Wednesday, August 30, 2006

Four iSeries Access Tips for Windows Professionals

Ironically, one of the problems with iSeries Access for Windows is also one of its strengths: its longevity. Starting out as a product called PC Support/400 in the late 1980s and progressing through at least three different name changes, this software has a history so long that it's almost geology. However, sometimes that history works against it, particularly when administrators who are not familiar with i5/OS and OS/400 are in charge of installing and maintaining iSeries Access for Windows desktops.
To alleviate potential problems when Windows administrators handle IBM's connectivity package to AS/400, iSeries, and i5 servers, here are four tips to help Microsoft Windows professionals create better iSeries Access software installations on the Windows desktops under their control

Tuesday, August 22, 2006

Zend Technologies Delivers PHP to IBM's System i as400 Customers

Zend Technologies, Inc., the PHP company, announced an important milestone in the company's multi-year agreement with IBM to deliver PHP to the "all-in-one" System i as400 business computing solution. The immediate availability of Zend Core for i5/OS and Zend Studio Professional for i5/OS provides an integrated, open Web application development environment with native support for the world's most popular Web scripting language, PHP, and i5/OS, the flagship operating system for IBM System i.
System i customers have shown great interest in PHP during the beta test phase, with thousands of System i customers and solutions providers downloading the beta releases. Using Zend Core for i5/OS and Zend Studio Professional for i5/OS, System i customers and solutions providers can develop innovative, new Web applications rapidly and cost-effectively or create Web front ends for existing applications written in RPG, C, C++ or Java(TM). Zend Core for i5/OS will include a toolkit that enables PHP applications to easily access the integrated DB2 database and other resources in i5/OS.
The addition of PHP capabilities for i5/OS provides System i customers with access to more than 10,000 existing PHP-based components and applications which developers can use instead of writing their own. For example, many companies set up forums, wikis, blogs and other collaborative Web sites by downloading open source PHP applications and customizing them to suit their needs.
A prime example of this trend is the community web site at i5php.net, where users can find information about application development, trends and techniques, along with interactive forums. "PHP support on i5/OS provides more freedom of choice in Web development, along with protecting our current investments and assets," said Rob Ward, webmaster, i5php.net. "The low learning curve and high adoption rate combine to create tremendous momentum and interest in the System i community."
PHP is one of the most popular Web development languages. More than 22 million Internet domains deploy PHP, supported by a robust community of approximately 4.5 million PHP developers. PHP's popularity has accelerated rapidly due to its flexibility and ease of use and is implemented in everything from the simplest web forms to some of the most trafficked and complex sites on the Internet.
"We are committed to helping our System i customers and solution providers deliver innovation in their businesses easily and cost-effectively," said Mark Shearer, general manager, IBM System i. "Zend's delivery of native support for PHP on the System i platform will make available thousands of existing PHP-based applications and open up a pool of millions of skilled Web developers for use by System i clients."
Today's announcement includes:
-- Zend Core for i5/OS is a tested and enhanced version of the open source PHP language. It delivers a seamless out-of-the-box experience by bundling all necessary drivers and third-party libraries to work with i5/OS V5R4 and DB2 UDB.
-- Zend Studio Professional for i5/OS is an Integrated Development Environment (IDE) for professional developers, encompassing all development components needed for the full PHP application lifecycle.
System i customers can order Core and Studio from IBM or download them from the Zend web site at www.zend.com for no additional charge. These offerings include three years of Standard support from Zend, provided through the Zend Network. This includes product downloads including current and previous versions, software updates and information, knowledge base access, and Web-based support including unlimited support tickets. Additional support options are available.
Zend Guard(TM) and Zend Platform(TM) for i5/OS are planned to be available for use later in 2006.
For more information on IBM System i, please visit http://www.ibm.com/systemi.
About Zend Technologies
Zend Technologies, Inc., the PHP company, is the leading provider of products and services for developing, deploying and managing business-critical PHP applications. PHP is used by more than twenty-two million Web sites and has quickly become the most popular language for building dynamic web applications. Deployed at more than 15,000 companies worldwide, the Zend family of products is a comprehensive platform for supporting the entire lifecycle of PHP applications. Zend is headquartered in Cupertino, California. For more information, please visit www.zend.com, or call 1-408-253-8800.
The following are either trademarks or registered trademarks of International Business Machines Corporation in the United States or other countries or both: IBM, the IBM e-business logo, System i, and System i5. For a list of additional IBM trademarks, please see www.ibm.com/legal/copytrade.shtml. Zend, Zend Technologies, Zend.com, Zend Studio and Zend Platform and/or the logos and icons associated with each of these names are trademarks of Zend Technologies, Inc. and may be registered in certain jurisdictions. All other trademarks are the property of their respective owners.

Zend and as400

Thursday, August 17, 2006

IBM Withdraws Various iSeries and System i5 Features

Last week, IBM announced that it would be withdrawing from marketing a number of iSeries and System i5 features. A bunch of software is also being torn out of the System i product catalog, too. All of these products have replacements, so don't get too nervous

Tuesday, July 25, 2006

Looksoftware Eliminates 5250 Processing Requirement with New Product

Looksoftware announced a new product last week that eliminates the requirement to purchase as400 5250 OLTP processing capability to run interactive workloads on an iSeries or System i server, thereby saving users potentially hundreds of thousands of dollars. The new product, called lookdirect, unleashes the 5250 capability in a non-invasive manner, the company says, and should be available next month.
The iSeries community has been looking for solutions to the 5250 pricing situation ever since 1996, when IBM introduced the CFINT governor and started charging more for interactive processing capability (what it now calls online transaction processing, or OLTP) than batch, or server-based, processing capability.
If developers had followed the lead of IBM, they would have re-written their 5250 applications in Java and run them in WebSphere, thereby bypassing the 5250 requirement. However, relatively few programmers that use the OS/400's server traditional language have made the switch to Java, which means the vast majority of OS/400 customers have had to live with the controversial pricing scheme.
Marcus Dee, managing director of Australia-based looksoftware, says IBM's interactive pricing policy--which adds close to $1 million to the price tag of the largest OS/400 servers--has been a challenge to the company. "It's been an issue for our partners and customers for many years. We lost some real opportunities because they wanted to cut these costs," he says.
Over the years, looksoftware considered the various options on the table for eliminating the impact of IBM's 5250 pricing policies on looksoftware's business, as well as the business of its partners. First up was the "invasive" approach, where the 5250 and the DDS is eliminated and then basically reconstructed in a different form. Several iSeries ISVs rolled out such solutions, but they've since been withdrawn, Dee says, due to the extensive effort required to adapt the programs. "Architecturally it was never going to fly," he says.
Another invasive technique for goosing 5250 performance that made many headlines over the last few years was a product and a company called Fast400. However, Dee saw serious problems with going down that road. "I think everybody in the marketplace knew what was going on was under the covers," he says. "And it didn't change the fact that it broke customers' machines."
For seven or eight years, looksoftware explored its options, but came up empty. Finally, in the last couple releases of the operating system, IBM has made changes that allowed looksoftware to do what it wanted to do.
It took a long time, but it was worth it, Dee says. "The access from IBM, the system level APIs--it's taken some time . . . but the perseverance paid off," he says. "We've done it the right way. We don't do accessing system state stuff, under-the-cover stuff. We've done it in a way that IBM's comfortable."
lookdirect
The new product, called lookdirect, helps customers by enabling the full batch CPW capability of a given OS/400 server to be utilized for 5250 applications. Dee didn't discuss the intricacies of how lookdirect works, except to say that it uses system-level APIs, which ensures that it will work with future releases of i5/OS, and that it and has the blessing of IBM.
All customers need to know (besides that look says it won't break their systems or hurt other applications) is that lookdirect eliminates the need for 5250 OLTP, thereby enabling customers to use the Standard Edition of i5/OS instead of the Enterprise Edition, which is considerably more expensive.
The one catch is that lookdirect must be used in conjunction with one of looksoftware's "multichannel" interface products, which are largely based on Microsoft's .NET technology. This lineup includes the full-featured smartclient designed for power users, the somewhat thinner liteclient designed for transaction workers, the browser-based thinclient for zero footprint deployments, and the mobileclient, which installs on PDAs and other mobile devices. The full-tilt-boogie 5250-enabling capabilities of lookdirect will require version 8 of the multichannel UI products, which will be released soon.
The idea behind hooking up lookdirect to the company's interface products is to get OS/400 shops to modernize their applications, Dee says. "There is a huge investment in 5250 applications and [IBM] has been pushing modernization through people like us for some time," Dee says. "This is another way to tell the marketplace, 'Here's a good reason to do it now and take your applications forward.'"
While looksoftware and IBM would rather that lookdirect customers take the opportunity to modernize their application with some sort of GUI, lookdirect doesn't prevent users from running 5250 applications in green-screen mode. The company sells its own 5250 emulator, called 5250client, because there always seems to be that one guy who refuses to move to a GUI. It makes no difference to Dee. "Horses for courses," he says.
Partner Reaction
Looksoftware business partners enthusiastically welcomed lookdirect, which they will embed into their own OS/400 solutions.
"Lookdirect…makes our i5 solution more competitive against other platforms," says Ernie Betancourt, CEO of Innovative Computing, an Oklahoma City, Oklahoma-based developer of OS/400-based trucking software with 500 customers. "Now that we can deploy our 5250 solutions on the i5 Standard Edition, we can drive our customers' IT dollar much further."
Four Soft had all but given up trying to sell its OS/400-based warehousing application. "When talking to prospects about our warehousing applications, the System i5 hardware costs were becoming increasingly prohibitive," says Ritu Rooney, head of sales for the English software developer. "Lookdirect will allow us to be much more competitive in the logistics market from a total solution point of view."
"The release of lookdirect is a pivotal moment in the evolution of the System i5," says Trevor Perry, who used to develop for looksoftware and who now works with Clear Technologies, a Texas CRM software developer. "You can have your GUI at a green-screen price, and move your applications into SOA at the same time."
Doug Fulmer, the longtime iSeries Tools Network director who recently joined Clear Tech as a systems architect, also had good things to say about the new product. "Lookdirect provides them with a double-good alternative--modernizing their existing 5250 assets and eliminating or reducing 5250 workload," he says. "I think looksoftware has a winner with lookdirect."
Dee credits the creation of lookdirect to a revitalized iSeries organization led by System i general manager Mark Shearer. "We've invested a lot of time working with partners and IBM and making sure that this sort of thing would benefit all of us," he says. "A real key thing here is that we understand, and I'm happy to say IBM understands, that some vendors out there can have a great impact on the platform."
Lookdirect is due to ship in early August. The product will require i5/OS V5R4 (Standard Edition will suffice, thank you), as well as one of the newer System i or eServer i5 models--the 520, 550, 570, or 595. The product will be delivered as an option when customers purchase either smartclient, liteclient, thinclient, mobileclient, or 5250client, and will add about 20 to 30 percent to the cost of those products. For more as400 information, visit www.looksoftware.com.

