The document provides a technical introduction to the IBM AS/400 system. It discusses the history and evolution of the AS/400 from its origins in the System/38. Key aspects of the AS/400 architecture are its technology independence, object-based design, integration of hardware and software, single-level store, and support for work management and programming. The document also explores the AS/400 command interface, file system, users, and startup process. It briefly discusses other environments like Unix, hypervisor, and Windows that can run on AS/400 hardware.
Virtualization with KVM (Kernel-based Virtual Machine)Novell
As a technical preview, SUSE Linux Enterprise Server 11 contains KVM, which is the next-generation virtualization software delivered with the Linux kernel. In this technical session we will demonstrate how to set up SUSE Linux Enterprise Server 11 for KVM, install some virtual machines and deal with different storage and networking setups.
To demonstrate live migration we will also show a distributed replicated block device (DRBD) setup and a setup based on iSCSI and OCFS2, which are included in SUSE Linux Enterprise Server 11 and SUSE Linux Enterprise 11 High Availability Extension.
This presentation is about creating software for for hardware which does not exist yet. In particular, it explains how to add support of new hardware to QEMU (I2C Accelerometer), how to simulate new hardware, write a simple application to work with accelerometer, and demonstrate that it works on the real platform as well as under QEMU.
Presentation by Igor Kaplinsky (Senior Embedded Software Developer, GlobalLogic, Kyiv), Taras Protsiv (Embedded Software Developer GlobalLogic, Kyiv), and Volodymyr Shymanskyy (Embedded Software Developer, GlobalLogic, Kyiv), Embedded TechTalk, Lviv, 2014.
More details -
http://www.globallogic.com.ua/press-releases/embedded-lviv-techtalk-2-coverage
Virtualization with KVM (Kernel-based Virtual Machine)Novell
As a technical preview, SUSE Linux Enterprise Server 11 contains KVM, which is the next-generation virtualization software delivered with the Linux kernel. In this technical session we will demonstrate how to set up SUSE Linux Enterprise Server 11 for KVM, install some virtual machines and deal with different storage and networking setups.
To demonstrate live migration we will also show a distributed replicated block device (DRBD) setup and a setup based on iSCSI and OCFS2, which are included in SUSE Linux Enterprise Server 11 and SUSE Linux Enterprise 11 High Availability Extension.
This presentation is about creating software for for hardware which does not exist yet. In particular, it explains how to add support of new hardware to QEMU (I2C Accelerometer), how to simulate new hardware, write a simple application to work with accelerometer, and demonstrate that it works on the real platform as well as under QEMU.
Presentation by Igor Kaplinsky (Senior Embedded Software Developer, GlobalLogic, Kyiv), Taras Protsiv (Embedded Software Developer GlobalLogic, Kyiv), and Volodymyr Shymanskyy (Embedded Software Developer, GlobalLogic, Kyiv), Embedded TechTalk, Lviv, 2014.
More details -
http://www.globallogic.com.ua/press-releases/embedded-lviv-techtalk-2-coverage
Homer - Workshop at Kamailio World 2017Giacomo Vacca
Homer is an Open Source tool for real-time analysis and monitoring of VoIP and RTC platforms. It supports all the major OSS voice platforms, it's modular, easy to install and scales to carrier-grade infrastructures. Homer goes beyond collecting and correlating signalling and logs, and can also capture RTCP reports, QoS reports, and other events. Through an ElasticSearch endpoint, Homer supports BigData analysis of traffic.
This workshop focuses on the deployment of a multi-node Homer framework with various approaches: bash installers, Docker containers, Puppet.
We'll see how to configure Kamailio, FreeSWITCH (including the ESL interface), RTPEngine, Janus gateway (Events API), to collect signalling, RTCP reports, app-specific events and have them correlated and presented in a user-friendly GUI.
For advanced users, we'll present the installation of captagent, the standalone capture agent, hepgen.js to generate test traffic, and a Wireshark dissector to have full visibility of data flows.
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
From the moment you open up a website in your browser multiple virtual machines (VMs) are at work. The server generating the website might use Java, your browser executes JavaScript and maybe there is some Flash content running — with everything being executed in a VM.
Virtual machines became increasingly important and popular after Google’s introduction of V8. We expect our code to run fast but let’s step back for a second and see how these complicated pieces of software work. With a better understanding of how your daily ActionScript or JavaScript code is being executed you might start coding a little different.
Join Joa and dive deep into the the world of virtual machines. Learn about different garbage collection strategies and understand why those beasts behave the way they do.
final report format It is a report that provides a summary of the project performance and how it went, either during that phase or during the entire project itself. As with all things in project management it can be a small piece of work or it could be a large detailed document in itself.
Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to the inputs of a computer program. The presentation covers types of fuzzers and describes how they work. We will write and run a real fuzzer. Also it shows how fuzzers can guess correct CRC checksums, help with regression testing and find logical bugs in programs. Finally, it summarizes fuzzing usage at Google.
Talk for PerconaLive 2016 by Brendan Gregg. Video: https://www.youtube.com/watch?v=CbmEDXq7es0 . "Systems performance provides a different perspective for analysis and tuning, and can help you find performance wins for your databases, applications, and the kernel. However, most of us are not performance or kernel engineers, and have limited time to study this topic. This talk summarizes six important areas of Linux systems performance in 50 minutes: observability tools, methodologies, benchmarking, profiling, tracing, and tuning. Included are recipes for Linux performance analysis and tuning (using vmstat, mpstat, iostat, etc), overviews of complex areas including profiling (perf_events), static tracing (tracepoints), and dynamic tracing (kprobes, uprobes), and much advice about what is and isn't important to learn. This talk is aimed at everyone: DBAs, developers, operations, etc, and in any environment running Linux, bare-metal or the cloud."
This is the latest version of the slides based on my book "Solaris Performance and Tuning" that has been extended to include Linux and many other more recent topics. It has been presented innumerable times, most recently at the CMG conference, Usenix 08 and LISA 08, and this version will be presented at Usenix 09, San Diego on June 16th, along with the Free Tools slides.
This webinar by Maksym Kreshchuk (Lead Software Engineer, Consultant, GlobalLogic) was delivered at Embedded Community Webinar #3 on August 19, 2020.
Webinar agenda:
- how the principles and approaches to Android updates have changed
- Project Treble, A / B updates, Android partitions, Mainline modules
- what to expect from the new version of Android 11, which is scheduled for release this fall
More details and presentation: https://www.globallogic.com/ua/about/events/embedded-community-webinar-3/
Homer - Workshop at Kamailio World 2017Giacomo Vacca
Homer is an Open Source tool for real-time analysis and monitoring of VoIP and RTC platforms. It supports all the major OSS voice platforms, it's modular, easy to install and scales to carrier-grade infrastructures. Homer goes beyond collecting and correlating signalling and logs, and can also capture RTCP reports, QoS reports, and other events. Through an ElasticSearch endpoint, Homer supports BigData analysis of traffic.
This workshop focuses on the deployment of a multi-node Homer framework with various approaches: bash installers, Docker containers, Puppet.
We'll see how to configure Kamailio, FreeSWITCH (including the ESL interface), RTPEngine, Janus gateway (Events API), to collect signalling, RTCP reports, app-specific events and have them correlated and presented in a user-friendly GUI.
For advanced users, we'll present the installation of captagent, the standalone capture agent, hepgen.js to generate test traffic, and a Wireshark dissector to have full visibility of data flows.
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
From the moment you open up a website in your browser multiple virtual machines (VMs) are at work. The server generating the website might use Java, your browser executes JavaScript and maybe there is some Flash content running — with everything being executed in a VM.
Virtual machines became increasingly important and popular after Google’s introduction of V8. We expect our code to run fast but let’s step back for a second and see how these complicated pieces of software work. With a better understanding of how your daily ActionScript or JavaScript code is being executed you might start coding a little different.
Join Joa and dive deep into the the world of virtual machines. Learn about different garbage collection strategies and understand why those beasts behave the way they do.
final report format It is a report that provides a summary of the project performance and how it went, either during that phase or during the entire project itself. As with all things in project management it can be a small piece of work or it could be a large detailed document in itself.
Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to the inputs of a computer program. The presentation covers types of fuzzers and describes how they work. We will write and run a real fuzzer. Also it shows how fuzzers can guess correct CRC checksums, help with regression testing and find logical bugs in programs. Finally, it summarizes fuzzing usage at Google.
Talk for PerconaLive 2016 by Brendan Gregg. Video: https://www.youtube.com/watch?v=CbmEDXq7es0 . "Systems performance provides a different perspective for analysis and tuning, and can help you find performance wins for your databases, applications, and the kernel. However, most of us are not performance or kernel engineers, and have limited time to study this topic. This talk summarizes six important areas of Linux systems performance in 50 minutes: observability tools, methodologies, benchmarking, profiling, tracing, and tuning. Included are recipes for Linux performance analysis and tuning (using vmstat, mpstat, iostat, etc), overviews of complex areas including profiling (perf_events), static tracing (tracepoints), and dynamic tracing (kprobes, uprobes), and much advice about what is and isn't important to learn. This talk is aimed at everyone: DBAs, developers, operations, etc, and in any environment running Linux, bare-metal or the cloud."
This is the latest version of the slides based on my book "Solaris Performance and Tuning" that has been extended to include Linux and many other more recent topics. It has been presented innumerable times, most recently at the CMG conference, Usenix 08 and LISA 08, and this version will be presented at Usenix 09, San Diego on June 16th, along with the Free Tools slides.
This webinar by Maksym Kreshchuk (Lead Software Engineer, Consultant, GlobalLogic) was delivered at Embedded Community Webinar #3 on August 19, 2020.
Webinar agenda:
- how the principles and approaches to Android updates have changed
- Project Treble, A / B updates, Android partitions, Mainline modules
- what to expect from the new version of Android 11, which is scheduled for release this fall
More details and presentation: https://www.globallogic.com/ua/about/events/embedded-community-webinar-3/
Unisanta - Visão Geral de hardware Servidor IBM System zAnderson Bassani
Apresentação realizada na Universidade Santa Cecília - Cidade de Santos, São Paulo em 03/09/2014. Apresentado aos alunos de Sistemas de Informação e Ciência da Computação.
A Brief History of Computation’s in PortugalIJRTEMJOURNAL
A history of the great development of information technology in the twentieth century, at a
global level. The story of the emergence and development of information technology in Portugal, also in the
twentieth century, is highlighted
A Brief History of Computation’s in Portugaljournal ijrtem
: A history of the great development of information technology in the twentieth century, at a
global level. The story of the emergence and development of information technology in Portugal, also in the
twentieth century, is highlighted.
Insurance fraud or unusual damage to a vehicle?IJRTEMJOURNAL
The article deals with the issue of insured events. It points out the fact that insurance companies
suffer financial losses in the case of insurance frauds. Then the procedures of the insurance companies are
explained and how the insurance companies work in order to determine whether in a specific case it is an
insurance fraud or not. The unusual damage to a vehicle and the procedure by which the insurance company
settled the damage are presented. The steps taken by the owner of a vehicle and a court that invited a technical
expert have been clarified. Next, the description of the technical expert´ working procedures and the results of his
investigation are showed.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Introduction to the IBM AS/400
1. The IBM AS/400
A technical introduction
by Tom Van Looy <tom@ctors.net>
January 2009
This paper was written for the AS/400's 20th anniversary,
and was presented at HAR2009.
