• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • An Alternative to Externally Described Printer Files, Take 2

    April 2, 2008 Ted Holt

    Note: The code accompanying this article is available for download here.

    Tomorrow, Lord willing, I will present a session entitled “An Alternative to Externally Described Printer Files” at the COMMON conference in Nashville. I’ll be sharing the report-building technique my reclusive colleague Cletus the Codeslinger introduced almost four years ago in this august publication. Since that time, various people have offered feedback, which Cletus and I have used to update the template that he provided. In this article, I present the updated template and two example programs: one using native I/O, one using SQL.

    First, if you haven’t read

    …

    Read more
  • Performance Advice from a Mysterious Friend, Part 3

    April 2, 2008 Ted Holt

    Here’s a third performance tip from one of your fellow subscribers, whose identity I have agreed to hold in confidence. I appreciate the feedback I have received in response to his previous tips and hope to publish some of your comments in the near future.

    Here’s performance tip number 3: “Use CHGJRN to set MINENTDTA to *FLDBDY.”

    When you journal a file, you record changes that are made to contents of the file. You keep a record of each record added to the file, each record that is removed from the file, and each record that is changed. All of

    …

    Read more
  • Admin Alert: How System i Boxes Impersonate Each Other, Part 2

    April 2, 2008 Joe Hertvik

    Last week, I began covering how to change the communications identity on an i5/OS box so that it can impersonate another system and take its place on the network. This week, I’ll conclude demonstrating my i5/OS impersonation techniques and offer a checklist for making one System i box look like another System i box on your network.

    Why We Impersonate?

    As covered last issue, system impersonation techniques come in handy in the following situations:

    • When replacing an existing System i machine with a new box. During testing, setup, and cutover, both systems may need to run side-by-side and
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12
  • Unattended IBM i Operations Continue Upward Climb
  • VS Code Is The Full Stack IDE For IBM i
  • Domino Runs on IBM i 7.5, But HCL Still Working on Power10
  • Four Hundred Monitor, March 6
  • IBM i PTF Guide, Volume 25, Number 11

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle