Category: IBM i
-
IBM Power Systems Enhances Hybrid Cloud Capabilities with Red Hat
New pre-configured private cloud platform, innovative cloud-consumption payment model, and more Red Hat software now supported on IBM Power Virtual Servers BM (NYSE: IBM) announced availability of Red Hat software on IBM Power Systems as well as new IBM Power Systems hardware. These announcements further expand IBM Systems’s commitment to help clients modernize by empowering them with the…
-
SQLite – What is that?
In this article, I’m going to show you another database option we now have on our IBM i. All these choices! Little did we think we would have any alternative for a database, we expected only to have the excellent DB2 for i. So, what is it? SQLite is a serverless database, self-contained and is…
-
Convert Spool File To PDF or Text File
On most systems I work on there are simply far too many spool files. Spool files are no doubt a useful source of information but what is also in no doubt is that spool file maintenance is one of the last tasks on anyone’s agenda. However, on every system there are spool files which are…
-
Remain Software Milestone
NIEUWEGEIN, Netherlands — Remain Software released today the second Milestone of TD/OMS V13, Gravity V6, Remain API Studio V2, and MiWorkplace V1.25.0. In line with the company’s longstanding commitment to ongoing product and customer support, these new Milestones mark the second of three scheduled enhancements to the current versions. The releases feature notable enhancements to integrations, user…
-
My source is MIA – RTVCLSRC
A bit of a follow on to my article in July last year about checking the date of source against your program. I have a customer who for their sins continues to run a V5R4 partition, part of the reason for this is if you run ANZOBJCVN you’ll kill a small forest with the number…
-
Should we strive to improve our code?
Last week, I was looking for “CPF2234 Invalid Password” messages, for a program I am writing. I assumed that I would find them in QSYSOPR, but there weren’t any. So, I tried DSPLOG and there they were. “Oh no”, I hear you say, “Why are you using 5250 Green Screen?”. I will admit that I…
-
Finding Non-Encrypted Connections to your IBM i
Connecting securely to our systems is more important now than ever before and this is just as true for IBM i as any other platform. As I’m sure you know you can encrypt your connections to IBM i at no extra cost and there have been many articles written on how to set this up.…
-
Man – Where’s that Manual Gone?
IBM has released quite a few big hitters lately, MariaDB etc., and some of the not so well known utilites have slipped under the cover. Let me take you through one of them in this article. This great utility stops you being told to RTFM (Read the manual)! So this is where this open source…
-
A screen a story – IBM i Services (SQL) to the rescue
Friday 29th January 2021 I am in a Teams meeting which is drawing to an end, when the phone is ringing. A quick text message is the response, telling the caller that I will call back within 10 minutes. The moment I prepare myself for calling back, another customer is calling. This call takes some…
-
Version 4 of the well-known “Flash for i” product: to enhance the usage of External Storage with IBM i
Available for 5 years, installed in more than 200 LPARs in 12 countries, you certainly already know the ‘Flash for i’ product. It brings to the IBM i the extremely powerful SnapShot/FlashCopy function (instant copy) of the external storage units. Mainly the usages of such a product were to completely automate the creation of a…
-
Free Registration Announced for RPG & DB2 Summit Lunch & Learn Series
— Features IBM i technical tips and tool demos for developers — Peterborough, NH – January 26, 2021 – System i Developer today announces free registration for a series of live, 75-minute Lunch & Learn events to take place from March 9-25, 2021. Designed exclusively for IBM i developers, the series focuses on latest IBM…
-
Lock System Values
Stay Safe! If you’re looking to tighten your IBM i security, it can be quite daunting to know where to start. Do you look at securing the perimeter by looking at an exit point solution, or do embark on lengthy object level security project? Or both?! A quick win for many could be preventing the…