Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Deleting the top 10 rows in a table
Find out the best way to use the SQL DELETE statement to delete rows from a table. Continue Reading
DB2's DATE data type
This article describes how IBM implemented the DATE data type for DB2. Continue Reading
What SQL can be used in a compound SQL statement?
-
Basic DB2 buffering and memory guidelines
A high-level trip through DB2's memory structures. Continue Reading
OpenOffice tip: Everything about envelopes
OpenOffice expert Solveig Haugland walks users through the printing, formatting, and design processes for making a custom envelope. Continue Reading
Linux virtual address randomization and impacting buffer overflows
PaX team developers Ed Tittel and Justin Korelc explain how to stop buffer flow exploitation leaks and bolster security with Linux virtual address randomization.Continue Reading
Managing Samba-3: User rights and privileges
Samba expert John Terpstra explains how to manage the Samba-3 equivalents of administrative security controls in the Microsoft Windows and Linux operating systems.Continue Reading
Most important precautions when upgrading COBOL and CICS
Are you missing the most important precautions when upgrading COBOL and CICS? Search390.com experts Jim Schesvold and Tom Ross will outline the necessary steps to ensure your upgrade goes smoothly.Continue Reading
Managing Samba: Windows network identity basics
Linux administrators keen to manage Samba well should be just as keen on learning the basics of Windows network identity, says Samba team co-founder John H. Terpstra. Understanding Windows networking identity basics can make Samba management a lot ...Continue Reading
The pros and cons of IPsec
-
Roaming profiles for Linux users
Assuring your third-party data center is secure
The costs are generally lower and the bandwidth abundant, but are third party data centers secure enough to protect your data?Continue Reading
Integrating and operating VB with MySQL
What is the difference between a compiler and an interpreter?
Ken Milberg explains the difference between a compiler and an interpreter.Continue Reading
Dual power supplies and power grids
A reader asked: Following on an earlier question about dual power cords, do the power supplies have to be of the same phase? Or can they be from entirely separate power grids. (We will have effectively two supply systems with inline diesel rotary ...Continue Reading
Windows-to-Linux desktop migration tips: Why to switch, how to plan
Versora CTO Jon Walker provides the why and how of migration from Windows to Linux. Why, in a nutshell: Better technology.Continue Reading
Best practice for UPS loading on distrubted parallel or prallel redundant configuration
Expert Robert McFarlane gives an expert's opinion on a good question.Continue Reading
Connecting Excel to Linux databases
A major interoperability challenge for Linux users is transferring data from Microsoft Excel spreadsheets into Linux databases. In this tip, Ken Milberg presents some ways to overcome the challenge using various open source and third-party products.Continue Reading
Learning Linux security administration
Learning Linux, especially Linux security administration, can seem particularly tricky for those only well-versed in Windows. Here, security expert James Turnbull offers some pointers for getting up to speed.Continue Reading
Database tip: All about subqueries
A continuation of Mich's response to a user's question about different types of joins.Continue Reading
Database tip: Understanding joins and set theory
Sybase expert Mich Talebzadeh provides an excerpt from his book explaining set theory and different types of joins.Continue Reading
Configure your RHEL4 network
Learn how to use Red Hat Enterprise Linux 4 commands and utilities to configure your network from a GUI or command line.Continue Reading
System panic: Get a serial console log
How to create a serial console log of a system panic.Continue Reading
Rsync and Amanda: Keeping your data safe with open source backup
Rsync and Amanda are two straightforward open source products that can simplify your backup procedure.Continue Reading
Configure LSF in a Unix environment (Solaris and Linux)
Find out how to configure Load Sharing Facility (LSF) in Unix and Linux.Continue Reading
Netfilter and iptables: Understanding how they harden Linux
Linux firewalls are often more secure than Windows firewalls because of the way they're implemented, according to James Turnbull, author of Hardening Linux. In this tip, he breaks down major components of Linux firewalls -- Netfilter and ...Continue Reading
How-to: Integrating Kerio MailServer on Linux with MS Active Directory
This is a guide to integrating version 6.1 of the Kerio MailServer, which runs on Linux, with Microsoft Active Directory. Kerio MailServer 6.1, released July 18, is being demonstrated at LinuxWorld Conference & Expo in San Francisco this week.Continue Reading
Knoppix Hacks: Use Knoppix to rescue Windows
In "Knoppix Hacks," author Kyle Rankin explains how the Knoppix CD can be used as an indispensable, multi-purpose tool for administrators. One of the many things Knoppix can accomplish is rescuing Windows. In this e-mail exchange, Rankin provides ...Continue Reading
Hardening Linux: Firewall implementation
A poorly implemented firewall not only allows viruses to slip past your defenses -- it could lock you out of your host, according to James Turnbull, author of "Hardening Linux." Here, he explains how Linux firewalls differ from those used in Windows...Continue Reading
Sharing files between Linux servers with NFS
Using the Network File System (NFS) allows you to share files on a network as if they were on your local drive. Ken Milberg shows you how in this tip.Continue Reading
Dual corded power supply
Expert Bob McFarlane explains the details of dual corded power supply.Continue Reading
Data center raised floors and ceiling height
In this question, Bob McFarlane explains the benefits and drawbacks to different data center designs pertaining to cooling and airflow.Continue Reading
Put these troubleshooting tools in your toolbox
In this tip, Peter Harrison describes how to use Linux commands to get a quick fix on IT troublemakersContinue Reading
Should we use Halon or FM-200?
