• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Guru: Debugging SQL Stored Procedures With ACS

    April 11, 2022 Mike Larsen

    I use Access Client Solutions (ACS) daily to help with different tasks. I’m usually running SQL scripts or working with the IFS, but recently I was asked if there was a way to debug SQL stored procedures using ACS. More specifically, they were looking for a way that a “non-IBM i” person can debug SQL stored procedures on IBM i.

    After browsing the various menus in Run SQL Scripts in ACS, I found a system debugger. I had seen the system debugger before, but never took the time to explore it further. With this new request in mind, I decided …

    Read more
  • Guru: IBM i Experience Sharing, Case 3 – When Performance Issues Come From Without

    April 4, 2022 Satid Singkorapoom

    When I started my IT career 35 years ago, it was in the “centralized” universe that originated from the mainframe model. All core application codes ran in one — and only one — big iron that all users accessed with “dumb” terminals devoid of any GUI. Problem solving in AS/400 systems was frequently straightforward and not time consuming because most cases were anything but elusive.

    But the contemporary IT infrastructure universe has evolved into a big onion, with layers that we must peel while troubleshooting. I often find myself having to address a problem in multiple layers, and it no …

    Read more
  • Guru: SIEM Is Only Part Of IBM i Cybersecurity

    March 28, 2022 Bruce Bading

    Many times, we hear from IBM i business owners that their SIEM – that’s short for Security Information and Event Management – is their cybersecurity solution for the IBM i. But that can’t be true, and I want to explain why it is part of the security shield but certainly not all of it.

    Let’s start with SIEMs and how they fit into cybersecurity frameworks. SIEM is mentioned in the PCI appendix, but not once in the core of the 250+ PCI DSS requirements, likewise, the NIST Cybersecurity Framework lists event monitoring as one of the 100s (1/100s) of NIST …

    Read more
  • Guru: IBM i Experience Sharing, Case 2 – Dealing With CPU Queuing Wait Time

    March 21, 2022 Satid Singkorapoom

    When we drive our cars, we hope to avoid red lights and traffic jams, because we all hate waiting immobile in traffic. I’m sure that you are aware, fully or subtly, that active jobs in any computer system can encounter wait as well. The IBM i developer team has categorized many types of wait.

    In this article, let’s look at CPU Queuing wait time. Let’s see how we can interpret and address it in a sensible way to resolve poor performance. I’ll try to provide you with a useful approach to wait time analysis using a gloriously useful performance reporting …

    Read more
  • Guru: IBM i Experience Sharing, Case 1 – Object Authority Check And Batch Job Performance

    March 7, 2022 Satid Singkorapoom

    Batch processes are perennial in virtually all kinds of business processing. From time to time, customers have to deal with batch runs that take too long, and many factors influence run time. One such factor in IBM i is how you assign object authority access rights for user profiles to the libraries and objects that are accessed by batch jobs. The importance of this factor can be found in the following case study.

    Many years ago, a customer asked me to determine why batch run time took too long. The customer ran 25 concurrent batch jobs in the batch process …

    Read more
  • Guru: Would You Rather See a Fire Marshal or a Fire Fighter?

    February 28, 2022 Bruce Bading

    While there are similarities between the two, a fire marshal has a preventive role and focus on preventing fire, whereas a fire fighter has a reactive role and focuses on the putting out the smoldering ruins.

    When it comes to your firm’s cybersecurity practices, would you consider yourselves to be proactive or reactive (Fire Marshal or Fire Fighter)? The biggest difference between the two is your level of vulnerability when an attack does happen.

    There are ongoing practices that you can do to reduce your risk. One thing that we recommend is included in every proactive cybersecurity strategy is a …

    Read more
  • Guru: Backup to an NAS using RSYNC

    February 14, 2022 Dan Devoe

    Like many small shops, we use a simple tape drive to backup most of our libraries and the contents of the IFS. Each workday, the tape would be changed and the previous tape taken home by someone in IT in case of a disaster.

    But then, COVID hit – there was no one in the office to switch tapes and the same tape was being used to perform nightly backups. What if we discovered a problem with the data from two nights ago? Ordinarily, we would restore one or more libraries or files from the appropriate tape.

    I set up …

    Read more
  • Guru: Keeping Track Of IBM i System Limits

    January 17, 2022 Dawn May

    Every complex system has limits, and computer systems are no different. During my work with clients over the years I’ve seen many shops push their systems as far as they can go until performance breaks down. The limits I encounter are generally numbers of things: How many objects can exist in a library? How many rows can be inserted into a table? How large can a file in the IFS be?

    Typically, these limits are large and you may think you do not need to worry about them, especially after an upgrade. But as the workload on your system …

    Read more
  • Guru: Global Variables in Modules

    December 13, 2021 Ted Holt

    When I first learned to program computers (RPG II, COBOL 74), the only kind of variables I knew of were global variables. Any statement within a program was able to use any variable.  It was not until I started my computer science degree that I found out about local variables, which are known to only part of a program. Since that time, it has been my practice to use local variables as much as possible and global variables only when necessary.

    Ideally an RPG program, service program, module, or subprocedure would have no global variables at all, but I don’t …

    Read more
  • The Four Hundred Guru Retires

    December 13, 2021 Ted Holt

    This is the last issue of The Four Hundred for which I am serving as technical editor.

    I have been editing the technical content of and writing articles for this august publication for 20 years. For most of that time, this has been a side job that I’ve done outside of normal working hours (i.e., nights and weekends). I’m ready for a change. Technical editing and writing are not easy and they take a lot of time, time that I had rather spend doing other things.

    In the days ahead I plan to spend:

    • Less time sitting and more time
    …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle