Author: Rudi van Helvoirt
-
A screen a story – Sometimes a question mark is not enough
By now you must be getting used to seeing a new version of IBM i Access Client Solutions (ACS) every time a new Technology Refresh (TR) is released – you are keeping your ptf’s up to date aren’t you?! In the official announcement letter we can read what is new for ACS, but most people…
-
A screen a story – A User Reporting Slow ODBC Performance
In my last article I wrote: “IBM i Services allows a modern system administrator to move away from having to use 5250 emulation, not because you should, but because using IBM i services is quicker in getting the job done. In my next episode of a screen a story I am going to demonstrate that…
-
A screen a story – The Contact Information National language version
Recently Scott Forstie created an SQL script allowing you to create a procedure with which it is a piece of cake to review the special instruction PTFs. What the link is between the contact information and the PTF cover letters is something I will explain later on. Please allow me to focus on the special…
-
A screen a story – The Run SQL Scripts bottom bar
If IBM is following the same schedule as it has in previous years it is fair to say that a new version of IBM i Access Client Solution (ACS) is waiting just around the corner. In the past April was the month in which a new ACS version was released as a part of a…
-
A screen a story – What does “move active records” mean?
The latest Technology Refresh (TR) for IBM i 7.4 and 7.5 has something new within them for reorganizing a file. If you have lost count of the TR levels IBM i 7.4 is at TR7 and IBM i 7.5 is at TR1. Every time a new TR is announced it can be overwhelming with the…
-
A screen a story – What does this button do? Part II
In my last article A screen a story – What does this button do? The SQL button was used to retrieve SQL statements which I then tweaked to get the job done. The purpose of it all was to build an SQL script to automate changing the object owner of a printer, object type *DEVD.…
-
A screen a story – What does this SQL button do?
When working in the IT business we all appreciate it if we are being helped by the operating system. For that purpose in the New Navigator for I IBM created the SQL button. Should we all start to use the name Navigator for i or keep it short, like I do, and use the term…
-
A screen a story – Not our problem anymore
Last week I ran into an issue, which did teach me something new about the command WRKPRB. After checking a test LPAR after having applied the latest group PTFs for IBM i 7.4, I noticed the following when checking the apply: When looking at the joblog of QSYSCOMM1 spoolfiles were being created: When looking at…
-
A screen a story – Explore the power of Authority Collection in Navigator for i
In order to step up to a higher level of security, I suggested a customer to start using encryption on File Shares on IBM i. Currently for IBM i SMBv3 with encryption, is the highest level you can go to. For more details I suggest you have a look at this article: smbv3-support-in-ibm-i-7-4. Since we…
-
A screen a story – Db2 Symmetric Multiprocessing part II
The sayings are “practice what you preach” or the more down to earth expression “eat you own dogfood”. Eating your own dog food is a phrase that refers to the internal use of a company’s own products or services in its day-to-day operations. So over the years I have been advising customers to purchase a…
-
A screen a story – Db2 Symmetric Multiprocessing
Part of the announcement of IBM i 7.5 was a change in what is entitled as part of the base operating system with IBM i. If you want a complete list of the Price Change(s): Price Decrease on Selected IBM i Sofware Products please have a look at the spreadsheet which is available for download…
-
A screen a story – Enabling SSL/TLS for IBM Navigator for i
In today’s world there is a lot of emphasis on IT security. Not strange when the word “Hack” is a word you often hear or read when following the daily news. We all know that there is no better security level possible than security implemented at the source level. I like bringing examples to life…