Recently Scott Forstie created an SQL script allowing you to create a procedure with which it is a piece of cake to review the special instruction PTFs. What the link is between the contact information and the PTF cover letters is something I will explain later on. Please allow me to focus on the special
The post A screen a story – The Contact Information National language version appeared first on PowerWire.eu. Read More
Practical SQL: Change Management with SQL MC Press Online
IBM continues to expand the scope of DB2 services, and two of them combine to provide excellent change management. By Joe Pluta In a recent article, I wrote about using an IBM DB2 for i service called DISPLAY_JOURNAL to retrieve object deletion information from the QAUDJRN journal. This service provides a way to identify when a program has been deleted. This article will expand on that by providing a way to compare the programs in two libraries to identify which programs are missing or otherwise different. Read More
Programming in ILE RPG – DDS Database Concepts MC Press Online
While most recent database objects are created by using SQL, many files are still defined by using DDS. The procedure for creating database file definitions with DDS is similar to that of creating an RPG program. By Brian Meyers and Jim Buck Editor’s Note: This article is excerpted from chapter 3 of Programming in ILE RPG, Fifth Edition. The first step is to use an editor, such as the RDi LPEX editor, to create a source member of definition statements. Most installations use a file named QDDSSRC to store members representing externally described files. The source member type of a physical file member is PF, and the type of a logical file member is LF. The editor automatically provides prompts appropriate to the member type you specify. Read More
The Skills Gap For Fortran Looms Large In HPC – The Next Platform
The Skills Gap For Fortran Looms Large In HPC The Next Platform Read More
Display event – POWERCast: Guide to IBM i Multi-Factor Authentication
We’ll discuss everything you need to know about implementing MFA verification on all your IBM i systems, including:
It seems that everyone—the government, regulators, insurance companies, enterprise security teams—is now requiring Multi-Factor Authentication (MFA) for IBM i system access. Read More