Dawn May

Dawn May




Bookmark and Share
RSS

Recent Posts

  • Trace Output Formatted for PCAP
    08/02/2017
  • Route FTP and SMTP Workloads to Their Own Subsystem
    07/24/2017
  • Integration Between Navigator and Access Client Solutions
    07/13/2017
  • Client Advisory Council Meetings in June 2017
    06/22/2017
  • Graph History—Stacked Charts
    05/22/2017
  • Workload Group Configuration with IBM i 7.3

    I wrote about workload groups some time ago in “i Can … Manage Workloads Better with IBM i 7.1”.  The information in that older article is still accurate, and I’m not going to repeat a lot of what I wrote there.  If you have not yet used workload groups, you may want to read the older blog for additional information on why workload groups are useful.

    Read More

    Posted: July 28, 2016 |

    IBM i 7.3 - Network Connection Auditing

    Another day, another security vulnerability. System administrators everywhere battle daily to keep their systems secure. When security algorithms are deemed vulnerable or another network attack is disclosed, how do you know if you're impacted? How many issues could be caused by turning a weak security algorithm off? Tracing network traffic and analyzing the data is a tedious task and isn't always straightforward.

    Read More

    Posted: July 12, 2016 |

    IBM i Performance Frequently Asked Questions Revisited

    Back in 2013, IBM first published the IBM i Performance FAQ; this document is a fantastic resource on all types of performance topics.  It reviews the various components of system performance, discusses benchmarking, sizing and capacity planning, monitoring, and covers the performance tools that are available on i.  The document has answers to many commonly asked questions, and ends with an extensive list of references.

    Read More

    Posted: July 05, 2016 |

    IBM i 7.3 Enhancements for Display Job Log (DSPJOBLOG)

    This week, I’m going to share a super-secret enhancement in the 7.3 release.  The Display Job Log (DSPJOBLOG) command was enhanced with two new parameters: MSGF and DUPJOBOPT.

    Read More

    Posted: June 27, 2016 |

    Route More Work to Systems by User Profile

    I initially wrote about the SET_SERVER_SBS_ROUTING procedure in this post, Route DB2 Requests to a Specific Subsystem, and then again in this post, Route Remote Command Requests to a Specific Subsystem.  I’m back again with another post to tell you about more enhancements to this IBM i Service.

    Read More

    Posted: June 14, 2016 |

    Graph History: New in 7.3 IBM Navigator for i

    IBM i now has historical data support from Collection Services and graphical display of that data with Graph History in the Performance task of IBM Navigator for i. 

    Read More

    Posted: May 31, 2016 |

    Using ALLCHGRCV or ALLDTCRCV Control Group Entries to Save Journal Receivers

    IBM i backup strategies may use journaling to shorten or eliminate down time for applications during backups.  BRMS provides special control group entries which assist in backing up journal receivers for these backup strategies.     

    Read More

    Posted: May 23, 2016 |

    IBM i 7.3 - Qshell Jobs and the Inactive Job Time Out

    I’m sure most of you know how you can use Qshell to get a Unix -like interactive environment.  You start an interactive Qshell session by using the Start QSH (STRQSH) or QSH command with *NONE for the CMD parameter.

    Read More

    Posted: May 04, 2016 |

    IBM i 7.2 Improved Temporary Storage Tracking (Part 7)

    I have written several posts on the 7.2 temporary storage tracking improvements, and I thought I had covered everything sufficiently.  But wait, there’s more! Here’s more information on temporary storage accounting.

    Read More

    Posted: April 25, 2016 |

    IBM i 7.3 Adds Authority Collection Feature

    IBM i 7.3 has added a feature called “Security Authority Collection” which tracks how applications and application users “use” an object.  Inquiries against that collection will provide advice on securing critical business data and applications from intrusion by identifying who needs to have access to data and in what context.  This is a major enhancement to security management that is unique to IBM i.

    Read More

    Posted: April 12, 2016 |

    Displaying results 31-40 (of 325)
     |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|