Use IBM i Authorization Lists to Control Access NickLitten

​How can I use IBM i authorization lists to control access? IBM i (AS400/iSeries) authorization lists are a powerful tool for controlling access to objects within your system. Let’s explore how you can effectively use them: Remember that authorization lists provide a flexible and efficient way to manage security. By using them effectively, you can Read More 

Talsco Weekly: ​AI and the IBM i patrick staudacher

​[[{“value”:”Welcome to another edition of Talsco Weekly IBM i Brief:  🔗 ​LightEdge Acquires Connectria. 🚀​ Rocket DevOps Receives Major Update. AI:  ​IBM AI Adoption Index​. AI and the IBM i. Development:  ❓ ​A Basic Node.js Question. A Deep Dive Into Node.js Streams. Data:  🔍 ​CD Query emerges as an alternative to DB2 Web Query. Training: 
The post Talsco Weekly: ​AI and the IBM i appeared first on IBM i (AS/400, RPG) Recruiting, Staffing & Consulting.”}]] Read More 

The Importance of BIFs, Part 1

​[[{“value”:”You know, you have a numeric field from a file, and you use a BIF to convert it to a character field.
The second thing to keep in mind about BIFs is that while many use just one parm, most of them are going to have multiple parms that need to (or can be) passed within the parentheses.”}]] Read More 

Verified by MonsterInsights