Issue Sponsored By:
> CYBRA Knows Bar Code, RFID, and Plain Paper Forms
![]()
IN THIS ISSUE:
>
How to set up an autostart job
>
Information on the autostart program
>
Using the startup program
>
Start and stop jobs without creating security holes
>
Monitoring your iSeries system
>
ITKnowledge Exchange: Get answers to your questions fast
>
Learning Guide: Simple steps to a secure iSeries
![Headlines]()
![]()
How to set up an autostart job
[Search400.com]
by Ron Turull
More than likely you have run into a situation where you wanted a program or command to run automatically when, say, the system IPL'd. The obvious solution in this instance is to put the necessary code into your start-up program. But what do you do when, for example, you want a program to run automatically only when a specific subsystem is started? The answer: Attach an autostart job entry to the subsystem.
MORE INFO:
> View previous tips by Ron Turull
Information on the autostart program
[Search400.com]
Looking for information on the autostart program? Site expert Ken Graap provides an overview of the basics in this Q&A.
Using the startup program
[Search400.com]
Search400.com member Azmat Bhatti had a situation where they needed to start certain subsystems and jobs when their system was back from IPL. Every time they had to run certain commands on the command line or add a job schedule entry. They finally found a way to save time running those commands.
Start and stop jobs without creating security holes
[Search400.com]
This user had upgraded an application package on the company's iSeries, and it required significantly more authority to stop and start the subsystem and jobs than previously required. Currently only QSECOFR can stop and start the processes. Is there a way to allow his programming team to be able to stop and start the processes without creating security holes? Security expert Carol Woodbury offers some insight.
Monitoring your iSeries system
[Search400.com]
The key to a smooth running iSeries system is monitoring. With other tasks at hand, it's not an easy job. We can help. Here's a sample of tips and tricks to make your job easier.
![]()
SEARCH400.COM PRODUCT OF THE YEAR AWARDS:
Accepting nominations now
Have a great product or tool? In January, Search400.com will present its Second Annual Product of the Year awards. The awards will highlight and celebrate those entries in the market that are deemed outstanding examples of new and innovative technological advancement for users.
Submit an application to have your product considered. But act fast: The deadline to submit nominations is Monday, Oct. 25.
| |
![]() |
![AD]() |
![]() |
Facing a bar code or RFID compliance deadline?
New MarkMagic 5 Barcode Label, RFID Tag, and [EMAIL PROTECTED] Forms for iSeries is the easiest, fastest way to comply with UCC bar code label or the new EPC RFID requirements. Design and print labels, tags, and forms using the included JMagic WYSIWYG client, and print on more than 300 printers including thermal, HP-PCL5, and IBM AFP/IPDS lasers. To get label, RFID, and forms printing for less than competing forms-only packages,
click here for special offer, or call 800-CYBRA-88 for info.
|
| |
GOT QUESTIONS?:
ITKnowledge Exchange: Get answers to your questions fast
Now you can ask any one of your fellow TechTarget members -- 1.2 million strong -- specific questions on technology, best practices or other IT issues. Just tell us who you are and the subjects you're interested in (iSeries, RPG, DB2, WebSphere, etc.) and then ask your questions or offer advice to other IT professionals. Our ITKnowledge Exchange brings members from all 22 TechTarget Web sites together to share information and
experiences.
LEARN IT:
Learning Guide: Simple steps to a secure iSeries
If you're a systems manager, chances are security is your top priority. With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security
Learning Guide to help you along your way. Consider it a security life preserver of sorts.
| |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
![]() |
| |
|
![]() |
| |
![]() |
Free E-Newsletters! Select e-newsletters you would like to receive via e-mail!
Search400: Programmer Tips
Search400: Security Tip
Search400: Top Expert Advice
![]()
![]()
Not a Member? We?ll activate your membership with your subscription.
|
![]() |
| |
|
|
![]()
![]() |
![TechTarget - The Most Targeted IT Media]() |
![]() |
This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
To unsubscribe from "Administrator Tips":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=494168&lid=430676&track=NL-176&ad=494168
Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
|
![]() |
|
![]() |
|