• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • API Corner: Database APIs

    September 28, 2005 Shannon O'Donnell

    The code for this article is available for download.

    If you want to gather some information about an OS/400 database, there are several ways you can go about it. You could use the DSPFD (Display File Description) command to display top level information about a file. Or you could use the DSPFFD (Display File Field Descriptions) command to display information about each field. However, neither command has a very convenient method of getting the resulting information into a format that can be easily used by your applications. To do that, you need to use the database APIs.

    The Database

    …

    Read more
  • SQL Record Selection with Dynamic Lists

    September 28, 2005 Ted Holt

    SQL’s IN predicate provides an easily understood, practical way to select records (rows) of a database file (table) by comparing a field’s (column’s) value to a list of predetermined values. However, when using IN with a dynamic list, i.e., a list whose values and number of values are not specified until run time, IN has a drawback, namely that the programmer must allow for the number of values in the list in advance. This article will give you three ways to deal with dynamic lists.

    But first, a brief review of the IN predicate is in order. One way to

    …

    Read more
  • Admin Alert: Limiting the Long Reach of OS/400 Security Officers

    September 28, 2005 Joe Hertvik

    It almost goes without saying that i5/OS and OS/400 administrators should limit the number of users who have security officer authority (SECOFR). In the wrong hands, SECOFR users can delete files, manipulate information for ill-gotten gains, corrupt system configurations, and compromise organizational and customer secrets. So as a general operational principle, the fewer people who possess security officer access, the better.

    But in some organizations, it isn’t enough just to limit the number of people who are security officers. You may also be required to limit where and when the few security officers you do have can sign on. This

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12
  • Unattended IBM i Operations Continue Upward Climb
  • VS Code Is The Full Stack IDE For IBM i
  • Domino Runs on IBM i 7.5, But HCL Still Working on Power10
  • Four Hundred Monitor, March 6
  • IBM i PTF Guide, Volume 25, Number 11

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle