• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Use WDSc to Develop XSL Transformations

    August 1, 2007 Ted Holt

    I use WebSphere Development Studio client (WDSc) often for editing RPG, CL, command, and DDS source code. I was happy to learn recently that WDSc also works well for the development of XSL transformations. I don’t consider myself a pro at it, but I’m finding WDSc so helpful with my XML projects that I wanted to go ahead and share something of what I’ve learned so far.

    First, I need to mention that I am currently using WDSc 6.0.1. I have tried XSL transformations under the full product and WDSc Lite, and both have worked well for me so far.

    …

    Read more
  • Have Your Cake and Eat It, Too

    August 1, 2007 Hey, Ted

    Recently one of my superiors walked into my cubicle and asked for some information. I was in the middle of another task and didn’t want to be side-tracked, so I hurriedly ripped out an SQL query to satisfy his request. A little while later he was back in my office asking me to run a fresh copy of the query, and while I was at it, to total some of the columns. This last request threw me for a loop, so I used Query/400. Could I have satisfied his request with SQL?

    –D

    I thought I had covered this situation

    …

    Read more
  • Admin Alert: Getting Around System i Default Passwords, Part 2

    August 1, 2007 Joe Hertvik

    In the last issue, I discussed how System i default passwords are created, their consequences, and how they can be detected and neutralized. Today, I’m going to shift the focus over to some simple command configurations for limiting or eliminating the proliferation of default password user profiles in your partition.

    What Are Default Passwords and When Are They a Problem?

    Default i5/OS and OS/400 passwords occur when a user profile’s password value is the same as its corresponding user profile name (i.e. a user profile called JOE has a password of ‘JOE’). Active default passwords are a security risk because

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12
  • Unattended IBM i Operations Continue Upward Climb
  • VS Code Is The Full Stack IDE For IBM i
  • Domino Runs on IBM i 7.5, But HCL Still Working on Power10
  • Four Hundred Monitor, March 6
  • IBM i PTF Guide, Volume 25, Number 11

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle