Bob
You need to update the unirpcservices file to have a sensible timeout value
for the server. This can time out without notifying the client in a manner
that can be easily trapped.
Look for the lines headed udcs and defcs and change the final column. Note
that the values are in 1/10th seconds
Caleb,
Just to point out - as a newbie don't think all MV coding is like this!
It's this sort of rubbish that gives our industry a bad name.
(Mind you I've seen worse C++ code...)
:)
Brian
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Caleb Ng
Hi Caleb wrote...
The general consensus of replies confirms my findings of how
this was originally meant to be nested. Thanks for all your help.
Caleb
[EMAIL PROTECTED] 12/08/05 12:09PM
IF P(2)-AR(12)=28 THEN
CC=CC+1
INS 0 BEFORE AR(14)1,1
DEL AR(14)1,9
END ELSE
IF
Hi
Does anybody know what the F@ / Screen Accept Character on SB+ is?
T.I.A
Many Thanks
Bjorn Behr
Programmer (TSD)
Tel : +27 11 523 4202
Email : [EMAIL PROTECTED]
Web Site: www.supergrp.com
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit
Good Morning Charlie,
No only a US issue, but also an issue for multinationals with US home
offices. We are in Argentina and have clients that must comply and frankly
we DO separate the DBA role from the programmer role and I am in favor of
this although it is an administrative pain at times.
Now I want to be really pedantic :-P and therefore here it is, the
probably ultimate piece of code:
IF AR(13) NE DATE() THEN
INS (P(2)-AR(12)) LE 28 BEFORE AR(14)1,1
DEL AR(14)1,9
CC=CC+AR(14)1,1
END
Mecki
Gary Gowans wrote:
Hi Caleb wrote...
The general consensus of replies
Sorry, sent this too early
Should be:.
IF AR(13) NE DATE() THEN
INS (P(2)-AR(12)) GT 28 BEFORE AR(14)1,1
DEL AR(14)1,9
CC+= (P(2)-AR(12)) LE 28
END
Mecki Foerthmann wrote:
Now I want to be really pedantic :-P and therefore here it is, the
probably ultimate piece of code:
IF AR(13) NE
Glen,
I ran into this issue a couple of months ago. The issue with -U when
starting a phantom appears to be a bug in the command line parser. When I
type in the command:
PHANTOM DAILY-UPDATE
The command line parser thinks -U is the user option (for the PHANTOM
command), and subsequently
Marc
How do the programmers to customer support if they cannot look at the data
in the production data-base? It would be hard to research problems if you
cannot look at live data.
Steve
At 08:49 AM 12/9/05 -0300, you wrote:
Good Morning Charlie,
No only a US issue, but also an issue for
What happens when the programmer is the dba? One person developing and managing
universe...
-Original Message-
From: [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Fri Dec 09 05:49:55 2005
Subject: Re: [U2] SOX question (United States only, I believe)
Good Morning Charlie,
No
Ahhh. Since I don't have access to 10 I couldn't get the problem.
Good option though once this bug gets repaired
__
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rex Gozar
[EMAIL
IBM Release notes -
7894Prior to this release, UniVerse incorrectly interpreted
any command line argument to the PHANTOM command containing
a -U to indicate that the PHANTOM command should be run as
a different user, and that the user name would follow the
-U
SOX SUCKS! (we have tee shirts with 'SOX SUCKS' on the front)
Our productivity has gone way down. If there is a problem here is what we have
to do now. And there are plenty of internal and external auditors to make sure
we do the following.
1. Create a request to modify.
2. Copy the records
You mean you don't separate them? Absolutely there needs to be a division
of labor here. As a developer I have no time to keep up with mundane
tasks as password verification, file resizing and maintenance, upgrades,
etc... That doesn't even touch on the security and accountability issues.
The difference is that you have access to LOOK, but not in any way CHANGE...
How do the programmers to customer support if they cannot look at the data
in the production data-base? It would be hard to research problems if you
cannot look at live data.
Steve
---
u2-users mailing list
Is it sufficient to formally separate the roles and procedures, even if they
are carried out by the same person?
and just think, you could put in for two pay rises :)
Brian SOX-Free here
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Lance Jahnke
I'm on a different machine than the one where I read the question regarding
a unix version of the PRIMOS ED, so can't reply to the thread directly.
However, Dec's TECO editor was pretty similar to Pr1me's ED, and has been
ported to unix.
Couple pointers that *might* help are:
On 12/9/05, Peter Gonzalez [EMAIL PROTECTED] wrote:
SOX SUCKS! (we have tee shirts with 'SOX SUCKS' on the front)
Our productivity has gone way down. If there is a problem here is what we
have to do now. And there are plenty of internal and external auditors to
make sure we do the
Actually it looks like some case tool code to me not a programmers code.
- Original Message -
From: Brian Leach [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Friday, December 09, 2005 3:01 AM
Subject: RE: [U2] Deciphering Pick UniBasic statement
Caleb,
Just to point out
Is that all there is to it
We have to do all that now...
We also produce diff items of the programs. This details all the changes
made.
But I do have access to the live machine as well.
Les
-Original Message-
From: Peter Gonzalez [mailto:[EMAIL PROTECTED]
Sent: 09 December
quote who=Larry Hiscock
We've done it on Linux SCO, but not AIX, although the concepts should be
the same. Under AIX, the locations and names of the files will
undoubtedly
be different ;-)
There are a couple of issues:
1) I'm not sure I'd expose my application server's to receive email
I am surprised by all the differing methodology's for being SOX compliant.
For data fixes we have an audit approved process as below.
1. All changes must be requested from the user. Artifact: User Request
(Can be a hard copy of an email.)
2. LIST.ITEM hard copy of the data before the
Gordon,
I used to work for a $500M company (multi-national, multiple
office) where I was the Unix Admin, the secondary DBA, the Hiring
Manager, an Area Manager, Head of Computer Security and QC, and a hands
on programmer simultaneously. The primary DBA also ran the operations
department,
Les,
I didn't include the MMDIFF program that we run. It too, prints the difference,
if any, on LIVE and DEVEL.
Our understanding of SOX is not to have one or two people involved in software
administration and conspiring to hard the system. The more people that are
involved, the less chances
Believe me - I think there are quite a few of us globally who agree with
that sentiment!
On another note, I'm really sorry to hear that overseas companies
have to deal with SOX. Or as I call it, The Great Productivity
Reduction Act of 2002.
Charlie Rubeor
This e-mail is for the use of the
Hello, Charles.
Charles Stevenson wrote...
Everyone's going to jump in with the answer, but here's a way to figure
it out yourself (on UV, but not UD): Use VLIST.
I don't know which is more painful, the original code or the VLIST output.
;-) I decompiled Caleb's code using the srs4uv.com
I know that SOX is a US thing but the change management process you describe is
very close to that used by government departments in the UK
So its all over, not just you yanks that have to put up with it :-)
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of
Check out postie at infradig.com ($75). It is a command line mailer; you
can send email (with attachments) through any smtp mail server, and you
can retrieve/process pop3 or imap mail from anywhere, and even
copy/move/delete messages from your imap folders. All command-line, all
scriptable, all
Marc
How do the programmers to customer support if they cannot look at the data
in the production data-base? It would be hard to research problems if you
cannot look at live data.
Steve
The thing that always cracks me up is that all one has to do in a U2/PICK
environment is to create q
I wrote a package for MANAGE-2000 clients that addressed these issues. I
call it DTS (Development Tracking System). It does a great job separating
Programmer from Live Data.
To use it one would create a Development Account and an end-user testing
account. My software would run on the
Steve,
If you have a good set of test data the user can frequently replicate the
problem in a test environment. You must regularly update your test data. As
a last resort, there is an emergency password for a programmer to have
access, in read-only mode to the production data. Sounds tedious,
Peter,
I am frequently frustrated at having to spend 2 to 3 times as much time to
fix something thanks to SOX or SOX-like norms. However if you put yourself
in the place of a director of a large company who doesn't know the IT staff
personally, you must bear in mind that your department (IT)
The thing that always cracks me up is that all one has to do in a U2/PICK
environment is to create q pointers to the main account from the test
account. You can look and even modify without having access to that
account
unless it is locked down by logon at the OS level, which I have yet to
That why we have triggers on our basic program files and on the voc. If
you do copy something from dev to live, it will show up in the logs. Then
your supervisor comes to you not in a very genial mood. You then have to
end up doing the paperwork anyway.
Gordon J. Glorfield
Sr. Applications
Ahh, but if one were to copy just the object code to the same path as the
voc that already existed in the main account, no trigger would be activated.
Doing this, someone could potentially 'cry war and wreck havoc'.
Or, someone could quickly disable the trigger, do the dirty work and
re-enable,
So if you're use to working with triggers, you know how to take the
trigger off the file, do the dirty deed, then put the trigger back on.
The bottom line of SOX is that someone in authority is ultimately
responsible for the accuracy of the financial reports that get
published, there-by giving
Allen:
Which makes one wonder why in the world security was pulled out of the dbms.
There's something illogical about an O/S administrator knowing better how to
set up security in the application than the application vendor.
Bill
-Original Message-
From: [EMAIL PROTECTED]
At 17:04 09/12/05 -0800, you wrote:
Allen:
Which makes one wonder why in the world security was pulled out of the dbms.
There's something illogical about an O/S administrator knowing better how to
set up security in the application than the application vendor.
Bill
Might it have something
I have not had occasion to use the src4uv.com decompiler service.
Probably worth the price when you really need it.
I am thankful for the wonderful www.src4uv.com freebie download,
SRC.UV.HEADER, that allows access to info about the object file from an
I-descriptor subroutine.
Besides VLIST, but
39 matches
Mail list logo