FlashCopy Aaron Fistler

​[[{“value”:”Page
edited by
Aaron Fistler

ESS FlashCopy® creates a clone of the source system onto a second set of disk drives which are then attached and used by another system or LPAR partition. BRMS provides a mechanism to perform a backup on the second system such that it appears to have been done on the original system.When using BRMS with FlashCopy, be aware that:To use all the functions of BRMS, 57xxBR1 Option 2 (FC-5102)  the BRMS – Network Feature and BRMS-Advanced Functions Feature are required.All BRMS functions are available in the base install of 5770BR2. BRMS PTFs should not be loaded on a system when it is in FlashCopy mode. The FlashCopy status needs to be *END. To verify the Flash copy status, run the following command – CALL PGM(QBRM/Q1AOLD) PARM(‘FLSSYSSTS ‘ ‘*DISPLAY’) The options the *DISPLAY will show are: *END which is the same as *ENDPRC *BEGIN which is the same as *STRPRC *BACKUPSYS which is the same as *STRBKU *ENDBACKUP which is the same as *ENDBKUIBM tests BRMS only with IBM disk storage products. BRMS is not tested with any OEM products or applications.FlashCopy is an IBM® System Storage® technology supported and controlled by IBM storage devices. FlashCopy processes are used outside of BRMS and not controlled by BRMS. When using BRMS with one system as a production system and a secondary system as the backup system, BRMS functionality and output are not equal between these systems. The FlashCopy process is a one-way process, the backup system’s data is not copied back to the production system by BRMS or toolkits. Toolkits such as IBM’s Systems Lab services Full System Copy Services Manager (FSCSM), only synchronize BRMS backup information (QUSRBRM) or the customer is responsible for building their own solution.
BRMS and IBM Cloud Solution for i supports FlashCopy environments in versions 7.3 and later with version 5.2 of the Expert Lab Services Toolkit and the following BRMS PTFs:7.4 SI767387.3 SI76737
Click on the links below for information about using FlashCopy with BRMS:Full System FlashCopyIASP FlashCopyUser-defined SYSBAS and IASP Timestamps

email.notification.view.online
·
View Changes Online”}]] Read More 

JavaScript: The Enterprise-Ready Language for IBM i Futurization Profound Logic

​[[{“value”:”Learn why forward-thinking organizations are choosing JavaScript over Java for IBM i transformation projects. Explore how Profound AppEvo leverages JavaScript to deliver faster, more cost-effective futurization with superior developer availability.
The post JavaScript: The Enterprise-Ready Language for IBM i Futurization appeared first on Profound Logic.”}]] Read More 

Easier way to check if member exists Simon Hutchinson

​[[{“value”:”I was asked: What is the easiest way to check if a member exists in a file?
They had been recommended to perform the check in a CL program, but wondered if there was a way to do the same in a RPG program.
In a “pre-SQL” world I would have used the Allocate Object command, ALCOBJ, in a CL program to check if the member exists. My program would look something like this:
Read more »”}]] Read More 

Secure API Authentication for IBM i: Protecting Your System While Enabling Integration Daniel Magid

​[[{“value”:”Our previous security blogs explored how IBM i systems are often isolated from enterprise security architectures and discussed implementing technologies like Okta for Multi-Factor Authentication. Our last blog focused on the vulnerabilities inherent in using Basic Authentication and the reasons to replace Basic Authentication with more modern authentication methods. Today, I want to focus on
The post Secure API Authentication for IBM i: Protecting Your System While Enabling Integration appeared first on Eradani.”}]] Read More 

Verified by MonsterInsights