Our fire protection expert says that it's time to plan the move away from Halon.Continue Reading
Security differences between Linux and Unix
As close cousins, both Unix and Linux share many similar security concepts. But there are significant differences in how, and exactly what, security is implemented on Unix and Linux platforms. These differences, however, are more dependent on the ...Continue Reading
Screen: The terminal baby-sitter in the sysadmin's toolbox
Use a single terminal window to run multiple applications -- with more flexibility than backgrounding allows you.Continue Reading
Minimize outsourcing risks: Best practices in security
Offshore outsourcing can cut costs, but if you fail to analyze a vendor's certifications, methodologies and security procedures, it'll cost you more than money in the long run.Continue Reading
Using CORBA as your client-server interface
Recover deleted records from a MySQL table
Postfix vs. sendmail
Migrating from Exchange to a Linux mail server
Excavating ancient abbreviations in Linux
Courtesy of Unix developers' creativity, Linux contains a legacy of bizarre terms with a history all their own.Continue Reading
Closing a VSAM file in CICS
Solving latency problems with a local ISP
The differences between System V and BSD Unix
How are checkpoints used in Sybase?
Difference between virtualization and consolidation?
Data center management expert Charles King explains the relationship between virtualization and consolidation in the data center.Continue Reading
Why a disaster recovery plan is a core part of compliance
Compliance cares whether or not the organization can provide accountability and assurance that they are protecting the information's and processes' confidentiality, integrity, and availability. Hence, the connection.Continue Reading
Samba servers and multiple domains
Samba-3: Windows file and directory ACLs
Discover the parallels between files and directories in Windows and Unix and challenges to transparent interoperability. This tip proposes solutions to common problems using Samba.Continue Reading
CICS program testing checklist
Everyone who has ever coded knows the frustrations of programming errors. This tip is a checklist for how to check a CICS program for errors.Continue Reading
Consolidation and virtualization: The same, but different
While they're similar, these two approaches are also fundamentally different. Managers need to explore how to use both if they want to end server sprawl.Continue Reading
Why does Linux keep time from Jan. 1, 1970?
UPS management checklist
UPS management checklist: Business continuity efforts will end in a fizzle if your power fails. Here are ten ways to make sure your data center is always plugged in.Continue Reading
Comparing apples to apples in vendor pricing
What is the max memory addressable by COBOL?
Can open source sendmail scale for a growing company?
What are some COBOL coding techniques for performance?
Get performance tips to use when coding in COBOL.Continue Reading
Uppercase to lowercase in VS COBOL II
Dynamic file allocation in COBOL
We need to create a unique DSN from within a COBOL program. The actual name of the file needs to be unique for every execution of the program.Continue Reading
Can I convert a legacy file to XML with COBOL?
How to design a server room
Location, location, location. That's one key element to consider when designing a server room. We've broken down this project into eight core elements in this Learning Guide.Continue Reading
What is the difference between utility computing and grid computing?
What IBM MVS commands will safely shut down a stuck task?
Mainframes don't always operate as they should. In extreme circumstances, the FORCE command can help close down a stuck program.Continue Reading
What is the role of XML in managing open source apps?
What is the difference between open source and open standards?
Counting characters in COBOL
How do I define the length of the query? Is there any predefined function that calculates the length of the string in COBOL?Continue Reading
Sequence number differences between Oracle and MySQL
Nigel McFarlane points out some essential differences between Oracle and MySQL sequence numbers.Continue Reading
How to figure size requirements for new UPS unit
Find out how to decipher the size ratings for UPSes.Continue Reading
A date with CICS
Putting a CICS application together and you need date and time information? Try the ASKTIME and FORMATTIME commands. This tip explores how they are used.Continue Reading
Naming and renaming MySQL files for case sensitivity
Converting a decimal to BCD in Java
What are the pros and cons of Linux versus Windows for corporate desktops?
Using IEBEDIT to randomize Job Control Language steps on the mainframe
The IEBEDIT utility for mainframe programming copies data into new data sets and retains the original order. So is it possible to switch IEBEDIT to 'random mode'?Continue Reading
How to enable and view user audit logs in Linux
Creating a table with a MUL column
Is there an open source alternative to IBM's Websphere?
MyISAM and foreign key support
What is meant by application hardening?
Are there Visual Basic equivalents for Linux?
Moving files in a Unix-to-Linux port
Ken Milberg discusses the crucial migration step of moving files from Unix to Linux.Continue Reading
Which is better and more stable: Windows, Unix or Linux?
What can you do with the "cat" command?
What happens when you type the "cat" command?
Query hints to override optimizer
Getting error 1006: Can't create database
Security differences between Linux and Windows
The best Linux hardening tools
Troubleshooting CICS SOS messages.
Fast Guide to Fibre Channel basics
This Fast Guide to Fibre Channel basics has everything you need to get up-to-speed on the speediest (not to mention one of the most expensive) of the storage interconnects.Continue Reading
Getting started on Solaris-to-Linux porting
Ken Milberg follows up his popular Unix-to-Linux migration series with some nitty-gritty information on porting to Linux from Solaris.Continue Reading
Is MySQL relational?
How is a C program stored in memory?
Comparing Windows and Linux: Systematic file storage
The architecture of Windows and Linux file systems is similar in some points, but diverges greatly when tools are considered. Here's a quick comparison.Continue Reading
ICETOOL, SYNCTOOL utilities exclude mainframe subset files
Mainframe programmers can turn to ICETOOL and SYNCTOOL utilities to avoid writing a COBOL program when working with records.Continue Reading
Multiple starts on the same CICS transaction
Using yum vs. RPM
Estimating the database size
A start to programming enterprise applications with Linux, Java and PostgreSQL
Programming in a Linux environment is getting better all the time.Continue Reading
Who are Red Hat's biggest competitors?