• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Why Are My Batch Jobs Running at Priority 20?

    November 30, 2011 Hey, Joe

    I’m looking at my work management setup on one of my System i boxes. I noticed that all the jobs in my QBATCH subsystem are executing at run priority 20, the same priority as my interactive jobs. What’s going on, here, and how do I reset my batch jobs to run priority 50 where they belong?

    –Henry

    In three steps, here’s what I think is happening and how you can change your batch run priorities.

    Step 1: Your job and its routing data

    Each submitted job has its own routing data. Job routing data can easily be viewed through the

    …

    Read more
  • NULL and NOT IN

    November 16, 2011 Ted Holt

    No matter who you are, there’s always something you can learn. In Much Ado about Nothing: Interesting Facts about Null, I presented a good bit of information about null values in database tables. Imagine my surprise and delight to stumble upon something I did not know about nulls.

    It started innocently enough. I was surfing the Web and happened upon a link to an article entitled Ten Common SQL Programming Mistakes. I couldn’t click the link fast enough.

    I found a very well-written article by Plamen Ratchev. I won’t repeat the whole thing here, but Ratchev wrote about

    …

    Read more
  • Wow! I Could Have Had Long Column Names!

    November 16, 2011 Ted Holt

    Sometimes I find out that something useful has been available to me for a long time, but I didn’t know about it. Then I feel like a moron. Today I’m telling you that a certain DB2 for i feature has been around for decades, and you’re probably not using it. However, there’s no need to feel like a moron.

    The feature of which I speak is the database ALIAS. As you well know, DB2 for i, in its native architecture, permits database column (field) names of up to 10 characters. That’s certainly better than the six-character limit for identifiers in

    …

    Read more
  • Putting Your i System in Semi-Restricted State

    November 16, 2011 Hey, Joe

    We need to put one of our i partitions in restricted state where no applications are running. However, we also need TCP/IP to be up while the system is down, so that we can download PTFs and some software upgrades while our third-party packages aren’t in use. Is there a way to put our system in a semi-restricted state where we can only use our system console and TCP/IP communications?

    –Mike

    Yes, there is. And it’s relatively easy to accomplish. Here’s the drill.

    First, make sure all your users are off the system. Then, make sure that all your batch

    …

    Read more
  • Add Powerful Generic Processing to Your Applications

    November 9, 2011 Ted Holt

    Each month I perform a ritual by which I attempt to placate the gods Sarbanes and Oxley. One task involves repeatedly selecting a certain menu option, filling the entry fields with different values each time. What an annoyance. Fortunately there are ways to eliminate repetition programmatically, and the use of generic names is one such way.

    A generic name is one that ends with the asterisk wild-card. Many CL commands accept generic parameters. I have written about this before.

    But when you want to run a certain command over a group of objects, and the command does not allow a

    …

    Read more
  • Meet JSON

    November 9, 2011 Alex Roytman

    If you have done Web application development with any modern toolset or technology lately, you have undoubtedly run across a trusty friend of mine: JSON (pronounced Jason). In recent years, JSON, or JavaScript Object Notation, has become the data interchange format of choice for Web applications. It has allowed many Web frameworks to flourish and has tremendously simplified my own job of creating IBM i web applications and frameworks. That’s why I decided to write a series of articles on JSON, in which I will explain the what, the why, and the how of JSON in detail.

    Let’s get going!

    …

    Read more
  • Admin Alert: When You Can’t Answer Record Lock Errors

    November 9, 2011 Joe Hertvik

    Recently, a client had a problem with Power i record allocation messages. When a program crashed with an RPG1218 record lock inquiry message, the system didn’t ask for a message reply. Instead, it automatically answered the message with a “D” to dump program data and end the job. The client didn’t want this to happen. He’d rather answer the message himself and retry the allocation. Here’s what happened and how it applies to all i OS shops.

    A Common Problem

    The first thing to understand is that this is a fairly common i OS situation. It isn’t magic or a

    …

    Read more
  • Adobe Flash Builder for the iSeries Programmer, Part 3

    November 4, 2011 Shannon O'Donnell

    NOTE: The code accompanying this article is available for download here.

    In my previous articles in this series, I showed you how to use Flash Builder to create a customer information GUI. You learned how to add visual components such as input text boxes, drop down lists, and even a tab navigator control. In this article, I will show you how to make your GUI into a server client that talks to Websphere Application Server Express running on your iSeries, and I will show you how to exchange data with the iSeries DB2/400 database.

    I will also demonstrate how

    …

    Read more
  • Debugging Authority Failures, Part 3

    November 2, 2011 Patrick Botz

    Authority failures are the result of attempts (i.e., actions) to access objects to which a user profile is not authorized. Several IBM i features, such as job logs and QHIST, contain some authority failure information. However, the system audit journal has all the information you need, and the OS provides easy-to-use tools to help you quickly find it. These tools are the audit configuration system values, the CPYAUDJRNE command, and the STRSQL command.

    Audit System Values

    To begin auditing authority failures, configure three system values: QAUDCTL, QAUDLVL, and QAUDLVL2. QAUDCTL is an on/off switch for auditing specific objects, specific user

    …

    Read more
  • Adaptable Data Areas

    November 2, 2011 Ted Holt

    If you’ve worked in IT for more than 15 minutes, you’ve undoubtedly been asked, “How hard would it be to. . . ?” The people who depend on the systems we support are constantly thinking of new and better ways to make information systems more closely resemble the reality of business. Every little thing you can do to ease the effort to modify software is worth doing. Here are two extremely simple ways to reduce the amount of effort required to change the length of a character data area.

    Consider a data area, FacInfo (Facility Info), that contains one item

    …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle