Author: Rudi van Helvoirt
-
A screen a story – What does this SQL button do?
When working in the IT business we all appreciate it if we are being helped by the operating system. For that purpose in the New Navigator for I IBM created the SQL button. Should we all start to use the name Navigator for i or keep it short, like I do, and use the term…
-
A screen a story – Not our problem anymore
Last week I ran into an issue, which did teach me something new about the command WRKPRB. After checking a test LPAR after having applied the latest group PTFs for IBM i 7.4, I noticed the following when checking the apply: When looking at the joblog of QSYSCOMM1 spoolfiles were being created: When looking at…
-
A screen a story – Explore the power of Authority Collection in Navigator for i
In order to step up to a higher level of security, I suggested a customer to start using encryption on File Shares on IBM i. Currently for IBM i SMBv3 with encryption, is the highest level you can go to. For more details I suggest you have a look at this article: smbv3-support-in-ibm-i-7-4. Since we…
-
A screen a story – Db2 Symmetric Multiprocessing part II
The sayings are “practice what you preach” or the more down to earth expression “eat you own dogfood”. Eating your own dog food is a phrase that refers to the internal use of a company’s own products or services in its day-to-day operations. So over the years I have been advising customers to purchase a…
-
A screen a story – Db2 Symmetric Multiprocessing
Part of the announcement of IBM i 7.5 was a change in what is entitled as part of the base operating system with IBM i. If you want a complete list of the Price Change(s): Price Decrease on Selected IBM i Sofware Products please have a look at the spreadsheet which is available for download…
-
A screen a story – Enabling SSL/TLS for IBM Navigator for i
In today’s world there is a lot of emphasis on IT security. Not strange when the word “Hack” is a word you often hear or read when following the daily news. We all know that there is no better security level possible than security implemented at the source level. I like bringing examples to life…
-
A screen a story – IBM i 7.5 – Set Subsystem Routing
May the third IBM i 7.5 was announced, if you follow the IBM i news, this announcement was hard to miss. Normally it does take a while before every IBM i LPAR is running this version, but this time things are little different. First of all, the date IBM I 7.5 will be available is…
-
A screen a story – SQL Performance – a Table Scan
In today’s world it is impossible to limit yourself to the green screen when we are talking about IBM i performance and SQL performance in particular. For some shops the IBM i database has become the spider in the database “web”. I assume we have all heard about the Plan Cache and the Index Advisor…
-
A screen a story – A Better way to Retire the Heritage Navigator for i
Let me cut right to the chase, if you have read or have not the article of last month titled: “A screen a story – Retire the Heritage Navigator for i”, forget about it. If, however you do not have the option to apply PTFs in the short term and you are concerned about this…
-
A screen a story – Retire the Heritage Navigator for i
Although the log4j media storm of December 2021 has settled and is part of what we call the past. IBM did publish a document titled Security Bulletin: IBM i components are affected by CVE-2021-4104 (log4j version 1.x) When looking at this document you will find a section called “Workarounds and Mitigations”, in there you can…
-
A screen a story – Storage Spikes?
As mentioned in my previous article, this article is all about when disk space spikes all of a sudden and how to trace the culprit. The last few year more and more of my tasks have moved from 5250 emulation to Run SQL scripts. So finding the reason why disk space suddenly spikes is no…
-
A screen a story – Custom Charts. Is it a hidden gem?
If disk space fills up completely on IBM i, the system will eventually come to a stop. Before doing that it will get slower and slower. It is your task as a system administrator to prevent that from happening, In the past I have seen a wide variety of monitoring software keeping an eye on…