[[{“value”:”I KNOW I had this working a while back, but it has been a while. I have the IBM i Renderer extension installed, and I have used it, but I cannot for the life of me remember HOW I got the rendered version of the display file to display. Does anyone know?
submitted by /u/garciawork[link][comments]”}]] Read More
New SQL scalar functions to generate UUID [email protected] (Simon Hutchinson)
[[{“value”:”At times there a coincidences, and this is one. I had been asked to add a UUID column to a SQL table that is sent to another application on a non-IBM server. My original plans were to use the MI program _GENUUID to generate the UUID. Then, to my delight I find that the latest Technology Refreshes, IBM i TR5 and IBM i TR11, includes two new SQL scalar functions that will generate an UUID. Which is ideal for me as I was using a SQL Insert statement to add data to the interface’s table.
What is UUID? Without going into too much detail, it stands for “Universally Unique Identifier”. It is administered by the Internet Engineering Task Force, IETF, with a standard, RFC9562, which defines it as: “A UUID is 128 bits long and is intended to guarantee uniqueness across space and time”. If you are interested in learning more the standard’s document is here.
In character form a version 4 UUID is 36 characters, and is formatted thus:
XXXXXXXX-XXXX-4XXX-XXXX-XXXXXXXXXXXX
Read more »”}]] Read More
Navigating the New Year: A Checklist for IBM i (AS400) B2B Companies [email protected] (Matt Laskosky)
B2B companies using IBM i (AS400) systems are at an exciting turning point. With technology evolving, it’s a great time to be proactive and stay ahead while keeping everything secure. In this blog post, we’ve created a helpful checklist for IBM i users, highlighting key priorities for 2025 and beyond. From enhancing security to modernizing systems, we’ll explore the important areas that deserve your attention as we embrace the new year. Read More
QMGTOOLS: Check Disk Fragmentation
This document shows how to use the IBM i Support Must Gather Tools (QMGTOOLS) to display fragmentation status of the system ASP based on the free space level counts in comparison to the system ASP threshold and the storage lower limit values. Read More
Re-architect: Transform Your IBM i Applications for Future Success Profound Logic
[[{“value”:”Explore how re-architecting IBM i applications can create new opportunities for innovation and growth. Learn how Profound AppEvo’s methodology ensures successful architectural transformation while preserving business value.
The post Re-architect: Transform Your IBM i Applications for Future Success appeared first on Profound Logic.”}]] Read More