Tuesday, May 09, 2006

The Inside Stories of the Innovation Award Winners

Back at the Spring COMMON user group meeting, IBM announced the second of its annual Innovation Awards. The awards are designed to showcase the achievements of iSeries and System i users who have done--as the name suggests--innovative things with the platform. We promised we would give you the inside stories of the winners, and here they are.
Our intent was to profile the 2006 winners and finalists for each category. We weren't able to reach everyone (although we tried, repeatedly), so we have had to give a snapshot of some of the companies that IBM deems the most innovative in their use of the System i5.
IBM reports having received more than 50 nominations across the five different award categories of Application Deployment, Business Resiliency, Infrastructure Simplification, i5/OS Leadership, and Education Excellence. A judging committee composed of two COMMON board members, two IBM members, and one industry analyst was then assigned to each category. This committee then ranked and scored each nomination based on the following criteria:
Demonstrates business innovation
Supports outstanding achievement
Highlights business value to the company and its end users
Is considered a best practice in the industry
Stands out from the others nominated in the category

Dispenser supplier sticks with System i

Since 2003, AptarGroup Inc., a global supplier of dispensing systems for the cosmetic, pharmaceutical and beverage industries, has had two major reasons to move off the iSeries, but each time it's stuck with it.

The company's primary factors for staying were the platform's reliability, physical footprint via server conglomeration and hundreds of thousands of dollars in licensing savings on R/3, SAP's Enterprise Resource Planning (ERP) software, according to Christopher Crofoot, global data center manager for Crystal Lake, Ill.-based AptarGroup.
Companies and products Crofoot considered switching to included: Unisys' 4-way ES7000, Hewlett-Packard Co.'s (HP) RX762 and IBM's xSeries boxes. With a budget of $2.5 million to work with, Crofoot had to make the call

Saturday, May 06, 2006

V5R4 Introduces Subroutines for CL

Subroutines for CL are here for V5R4

CL subroutine support is quite powerful and makes great strides toward improving CL programs in the area of code readability, maintainability and debugging capability

Wednesday, May 03, 2006

Three Languages For Java Programmers to Learn

Russ Olsen's Weblog

Dave Thomas, among others, has been saying for years that you can become a better Java programmer by getting out there and learning some other programming languages. The idea is that by knowing something about what the other guys are thinking you can think a little clearer yourself. I'd like to suggest three languages that I think every Java programmer should spend some time thinking about. Just to make it interesting, I'm going to describe each language first, before I tell you what it is. Here goes.

Monday, May 01, 2006

RPG Bods too expensive?

Codan Rubber Ltd, based in Corby, Northants, manufactures and distributes fluid handling system. As part of the Codan Group they had previously implemented a high-end MRP and accounting system costing in excess of £300,000, of which £180,000 were training and consultancy costs. It also proved difficult to implement and costly to develop. Hament Patel, IT Manager said; There were numerous bugs in the system. Product costing did not work, and neither did EDI, which impacted heavily on the main business as costings were inaccurate. We found the software too complex, and if we wanted to modify the system it would require development by AS/400 RPG programmers, which are very costly. In 2005, the demise of Rover Group - one of Codan�s largest customers - caused Codan to re-evaluate their MRP needs. Said General Manager Jonathan George MBA, 'The big push for change was when Rover went bust in April 2005, which happened at a time when some of our other business was being transferred to low-cost countries. The combination of massive restructuring meant that we had to get a new system in quickly otherwise we would not have survived'

RPG Programmers too expensive?

Codan Rubber Ltd, based in Corby, Northants, manufactures and distributes fluid handling system. As part of the Codan Group they had previously implemented a high-end MRP and accounting system costing in excess of £300,000, of which £180,000 were training and consultancy costs. It also proved difficult to implement and costly to develop. Hament Patel, IT Manager said; There were numerous bugs in the system. Product costing did not work, and neither did EDI, which impacted heavily on the main business as costings were inaccurate. We found the software too complex, and if we wanted to modify the system it would require development by AS/400 RPG programmers, which are very costly. In 2005, the demise of Rover Group - one of Codans largest customers - caused Codan to re-evaluate their MRP needs. Said General Manager Jonathan George MBA, The big push for change was when Rover went bust in April 2005, which happened at a time when some of our other business was being transferred to low-cost countries. The combination of massive restructuring meant that we had to get a new system in quickly otherwise we would not have survived.

Friday, April 28, 2006

AS/400: Move / Convert Data from Excel Spreadsheet to DB2/400

On AS400, first create a DB file in the relevant format using either DDS or SQL

eg


CREATE TABLE QGPL/TEMPXML
(
FILE CHAR(10),
FIELD char(10),
DBFIELD char(10),
DESCRIPTION CHAR(100),
DATATYPE CHAR(20),
FORMAT CHAR(20),
SYSTEM CHAR(20));

Then save the xls as a CSV to the iSeries IFS

Once the file has been saved to the iSeries, use the following command to convert the spreadsheet to a native as400 DB2/400 file:

Use the CPYFRMIMPF command (copy from Import File). This is by far the easiest method and you're not restricted by the file name lengths, etc. Here's what the command looks like:

CPYFRMIMPF FROMSTMF('\iSeries directory\test.csv')
TOFILE(testlib/TESTF)
RCDDLM(*ALL)

Check this has imported to your as400 correctly

Wednesday, April 26, 2006

Oracle Indefinitely Extends the Life of JDE World, EnterpriseOne

The users of the World and EnterpriseOne ERP software suites from the former J.D. Edwards will probably breathe a sigh of relief this week, and so will the top brass at IBM's System i division. The reason why is that Charles Phillips, Oracle's president, and Mark Shearer, general manager of the System i business, will announce that Oracle will now support and enhance the JDE World and EnterpriseOne suites indefinitely--no strings, no gimmicks, no tricks.

ISVs React (Or Not) to PHP on the System i

The news that PHP will be available on the System i--and for free!--seems to have captured the imagination and interest of many. After all, it's a Java alternative, and we all know how unenthusiastic many iSeries users have been about going down the Java road. The potential is there, many say, for PHP to have a big--even huge--impact on the System i5 line. But there are some issues that need to be dealt with first.
For one thing, there are lots and lots of young and enthusiastic PHP programmers who are devoted to this easy-to-learn and easy-to-use Web scripting language. If you've been hesitating to Web-enable your legacy applications because you can't find or afford the necessary Java or WebSphere resources (both of which tend to send the minds and hearts of many an OS/400 professional sinking), it's not hard to find (and hire) those with PHP experience. And, if you're inclined to grow your own, PHP is far more likely to be accepted by your staff than, say, Java.
The partnership announcement between IBM and Zend Technologies for the System i platform a few weeks ago is leading to a lot of speculation (and some high hopes) about what it all really means to the System i community. Andi Gutman, one of the founders of Zend, posted a note on his weblog on April 14: 'I believe this initiative will have a huge impact on the i5/OS community, which has primarily been offered Java as a way to Web and Web Service enable their platform, but as most of us PHPers know, Java is just too damn hard and takes too much time . . . :' He notes also that Zend will be providing ways to i5/OS users to 'access their existing code-base by creating language bridges, native drivers for accessing DB2/400, and various other bridges to operating system services

Tuesday, April 25, 2006

Scott McNealy steps down as Sun CEO

Sun Microsystems announced Monday that its longtime chief executive Scott McNealy is stepping down from the helm and will be succeeded by the struggling computer and software company's No. 2 executive, Jonathan Scwhartz.
McNealy, 51, a Silicon Valley luminary for years, will continue as chairman of the company he co-founded in 1982. Schwartz, 40, will keep the title of president.
The changes are effective immediately and are the ``result of Sun's ongoing succession planning process'' the company said in a statement.
The shakeup followed rising speculation in recent days that the Santa Clara company, after years of struggling financially, would announce large-scale layoffs or that McNealy would step down as CEO

Thursday, April 20, 2006

IBM System i revenue slumps hard

IBM yesterday announced revenues for the servers plunged 22% in the first quarter of 2006, the second consecutive quarterly drop for a platform that saw its numbers surge last year alongside substantial company backing in the form of upgrades and vigorous marketing. Sales in the fourth quarter fell 12% at the end of 2005.

Though disappointing, analysts said the results weren't necessarily an indicator of doom, as the iSeries is a product line in transition that could cause potential customers to hold out for a few months before an assumedly attractive new release. But this latest decline, even sharper than before, may be an indicator that last quarter's dip was more than a hiccup

prefuse | interactive information visualization

The Prefuse visualization toolkit

A Java-based toolkit for building interactive information visualization applications.

Prefuse supports a rich set of features for data modeling, visualization, and interaction. It provides optimized data structures for tables, graphs, and trees, a host of layout and visual encoding techniques, and support for animation, dynamic queries, integrated search, and database connectivity. Prefuse is written in Java, using the Java 2D graphics library, and is easily integrated into Java Swing applications or web applets. Prefuse is licensed under the terms of a BSD license, and can be freely used for both commercial and non-commercial purposes.
The visualization gallery and demonstration video provide numerous examples of the types of applications that can be built with the prefuse toolkit

IBM - Diagnosing connection leak problems in WebSphere V5.0 and V5.1

Cause
Applications that connect to a back-end server and that have become slow or unresponsive might be encountering connection problems that are related to the application code or configuration problems, rather than to bugs in the WebSphere� connection manager. These issues include leaked connections that are not explicitly closed by application, and connectionWaitTimeoutExceptions in the application that might fill up the connection pool without returning connections to the free pool.

Solution
The Connection Manager code for WebSphere versions 5.1.1.3 and 5.0.2.10 provides a new diagnostic feature, connection leak trace logic, that gathers information on which application methods might be generating leaked connections, or might be holding on to connections for longer than expected. This information is useful, especially considering that connections should not take much longer then the maximum processing time of the longest running query in the application.

Wednesday, April 19, 2006

The best free utilities

The best things in life may be free, but most software isn't. Limited functionality, annoying adware, and pesky nag screens mean even most 'free' software isn't actually without cost.
Anyone who has explored the world of free utilities knows the woes of saving a few bucks. But have heart, ye short of dollars; when it comes to boosting performance, snagging spyware, or protecting your privacy, Download.com has software that debunks that old saying about the mythical free lunch. If you need a beefy, dynamic FTP client, SmartFTP is tough to beat. Does your PC sound as if it's about to go into orbit? Look under the hood with SpeedFan. Ridding yourself of gnarly spyware and the associated headaches won't cost you a penny with HijackThis, Microsoft AntiSpyware, or Spybot - Search & Destroy. When it comes to utilities, here are 10 frugal favorites

Tuesday, April 18, 2006

Python for as400 programmers

Strictly speaking, the popular open source software stack that is abbreviated as LAMP should really be shortened to LAMPPP, since the stack is comprised of the Linux operating system, the Apache Web server, the MySQL database, and the three programming languages made popular for Web programming: Perl, Python, and PHP. While the OS/400 platform has informally supported Perl for years, and is just now getting official support for PHP, what you might not know is that two Python variants also run natively on the i5 box

Saturday, April 15, 2006

Look Mom, No Application Servers, Look...MOM!

'What do you think of application servers?' The most popular answer was, 'I don't need no stinkin' application server.'

By: Yakov Fain"

Nuts-and-Bolts, and Download Details

The Zend/IBM agreement calls for the creation of a Zend Core, Zend Studio, Zend Guard and Zend Platform for i5/OS for use by the end of 2006.

-- Zend Core for i5/OS will be a fully-tested and enhanced version the Open Source PHP language, bundling all necessary drivers and third-party libraries to work with i5/OS and DB2 UDB. An Early Access version of Zend Core for i5/OS is now available for download.

-- Zend Studio for i5/OS is an IDE for encompassing all components needed for the full PHP application lifecycle. An evaluation version is now available.

-- Zend Guard provides independent software vendors and IT managers with the ability to safely distribute and manage the distribution of PHP apps, while protecting their source code. Zend Guard is comprised of an encoder/obfuscator and a license manager. Information is available.

-- Zend Platform for i5/OS is a PHP production environment, which includes performance, availability, clustering and monitoring capabilities for business-critical PHP applications

Thursday, April 13, 2006

Basic WebSphere Application Server V5.0 and V5.1 wsadmin Programmers Guide

Websphere Application Server v5 and v5.1

Examples for the WebSphere Application Server V5.0 wsadmin tool are included in the information center, Redbooks and technotes. Many clients want to advance their skills, doing more than making minor modifications to these examples. A common goal for clients is to use wsadmin to create commands that duplicate the functionality of the administrative console.

The building blocks in this document help you build the skills necessary to correctly formulate commands that administer a WebSphere Application Server V5.x environment. This document explains how simple techniques that use wsadmin commands, and other available documentation, can help you reach your administrative design goals.


Content
Basic WebSphere Application Server V5.0 wsadmin
Programmers Guide

Index
1. Purpose
2. Official Product Documentation
3. Wsadmin Command Overview
3.1. Help
3.2. AdminApp
3.3. AdminConfig
3.4. AdminControl
4. Wsadmin Application Commands, AdminApp
4.1. Options
4.2. Interactive
5. Wsadmin Configuration Commands, AdminConfig
5.1. Basic AdminConfig Subjects
5.1.1. Types
5.1.2. Attributes
5.1.3. Required Attributes
5.1.4. Config IDs
5.2. Techniques for Formulating Administrative Configuration Commands
5.2.1. Scenario 1
5.2.2. Scenario 2
5.2.2.1. Discovering the Type
5.2.2.2. Understanding the Final Command
5.2.2.3. Forming the Final Command
6. Wsadmin Control Commands, AdminControl
7. Conclusion


--------------------------------------------------------------------------------


1. Purpose
Many examples for the WebSphere Application Server V5.0 wsadmin tool are provided in the information center, Redbooks or technotes. Many clients want to advance their skills beyond the making minor enhancements to examples, without calling IBM® Support.

The final goal for the client is the ability to create commands to mimic the administrative console and beyond. The Basic WebSphere Application Server V5.0 Wsadmin Programmers Guide advances the client skills by pointing out important documentation that IBM provides, and the simple techniques needed to correctly formulate any command to administer a WebSphere Application Server V5.x. This document shows how some public documentation and some simple techniques that use wsadmin commands, can reach the final administrative design goals.

2. Official Product Documentation
WebSphere Application Server V5.0 Information Center:
V5.0: http://publib.boulder.ibm.com/infocenter/wasinfo/index.jsp
V5.1: http://publib.boulder.ibm.com/infocenter/ws51help/index.jsp

The WebSphere Application Server Information Center contains many examples for wsadmin commands, the migration commands from WSCP to wsadmin, and information about WebSphere Application Server MBeans, JavaDoc.

The recommend starting point for new wsadmin users is the information center’s Contents view, where you can expand your WebSphere Application Server editions to find All topics by feature. Inside this view is the System administration section. Underneath System administration is Scripting, where new users can learn how to use wsadmin with the information center.

More advance users can employ good search strings to locate information directly.

One example of a generic search string is Example wsadmin; a more specific wsadmin search uses the specific command, for example, installInteractive. The search results show all the examples and descriptions that IBM has created. This is a powerful source, which IBM keeps up-to-date with current information.

WebSphere Application Server Support Web site:
http://www.ibm.com/software/webservers/appserv/was/support/
The IBM Redbooks, white papers, technotes and fixes for WebSphere Application Server are located on this Web site. The WebSphere Application Server Support Web site provides a variety of information to help you use and fix WebSphere Application Server.

The IBM Redbooks contain cook book examples for wsadmin; for example, the IBM WebSphere Application Server 5.0 System Management and Configuration Redbook contains “Command Line Administration and Scripting” in Chapter 22.

Technotes document specific examples that many customers run into that are not documented or that correct documented commands and examples from the Redbooks or other sources.

WebSphere developerWorks :
http://www.ibm.com/developerworks/websphere/
developerWorks is a Web site where advanced technical papers written by the architects and developers of WebSphere products explain the design and usage of the products.

3. Wsadmin Command Overview
Three major categories, or objects, comprise the WebSphere Application Server administration commands: AdminApp, AdminConfig and AdminControl. The most helpful command to use when lost in wsadmin is the help command.

The building blocks in this document help you build the skills necessary to correctly formulate commands that administer a WebSphere Application Server V5.x environment. This document explains how simple techniques that use wsadmin commands, and other available documentation, can help you reach your administrative design goals.


Content
Basic WebSphere Application Server V5.0 wsadmin
Programmers Guide

Index
1. Purpose
2. Official Product Documentation
3. Wsadmin Command Overview
3.1. Help
3.2. AdminApp
3.3. AdminConfig
3.4. AdminControl
4. Wsadmin Application Commands, AdminApp
4.1. Options
4.2. Interactive
5. Wsadmin Configuration Commands, AdminConfig
5.1. Basic AdminConfig Subjects
5.1.1. Types
5.1.2. Attributes
5.1.3. Required Attributes
5.1.4. Config IDs
5.2. Techniques for Formulating Administrative Configuration Commands
5.2.1. Scenario 1
5.2.2. Scenario 2
5.2.2.1. Discovering the Type
5.2.2.2. Understanding the Final Command
5.2.2.3. Forming the Final Command
6. Wsadmin Control Commands, AdminControl
7. Conclusion





1. Purpose
Many examples for the WebSphere Application Server V5.0 wsadmin tool are provided in the information center, Redbooks or technotes. Many clients want to advance their skills beyo"

SQL Goodies in DB2 for i5/OS V5R4, Part 1

Instead of Triggers

Embedded SQL in Free Form RPG

ISO Timestamp Format

Row Value Expressions in Predicates

Fullselect in a Subquery and Scalar Fullselect

ORDER OF in ORDER BY Clause

RCDFMT Keyword

USE AND KEEP EXCLUSIVE LOCKS

Alter Procedure

Label On Index

Set Current Debug Mode

Set Current Degree

Set Session Authorization

Wednesday, April 12, 2006

How to Create a Windows Installer for an SWT Application

Native Windows installers offer unparalleled integration with the operating system, as well as a familiar installation process for your users they just double-click on the installer, click Next a few times, and then click Finish. In this 10-Minute Solution, you will learn how to build a native Windows installer for an SWT application using open source tools.

Tuesday, April 11, 2006

How To Make a Dalek

Advanced Projects and Kits for Electronics

A small collection of electronic circuits for the hobbyist or student

A small collection of electronic circuits for the hobbyist or student. Site includes over 100 circuit diagrams, links to related sites, commercial kits and projects, newsgroups and educational areas. Most of the circuits can be built with common components available from Radio Shack or salvaged from scrap electronic equipment. Most all of the circuits have been built and tested and believed to perform as described, however possible mistakes may be found

Find the jar for a class in Eclipse based IDEs

There is a trick in Eclipse IDEs that you can use to find the jar for a class:

Right click a source folder and select New...Class

On the superclass field, click the browse button

Blank out the java.lang.Object, and type in the unqualified (no package) name of the class that you need the jar for

In the qualifier box below will be shown the package name for the class, and next to that is the name and the location of the jar for that class

Sunday, April 09, 2006

How to move up rank in Google

Optimise the site

Correct use of Headers h1 - h6

Add keyords and important words to the H? tags

Add Keywords and key phrases

Key words and phrases in the first two paragraphs

Good logical structure

Good idea to index your sitemap

If you do not have a sitemap, then make one.

CSS based site can help, less code for the spider to fight through

Friday, April 07, 2006

New Phishing Flaw in Internet Explorer

Hai Nam Luke has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to conduct phishing attacks.

The vulnerability is caused due to a race condition in the loading of web content and Macromedia Flash Format files (".swf") in browser windows.

This can be exploited to spoof the address bar in a browser window showing web content from a malicious web site.

Secunia has constructed a test, which can be used to check if your browser is affected by this issue

Top Ten Coolest Laptop Bags

Laptop cases are no longer simply about getting your laptop from one place to another; you can do that with a plastic grocery bag. With more people than ever daily toting their computers between the office and the home, the laptop case is now expected to mix durability, security, style, the ratio of those elements is up to you. Heres a list of some of our favorite laptop cases that weve come across over the last year, each mixing function and fashion in their own way. Which works for you?

Visits to Sites for Blogging, Local Information and Social Networks Drive Web Growth

While growth is slowing at most top Internet sites, it is skyrocketing at sites focused on social networking, blogging and local information.

The dramatic success of those Internet categories is apparent from a recent online-traffic analysis provided by market research firm ComScore Media Metrix, which examined visitor growth rates among the 50 top Web sites over the past year.

Top-ranked sites growing the most, ComScore's data showed, were Blogger.com, a personal publishing site; MySpace.com, where young people do virtual preening and share musical tastes; Wikipedia, an open reference site jointly edited by millions of people; and Citysearch, a network of local guides focused on cities"

US Attorney General sues Direct Revenue over spyware

New York Attorney General Eliot Spitzer said on Tuesday he has sued Direct Revenue, charging the Internet marketer with secretly installing millions of spyware programs that sent unsolicited advertisements to users' computers.

Spitzer, in a statement, said Direct Revenue secretly bundled spyware, that tracked users' Internet habits and caused pop-up ads to appear, into offers for free games or other applications.
The lawsuit filed in Supreme Court of the State of New York seeks an order barring Direct Revenue from secretly installing spyware or sending ads through existing spyware programs.
Spitzer also asked the court to compel the company to account for its revenue and pay unspecified monetary penalties.
Spitzer has been pursuing companies involved in alleged Internet fraud and other misconduct.
Last year, he reached a $7.5 million settlement with Intermix Media after suing the company for bundling hidden spyware along with millions of programs it gave away for free. Intermix owns the popular MySpace social networking site and was later purchased by News Corp

Ten Things Every Java Developer Should Know About Unix

One of the great things about Java is how multi-platform it really is. While cross platform glitches do occur, they are not really all that common. But since the law of unintended consequences is all pervasive, we now have the common sight of teams of developers building Java programs meant to run on Unix boxes on Windows.
Developing code meant for Unix on Windows does work reasonably well. The trouble is, many those coders slaving away in front of XP have a very limited understanding of their target platform. If that describes you, this following list is meant for you. Without further ado, here are the ten things you really need to know about Unix, in reverse David Letterman order

Has the Java platform has simply stopped being cool?

Arguably, Java did the same thing to C++ and C++ did the same thing to Smalltalk. In the Java over C++ case at least, it was a good thing as Java was a better concept.

Thursday, April 06, 2006

The creation and use of materialized query tables within IBM DB2 UDB for iSeries

This white paper explains, at length, the process for creating and implementing materialized query tables (MQT) within the IBM DB2 UDB for iSeries environment. MQT is a new technology that is delivered with the latest release of this state-of-the-art database. It offers new methods for enjoying high performance query processing

DB2 for IBM i - Articles and White Papers

AS400 Articles and White Papers

A new approach to enforcing business rules with DB2 for IBM i

Accessing DB2 for i5/OS data from a Linux Partition and Optimize Linux access to your DB2 for i5/OS database

Accessing DB2 for i5/OS data from AIX Applications - Optimize AIX access to your DB2 for i5/OS database

Building Web services with db2 and .Net

Creating and using materialized query tables (MQT) in IBM DB2 for i5/OS

IBM DB2 Development Add-in for Microsoft Visual Studio .NET

DB2 for i5/OS and Web Services

Debugging SQL procedures with the System i graphical debugger and DB2 developers workbench

Heterogeneous Data Access for iSeries Applications

IBM DB2 for i5/OS and Development Center

Improving SQL procedure performance: New features and tips to help improve stored-procedure performance
Indexing and statistics strategies for DB2 for i5/OS
Modernizing a DB2 for i5/OS application
Protecting i5/OS data with encryption [New]
QIBM_QDB_OPEN: The Open Database File-exit program - Using the Open Database File-exit program to secure your database [New]
Routing database client connections to IBM DB2 for i5/OS through an alternate subsystem
Star Schema Join Support within DB2 for i5/OS - Version 3
Table Partitioning Strategies for DB2 for i5/OS
Understanding the DB2 Universal Database on iSeries systems
Using DB2 Connect in an iSeries Linux Partition - Optimize the DB2 Connect access to a DB2 UDB for iSeries from a Linux partition white paper
Using IBM Rational Application Developer Version 6.0 wizards
Using iSeries database monitor to identify and tune SQL queries
Using iSeries ODBC Driver in a Linux Partition - Optimize the access to your DB2 UDB for iSeries database from a Linux partition
IBM DB2 for as400 i5/OS and DB2 Developer Workbench

Native PHP Ready to Burst onto the i5 Scene

The availability of native PHP on the System i might be the news with the most far-reaching effects this year. Previewed several months ago and announced last week at COMMON, native PHP brings not only a fast and free way to deliver i5 Web applications, but it also makes the i5 more relevant to new Web developers and carries the potential to reduce the use of Java and WebSphere on the i5.
'Since PHP is built to be a simple Web-scripting language, programmers will find it easier to develop applications without the need for all the overhead of WebSphere and the complexities of CGI,' says Mike Pavlak, director of IS for Trippe Manufacturing Company. 'PHP represents an alternative to Java that does not require a degree in Object-Oriented Development but still supports it. It is the biggest language to hit the iSeries since Java!'
PHP is the world's most popular Web-scripting language, and it comes with more than 10,000 existing PHP-based components and applications, many of which are open source and readily customizable. i5 developers can embed PHP inside Web pages and use it to access database content. While most PHP scripts are currently designed for MySQL, i5 pros should be able to adapt them for use with DB2 fairly easily

Socializer - free automatic social bookmark submission

The Socializer allows you to easily submit a link to several social bookmarking systems. Instead of having a link to each social bookmarking website, you have a single link to all of them

Socializer - free automatic social bookmark submission

The Socializer allows you to easily submit a link to several social bookmarking systems. Instead of having a link to each social bookmarking website, you have a single link to all of them

PHP Form Handling

If your PHP program is a dynamic web page (and it probably is) and your PHP program is dealing with user input (and it probably is), then you need to work with HTML forms. Here are some tips for simplifying, securing, and organizing your form-handling PHP code

Wednesday, April 05, 2006

Using Websphere on Iseries? Then you must read this paper!

This paper provides examples of the possible environments used to deploy IBM® WebFacing Tool solutions. The reader will also be walked through techniques to tune the environment to maximize performance Link

Tuesday, April 04, 2006

UK Government to Shut Down GSM Networks - Mobile Gazette - Mobile Phone News

Mobile Gazette has learned of a shock move by the British Government - it has decided to take back the part of the radio spectrum currently used for GSM networks in the UK, and will force mobile operators to run a 3G-only service in the future.
According to an interview in a secret location with someone claiming to be close to the heart of government (known to us only as 'Barry'), the 900MHz and 1800MHz bands are to be taken away from mobile operators from 1st April 2007 and redeployed to other functions. This means that all mobile phone users in the UK will need to switch to a 3G handset before that date. And on the subject of dates, check the date on this one!

Monday, April 03, 2006

32bit JVM for Websphere for Iseries

Text release of WAS (due out
this summer) will allow you to enable the installed product or a specific
profile in the product to use the 32-bit JVM. Out of the box, the product
will use the 'classic' iSeries JDK 5.
Currently available WAS releases cannot use the new 32-bit JVM because they
require JDK levels prior to JDK 5

Using System Request to execute a command

If your workstation is running some batch job and you don't have any other display session to execute command, you can use the 'send a message option' from the system request menu to execute the command.
That program allows you to send a message to a message queue by using the System Request key with option 5 (Send a message). That can be done even while your workstation is input-inhibited. By using that program, the 'Send a message' option can be used to send a command that gets executed by the operating system. The following command must be executed before MYCMD can be used, ADDLIBLE LIB(qtemp) Crtmsgq msgq(qtemp/q) Chgmsgq msgq(qtemp/q) dlver(*break) pgm(mycmd)

Printing from Qshell

While Qshell is a valuable tool in the iSeries professional's toolbox, some features it has are hard to discover. For example, instructions on how to print Qshell output to an iSeries printer are hidden in an obscure page in the InfoCenter. To send the output of a Qshell command to an output queue, use the Rfile command. Entered by itself, the following command 'echo Hello iSeries' will echo to the screen the words 'Hello iSeries'. We will redirect that to a printer file via Rfile echo Hello iSeries | Rfile -wbQ -c 'ovrprtf file(qprint) outq(outqname) splfname(qshprt) hold(*yes)' qprint
The InfoCenter has an example on how to send ASCII files and Qshell output to remote printers

Printing from Qshell

While Qshell is a valuable tool in the iSeries professional's toolbox, some features it has are hard to discover. For example, instructions on how to print Qshell output to an iSeries printer are hidden in an obscure page in the InfoCenter. To send the output of a Qshell command to an output queue, use the Rfile command. Entered by itself, the following command 'echo Hello iSeries' will echo to the screen the words 'Hello iSeries'. We will redirect that to a printer file via Rfile echo Hello iSeries | Rfile -wbQ -c 'ovrprtf file(qprint) outq(outqname) splfname(qshprt) hold(*yes)' qprint
The InfoCenter has an example on how to send ASCII files and Qshell output to remote printers

Advanced trigger applications

The application of triggers to implement solutions for many data processing problems is limited by the imagination only. A trigger program can be attached to (or, associated with) any number of physical files using the ADDPFTRG command. You write the trigger program in the language of your choice. Once attached to a file, the program is called every time a record is deleted, inserted and/or updated

Saturday, April 01, 2006

Stupid google tricks

There have been many examples of people "tweeking" the results of a google search.

Everyone knows about the GWB one, but I found a real funny one.

type "french military victories" and press "feeling lucky".

Friday, March 31, 2006

Is Microsoft about to collapse?

Thats a pretty bold question when you ask it about a company with $56 billion in cash, but just take a look at it from a business standpoint fortunately we have a solid example for comparison. GM makes cars and trucks which fewer and fewer people want except for a few enormously bloated, expensive, and resource-hungry SUVs.
What people want are comfortable, safe, low-cost, efficient, well-designed and, above all, reliable products which are readily from other vendors.
GM needs a minimum of 3-5 years to produce a new product and those are so similar to older products that most potential buyers dont see any difference. See the connection?

What is a Proxy Server, what is an anonymous proxy server?

Proxy Servers

A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately. The overall increase in performance may be very high. Also, proxy servers can help in cases when some owners of the Internet resources impose some restrictions on users from certain countries or geographical regions. In addition to that, among proxy servers there are so called anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.



Anonymous Proxy Servers

Anonymous proxy servers hide your IP address and thereby prevent unauthorized access to your computer through the Internet. They do not provide anyone with your IP address and effectively hide any information about you and your reading interests. Besides that, they don’t even let anyone know that you are surfing through a proxy server. Anonymous proxy servers can be used for all kinds of Web-services, such as Web-Mail (MSN Hot Mail, Yahoo mail), web-chat rooms, FTP archives, etc. ProxySite.com - a place where the huge list of public proxies is compiled. In a database you always can find the most modern lists, the Proxy are checked every minute, and the list is updated daily from various sources. The system uses the latest algorithm for set and sortings of servers by proxy, servers for anonymous access are checked. Results of Search always can be kept in file Excel.



Why Should You Use Anonymous Proxy Servers?

Any web resource you access can gather personal information about you through your unique IP address – your ID in the Internet. They can monitor your reading interests, spy upon you and, according to some policies of the Internet resources, deny accessing any information you might need. You might become a target for many marketers and advertising agencies who, having information about your interests and knowing your IP address as well as your e-mail, will be able to send you regularly their spam and junk e-mails.

A web site can automatically exploit security holes in your system using not-very-complex, ready-made, free hacking programs. Some of such programs may just hang your machine, making you reboot it, but other, more powerful ones, can get access to the content of your hard drive or RAM. Everything a web site may need for that is only your IP address and some information about your operating system.

Thursday, March 30, 2006

Help, im addicted to online games

A worried comrade asks: 'A friend of mine has had what many of us (his peers) are starting to consider a serious problem that we are becoming very worried about. He is addicted to World of Warcraft, and not in the same way the rest of us are. While most of us are able to disconnect from the game to take care of our own affairs, he plays to the exclusion of his friends, his job (he calls in sick a lot, it is starting to get noticed) and his life. How do you help someone who is actively throwing their whole life away to play a game?'

The Man Who Said No to Wal-Mart

Charles Fishman, senior writer for Fast Company magazine has recently published a book entitled The Man Who Said No To Wal-mart. It's an excellent book (Yes, I've read it) that talks about the intersection of making good stuff, the commodization of products, and the changing world that we work in; not exactly high tech, but tech nonetheless

Beginning Ubuntu Linux

Ravi writes 'Anybody who have heard about Linux would be aware of Ubuntu which is a very popular flavor of Linux created by the South African firm Canonical founded by the space tourist Mark Shuttleworth. In fact, they set the precedent of supplying free CDs of this very popular OS to any one interested in installing and trying out Linux on their machine. Recently, I got hold of this wonderful book named 'Beginning Ubuntu Linux - From Novice to Professional' authored by Kier Thomas. Being a Ubuntu user myself, I was pleased to see a Linux book specifically concentrating on Ubuntu, finding its way to the book stores. This book is aimed at people who are new to Linux and who wish to start their Linux journey by installing Ubuntu on their machines. Read the rest of Ravi's review

Wednesday, March 29, 2006

PHP Form Handling

If your PHP program is a dynamic web page (and it probably is) and your
PHP program is dealing with user input (and it probably is), then you need
to work with HTML forms. David Sklar, author of Learning PHP 5, offers
tips for simplifying, securing, and organizing your form-handling PHP
code

Secure Your Linux Server

Linux is a powerful and popular operating system kernel. That popularity
means you might be running it even if you're not a dedicated Unix
administrator or high-powered programmer. That doesn't mean that
rock-solid security is out of your reach, though. Aaron Brazell shows how
to make Red Hat 9 (and other Linux distributions) much more secure in a
few easy steps

Setting the Application Startup State to STOPPED in Websphere

Uncheck the checkbox in:

Application Name / Target Mappings / Server Name / enabled

Tuesday, March 28, 2006

Curl has a lot of amazing options

Looking for a powerful download program that's fast, versatile, and very easy to use? Look no further than Curl. It can download files via HTTP or FTP with or without authentication, it works over SSL, and it works without interaction.
Being able to download via FTP without interaction is a definite boon over scripting other command-line clients. For instance, to download the latest nmap sources, you could use:
$ curl -O http://download.insecure.org/nmap/dist/nmap-4.00.tar.bz2
This would download the file and save it in the current directory.
Curl has a lot of amazing options, such as being able to set cookie data for HTTP downloads and 'suck' down entire pages and linked pages. It's even useful for other things, such as automated tasks. For instance, to have a custom piece of code on your Web site updated with information from your local computer, you could build an HTTP request locally to a specific URL (the custom Web code).

TechRepublic Blog: Most Powerful Job Seeking Tip I Know

Here's what is probably the most powerful job seeking tip I know of, and it almost always works, sometimes too fast, with nearly any type of job, from CEO to janitor. Consider yourself pinged.

THE TIP: Hang out there.

That's it. Yes. That's all there is to it, and it works almost every single time. Let me explain in further, suspenseful, nerve-wracking detail.

First, because there is always some sourpuss who hates good news and proven techniques, I must rush to state this: I am *not* advocating any form of systematic stalking, trollish malingering, or unprincipled lollygagging. But to get your sleepy, Starbucks-deprived butt in gear, I must always state my views and insights with extreme, theatrical, Dada-esque language.

THE TIP (CLARIFIED): Hang out as a paying and good tipping customer,

or...a free advice-giver, helper, usability analyst, beta tester, bodyguard, computer fixer, printer disjammer, hail-fellow-well-met, comedic relief, floor sweeper, human surveillance camera, jackslabber, whatever...at the place you wish to work

10+ things you should know about troubleshooting a slow PC

User complaints are minimal when new PCs are rolled out. They start up quick, and programs seem to open in a snap. But over time, users begin to notice that their system is slow or that it hangs up often. While the possibilities for system slowdown are endless, this download identifies 10+ common troubleshooting areas you should examine first before you suggest to management that it's time for an upgrade

Learn to surf the Web anonymously

Anonymity has nearly become a thing of the past on the Internet. With cookies, adware, and spyware, most users are constantly being tracked when they surf the Internet. This can pose a variety of problems, especially in high-security industries. If you'd like to learn how to surf the Web anonymously, take a look at this short chapter from Windows XP Hacks, 2nd Edition. This is a great training resource for users in your organization who need to browse the Web without leaving a trace

Return better results using full-text search in MySQL

Many Web applications offer full-text search capabilities, wherein the user can locate matching records by using a word or word fragment as the query term. Behind the scenes, these applications are often performing this search by using a LIKE clause in a SELECT query. While this certainly works, it is an extremely inefficient way of performing a full-text search, especially with large volumes of data.
MySQL offers a solution to this problem, in the form of built-in full-text search. Here, the developer need simply mark certain fields as needing full-text search, and then use special MySQL functions to run searches on those fields. This is not only more performance-efficient (because MySQL indexes these fields differently to optimize the search) but also results in higher-quality searches, because MySQL intelligently ranks the results using a natural-language algorithm to remove irrelevant items.
This document will show you how to perform full-text searches in MySQL

Monday, March 27, 2006

Windows Vista: Gadgets are back in full force

The Sidebar is essentially a toolbar that can appear on either the left or right side of the desktop and provides you with a place to store and organize information that you regularly need, or want, to access quickly. The information is presented via little tools called Gadgets, which are actually customizable mini programs that can display continuously updated information, as well as provide shortcuts to common tasks. In the first category, Gadgets can bring you regularly updated weather forecasts, news headlines, or stock tickers. In the second category, you could have links to your favorite Web sites or a Web search tool

Choose a network management tool that can also help secure your systems

Most management tools do an excellent job of keeping track of your network interfaces, server processes, and network statistics. But you can get the maximum benefit from network management tools by selecting the right tool and using it to keep your network secure.

Know what you're looking for

When researching network management tools, keep in mind that the best tools have three key features.

One simple interface:

All of the information you need should be on one interface; you shouldn't have to switch between different screens. The interface should be Web-based and customizable for each administrator who needs to see the information. By giving system administrators, managers, and department heads a customized view that they can work with, they can become another set of eyes for your network operations.

Ability to recognize normal operations:

Most security-related events occur outside of the normal operating parameters of your network. Your tool must be able to tell the difference between normal traffic and abnormal traffic, and it should be able to report that information accurately.

Actionable information:

If you're going to use the tool to manage the security of your network, you must be able to act on that information from the same screen that delivered it. In other words, you should be able to detect a security-related event and then use the same tool to deal with the problem

Indexing and statistics strategies for DB2 UDB for iSeries

On any platform, good database performance depends on good design. And good design includes a solid understanding of indexes and column statistics: how many to build, their structure and complexity, and their maintenance requirements.
This is especially true for DB2 UDB for iSeries, which provides a robust set of choices for indexing and allows indexes to play a key role in several aspects of query optimization. On the IBM eServer iSeries platform, the use of indexes is a powerful tool, but also requires some knowledge on their application.
This paper starts with basic information about indexes in DB2 UDB for iSeries, the data structures underlying them, and how the server uses them. In the second part of the paper, index strategies are presented. Part three discusses additional indexing considerations related to maintenance, tools, and methods. Parts four and five cover column statistics and statistics collection strategies. And finally, the appendices provide examples and references

as400 Query performance and query optimization

The goal of database performance tuning is to minimize the response time of your queries and to make the best use of your server's resources by minimizing network traffic, disk I/O, and CPU time. This goal can only be achieved by understanding the logical and physical structure of your data, understanding the applications used on your server, and understanding how the many conflicting uses of your database may impact database performance.

The best way to avoid performance problems is to ensure that performance issues are part of your ongoing development activities. Many of the most significant performance improvements are realized through careful design at the beginning of the database development cycle. To most effectively optimize performance, you must identify the areas that will yield the largest performance increases over the widest variety of situations and focus your analysis on those areas.

In this topic, you will find the following information

What's new for V5R3
This describes the new topics in V5R3

Print this topic
This describes how to print

Query Engine Overview
This describes query engine overview

Data access on DB2 UDB for iSeries: data access paths and methods
Find out how the server determines the most efficient access method and what factors determine their selection by the server.

Processing queries: Overview
Describes how to design queries that leverage the query optimizer's cost estimation and decision-making rules.

Optimizing query performance using query optimization tools
Describes how you can use query optimization tools to improve data retrieval times by gathering statistics about your queries or controlling the processing of your queries. With the results that these tools provide, you can then change the data access method chosen by the server or create the correct indexes and use them effectively.

Creating an index strategy
Describes the index-based retrieval method for accessing tables and how to create effective indexes by avoiding such things as numeric conversions, arithmetic expressions, character string padding, and the use of like patterns.

Application design tips for database performance
Describes how the correct design of user applications can improve performance. Application design considerations include parameter passing techniques, using live data, reducing the number of open operations, and retaining cursor positions.

Programming techniques for database performance
Describes how the correct programming techniques can improve performance. Among the techniques covered are: using the OPTIMIZE clause, using FETCH n ROWS, using INSERT n ROWS, controlling the database manager blocking, optimizing the number of columns selected with SELECT statements, eliminating redundant validation, and paging interactively displayed data.

General DB2 UDB for iSeries performance considerations
Describes some general server considerations and how they affect the performance of your queries.

Database Monitor DDS
Reference information about database monitor DDS

Query optimizer messages reference
Reference information about query optimizer messages

You can also find more information about the V5R2 query engine in the Preparing for and Tuning the V5R2 SQL Query Engine on DB2 Universal Database™ for iSeries™.

Friday, March 24, 2006

How to set up a home FTP server

A home FTP server is useful to anyone who wants to save and retrieve files on their computer from anywhere. Ever forget a Word document on your home desktop that you really need at work? Ever download a PDF that explains how to fix something at work and you realize too late you left it at home that morning? If you have a personal FTP server, and you can reach your computer from any place on earth, your files will never be captive on your hard drive at home again

Lindsay's Technical Books

Books for curious people - Highest quality books, new and old, for experimenters, inventors, tinkerers, mad scientists, and a very few normal people..." A Maker writes "The books cover the spectrum of DIY- machining, mechanics, electronics, wood working, cooking, and everything in between. The books range from excerpts of old technical manuals to new publications

CutePDF - Create PDF for free, Save PDF Forms, Edit PDF easily;.

Portable Document Format (PDF) is the de facto standard for the secure and reliable distribution and exchange of electronic documents and forms around the world. CutePDF Writer (formerly CutePDF Printer) is the free version of commercial PDF creation software. CutePDF Writer installs itself as a 'printer subsystem'. This enables virtually any Windows applications (must be able to print) to create professional quality PDF documents - with just a push of a button!

Modding the Xbox in 10 Minutes

Xbox modification has come a long way in the past couple years. With the introduction of the TSOP mod, potential modders no longer had to shell out money for a modchip; rather just bridge two points on the Xbox motherboard. Now one doesn't even have to open up his Xbox. Welcome to the world of soft modding. Using code exploits in certain games, a user is able to load a phony gamesave that will boot into a Linux based operating system and allow a user to mod his Xbox... in under ten minutes

Beer mat knows when it isrefill time

Two German students have created a device that will stop beer lovers having to get out of their seats for a refill.
The 'smart' beer mat, created by Matthias Hahnen and Robert Doerr from Saarland University in Saarbruecken, southwest Germany, can sense when a glass is nearly empty, sending an alert to a central computer behind the bar so waiters know there are thirsty customers

Thursday, March 23, 2006

Recommended PHP reading list

This list of recommended reading material on PHP is compiled from a variety of online sources by Web application developers in IBM's Global Production Services organization. These resources have been selected with the intention of introducing IT specialists and architects to PHP, providing specific information about development and maintenance, and helping to integrate the technology with IBM products.
PHP is an interpreted programming language run in an environment provided by an open source core engine and extensions whose development is driven by many companies and individuals. As such, this list describes resources that apply to writing PHP programs and to customizing the interpreter's environment. It links to material published by IBM and content provided by others

Slashdot | Automatix Kicks Ubuntu into Gear

With the growing amount of talk on the usability of Linux for beginners, there have been quite a few people who have mentioned a script called 'Automatix' for Ubuntu as a means of easing the average joe into a life of Linux. Linux.com's (a Slashdot sister site) Tina Gasperson takes a closer look at Automatix and how it could help soften the blow of a Linux switch, at least in the short term. From the article: 'Automatix lives up to its reputation. It's worth any time and small frustration it might take to get through the script. And it's even worth that 'over-the-shoulder' time you might spend with a new Linux user to walk them through it. I don't see any reason why a beginner would not be delighted with Ubuntu after a magic touch from Automatix.'

UK Demands Sourcecode for Strike Fighters

Slashdot

"An anonymous reader writes ''The UK has warned America that it will cancel its 12bn order for the Joint Strike Fighter if the US does not hand over full access to the computer software code that controls the jets' Lord Drayson, minister for defense procurement, told the The Daily Telegraph that the planes were useless without control of the software as they could effectively be 'switched off' by the Americans without warning.' "

Iseries High speed link cable options and loop maximums

Tables show the high speed link (HSL) cables available for the system units, expansion units and the maximum number of expansion units on an HSL loop

Wednesday, March 22, 2006

The Modern Age

The Modern Age

Embracing The Mobile Hacker Ethic

As mobile phones become more powerful and pervasive, it was inevitable that theyd spawn the same kind of homebrew hacking culture as computers and the Internet. While the locked-down nature of cell phones and the closemindedness of wireless carriers has stunted that cultures growth, a few developments are afoot that promise to give a big boost to DIY mobile programming. Whereas programmers must typically pick up platform-specific skills to develop for mobile, a number of ways for independent and casual developers and even enthusiasts to use skills theyve already got or can relatively easily learn to build applications

Building a Car Camera Mount

UV-Tube for Disinfecting Water

This UV-Tube has been getting some press in the wake of hurricane Katrina. It is a low-cost water disinfecting system, which basically consists of a plastic tube and an ultraviolet light bulb, which can be run on solar power. It processes about five liters of water per minute. Ultraviolet light has been used to disinfect water for quite a while now. The inventors say the UV-Tube differs from other systems because it is inexpensive and less energy intensive

Game of the Week - Oregon Trail

www.classicgaming.com

Have you ever heard older, stupider, smellier people rambling on about how computer games rot the brains of impressionable youngsters? Not so! Sure, there may be a few games that hyperactive six-year-olds can complete simply by pressing a button over and over again, but there are also games that make learning fun! Actually, that's pretty much bullshit, but some educational games don't suck. Probably the unsuckiest (now there's a word) educational game of all time is Oregon Trail.
Back in the early 80's, Apple II's were the most groovin' thing to hit elementary schools since the lunch box \ thermos combination. Nearly every school in the country had at least a few Apple II compatible computers, some had one in every classroom. Of course, educators weren't about to let kids pass the time by playing Choplifter on these babies, so they bought (of all things) educational software. Quality ranged from 'programmed in two minutes and only teaches kids that eating snow is more entertaining than computer games' to 'not horrible.' Only a few really stood out as being really popular with the kiddies, and most of them were MECC games. The two most popular ones probably being Math Munchers and (of course) Oregon Trail

Announcing the Preview Release of Ubuntu 5.10 (Breezy Badger)

The Ubuntu team is proud to announce the Preview Release of
Ubuntu 5.10 - codenamed 'Breezy Badger'. The Preview Release
includes both Install CDs and bootable Live CDs for three
architectures.

Ubuntu is a Linux distribution for your desktop or server, with a
fast and easy install, regular releases, a tight selection of
excellent packages installed by default, every other package you can
imagine available from the network, a commitment to security updates
for 18 months after each release and professional technical support
from many companies around the world

Vintage Projects

Make Blog

...free project plans cover farm machines, the woodshop, machine shop, boats, and more. These vintage plans come from a half-century ago when do-it-yourself enthusiasts turned wood, metal and old motors into useful workhorses, functional tools, and toys

Tuesday, March 21, 2006

Someone went through a lot of trouble to very accurately depict the Simpsons intro with real life actors

Bigger mobile bundles reduce 3G charges - IT Week

Orange is trying to simplify its corporate mobile data tariffs by merging charges for international roaming calls, data and text into a single monthly pricing plan. Meanwhile, rival operator 3 has launched its first 3G data card for notebook PCs.
The Orange Business Advance plan contains six different tariffs, ranging from £400 to £10,000 per month. The tariffs can be shared among up to 200 employees on the same contract. The cost of voice calls varies from 5p to 27p per minute but the operator remained vague about data prices

3 to deliver MSN on 3G phones

Microsoft and 3 Group announced plans to deliver seamless access to Microsoft's communication services, MSN Messenger and MSN Hotmail, through the 3 portal and installed software clients on 3G handsets. These services will provide millions of customers with different ways to stay in touch using their 3G mobile phone

Monday, March 20, 2006

Messy daughter fights back by humiliating dad

An exasperated father has discovered to his cost that cyberspace is not the ideal arena for family feuds. Two weeks ago Steve Williams became so fed up with his daughter's messy bedroom that he built a website featuring pictures of his slothful offspring's lair in an attempt to shame her into action.
But the public humiliation proved a short-lived victory. While it did spur his daughter, Claire, into tidying up her room, it also whet her appetite for revenge. With the help of her father's friends, the 20-year-old business student has now set up a rival website that displays photos of him in a variety of compromising situations

ATI unwraps first 1GB graphics card | Reg Hardware

ATI today unwrapped its latest pair of workstation-oriented graphics chips - including what it claims is the first ever board to support one gigabyte of graphics memory

Microsoft takes on Craigslist in battle for classifieds | CNET News.com

Craigslist has taken on many giants. Can it survive a challenge from Microsoft?

The software behemoth late last month started Windows Live Expo, another node in its growing network of Internet services--and a direct stab at Craiglist's vital organs: free, local classified ads

Bus Driver sacked for playing PSP at wheel

A BUS driver has been fired for playing computer game Grand Theft Auto while at the WHEEL.

Steve Allcock was reported by terrified passengers who heard the screams of characters being butchered as he drove between stops.

Bosses fired him after on-board CCTV footage showed he had the handheld device on his knees

Intel's mobile phone plans still on hold

Intel's latest attempt at the mobile phone market has found its way into only two devices thus far: a BlackBerry phone and a networked vending machine

Samsung hits 10 megapixels with the SCH-B600

Samsung launched the first 5-megapixel camera phone in 2004, and the first 7- and 8-megapixel camera phones in 2005, so it's no surprise the Korean electronics giant has launched the world's first 10-megapixel camera phone at CeBIT 2006. Like its predecessors, the SCH-B600 looks like a regular handset from the front, but when you activate the camera application, a large lens extends from the back. You won't want to make calls at this point, because you'll feel like an idiot with the lens sticking out of your ear, but if you turn the phone horizontally and frame up a shot, passers-by won't realise you're using a phone -- it looks just like a compact camera

On the downside, once you get over having more megapixels than anyone else, you're stuck with a big, ugly phone that transforms into a big, ugly camera

Samsung SGH-E770

We like:
Small size; easy to take shots using front screen; good sound output through headset; plenty of built-in memory
We don't like:
Poor sound output through handset speaker; speaker port and volume rocker too close together

3 fires up high-speed Super 3G network, News at CNET.co.uk

3 has finished off the UK's HSDPA roster with the announcement it is to roll out a high speed third-generation network.
The third-generation operator, which recently celebrated its third birthday, has revealed it has completed trials of the super-fast 3G technology HSDPA (which stands for 'high speed downlink packet access').
3 has been testing the technology, also known as 3.5G and Super 3G, for four months around Maidenhead and has found users are getting downlink speeds of around 1.4Mbps. The trial will be extended in May and HSDPA connectivity will be rolled out to all 3's customers from the second half of the year.
O2, Orange, T-Mobile and Vodafone have already committed to trials or full scale rollouts of HSDPA

LG P7200



This is a nifty camera phone that makes taking photos very simple -- it has a 2-megapixel camera with flash, dedicated shutter button and autofocus. We particularly like the brightness and sharpness of the screen, which makes using your phone to take photos easier and less embarrassing than on other camera phones

Sony Ericsson Z520i



CNET.co.uk judgement:

The quad-band Z520i offers Bluetooth, infrared and some other interesting features. However, the loop aerial is unnecessary and 16MB internal memory just isn't enough. It also mysteriously takes pictures when it's in your pocket. That said, it is a good phone for the price and we like the easy-to-use interface and speakerphone

Slow your Iseries server with one press of a key

i5blog

"Upon review, I realized that the core tuning principles for the server are truly the same - with some refinements, and with a definite improvement in the automatic tuning process. My presentation has three basic steps:
1) Tune your system values
2) Tune your timeslices
3) Tune your shared pools - using the auto-tuner to your advantage.
This is all wrapped into a performance methodology - monitor, review, change (if needed), rinse and repeat"

IBM iSeries System: Take Back Control with i - Podcasts

'Take Back Control with i' is IBMs continuing series of podcast interviews with iSeries clients who are using their iSeries systems to streamline IT and maximize results

Customer and IBM specialist interviews reveal how companies are taking advantage of the iSeries legendary reliability.

This episode: Twitchell Corporation; Triple A Cooper Transportation; Moraine Valley Community College; Greg VandeCorput, IBM

Customer and IBM specialist interviews reveal how companies are using their iSeries system from IBM to help improve IT security.

This episode: Kirkland & Ellis; PDQ Solutions; Missouri State University; Tom Barlen, IBM

Customer and expert interviews conducted at the iSeries user conference in Orlando, FL reveal how companies are using their iSeries system from IBM to help simplify IT.

This episode: Vistar; Missouri State University; Client Server Development; Erwin Earley, IBM

machinehead: IBM water cooled racks

machinehead

"Real funny coz i sat through a ibm blade presentation today and at the end they were introducing the water cooled server racks. (oddly enough was an idea i had 5 years ago).

Anyway, i mentioned it looked quite cool and all it was missing was the blue neon lights. I didn't think anyone else found it hilarious because i didn't get any laughs"

Windows XP: Get Started Using Remote Desktop

Remote Desktop, included with Windows XP Professional, enables you to connect to your computer across the Internet from virtually any computer, Pocket PC, or Smartphone. Once connected, Remote Desktop gives you mouse and keyboard control over your computer while showing you everything that's happening on the screen. With Remote Desktop, you can leave your computer at the office without losing access to your files, applications, and e-mail. Your sales force will be able to access the latest pricing sheet from on the road by using Remote Desktop in Windows XP Professional

Too rich to care? Bill Gates mocks MIT's $100 laptop project

Chairman and Chief Software Architect Bill Gates on Wednesday mocked a $100 laptop computer for developing countries being developed with the backing of rival Google Inc. at the Massachusetts Institute of Technology.
The $100 laptop project seeks to provide inexpensive computers to people in developing countries. The computers lack many features found on a typical personal computer, such as a hard disk and software

Are You Pondering What I'm Pondering?

del.icio.us + Gmail

BusinessWeek Magazine: Best of the Web

BusinessWeeks Cream of the Crop














@ Home


















TOOLBOX
















Saturday, March 18, 2006

c-jump: Discover fundamentals of computer programming by playing a board game

Discover fundamentals of computer programming by playing a board game!
c-jump helps children to learn basics of programming languages, such as C, C++ and Java"

Ghetto-GPS

A simple DIY GPS device

Free MIT courses....Become a mad scientist today!!!

A free and open educational resource for faculty, students, and self-learners around the world. OCW supports MIT's mission to advance knowledge and education, and serve the world in the 21st century. It is true to MIT's values of excellence, innovation, and leadership.

MIT OCW:
Is a publication of MIT course materials
Does not require any registration

Buld your own working Lego Computer

DIY Arcade Machine for home

This is a budget arcade cabinet. Instead of a computer running the MAME software, the gaming is provided by a Namco TV Games 5-in-1 game controller, hacked for real arcade controls. So, instead of spending a few hundred on a computer, the controller is $20. Also, inside is a 14' TV, saving money there too.

Tour of the Xbox manufacturing facility

Getting to know LILO and GRUB

Most Linux users, from the casual desktop user to the Linux system administrator, have used a utility known as a boot loader. Different variations of this utility provide varying levels of support and functionality. In many cases, the default boot loader installed with a Linux distribution is not always the best for your needs; the same can be said for the default settings of each boot loader. In this article, Laurence Bonney discusses the pros and cons of two of the more popular boot loaders -- LILO and GRUB -- and suggests a number of configurations to get the most from your machine

DIY Cheap GPS receiver

Heres a short guide for converting a Palm III GPS sled into a normal serial GPS receiver. The Palm III is old tech so its accessories can be picked up cheap and modified for other purposes. The GPS receiver needs to be separated from the Palm specific board and a few components need to be transfered between the two. Once thats done you should have a standard serial GPS receiver

HOW-TO: Portable car pc

A practical, portable car computer design it is intended to be easy to use in the car, but also easily removable

HOW-TO: Laptop resurrection and upgrade

Follow along as reader [Seth] combines two i1400 Thinkpads. He refreshes the batteries, fixes the keyboard and trackpad, removes the floppy, adds USB ports and WiFi to end up with a ghoulish, but functional machine: The Franken-laptop

How to perform a clean boot on XP to prevent background programs from interfering with Games

This article describes how to use a clean boot to start your Microsoft Windows XP, Microsoft Windows Millennium Edition (Me), or Microsoft Windows 98-based computer. When you use a clean boot to start your computer, Microsoft Windows loads only basic devices and services when it starts."

50 Strategies for Making Yourself Work

Could be applied to many areas, not just writing!

Microsoft to go mano-a-mano against IBM in large-business computing

Ever since the dawn of the info era more than 50 years ago, IBM (IBM) has been the 500-pound gorilla in large-business computing -- supplying technology and services to coordinate communications, process transactions, and manage information. Well, another big gorilla just charged into IBM's jungle. Microsoft (MSFT) Chief Executive Steven Ballmer on Mar. 16 laid out his vision of an expanded role for his company in the $1 trillion business-computing market

Rules to Better Google Rankings

Confirmed: PlayStation 3 will ship with 60 GB HDD - Joystiq

To clear any confusion, a Sony representative, speaking with Yahoo! Games, has confirmed that the PS3 will ship with a 60 GB HDD, with an option to upgrade. No PS3 bundles will be sold without a hard drive. However, it's unclear if by upgrading, purchasers will have the option to buy the console with a larger hard drive, or if they'll be forced take the 60 GB HDD and buy an additional, larger drive separately we guess the latter (at least, at launch), but aren't ruling out the possibility of two bundles with different sized hard drives (for example, 60 GB and 100 GB bundles)

Lost Ernst & Young laptops exposes IBM staff to identity fraud

Ernst & Young has lost another laptop containing the social security numbers and other personal information of its clients' employees. This time, the incident puts thousands of IBM workers at risk

Super $500 Myth Project

Build a super-optimized, high performance MythTV box completely from scratch for a maximum of $500

Diabetes breakthrough may end insulin injections

Bioengineers at the University of Calgary have successfully grown insulin producing cells in a lab, marking a major breakthrough in diabetes research.
The team of scientists hope to eventually transplant lab grown, insulin producing cells directly into the bodies of patients with Type 1 diabetes.
Type 1 diabetes makes the body unable to produce enough insulin, requiring those suffering from the disease to inject themselves with the hormone.
In theory, the transplant would eliminate the need for daily insulin injections by patients who suffer from the disease

Friday, March 17, 2006

How To Build A Wireless Antenna Without Spending Much Money

Looking for an affordable way to increase the range of your wireless network? Trying to reach dead spots inside or outside a home, sharing a signal with your neighbors, or maybe for a point-to-point link with another network? Are you suffering from weak cell phone (photo) reception? You have come to the right place to extend the range of your wireless device, wireless gaming console, wireless network or connect to other wireless networks in your neighborhood. We look at hacking and modding a variety of wireless antennas and related hardware. Make your own wireless antenna!

Wifi hifi in my bathroom

I had a dream.. a dream about music.. music and soap... and water.. hot water.... Music, soap and hot water combined in a joyous.. er... combination that would rock (and cleanse) the unwashed masses (me and my flatmate)

I wanted a stereo in my bathroom

How To Build A Wireless Antenna Without Spending Much Money

Looking for an affordable way to increase the range of your wireless network? Trying to reach dead spots inside or outside a home, sharing a signal with your neighbors, or maybe for a point-to-point link with another network? Are you suffering from weak cell phone (photo) reception? You have come to the right place to extend the range of your wireless device, wireless gaming console, wireless network or connect to other wireless networks in your neighborhood. We look at hacking and modding a variety of wireless antennas and related hardware. Make your own wireless antenna!

Backup Del.icio.us with Excel

If you have Excel 2003 and use the social bookmarking tool Del.icio.us, you can backup your bookmarks in Excel

DIY Gaming Router / Firewall 101

If you share the bandwidth in your home with family members, kids, spouses, friends, roommates, or just about anyone else, you will know the headaches caused by unexpected downloads right in the middle of your online application of choice. Instant jump of ping, disconnects, and many other nasty things that can happen as a result of sharing bandwidth. Recently, companies have been coming out with routers specifically designed to aleviate this problem. But for the most part, they are hard to find, and hard on the cheque book.

With this article, you will walkthrough how to set up your own firewall / router from old computer parts laying around the house. And include all the nifty features you will find with a commercial router

Online Text to HTML Converter

This is a simple text to HTML converter. It will do the best it can to create URL and mailto: links, headings, lists, and paragraphs. You'll probably want to touch up the code after the conversion

Tardis Shed - Its bigger inside

Paper Steam Engine


This paper steam engine is based on his cad drawing of a Riches and Watts nominal 2.5 horsepower vertical A-frame double acting simple slide-valve steam engine circa 1870-75. The original engine was used to drive a water pump to irrigate the fields of Norfolk. If this model had a scale, it would be roughly 1:19

Be (a programming) GOD - code your own programs that evolve!

Using simple evolutionary models, it's easy to create algorithms that 'evolve' solutions to problems, such as fitting a function to a dataset (one of my applications) or creating an optimum antenna (one of NASA's applications). The concept I used is simple: sequences of 'DNA', strings that consist of the characters A, T, C, and G (from real biology), map out to some sort of algorithm. Sequences are then ranked, such that the 'better' or 'stronger' algorithms they represent achieve a better rank (in EPTK, lower ranks are 'better'). The EPTK frontend then proceeds to cull the algorithms by rank: the top algorithms reproduce, creating a pure copy and two mutated copies (with either a letter change, insertion, or deletion), while the weaker algorithms are randomly weeded out. Thus, a strong algorithm will either continue its lineage, mutate into something weaker and die out, or mutate into something stronger and perhaps become the new dominant algorithm. In the end, you're left with a strong algorithm