• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Four Ways to Avoid Problems Caused by Global Data

    December 10, 2008 Ted Holt

    Junior J. Programmer modifies an RPG program. His testing works properly. The user’s test works properly. The user approves the change, the modified program is installed, and everything is copasetic until a few months later when the program gets stuck in a loop. What happened, and why is Junior not entirely to blame?

    Here’s the code Junior added to the program:

    C     1             DO        5             X                 1 0
    C                   EXCEPT    PLINE
    C                   ENDDO
    

    What could go wrong with such simple code?

    It turns out that the subroutine that contains Junior’s code is also conditionally and indirectly executed from another part

    …

    Read more
  • Where’s the Service Program?

    December 10, 2008 Hey, Ted

    We have two environments: a homegrown system for financials and a canned ERP system for manufacturing. We have written a service program containing subprocedures that access manufacturing data. This service program is stored in a library that is in the manufacturing system’s library list, but is not in the financial system’s library list. Now we need a financial program to use a routine from this service program.

    We add manufacturing libraries to the end of the finance library list when we create the finance program so the compiler finds the service program and binds to it. It would be nice

    …

    Read more
  • Admin Alert: The Dangers of User Profiles with Privileges

    December 10, 2008 Joe Hertvik

    Handling user profile authorities is one of the more critical i5/OS administrative duties. In particular, there are three crucial user parameters that must be set up correctly to prevent your users from inadvertently accessing objects and functions that they should not be using. Today, I’ll look at how you can work with these values to prevent several avoidable security pitfalls.

    The Hierarchy of User Authority

    Before you can work with user authorities, you must understand what they do. Here is the basic hierarchy of user profile security settings and how they relate to each other.

    1. System privileges–Eight user profile
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • LANSA Developing Business Intelligence Tool
  • Blazing The Trail For VTL In The Cloud
  • Data De-Dupe Gives VTL Customers More Options
  • Four Hundred Monitor, March 29
  • The Big Spending On IT Security Is Only Going To Get Bigger
  • IBM Tweaks Some Power Systems Prices Down, Others Up
  • Disaster Recovery: From OS/400 V5R3 To IBM i 7.4 In 36 Hours
  • The Disconnect In Modernization Planning And Execution
  • Superior Support: One Of The Reasons You Pay The Power Systems Premium
  • IBM i PTF Guide, Volume 25, Number 13

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle