Author: Ted Holt
Publisher: Lessons from History Series
ISBN:
Category : Computers
Languages : en
Pages : 602
Book Description
From the basics of programming in the Qshell on iSeries to complete coverage of previously undocumented topics, programmers will not only learn the Qshell more easily than they can with the Qshell manual from IBM, they will also learn practical applications of using the Qshell effectively. Written for users who are more comfortable with DDS, CL, and RPG as well as those using modern languages such as C and Java, this book allows those who are unfamiliar with Unix to easily learn this technology, which otherwise might be foreign to them. Although written specifically for iSeries programmers, the information gleaned here will be largely applicable to the shells for Linux and Unix, so programmers not familiar with those platforms will find those shells much easier to learn after learning Qshell.
Qshell for ISeries
Author: Ted Holt
Publisher: Lessons from History Series
ISBN:
Category : Computers
Languages : en
Pages : 602
Book Description
From the basics of programming in the Qshell on iSeries to complete coverage of previously undocumented topics, programmers will not only learn the Qshell more easily than they can with the Qshell manual from IBM, they will also learn practical applications of using the Qshell effectively. Written for users who are more comfortable with DDS, CL, and RPG as well as those using modern languages such as C and Java, this book allows those who are unfamiliar with Unix to easily learn this technology, which otherwise might be foreign to them. Although written specifically for iSeries programmers, the information gleaned here will be largely applicable to the shells for Linux and Unix, so programmers not familiar with those platforms will find those shells much easier to learn after learning Qshell.
Publisher: Lessons from History Series
ISBN:
Category : Computers
Languages : en
Pages : 602
Book Description
From the basics of programming in the Qshell on iSeries to complete coverage of previously undocumented topics, programmers will not only learn the Qshell more easily than they can with the Qshell manual from IBM, they will also learn practical applications of using the Qshell effectively. Written for users who are more comfortable with DDS, CL, and RPG as well as those using modern languages such as C and Java, this book allows those who are unfamiliar with Unix to easily learn this technology, which otherwise might be foreign to them. Although written specifically for iSeries programmers, the information gleaned here will be largely applicable to the shells for Linux and Unix, so programmers not familiar with those platforms will find those shells much easier to learn after learning Qshell.
Hacking iSeries
Author:
Publisher: Venera Systems
ISBN: 9659088906
Category :
Languages : en
Pages : 204
Book Description
Publisher: Venera Systems
ISBN: 9659088906
Category :
Languages : en
Pages : 204
Book Description
IBM I5/iSeries Primer
Author: Doug Pence
Publisher:
ISBN: 9781583470398
Category : Computers
Languages : en
Pages : 0
Book Description
This comprehensive, 35-chapter book is the ultimate resource and a "must-have" for every professional working with the i5/iSeries. It is perfect for novice and intermediate programmers as well as for system administrators and operators. In simple, straightforward style, the authors explain core i5/iSeries concepts and show you step by step how to perform a wide variety of essential functions. The book includes sections on installation, operations, administration, system architecture, programming, the Internet, and troubleshooting. These sections are organized in free-standing style so you don t have to read the book from cover to cover or even sequentially; you can reference the chapters that interest you most, skip some, and jump back and forth as needed. It even contains a helpful glossary to act as a fast reference for all the terms you need to know. Completely updated through i5/OS V5, the fourth edition of this best-selling book contains page after page of information covering RPG IV and Java programming, system values, database and SQL, important system security information, the i5/iSeries as an Internet server, and much more. You ll learn the essential technical concepts you need to get up to speed on all areas of the i5/iSeries, and your increased understanding of the i5/iSeries will boost your productivity. Even if you have a previous edition of this book, you'll want to get this new edition with all of the V5 update and brand new topics like: iSeries Navigator Java SQL iSeries Access HTTP Server Qshell Client/Server and TCP/IP Client Access This book is a learning tool and valuable reference you will use for years to come. As one satisfied reader put it, "If you could own only one i5/iSeries book, this would be it." With "IBM i5/iSeries Primer," Fourth Edition you will: Learn how to install an i5 server Gain a comprehensive knowledge of i5/iSeries operations Understand libraries, objects, library lists, and everything you need to know about files Be able to configure a system Explore programming basics, including how to use utilities, journaling, and commitment control Discover what to do in case of trouble, how to request help from IBM, how to report problems, and how to manage PTFs"