Tom Van Looy 1/14
2. Index
History..............................................................................................................................................................3
What is IBM i?..................................................................................................................................................3
Technology independence..........................................................................................................................4
Objectbased design...................................................................................................................................5
Hardware integration...................................................................................................................................6
Software integration....................................................................................................................................6
Singlelevel store.........................................................................................................................................6
Work management...........................................................................................................................................7
Jobs.............................................................................................................................................................7
Pools............................................................................................................................................................7
Programming....................................................................................................................................................8
OPM............................................................................................................................................................8
ILE...............................................................................................................................................................8
Exploring the system........................................................................................................................................9
Command interface.....................................................................................................................................9
File system structure..................................................................................................................................10
Users.........................................................................................................................................................10
Starting the system....................................................................................................................................11
Other environments........................................................................................................................................12
Unix............................................................................................................................................................12
Hypervisor.................................................................................................................................................13
Windows....................................................................................................................................................13
Bibliography....................................................................................................................................................13
About the author.............................................................................................................................................14
Legal notice....................................................................................................................................................14
Tom Van Looy 2/14
9. This is all similar to how Linux and Windows work. Below is an overview:
+----------+---------+-------------+
| ILE | Windows | Linux (ELF) |
+-------------------+----------+---------+-------------+
| After compilation | *.MODULE | *.obj | *.o |
+-------------------+----------+---------+-------------+
| Bind by copy | *.PGM | *.exe | * |
+-------------------+----------+---------+-------------+
| Bind by reference | *.SRVPGM | *.dll | *.so |
+-------------------+----------+---------+-------------+
Java programs are also first compiled into byte codes that are part of the MI. These byte codes are then
used by the Java Virtual Machine (JVM), which is implemented in SLIC.
The IBM i uses a three level hierarchy to manage the flow of work through a system. A job on the IBM i is a
unit of work represented as an object that contains, among other things, a process structure that's used to
manage the system resources required to complete the unit of work. The third level in the flow of work are
kernel threads. Threads are a portion of the process and are scheduled for execution by the process
management component of SLIC. The IBM i also supports two user thread management interfaces, namely
pthreads (POSIX) and the Java thread class.
A process is a system object at the MI, called a process control space (PCS). There is no equivalent
OS/400 object. A process object's responsibility is to tie together the resources needed to execute a
program. A process object contains an activation group. When a program is called the CALLPGM activates
the program. It completes the interprogram binding and implicitly creates an activation group. Activation
groups are always named, if not explicitly then implicitly. An activation group is the working storage
allocated to run one or more programs. Each activation group contains a:
● program static storage area (PSSA): section used for global static data
● program automatic storage area (PASA): the call/return stack, used to allocate local variables
● heap storage area: dynamic data that does not adhere to a stack structure, variable length data etc.
A system may use these storage areas to use a combination of registers, memory and disk storage. That's
why these areas are referred to as storage areas and not memory areas. The static and heap storage are
accessible by any thread with a program or procedure running in the activation group. The automatic
storage is associated with the thread. Activation groups can be shared among multiple threads, and a
thread may have code actively running in multiple activation groups.
Exploring the system
Command interface
An immediately noticeable distinctive feature of the IBM i is its command syntax and menubased
command interface.
Each command consists of a concatenation of simple abbreviations. For example, the command “work with
object” is WRKOBJ, while the command “work with output queue” would be WRKOUTQ. Every command
can be prompted with F4, and every command's parameters can be prompted as well. Every command /
parameter has a help, you can just put your cursor at it and press F1.
