|
Thanks to Vern Hamberg for his reply. I was hoping the AS/400 and its implementation of REXX had matured to the level of the VM operating system but I guess not. You see in VM you can create screens using the XEDIT editor and call those screens from REXX thus quickly creating a professional looking and functioning application without all the extra work of a compiled language. While you are correct that an interpretive language like REXX, VB, etc., is never going to be as fast as a compiled language, nor is it going to enjoy static SQL calls to DB2 and the accompanying performance, if the application is relatively small and not hugely complex, REXX is a very capable and powerful language. I also agree with you as to string functions. REXX is probably one of the best out there. It seems like one of your ideas has merit for my use... If I understand you correctly, you say to create an RPG "driver" program, called from my REXX program, that basically runs and manages the DSPFs and takes the variables and puts them into the REXX variable pool. If its possible to architect such a thing such that it can be called and called with all the variables getting messed up, that sort of sounds like what is done in VM with XEDIT screens, except there XEDIT and REXX can be more integrated with each other. What do you think? Anyone else care to comment? Thanks in advance, Dave >>> midrange-l-request@xxxxxxxxxxxx 1/27/2004 09:52:42 >>> Send MIDRANGE-L mailing list submissions to midrange-l@xxxxxxxxxxxx To subscribe or unsubscribe via the World Wide Web, visit http://lists.midrange.com/mailman/listinfo/midrange-l or, via email, send a message with subject or body 'help' to midrange-l-request@xxxxxxxxxxxx You can reach the person managing the list at midrange-l-owner@xxxxxxxxxxxx When replying, please edit your Subject line so it is more specific than "Re: Contents of MIDRANGE-L digest..." Today's Topics: 1. RE: Socket bug??? (GKern@xxxxxxxxxxxxxxxx) 2. Re: EBCDIC to ASCII translation (Baltus,Kevin L) 3. REXX on AS/400- Can you call formatted screens (Dave Odom) 4. Re: Changing passwords issue (Ed Fishel) 5. Yet another virus (rob@xxxxxxxxx) 6. *** ADMIN: Viruses (David Gibbs) 7. Re: *** ADMIN: Viruses (pnelson@xxxxxxxxxx) 8. RE: I/O guidelines (Andy Nolen-Parkhouse) 9. Re: REXX on AS/400- Can you call formatted screens (Vern Hamberg) 10. communication from and to a blackbox (Andreas.Stadelmann@xxxxxxxxxx) 11. AFP - *OVL issue (Fabrice Calmelat) 12. What's that character? (rick.baird@xxxxxxxxxxxxxxx) 13. Re: What's that character? (James Rich) ---------------------------------------------------------------------- message: 1 date: Tue, 27 Jan 2004 08:33:25 -0500 from: GKern@xxxxxxxxxxxxxxxx subject: RE: Socket bug??? Scott, The correction you suggested was also provided to me by another reader. That indeed fixed the problem. Thanks again. Regards, Gerald Kern IBM Certified AS/400 RPG IV Developer & RPG IV Programmer MIS Project Leader, Lotus Notes/Domino Administrator The Toledo Clinic, Inc. 4235 Secor Road Toledo, OH 43623-4299 Phone 419-479-5535 gkern@xxxxxxxxxxxxxxxx ------------------------------ message: 2 date: Tue, 27 Jan 2004 08:46:56 -0500 from: "Baltus,Kevin L" <KBALTUS@xxxxxxxxxxxxx> subject: Re: EBCDIC to ASCII translation Could you explain more or give samples regarding "table-lookup"? Much appreciated - thanks! <beg snip> date: Mon, 26 Jan 2004 14:29:13 -0800 (PST) from: "James H H Lampert" <jamesl@xxxxxxxxxxx> subject: Re: EBCDIC to ASCII translation > How do we translate an IFS file from EBCDIC to ASCII either through FTP > or through netserver? > Doesn't it automatically? Hmm. Depends. Dunno about Netserver (except that it probably has everything to do with the file's CCSID), but with FTP, it depends on whether one is in binary mode. At any rate, we do a great deal of EBCDIC-to-ASCII and ASCII-to-EBCDIC translation here at Touchtone, and it's all done with table-lookup. -- JHHL <end snip> ============================================================================== This communication, together with any attachments hereto or links contained herein, is intended for the use of the intended recipient(s) only and may contain information that is confidential or legally protected. If you are not the intended recipient, you are hereby notified that any review, disclosure, copying, dissemination, distribution or use of this communication is STRICTLY PROHIBITED. If you have received this communication in error, please notify the sender immediately by return e-mail message and delete all copies of the original communication, along with any attachments hereto or links herein, from your system. ============================================================================== The Travelers E-mail System <tdmmsws2> made this annotation on 01/27/2004 08:47:01 AM. ------------------------------ message: 3 date: Mon, 26 Jan 2004 17:27:12 -0700 from: "Dave Odom" <DOdom1@xxxxxxxxxxxxxxx> subject: REXX on AS/400- Can you call formatted screens Is it possible to pass parameters via DSPF screens? I'd like to build some applications using REXX on the 400 but line at a time entry is a "gating" problem; it is soooooo passe. Thanks, Dave Tucson Water ------------------------------ message: 4 date: Tue, 27 Jan 2004 08:33:11 -0600 from: Ed Fishel <edfishel@xxxxxxxxxx> subject: Re: Changing passwords issue Mike Silvers wrote: >I am having a problem with a user profile. The password is >getting changed somewhere along the line. I need to determine >where the password is getting changed. I looked in the QHST >log, but I can not find any reference to the password being >changed. Does anyone have any ideas where I can look to >determine how/when the password was changed? Is there an >exit program that can record who changed and when passwords >were changed (or when a change was made to the user profile)? Take a look at the CP audit record in the QAUDJRN audit journal. The Password Changed field will be set to "Y" when the password was changed for the user profile. To cause the CP audit record to be generated you will need to have *SECURITY specified in the QAUDLVL system value and *AUDLVL specified in the QAUDCTL system value. The Change Security Auditing (CHGSECAUD) command can be used to set both of these system value and create the audit journal if it does not exist. The CP audit record will also be written when the user profile is restored. Ed Fishel, edfishel@xxxxxxxxxx ------------------------------ message: 5 date: Tue, 27 Jan 2004 09:34:05 -0500 from: rob@xxxxxxxxx subject: Yet another virus Rest assured that my PC does not have a virus. Evidently there are a lot of people on this list that have been clobbered. And some are sending the messages as if they came from me. Rob Berendt -- Group Dekko Services, LLC Dept 01.073 PO Box 2000 Dock 108 6928N 400E Kendallville, IN 46755 http://www.dekko.com ------------------------------ message: 6 date: Tue, 27 Jan 2004 08:35:42 -0600 from: David Gibbs <david@xxxxxxxxxxxx> subject: *** ADMIN: Viruses Folks: Once again there is a batch of viruses in distribution via email that are forging the 'from' address. Please keep in mind that, if you get a virus from someone, it's probably not being sent from them at all ... but someone else with both the apparent sender and you have corresponded with. Unfortunately, this means that it's possible for a virus to be sent to a mailing list. I am running active virus protection (two different virus scanners, f-prot & clamav) which seems to be catching everything that has been thrown at it. Rest assured, however, that even if the virus were to get past the virus scanner ... the virus payload would be removed from the email before it gets distributed so only the text portion of the message could possibly get distributed. As always, please make sure you are running virus protection on your systems and that your virus definitions are up to date. A current backup doesn't hurt either :) If you have questions about virus protection, feel free to post a message in the PCTECH mailing list (http://lists.midrange.com/listinfo/pctech) or contact me directly. david ------------------------------ message: 7 date: Tue, 27 Jan 2004 08:52:20 -0600 from: pnelson@xxxxxxxxxx subject: Re: *** ADMIN: Viruses You da man, David. Paul Nelson Arbor Solutions, Inc. 708-670-6978 Cell pnelson@xxxxxxxxxx "Courage is contagious. When a brave man takes a stand, the spines of others are often stiffened." ~~ Billy Graham David Gibbs <david@xxxxxxxxxxxx> Sent by: midrange-l-bounces@xxxxxxxxxxxx 01/27/2004 08:35 AM Please respond to Midrange Systems Technical Discussion To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>, bpcs-l@xxxxxxxxxxxx cc: Subject: *** ADMIN: Viruses Folks: Once again there is a batch of viruses in distribution via email that are forging the 'from' address. Please keep in mind that, if you get a virus from someone, it's probably not being sent from them at all ... but someone else with both the apparent sender and you have corresponded with. Unfortunately, this means that it's possible for a virus to be sent to a mailing list. I am running active virus protection (two different virus scanners, f-prot & clamav) which seems to be catching everything that has been thrown at it. Rest assured, however, that even if the virus were to get past the virus scanner ... the virus payload would be removed from the email before it gets distributed so only the text portion of the message could possibly get distributed. As always, please make sure you are running virus protection on your systems and that your virus definitions are up to date. A current backup doesn't hurt either :) If you have questions about virus protection, feel free to post a message in the PCTECH mailing list (http://lists.midrange.com/listinfo/pctech) or contact me directly. david _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. ------------------------------ message: 8 date: Tue, 27 Jan 2004 10:06:42 -0500 from: "Andy Nolen-Parkhouse" <aparkhouse@xxxxxxxxxxx> subject: RE: I/O guidelines David, Have you reviewed the iSeries Disk Arm Requirements document available at the following URL? http://www-1.ibm.com/servers/eserver/iseries/perfmgmt/diskarm.htm If these are the published guidelines you are referring to, then it would not be much help. But they have gone to the trouble of benchmarking their various controllers and adjusting their disk arm recommendations based upon specific hardware. Sorry, no direct experience with your configuration. Regards, Andy Nolen-Parkhouse > On Behalf Of David Morris > Subject: I/O guidelines > > Does anyone have any supportable guidelines related to the new 2757 > controllers and 4326 drives? IBM's published guidelines seem overly > conservative and the business partner we purchased our 825 from seems > overly optimistic. They differ by a factor of 4. We are trying to narrow > in on a reasonable upgrade to our 20 drives that are becoming a > bottleneck. I can come up with a number that works but it would be > really helpful if we had another opinion that wasn't as skewed. > > Thanks, > > David Morris ------------------------------ message: 9 date: Tue, 27 Jan 2004 10:13:09 -0600 from: Vern Hamberg <vhamberg@xxxxxxxxxxxxxxxxxxxxxxxxx> subject: Re: REXX on AS/400- Can you call formatted screens According to the REXX Reference, >When a REXX program is running in interactive mode, all terminal input and >output >is displayed by the ILE Session Manager. The ILE Session Manager is a system >facility that provides line mode access to the display for output and the >keyboard for >input. This line mode operation is fixed and cannot be changed by the use of >display files. You could always get prompts from a DSPF in RPG, say, then send the values to the variable pool for REXX, then STRREXPRC. Or have commands that use a REXX procedure as the command-processing program. Once in the REXX environment, things are pretty quick - it can read and write to PFs, too. But it's probably slower than an app using only RPG or COBOL. It IS often the best choice for various text-handling stuff, IMO. HTH Vern At 05:27 PM 1/26/2004 -0700, you wrote: >Is it possible to pass parameters via DSPF screens? I'd like to build >some applications using REXX on the 400 but line at a time entry is a >"gating" problem; it is soooooo passe. > >Thanks, > >Dave >Tucson Water ------------------------------ message: 10 date: Tue, 27 Jan 2004 16:51:59 +0100 from: Andreas.Stadelmann@xxxxxxxxxx subject: communication from and to a blackbox hi folks i try to connect my iSeries to another computer, which acts as a black box. this blackbox sends throu a crossover cable data strings (using V.24). i would like to receive these with my iSeries, but i do not get anything. i creates an ascii controller, line and device but how do i get the data into a file ? the lin/ctl/dev are active, because the crossover cable is connected to the iSeries lin01 port and to the blackbox is there a way to start a terminal like hyperterm on a pc ? thanks for any help andreas ------------------------------ message: 11 date: Tue, 27 Jan 2004 16:01:54 -0000 from: "Fabrice Calmelat" <f.calmelat@xxxxxxxxxxxxxxxxxxxxxxx> subject: AFP - *OVL issue Hi, I have created an overlay using the IBM AFP driver and the CRTOVL command. This went smoothly and I can compile a PRTF referencing this overlay. However, when I print my report, the overlay does not get printed and I only get the data. Any ideas? Fabrice ------------------------------ message: 12 date: Tue, 27 Jan 2004 11:43:34 -0500 from: rick.baird@xxxxxxxxxxxxxxx subject: What's that character? hey all, I get an flat ascii text file with invoices from a vendor which I upload to the 400. and they've suddenly been having problems with spacing and such. While i was looking through the file, I was cutting and pasting several lines into another text file to illustrate the problems to them, and I came across a character that stopped the paste - for instance, I copied 5 lines, but could only paste 2 1/2 lines, and it stopped at this particular character. I'm sure that this will give fits to the CPYFRMSTMF or CPYFRMIMPF commands too, though I haven't tried. My question is, how can I find out what ascii char this is, and why it can't be copy/pasted? If someone wants to actually see the file, I can send it to them offline. Thanks, Rick "... any man who can hitch the length and breadth of the galaxy and still know where his towel is is clearly a man to be reckoned with". - Ford Prefect ------------------------------ message: 13 date: Tue, 27 Jan 2004 09:52:26 -0700 (MST) from: James Rich <james@xxxxxxxxxxx> subject: Re: What's that character? On Tue, 27 Jan 2004 rick.baird@xxxxxxxxxxxxxxx wrote: > While i was looking through the file, I was cutting and pasting several > lines into another text file to illustrate the problems to them, and I came > across a character that stopped the paste - for instance, I copied 5 lines, > but could only paste 2 1/2 lines, and it stopped at this particular > character. I'm sure that this will give fits to the CPYFRMSTMF or > CPYFRMIMPF commands too, though I haven't tried. > > My question is, how can I find out what ascii char this is, and why it > can't be copy/pasted? If someone wants to actually see the file, I can > send it to them offline. You could use a tool such as ghex to look at the file in hexadecimal. I can do that for you if you don't have such a tool available. James Rich "As for security, being lectured by Microsoft is like receiving wise words on the subject of compassion from Stalin." -- mormop on lwn.net ------------------------------ _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) digest list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. End of MIDRANGE-L Digest, Vol 3, Issue 121 ******************************************
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.