Publisher:
ISBN: 9781583470398
Category : Computers
Languages : en
Pages : 0
Book Description
This comprehensive, 35-chapter book is the ultimate resource and a "must-have" for every professional working with the i5/iSeries. It is perfect for novice and intermediate programmers as well as for system administrators and operators. In simple, straightforward style, the authors explain core i5/iSeries concepts and show you step by step how to perform a wide variety of essential functions. The book includes sections on installation, operations, administration, system architecture, programming, the Internet, and troubleshooting. These sections are organized in free-standing style so you don t have to read the book from cover to cover or even sequentially; you can reference the chapters that interest you most, skip some, and jump back and forth as needed. It even contains a helpful glossary to act as a fast reference for all the terms you need to know. Completely updated through i5/OS V5, the fourth edition of this best-selling book contains page after page of information covering RPG IV and Java programming, system values, database and SQL, important system security information, the i5/iSeries as an Internet server, and much more. You ll learn the essential technical concepts you need to get up to speed on all areas of the i5/iSeries, and your increased understanding of the i5/iSeries will boost your productivity. Even if you have a previous edition of this book, you'll want to get this new edition with all of the V5 update and brand new topics like: iSeries Navigator Java SQL iSeries Access HTTP Server Qshell Client/Server and TCP/IP Client Access This book is a learning tool and valuable reference you will use for years to come. As one satisfied reader put it, "If you could own only one i5/iSeries book, this would be it." With "IBM i5/iSeries Primer," Fourth Edition you will: Learn how to install an i5 server Gain a comprehensive knowledge of i5/iSeries operations Understand libraries, objects, library lists, and everything you need to know about files Be able to configure a system Explore programming basics, including how to use utilities, journaling, and commitment control Discover what to do in case of trouble, how to request help from IBM, how to report problems, and how to manage PTFs"
IBM i 6.1 Independent ASPs: A Guide to Quick Implementation of Independent ASPs
Author: Scott Vetter
Publisher: IBM Redbooks
ISBN: 0738433683
Category : Computers
Languages : en
Pages : 268
Book Description
This IBM® Redbooks® publication explains how to configure and manage independent disk pool (IASP) functionality of IBM i 6.1. It is designed to help IBM technical professionals, business partners, and customers understand and implement independent disk pools in the IBM i 6.1. In addition, this publication provides the background information that is necessary to plan, implement, and customize this functionality to your particular environment. It provides guidance on running user applications with either application data or most application objects residing in an independent disk pool. Considering that you can also use independent disk pools in a cluster environment, this publication shows you the basic steps to make your independent disk pool switchable between two Power SystemsTM servers or a single server with multiple LPARs. Independent auxiliary storage pools have many business and technical advantages for Power Systems using IBM i. Not only are independent auxiliary storage pools (IASPs) easy to create and maintain, most applications can use them by simple work management changes. IASPs can provide immediate benefits to your enterprise.
Publisher: IBM Redbooks
ISBN: 0738433683
Category : Computers
Languages : en
Pages : 268
Book Description
This IBM® Redbooks® publication explains how to configure and manage independent disk pool (IASP) functionality of IBM i 6.1. It is designed to help IBM technical professionals, business partners, and customers understand and implement independent disk pools in the IBM i 6.1. In addition, this publication provides the background information that is necessary to plan, implement, and customize this functionality to your particular environment. It provides guidance on running user applications with either application data or most application objects residing in an independent disk pool. Considering that you can also use independent disk pools in a cluster environment, this publication shows you the basic steps to make your independent disk pool switchable between two Power SystemsTM servers or a single server with multiple LPARs. Independent auxiliary storage pools have many business and technical advantages for Power Systems using IBM i. Not only are independent auxiliary storage pools (IASPs) easy to create and maintain, most applications can use them by simple work management changes. IASPs can provide immediate benefits to your enterprise.
IBM i 7.2 Technical Overview with Technology Refresh Updates
Author: Ryan Cooper
Publisher: IBM Redbooks
ISBN: 0738442070
Category : Computers
Languages : en
Pages : 520
Book Description
This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.
Publisher: IBM Redbooks
ISBN: 0738442070
Category : Computers
Languages : en
Pages : 520
Book Description
This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.
Security Guide for IBM i V6.1
Author: Jim Cook
Publisher: IBM Redbooks
ISBN: 0738432865
Category : Computers
Languages : en
Pages : 426
Book Description
The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security auditors and consultants who are in charge of implementing corporate security policies in an organization. In many cases, they are not familiar with the IBM i operating system, but must understand the security services that are available. This IBM Redbooks® publication guides you through the broad range of native security features that are available within IBM i Version and release level 6.1. This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM. The focus in this publication is the integration of IBM 6.1 enhancements into the range of security facilities available within IBM i up through Version release level 6.1. IBM i 6.1 security enhancements include: - Extended IBM i password rules and closer affinity between normal user IBM i operating system user profiles and IBM service tools user profiles - Encrypted disk data within a user Auxiliary Storage Pool (ASP) - Tape data save and restore encryption under control of the Backup Recovery and Media Services for i5/OS (BRMS) product, 5761-BR1 - Networking security enhancements including additional control of Secure Sockets Layer (SSL) encryption rules and greatly expanded IP intrusion detection protection and actions. DB2® for i5/OS built-in column encryption expanded to include support of the Advanced Encryption Standard (AES) encryption algorithm to the already available Rivest Cipher 2 (RC2) and Triple DES (Data Encryption Standard) (TDES) encryption algorithms. The IBM i V5R4 level IBM Redbooks publication IBM System i Security Guide for IBM i5/OS Version 5 Release 4, SG24-6668, remains available.
Publisher: IBM Redbooks
ISBN: 0738432865
Category : Computers
Languages : en
Pages : 426
Book Description
The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security auditors and consultants who are in charge of implementing corporate security policies in an organization. In many cases, they are not familiar with the IBM i operating system, but must understand the security services that are available. This IBM Redbooks® publication guides you through the broad range of native security features that are available within IBM i Version and release level 6.1. This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM. The focus in this publication is the integration of IBM 6.1 enhancements into the range of security facilities available within IBM i up through Version release level 6.1. IBM i 6.1 security enhancements include: - Extended IBM i password rules and closer affinity between normal user IBM i operating system user profiles and IBM service tools user profiles - Encrypted disk data within a user Auxiliary Storage Pool (ASP) - Tape data save and restore encryption under control of the Backup Recovery and Media Services for i5/OS (BRMS) product, 5761-BR1 - Networking security enhancements including additional control of Secure Sockets Layer (SSL) encryption rules and greatly expanded IP intrusion detection protection and actions. DB2® for i5/OS built-in column encryption expanded to include support of the Advanced Encryption Standard (AES) encryption algorithm to the already available Rivest Cipher 2 (RC2) and Triple DES (Data Encryption Standard) (TDES) encryption algorithms. The IBM i V5R4 level IBM Redbooks publication IBM System i Security Guide for IBM i5/OS Version 5 Release 4, SG24-6668, remains available.
PowerHA SystemMirror for IBM i Cookbook
Author: Hernando Bedoya
Publisher: IBM Redbooks
ISBN: 0738436364
Category : Computers
Languages : en
Pages : 488
Book Description
IBM® PowerHATM SystemMirror for i is the IBM high-availability disk-based clustering solution for the IBM i 7.1 operating system. When combined with IBM i clustering technology, PowerHA for i delivers a complete high-availability and disaster-recovery solution for your business applications running in the IBM System i® environment. PowerHA for i enables you to support high-availability capabilities with either native disk storage or IBM DS8000® or DS6000TM storage servers or IBM Storwize V7000 and SAN Volume Controllers. The latest release of IBM PowerHA SystemMirror for i delivers a brand-new web-based PowerHA graphical user interface that effectively combines the solution-based and task-based activities for your HA environment, all in a single user interface. This IBM Redbooks® publication provides a broad understanding of PowerHA for i. This book is intended for all IBM i professionals who are planning on implementing a PowerHA solution on IBM i.
Publisher: IBM Redbooks
ISBN: 0738436364
Category : Computers
Languages : en
Pages : 488
Book Description
IBM® PowerHATM SystemMirror for i is the IBM high-availability disk-based clustering solution for the IBM i 7.1 operating system. When combined with IBM i clustering technology, PowerHA for i delivers a complete high-availability and disaster-recovery solution for your business applications running in the IBM System i® environment. PowerHA for i enables you to support high-availability capabilities with either native disk storage or IBM DS8000® or DS6000TM storage servers or IBM Storwize V7000 and SAN Volume Controllers. The latest release of IBM PowerHA SystemMirror for i delivers a brand-new web-based PowerHA graphical user interface that effectively combines the solution-based and task-based activities for your HA environment, all in a single user interface. This IBM Redbooks® publication provides a broad understanding of PowerHA for i. This book is intended for all IBM i professionals who are planning on implementing a PowerHA solution on IBM i.
End to End Performance Management on IBM i
Author: Hernando Bedoya
Publisher: IBM Redbooks
ISBN: 0738433810
Category : Computers
Languages : en
Pages : 296
Book Description
Monitoring and managing your system's performance is critical to ensure that you are keeping pace with the changing demands of your business. To respond to business changes effectively, your system must change too. Managing your system, at first glance, might seem like just another time-consuming job. But the investment soon pays off because the system runs more efficiently, and this is reflected in your business. It is efficient because changes are planned and managed. Managing performance of any system can be a complex task that requires a thorough understanding of that system's hardware and software. IBM® i is an industry leader in the area of performance management and has many qualities that are not found in other systems, such as: - Unparalleled performance metrics - Always-on collection of metrics - Graphical investigation of performance data While understanding all the different processes that affect system performance can be challenging and resolving performance problems requires the effective use of a large suite of tools, the functions offered by IBM i are intended to make this job easier for users. This IBM Redbooks® publication explains the tasks and rich tools associated with performance management on IBM i.
Publisher: IBM Redbooks
ISBN: 0738433810
Category : Computers
Languages : en
Pages : 296
Book Description
Monitoring and managing your system's performance is critical to ensure that you are keeping pace with the changing demands of your business. To respond to business changes effectively, your system must change too. Managing your system, at first glance, might seem like just another time-consuming job. But the investment soon pays off because the system runs more efficiently, and this is reflected in your business. It is efficient because changes are planned and managed. Managing performance of any system can be a complex task that requires a thorough understanding of that system's hardware and software. IBM® i is an industry leader in the area of performance management and has many qualities that are not found in other systems, such as: - Unparalleled performance metrics - Always-on collection of metrics - Graphical investigation of performance data While understanding all the different processes that affect system performance can be challenging and resolving performance problems requires the effective use of a large suite of tools, the functions offered by IBM i are intended to make this job easier for users. This IBM Redbooks® publication explains the tasks and rich tools associated with performance management on IBM i.
IBM i and IBM Storwize Family: A Practical Guide to Usage Scenarios
Author: Sabine Jordan
Publisher: IBM Redbooks
ISBN: 0738439223
Category : Computers
Languages : en
Pages : 202
Book Description
The use of external storage and the benefits of virtualization became a topic of discussion in the IBM® i area during the last several years. The question tends to be, what are the advantages of the use of external storage that is attached to an IBM i environment as opposed to the use of internal storage. The use of IBM PowerVM® virtualization technology to virtualize Power server processors and memory also became common in IBM i environments. However, virtualized access to external storage and network resources by using a VIO server is still not widely used. This IBM Redbooks® publication gives a broad overview of the IBM Storwize® family products and their features and functions. It describes the setup that is required on the storage side and describes and positions the different options for attaching IBM Storwize family products to an IBM i environment. Basic setup and configuration of a VIO server specifically for the needs of an IBM i environment is also described. In addition, different configuration options for a combined setup of IBM PowerHA® SystemMirror® for i and the Storwize family products are described and positioned against each other. Detailed examples are provided for the setup process that is required for these environments. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals who need to understand how to install and configure their IBM i environment with attachment to the Storwize family products.
Publisher: IBM Redbooks
ISBN: 0738439223
Category : Computers
Languages : en
Pages : 202
Book Description
The use of external storage and the benefits of virtualization became a topic of discussion in the IBM® i area during the last several years. The question tends to be, what are the advantages of the use of external storage that is attached to an IBM i environment as opposed to the use of internal storage. The use of IBM PowerVM® virtualization technology to virtualize Power server processors and memory also became common in IBM i environments. However, virtualized access to external storage and network resources by using a VIO server is still not widely used. This IBM Redbooks® publication gives a broad overview of the IBM Storwize® family products and their features and functions. It describes the setup that is required on the storage side and describes and positions the different options for attaching IBM Storwize family products to an IBM i environment. Basic setup and configuration of a VIO server specifically for the needs of an IBM i environment is also described. In addition, different configuration options for a combined setup of IBM PowerHA® SystemMirror® for i and the Storwize family products are described and positioned against each other. Detailed examples are provided for the setup process that is required for these environments. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals who need to understand how to install and configure their IBM i environment with attachment to the Storwize family products.
SQL for IBM i
Author: Rafael Victória-Pereira
Publisher:
ISBN: 9781583474501
Category : COMPUTERS
Languages : en
Pages :
Book Description
Publisher:
ISBN: 9781583474501
Category : COMPUTERS
Languages : en
Pages :
Book Description