Our Shield team were at the TechXchange in Las Vegas last month. We’d like to thank all those who visited our booth and chatted with Chris and Charlie. A special thank you to COMMON too, Read More
Using expression in CL call parameters [email protected] (Simon Hutchinson)
[[{“value”:”Starting in IBM i 7.4 it is possible to use CL Built in Functions, BiF, in the parameters of CL’s Call command. This becomes even easier when I use the additional parameters in the Parameter parameters of the CALL command.
Those of you who have seen example of my RPG code have seen examples where I have used BiFs in its Call operation code parameters. When I learned that there was now similar functionality in CL I became very curious what could I do with it.
I chosen a number of scenarios to write examples for, as these are things I have done many times with RPG’s Call operation code.
Read more »”}]] Read More
IBM i Security Essentials: 4 Components for an Effective Strategy
[[{“value”:”IBM i has the great potential of keeping your data secure at the highest level, but is it configured to take advantage of all the security features the system provides?
On IBM i, many remote servers (e.g., FTP, ODBC/JDBC, SQL, File Server, Telnet, etc.) are turned on by default and can allow users with legitimate system access the ability to bypass their usual application-level security and access whatever they want by using the remote service.”}]] Read More
Automate IBM i Backup: The Smarter Tape-Free Solution LaserVault
Want to simplify your IBM i backup processes? Discover how to automate and modernize your backup strategy without the hassle of physical tapes. This short pre-recorded session showcases a smarter, tape-free solution that helps you achieve efficient, automated backups with the reliability you need. Read More
Overview of JOBS Programmers IO
Teaching IBM Power skills in a free online IBM i Internship Program for university students and IT professionals around the world. Read More