• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Use WDSc to Develop XSL Transformations

    August 1, 2007 Ted Holt

    I use WebSphere Development Studio client (WDSc) often for editing RPG, CL, command, and DDS source code. I was happy to learn recently that WDSc also works well for the development of XSL transformations. I don’t consider myself a pro at it, but I’m finding WDSc so helpful with my XML projects that I wanted to go ahead and share something of what I’ve learned so far.

    First, I need to mention that I am currently using WDSc 6.0.1. I have tried XSL transformations under the full product and WDSc Lite, and both have worked well for me so far.

    …

    Read more
  • Have Your Cake and Eat It, Too

    August 1, 2007 Hey, Ted

    Recently one of my superiors walked into my cubicle and asked for some information. I was in the middle of another task and didn’t want to be side-tracked, so I hurriedly ripped out an SQL query to satisfy his request. A little while later he was back in my office asking me to run a fresh copy of the query, and while I was at it, to total some of the columns. This last request threw me for a loop, so I used Query/400. Could I have satisfied his request with SQL?

    –D

    I thought I had covered this situation

    …

    Read more
  • Admin Alert: Getting Around System i Default Passwords, Part 2

    August 1, 2007 Joe Hertvik

    In the last issue, I discussed how System i default passwords are created, their consequences, and how they can be detected and neutralized. Today, I’m going to shift the focus over to some simple command configurations for limiting or eliminating the proliferation of default password user profiles in your partition.

    What Are Default Passwords and When Are They a Problem?

    Default i5/OS and OS/400 passwords occur when a user profile’s password value is the same as its corresponding user profile name (i.e. a user profile called JOE has a password of ‘JOE’). Active default passwords are a security risk because

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle