![]() |
|
|
In this Issue |
![]() |
![]()
| >> |
From the Editor:
Search400.com newsletters get new look |
| >> |
Featured Topic:
Top 10 backup commands |
| >> |
Expert Technical Advice:
* Featured Expert: Kenneth Graap, backup and recovery
* In the Forums: Command validity checker
* Programmer Tip: Take control of the jobq |
| >> |
Site Highlights:
* Tales from the AS/400 crypt -- they're alive!
* Vendor Webcast: UCCnet -- For suppliers, integration is the payoff
* Book Excerpt: Information Security Best Practices |
![]()
|
|
From the Editor: |
![]() |
![]()
by Debra Tart, assistant site editor
![]()
Search400.com newsletters get new look
Are you currently receiving Search400.com's News e-mails? If the answer is yes, then most likely you've already experienced a pleasant surprise in our new look. If the answer is no, you'll want to sign up today.
On Oct. 20, we gave our newsletters a facelift. From this point forward, the Today's News e-mails will be available in HTML format. The new and improved newsletters have a much nicer look, are easier to navigate and can be delivered right to your inbox -- free of charge.
To receive Today's News in the new HTML format, make sure you indicate your preference in your member profile. And if you decide you'd rather receive the text version, just check the "text" box in your preferences.
Be on the look out for other newsletter updates, as we will eventually be converting all of our weekly and monthly publications to HTML. Let us know what you think about our new look -- good or bad -- and don't hesitate to tell me if you think we can improve it in any way.
Search400.com members are our eyes and ears in the iSeries community. You are our top priority, and our main goal is to continually attempt to better serve our readers. We hope you enjoy our new look.
|
![]()
|
|
Featured Topic: |
![]() |
![]()
Top 10 backup commands
by Michelle Davidson, site editor
![]()
This week we address the backup basics with these top commands. Learn when it's the best time to use each one, then put the commands to use with the tips provided.
Read more about this topic
|
![]()
|
|
Expert Technical Advice: |
![]() |
![]()
![]()
|
This Week: In the forums
|
| >> |
Command validity checker
"Nicasas" said under V5R1 they had a validity checker program for the CHGSPLFA command. They upgraded recently to V5R2, and now it doesn't work. The reason is that the number of parameters to the command has changed from 39 under V5R1 to 42 under V5R2. He tried changing the validity checker CL program to accept all 42 parameters, but IBM has established a limit to the number of parameters to 40. How can he get around this? "CLKelly" and site expert John Brandt have some suggestions.
|
| >> |
Help for a WDSC beginner
"MCrangle" has a V5R2 machine and has WDSC installed on a PC. His question: What does he need to install on his 720 iSeries? Site expert Jim Mason replies.
|
| >> |
Need help connecting Windows XP machine to the 400
"Pam400" asks, "Does anyone know how I can make my Windows XP machine connect to the iSeries. I have to use a Twinax connection. I am using an Affinity adapter by Perle. I tried Cient Access and NS/router, but no luck. I tried Client Access Express, but I'm not sure how to make it recognize the Twinax. Any suggestions?" |
![]()
| Tip of the Week: |
Take control of the jobq
There are times when you'd like to submit jobs to a multi-stream job queue or run several jobs in parallel. How do you do that? In this tip Search400.com member Carolyn Kelly says it's a simple matter of changing some parameters. |
| >> |
Read full tip |
![]()
|
|
Site Highlights |
![]() |
![]()
![]() |
Tales from the AS/400 crypt -- they're alive!
You can smash it, flood it and even run a forklift through it, but the AS/400 (iSeries) keeps on running. These true tales illustrate just how reliable the 400 is.
Read column
![]()
Vendor webcast: UCCnet -- For suppliers, integration is the payoff
Examine the benefits of UCCnet and find out why integration is key to achieving cost savings & increased efficiencies.
Register here
Sponsored By: EXTOL International
|
![]() |
![]() |
![]() |
New book excerpt
Information Security Best Practices -- 205 Basic Rules
Chapter 9, "Operating System Security Rules," addresses best practices for setting up security within operating systems. Authentication, file protection, virus checking, file sharing, network software and security logging are discussed.
|
![]() |
![]()
|
![]() |
![]()
![]() |
|
Update your subscriptions
|
![]() |
| Select newsletters you would like to receive from the list below. |
![]() |
|
Daily News |
|
Administrator Tips |
|
WebSphere Strategies |
|
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
| Featured White Paper |
Top Security Issues for the IFS
In this white paper OS/400 security expert Carol Woodbury outlines issues and offers suggestions and advice on keeping your iSeries, data and users safe. |
Read it today |
|
![]()
![]()
| Security Monitoring |
| Find the security monitoring solutions you need in the Search400.com Product & Vendor Guide. Research products, compare vendors and contact companies from one location. |
Check it out |
|
![]()
| Vendor news |
| What are vendors such as Aldon, EMC, EXTOL, iTera and LANSA up to? We have the updates here. |
Read articles |
|
![]()
|
![]() |