• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Every Bucket Deserves a Descriptive Name

    July 28, 2010 Hey, Guru

    One of the fun things about editing this newsletter is reading the interesting ideas I get from you, the readers. One reader in particular, one of the several David’s from whom I hear, comes up with interesting questions, comments and ideas. Here’s an SQL tip he came up with. I thought I’d share it with you.

    Many of us use files with “buckets” (a list of repeating fields), in order to easily present data to users in an intuitive format. A file with repeating fields violates First Normal Form (1NF), and can cause grief when the number of buckets must

    …

    Read more
  • Allocating Enough System Storage to a Subsystem

    July 28, 2010 Hey, Joe

    I want to set up a private storage pool on our i/OS machine for our debit card subsystem. I want to protect its storage since we frequently time out on transactions, even when we run the programs run at priority 16. The debit card programs already run in their own subsystem, but how do I make sure the subsystem pool is getting enough memory?

    –David

    There are two ways you can approach this problem: give the subsystem a fixed amount of memory that never varies, or give the subsystem its own shared storage pool that contains a range for how

    …

    Read more
  • AAA Secures IBM i Server

    July 21, 2010 Pi Guang Ming

    The IBM HTTP Server for i, powered by Apache, has three distinct ways to handle whether a particular request for a resource will result in that resource actually being returned. These three techniques are access control, authentication, and authorization, or AAA.

    In this article, I’ll share how AAA works within IBM HTTP Server for i.

    First A: Access Control

    Access control refers to any means of controlling access to any resource. This A is distinct from authentication and authorization.

    IBM HTTP Server for i uses Allow and Deny directives to implement the criteria of access control. The Order directive

    …

    Read more
  • It’s My (De)fault That You’re a Zero

    July 21, 2010 Ted Holt

    Unless you say otherwise, numeric database fields have a value of zero and character fields are blank, right? Not necessarily. There’s more to default field values than some i Gurus realize.

    A field’s default value is the value the system assigns to the field when an application does not specify a value. Default values come into play in several situations.

    1. A record (row) is added to (inserted into) a physical file (table) by means of a logical file or SQL view that does not contain one or more fields.
    2. RPG O specs list the fields of an externally described file,
    …

    Read more
  • Admin Alert: The Poor Manager’s 5250 Single Sign-On

    July 21, 2010 Joe Hertvik

    Properly implemented, single sign-on (SSO) is a blessing for i/OS shops. With it, users log on to their desktops once and then access all their servers without entering several different passwords. But it’s always been problematic enabling SSO for Power i machines, causing some administrators to skip the process all together. This week, I’ll present a workaround for making PC5250 sessions act like single sign-on participants without configuring SSO.

    Same as Single Sign-On, Only Different

    In earlier articles, I outlined how to set up an i/OS system for single sign-on. (See Related Stories below.) A true SSO environment provides access

    …

    Read more
  • Heads Up! Additional Configuration Required for Windows 7/Windows Server 2008 R2

    July 14, 2010 Patrick Botz

    If you have a Windows 7 workstation or you are running Windows Server 2008 R2, there is an extra configuration step to enable Kerberos authentication with i5/OS. In these releases, Microsoft no longer enables the DES cipher suites (DES-CBC-MD5 and DES-CBC-CRC) for Kerberos by default. Unfortunately, Kerberos on i5/OS does not support the new default suites used by Microsoft.

    A few details about the Kerberos protocol will explain why this change requires additional configuration. The Kerberos protocol negotiates the cipher suites used to build Kerberos tickets. When a client requests a Kerberos ticket, it includes a list of cipher suites

    …

    Read more
  • Who’s the Scoundrel That Corrupted My Database?

    July 14, 2010 Dear Guru

    Yes, I’m talking to you. You who read this newsletter are gurus. Devoted and profoundly resourceful reader Sarah showed me a tip that I’ve got to share with you. Her technique makes it easy to find out who’s doing what with the database.

    Sometimes a user asks Sarah to determine who changed something in a file. The journal tells all. The problem is that journals are not easy to read. The data is stored in one big long field, called entry-specific data. However, Sarah has a way to break down the entry-specific data as it is defined in the database.

    …

    Read more
  • Admin Alert: Keep Your Data Synced Up During an HA Switch Over

    July 14, 2010 Joe Hertvik

    When performing high availability (HA) switch exercises where production processing is temporarily switched from a live system to an HA system and back again, there is one essential procedure that must be followed or you risk screwing up your databases and losing data. Here’s the issue and how to avoid it.

    Rule #1: Don’t Do This!!!

    In my humble opinion, this is the cardinal rule for an HA switch over:

    Don’t update your production data without replication running.

    It’s a good simple rule to follow, but it’s also an easy rule to mess up. Whenever you switch processing from a

    …

    Read more
  • Generic Database Access with .NET 2.0

    June 30, 2010 Michael Sansoterra

    A difficult task for developers is to foresee how an application may evolve in the future. As we all know, sometimes the unrealistic becomes reality. Say you have an application that will start on SQL Server and possibly later be moved to DB2 for i or vice versa. How do you create a data-centric application in .NET that isn’t tied to a particular database server? The answer lies in writing “database-agnostic” code.

    Let’s back up for a moment to when .NET was in its infancy. When .NET was first released, each ADO.NET database provider had its own set of classes.

    …

    Read more
  • Spaces, Braces, and Semicolons

    June 30, 2010 Hey, Ted

    My Qshell script would work perfectly if I could make it count correctly. It thinks I have more objects in library QGPL than I really do have. Can you help?

    –Hugo

    Today is a spectacular day to improve our Qshell skills, thus improving our Unix and Linux shell skills and beefing up our résumés.

    Here is Hugo’s Qshell command:

    find /qsys.lib/qgpl.lib/ -name '*' | wc -l
    

    The “find” utility produces a list of everything (-name ‘*’) in QGPL. The list is passed along to the “wc” utility, which counts the number of lines (-l) in the list. The problem is

    …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle