Use this URL if you only want to view what your LinkedIn connections have shared on your LinkedIn home page.
One of the problems with accessing on-line publications (including blogs) is that it’s hard for readers to verify the accuracy, reliability, and freshness of the content you’re reading. Especially in a technical article where a solution written for one version of a product may not work in a later version.
Here are three things I believe that anyone posting content should do in order to help readers insure your post is accurate and fit for its intended purpose. These aren’t difficult to add to a post, but they can help enhance your credibility by helping the reader evaluate whether the content will work for them now and in the future. Continue reading
One of the frustrations about having a High Availability setup is that unless something drastic happens, you may never use it. It will only go live if you have an unexpected outage on your source box, for testing, or if you need to switch processing to it for an extended planned outage (migration to a new box, moving locations, etc.)
An HA box is an insurance policy against the unexpected; one that’s usually not intended to be productive day-to-day.
But what if you want to make your HA setup more productive and get some value out of that machine that’s just sitting there replicating all day?
In that spirit, here are five things you can try to make your HA setup more productive without losing its ability to function as a backup machine. Continue reading
This post is an in-process centralized shared list of all organizations or individuals who provide content-specific information on the IBM i platform (no marketing-oriented pages, with the possible exception of IBM). Feel free to pull the information from this post into other posts to disseminate to the broader IBM i community.
Here the starter list of individuals and groups who provide information on the IBM i platform. (updated 12/6/13) Continue reading
Here’s a link to a nice IBM post about how to run a full system save in batch mode while the system is restricted.
Batch saves in restricted state are made possible by a Batch Time Limit parameter (BCHTIMLMT) added to the End Subsystems command (ENDSBS) you submit to put the system into restricted mode. This enables you to submit a batch full system backup job into the QCTL subsystem and to specify a maximum amount of time to run before the batch full save ends and the system exits out of restricted state. Continue reading
Let’s say you have the following IBM i partitions at your location:
PROD1 = Production machine (system 1)
DEV1 = Development machine (system 2)
Everyone has to log on to PROD1 but only selected people need to log on to DEV1 (mostly programmers but sometimes testers). With this setup, you need to configure IBM i Access for Windows PC5250 sessions for system 1 (PROD1) on each desktop but you don’t want to configure PC5250 sessions for system 2 (DEV1) on each desktop.
How do you configure your user desktops so they can sign on to both system 1 and system 2 without putting a second system 2 session on each desktop? Continue reading
(updated on 11-23-13)
There’s a good article/slide show from Gary Vaynerchuk on LinkedIn about why you should be careful when your tweets start with an ‘@’.
The gist is that if you send a tweet that starts with a twitter handle in the first position of your tweet (ex., @joehertvik), that message will only be sent to your followers who also follow the twitter account you reference in your tweet.
The simple way to think about this is: Continue reading
I recently received the following two LinkedIn invites. Which one do you think I accepted?
Invite #1: I’d like to add you to my professional network(note: this is LinkedIn’s default invitation text)
Invite #2: I am a subscriber to joehertvik dot com. I use LinkedIn to keep track of my professional network, and would like to add you.
I obviously linked to the person who sent invite #2 because even in one sentence, he gave me a personal reason for why I should connect with him.
Personalizing your LinkedIn invites is a surefire way to increase the number of people who accept your LinkedIn invitations. Continue reading
One of my editors gave me a great piece of advice one day regarding writing and blogging. He said (and I paraphrase):
We’re making stew with this publication. Sometimes the reader gets a nice big piece of steak for an article. Sometimes she gets a carrot and sometimes it’s a potato. We mix it up and give the pub a great flavor so there isn’t too much of one ingredient or another.
And the stew analogy is a great basis for some simple rules for serial bloggers, which can be summarized as: Continue reading