Title: Administrator Tips
  October 13, 2004 Published by  Search400.com   

Administrator Tips

search400.com
News Topics ITKnowledge Exchange Tips Ask the Experts Webcasts White Papers
Issue Sponsored By:
  > CYBRA Knows Bar Code, RFID, and Plain Paper Forms


IN THIS ISSUE:
  >  How to set up an autostart job
  >  Information on the autostart program
  >  Using the startup program
  >  Start and stop jobs without creating security holes
  >  Monitoring your iSeries system
  >  ITKnowledge Exchange: Get answers to your questions fast
  >  Learning Guide: Simple steps to a secure iSeries

Headlines


How to set up an autostart job
[Search400.com]
by Ron Turull

More than likely you have run into a situation where you wanted a program or command to run automatically when, say, the system IPL'd. The obvious solution in this instance is to put the necessary code into your start-up program. But what do you do when, for example, you want a program to run automatically only when a specific subsystem is started? The answer: Attach an autostart job entry to the subsystem.

MORE INFO:
View previous tips by Ron Turull

Information on the autostart program
[Search400.com]
Looking for information on the autostart program? Site expert Ken Graap provides an overview of the basics in this Q&A.

Using the startup program
[Search400.com]
Search400.com member Azmat Bhatti had a situation where they needed to start certain subsystems and jobs when their system was back from IPL. Every time they had to run certain commands on the command line or add a job schedule entry. They finally found a way to save time running those commands.

Start and stop jobs without creating security holes
[Search400.com]
This user had upgraded an application package on the company's iSeries, and it required significantly more authority to stop and start the subsystem and jobs than previously required. Currently only QSECOFR can stop and start the processes. Is there a way to allow his programming team to be able to stop and start the processes without creating security holes? Security expert Carol Woodbury offers some insight.

Monitoring your iSeries system
[Search400.com]
The key to a smooth running iSeries system is monitoring. With other tasks at hand, it's not an easy job. We can help. Here's a sample of tips and tricks to make your job easier.

Also on Search400.com

SEARCH400.COM PRODUCT OF THE YEAR AWARDS:  Accepting nominations now
Have a great product or tool? In January, Search400.com will present its Second Annual Product of the Year awards. The awards will highlight and celebrate those entries in the market that are deemed outstanding examples of new and innovative technological advancement for users.

Submit an application to have your product considered. But act fast: The deadline to submit nominations is Monday, Oct. 25.

 
AD Facing a bar code or RFID compliance deadline?
New MarkMagic 5 Barcode Label, RFID Tag, and [EMAIL PROTECTED] Forms for iSeries is the easiest, fastest way to comply with UCC bar code label or the new EPC RFID requirements. Design and print labels, tags, and forms using the included JMagic WYSIWYG client, and print on more than 300 printers including thermal, HP-PCL5, and IBM AFP/IPDS lasers. To get label, RFID, and forms printing for less than competing forms-only packages, click here for special offer, or call 800-CYBRA-88 for info.
 


GOT QUESTIONS?:  ITKnowledge Exchange: Get answers to your questions fast
Now you can ask any one of your fellow TechTarget members -- 1.2 million strong -- specific questions on technology, best practices or other IT issues. Just tell us who you are and the subjects you're interested in (iSeries, RPG, DB2, WebSphere, etc.) and then ask your questions or offer advice to other IT professionals. Our ITKnowledge Exchange brings members from all 22 TechTarget Web sites together to share information and experiences.

LEARN IT:  Learning Guide: Simple steps to a secure iSeries
If you're a systems manager, chances are security is your top priority. With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security Learning Guide to help you along your way. Consider it a security life preserver of sorts.


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Programmer Tips
 Search400: Security Tip
 Search400: Top Expert Advice




Not a Member? We?ll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Administrator Tips":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=494168&lid=430676&track=NL-176&ad=494168

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to