![]() |
|
|
In this Issue |
![]() |
![]()
| >> |
From the Editor:
No rest for the weary |
| >> |
Featured Topic:
Crash course: Remote journaling |
| >> |
Expert Technical Advice:
* Featured expert: Ken Graap, backup and recovery
* Discussion thread: Convert database file to XML
* Admin. tip: Commands, APIs and op-codes to control activation groups |
| >> |
Site Highlights:
* Webcast premiere: Benefits and uses of remote journaling
* Reader poll: Skills for the future
* Expanded output functions for the iSeries |
![]()
|
|
From the Editor: |
![]() |
![]()
by Michelle Davidson, site editor
![]()
No rest for the weary
It's summertime, and the living is easy. Right? Not exactly.
You may have that 10-day vacation all lined up, but the work you need to do before you can head out is immense. (It's like packing two weeks of work into one.) Then there's the dread of knowing how much work -- and e-mail -- you're going to face when you return. But it will be OK, you think. You can handle it because you'll have 10 days of R&R. Wrong. Not if you bring your cell phone -- or are foolish like me and drag along your laptop to check e-mail. Inevitably you get sucked into work.
According to a recent survey from IT recovery services firm CoreProtect, more than 20% of IT managers and staff had their vacations interrupted by calls from work, and more than 70% dread the pile of work that awaits their return.
There really is no escape. Because computer networks are always on, the people who work with them are always on. Uptime doesn't just apply to the machines; it also applies to the men and women who manage them. With IT still dealing with cutbacks, work is bound to interrupt and rain on your beach day because there just aren't enough people to fill the void.
What can you do? Unfortunately, there isn't a simple answer. You can hope that the economy improves and your department starts hiring. You could plan a vacation where cell phones don't work -- the mountains or an island in the middle of the ocean. If that isn't an option, how about leaving your cell phone behind -- at least for a few hours. After all, we all need a break once in a while.
That said, I need to hurry up and finish my work for NEXT week. I'm taking a few days off. This time I won't bring my laptop.
|
![]()
|
|
Featured Topic: |
![]() |
![]()
Crash course: Remote journaling
by Michelle Davidson, site editor
![]()
There's no doubt that 24x7 availability and secure backups are essential. With remote journal support, achieving that becomes a little easier. These tips and articles show you how to get the most out of this technology.
Read more about this topic
|
![]()
|
|
Expert Technical Advice: |
![]() |
![]()
Featured expert: Ken Graap, senior AS/400e system administrator, Northwest Natural Gas
Category: Backup and recovery
With all the data companies generate and store, you can't afford to lose any. Backup and recovery expert Ken Graap can help you if you're in a bind.
Submit a question
|
![]()
|
This Week: In the forums
|
| >> |
Convert database file to XML
"Silvap" was looking for a tool that would convert database files to XML. Lucky for him "PKArcher" has some programs that can do the trick.
|
| >> |
Limiting query access
"Imserious" wants to restrict the libraries users can access in query. Do you know how to do this?
|
| >> |
Upgrading to V5R2 without losing V5R1
"Wishiwereaguru" wants to put V5R2 on a machine that's already running V5R1 -- but without losing V5R1. He wonders if he can have them on separate drives or should he put them on two partitions. "Ug400guru" offers some advice. |
![]()
| Tip of the Week: |
Commands, APIs and op-codes to control activation groups
by Ron Turull
First you learned the basics of activation groups, then you learned how to create and delete them and some strategies for using them effectively and efficiently. Now it's time to learn how to control them. Let's take a look at some of the more common system commands, APIs and high-level language op-codes (a.k.a. HLL verbs) you can use to control activation groups. |
| >> |
Read full tip |
![]()
|
|
Site Highlights |
![]() |
![]()
![]() |
Webcast premiere: Benefits and uses of remote journaling
Speaker: Larry Youngren, leader of IBM's iSeries Journal microcode design team
Speaker: Adam Stallman, member of IBM's iSeries Journal design team
If you need a highly available 24x7 system, a remote data vault, or just better plumbing for your data warehouse approach, you'll want to consider Remote Journal support. This webcast looks at what Remote Journal support can offer your business.
Listen to broadcast
Sponsored By: iTera, Inc.
![]()
Reader poll: Skills for the future
Do you believe a different skill set will be required of you within the next five years?
Vote now
|
![]() |
![]() |
![]() |
Expanded output functions for the iSeries
IBM announces enhancements to InfoPrint Server & Designer
On Aug. 19, IBM unveiled new capabilities being added to iSeries e-Output. Bill Shaffer, iSeries Product Manager, Printing and E-output, joined Search400.com for a live webcast to announce the features and answer members' questions. Click over to listen to all the details.
Sponsored By: Brooks Internet Software
|
![]() |
![]()
|
![]() |
![]()
![]() |
|
Update your subscriptions
|
![]() |
| Select newsletters you would like to receive from the list below. |
![]() |
|
Daily News |
|
Administrator Tips |
|
Programmer Tips |
|
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
| On-demand tough sell |
| IBM is selling its on-demand vision as computing nirvana, but some users are hesitant about taking that leap of faith. Analysts understand why users are leery but say taking an incremental approach to on-demand can be a no-lose proposition. |
Read story |
|
![]()
![]()
| Product/vendor guide |
Compare app. dev. products
Let Search400.com help you determine which vendors can help you with your application development needs. Check out the listings of vendors and their tools before you make any decisions. |
Find tools |
|
![]()
| iSeries security |
Best practices
In today's computing environment, new security problems emerge on a daily basis. With the basic security issues addressed, you have more time to devote to specific and proactive security improvement endeavors. |
Read paper |
|
![]()
|
![]() |