Tom Van Looy 9/14
10. The command entry prompt is always available, but the system also provides a series of topicoriented
menus to facilitate command use. For example, the MAIN menu looks like this:
Select one of the following:
1. User tasks
2. Office tasks
3. General system tasks
4. Files, libraries, and folders
5. Programming
6. Communications
7. Define or change the system
8. Problem handling
9. Display a menu
10. Information Assistant options
11. iSeries Access tasks
90. Sign off
When you call the MAJOR menu with GO MAJOR, you get the following:
1. Select Command by Name SLTCMD
2. Verb Commands VERB
3. Subject Commands SUBJECT
4. Object Management Commands CMDOBJMGT
5. File Commands CMDFILE
6. Save and Restore Commands CMDSAVRST
7. Work Management Commands CMDWRKMGT
8. Data Management Commands CMDDTAMGT
9. Security Commands CMDSEC
10. Print Commands CMDPRT
11. Spooling Commands CMDSPL
12. System Control Commands CMDSYSCTL
13. Program Commands CMDPGM
File system structure
An object name is maximum 10 characters long and is contained in a library (*LIB object). A library is
similar to a directory on Unix. The root of the IBM i file system is the special library QSYS. This is the only
*LIB object that can contain other *LIB objects. All IBMsupplied system library names begin with the letter
Q or #, it's considered good practice to never let your own library names start with one of these two letters.
The object name consists of the given name concatenated with the object type. It is perfectly possible to
have two objects named OBJ1, one being a file (*FILE) and one being a program (*PGM). Related objects
are grouped into libraries (object type *LIB). Every object is implicitly related to a library, and always
explicitly accessible like <library>/<object>. Objects are stored in EBCDIC format, so when transferring
data to the PC, translation to ASCII is needed.
A job on the system uses a library list, comparable to $PATH on Unix. A library list is composed of a system
and user part. Library QSYS will be in the system part of the library list. And, for example, a library TVL will
be in the user part of the library list.
The IBM i has an Integrated Filesystem (IFS). In the early years, OS/400 only had the QSYS single level file
system hierarchy. Over time, additional file systems were supported by adding a Virtual File System (VFS)
architecture. The VFS provides a common interface to all file systems in the IFS. One remarkable file
system is the QOpenSys file system. This file system contains Unixbased files and directories, and is fully
Tom Van Looy 10/14
11. compatible with the Portable OperatingSystem Interface for Unix (POSIX) and the X/Open Portability
Guide (XPG). The IFS also supports things like optical file systems and servers like NFS and SMB.
Users
Users are assigned a user class that holds some special authority levels. The IBM i superuser is called
QSECOFR (security officer).
Authority levels:
● all object (*ALLOBJ)
● auditing (*AUDIT)
● I/O system configuration (*IOSYSCFG)
● job control (*JOBCTL)
● save system (*SAVSYS)
● security administration (*SECADM)
● service functions (*SERVICE)
● spool control (*SPLCTL)
Originally, users would use an IBM 5250 terminal device to connect to the system. Few 5250 terminals still
exist, the term 5250 now refers to the content of the data stream itself. IBM provides IBM i users with a
5250 emulator instead.
When you connect to the system you get a “sing on” screen, which is configurable but by default, looks
something like this:
Sign On
System . . . . . : SOMESYS
Subsystem . . . . : QINTER
Display . . . . . : QPADEV0001
User . . . . . . . . . . . . . .
Password . . . . . . . . . . . .
Program/procedure . . . . . . . .
Menu . . . . . . . . . . . . . .
Current library . . . . . . . . .
At sign on, the user's initial library list gets set and it's default menu is shown. Because a user, like
everything else on the system, is an object, a message queue is also attached. All these parameters are
configurable in the user profile. When signed on, IBM i supports group jobs on your terminal. This can be
compared to the GNU screen utility on Unix, without the detach functionality.
Starting the system
The IBM i is managed from a console. There are two types of consoles. The obsolete twinax console, and
the Hardware Management Console (HMC). The second being required since POWER 6. The HMC is
basically an IBM System x running Linux with some base utility's, X with Fluxbox to provide graphical
login's, and a Java based application for system administration.
The HMC connects to the IBM i's Flexible Service Processor (FSP) over a network interface. The FSP is a
firmware that provides access to the IBM i's System Service Tools (SST) and Dedicated Service Tools
(DST) for diagnostics, initialization, configuration, runtime error detection and correction. SST can also be
accessed from a 5250 connection, DST is only alternatively accessible from the system control panel (CP).
Tom Van Looy 11/14
12. +-------+
| ||
+-------+ | IBM i ||
| || | || +----+ +----+ +----+
| HMC ||------------[FSP] || | WS | | WS | | WS |
| ||----+ +---| || +----+ +----+ +----+
+-------+/ | | | || /____/| /____/| /____/|
/_______/ | | | [CP ] || | | |
| | +-------+/ | | |
~~~~~~~ | | |
( )-----------------+ | |
( LAN )------------------------+ |
( )---------------------------------+
~~~~~~~
The HMC can be used to initiate the system's Initial Program Load (IPL). Or, simply stated, boot the
system. The FSP sends the IPL values to the HMC. For example, code C6004056 means that “Journal
recovery is running”. You can look up the IPL values of the last boot by using the command “CALL
QWCCRTEC”. This generates a QPSRVDMP spoolfile.
IPL attributes can be configured with the CHGIPLA command, for example you can specify to not clear the
system's output queue's etc. There are also some system values important to IPL. For example, system
value QCTLSBSD holds the name of the controlling subsystem. By default IBM ships two subsystems:
QBASE and QCTL. These subsystems have autostart jobs to start a few required subsystems. The QCTL
controlling subsystem will start the following subsystems (QBASE starts just a subset of those):
● QINTER (interactive jobs)
● QBATCH (batch jobs)
● QCMN (communication jobs)
● QUSRWRK (user work)
● QSERVER (server jobs)
● QSPL (spooling)
People can bring the system in a restricted state by stopping all subsystems except the controlling
subsystem (ENDSBS SBS(*ALL)). For example, this will make sure that object locks are removed so they
don't get in the way. Things like the console display and backup jobs will typically run in the controlling
subsystem.
The QSTRUPPGM system value holds the name of the first program that is started when the IPL is
complete. Typically this program will start all additional subsystems.
A few other interesting system values are:
● QDATETIME, keeps the current date and time
● QMODEL, the system model number
● QSRLNBR, the system serial number
● QSYSLIBL, the system part of the library list
● QSECURITY, the security level
Tom Van Looy 12/14
14. Bibliography
● Fortress Rochester, the inside story of the IBM iSeries; ISBN 1583040838
● Inside the AS/400; ISBN 1882419138
● Goodbye, AS/400, Old Friend; http://www.itjungle.com/tfh/tfh040708story05.html
● What is an iSeries; http://systeminetwork.com/article/whatiseries
● Understanding AS/400 system operations; ISBN 1583470158
● Architecture of the IBM AS/400; Vincent LeVeque, James Madison University, CS511
● Wikipedia, the free encyclopedia; http://en.wikipedia.org/ (S/3, S/32, S/34, S/36, S/38, AS/400)
● i5/OS information center, http://publib.boulder.ibm.com/infocenter/iseries/v5r4/index.jsp
● When is PowerPC not PowerPC, http://systeminetwork.com/article/whenpowerpcnotpowerpc
About the author
Tom Van Looy started out his IT career as a software developer in 2005 and moved over to the position of
network / system engineer in 2007. Since he changed jobs in 2009, Tom doesn't use the AS/400 in
production anymore. But the respect to this remarkable system has remained. Tom can be reached by
email at tom@ctors.net.
This paper was written for the AS/400's 20th anniversary, and was presented at HAR2009.
Legal notice
This paper is licensed under the Creative Commons
AttributionNoncommercialNo Derivative Works 2.0 Belgium license.
http://creativecommons.org/licenses/byncnd/2.0/be/deed.en
Tom Van Looy 14/14