There is no way we can tell anything from what you have provided. At the least, we would need to see actual e-mail headers. We aren’t able to determine if any time was changed. The two time values might simply represent two different UTC offsets and be perfectly valid.
View Discussion | May 25, 2013 1:28 PM
email falsification by date
Are you looking for a tutorial for Visual Basic? This seems like an academic question. — Tom
View Discussion | May 25, 2013 1:21 PM
characters, numbers, text files
You are right I am also doing to trial and error.. I am working from offshore but this printer is at onsite, so the tester who does testing each time scans and send it to me but in vain everytime it overlaps.
What do you mean by wrong definition? can you elaborate pls?
View Discussion | May 25, 2013 11:47 AM
You maybe using the wrong printer definition in the software.
Do you have any labels that print successfully on that printer?
I would think that you also need the printer definition when you use the GUI –
– I’ve used this software but never with the GUI
– my experience was trial and error to layout the label
View Discussion | May 25, 2013 11:35 AM
they are using a tool called tlabarcode for this label printinf
View Discussion | May 25, 2013 10:29 AM
whatever I have pasted is their printer language. It has font size, row and coloumn number. Each time I change their font and other values , but fields are overlapped everytime.
CAn you give me any solution for it
View Discussion | May 25, 2013 10:25 AM
View Discussion | May 25, 2013 8:26 AM
AS 400, logical file and Physical File
Are you curious about the future for most people alive today or for some time within the next few dozen centuries or more? It seems unlikely in any near future.
Technology involved around police actions advances as always, both positively and negatively. Technological advances need to be understood at a “meta” level before society learns how to manage human interactions Implications and relationships are too complex and not enough is known. We have a long way to go before we reach predictability for individuals in a population. Until then, technology will counteract technology; and human presence will be required.
View Discussion | May 25, 2013 5:15 AM
Biometrics and police officers
The actions I asked about are possible kinds of things that might have happened manually or by 3rd-party products or other ways completely separate from the use of the user space. For example, someone might do a test install of some Security or Compliance product. A test run of the product could run through a list of libraries to retrieve ownership and authority in order to generate a sample report.
Now, that example shouldn’t have the effect you’re asking about. It’s just an example of some external, unrelated process that touches objects on the system. And the point is that something like IFS processes can happen in many ways.
IFS activity is interesting for user spaces because a space can be accessed as a stream file. You can use the CPY command or EDTF to modify a space. I haven’t seen either of those give your result, but I don’t know all possible combinations. The use of SAV might set IFS-style backup attributes.
In short, I don’t see anything that you can do differently. Your recreation seems to be appropriate. You might need to call the QUSCUSAT API for additional attributes, in case you need it to auto-size itself or other reasons.
IBM support seems to be your best place to go if you need an authoritative explanation.
View Discussion | May 25, 2013 12:24 AM
If you are rich enough to build one, then you’re rich enough to hire companies that can do it. You don’t need to ask here, and this isn’t a place you can get that kind of information anyway.
View Discussion | May 24, 2013 11:07 PM
emp electromagnetic pulse
My 1T external has a D/C power supply that has to be running for it to power up?
View Discussion | May 24, 2013 7:50 PM
External hard drives, USB hard drives
Can you give us more information as to what is happening?
View Discussion | May 24, 2013 5:13 PM
I did not find any call to QLICOBJD , neither object auditing … I did not find IFS calls either … as you said the other parameters do not wite this -extended data- section …
View Discussion | May 24, 2013 4:35 PM
I tried to make the report work a dozen times with no success. I recreated the file and imported its MS Word document and all works just fine now.
Win 98 to the rescue!
Must have been a glitch in the original importing of the MS Word document.
View Discussion | May 24, 2013 3:01 PM
SQL can run a statement like this:
INSERT INTO MyFile2 SELECT * FROM MyFile1
View Discussion | May 24, 2013 12:30 PM
AS400 - Embedded SQL
The problem comes from the sharing. OPNQRYF cannot share an existing ODP. But unfortunately, as you’ve learned, the reason you have to share is because of OPNQRYF. You’ve answered why the sharing is done; OPNQRYF requires it. But it seems like a contradiction, doesn’t it?
Call CL1 Call RPG program Call CL2
PGM DCLF File(XXX) OvrDbf File(xxxx) ToFile(*LIBL/xxxx) SHARE(*YES) OpnQryF File((xxxx) QrySlt('Fld1 *EQ "3"') read the file here
PGM DCLF File(xxx) Ovrdbf File(xxxx) Share(*Yes) Secure(*Yes) Opnqryf File((T00210)) QrySlt('AAAUS *GT "111" + *And AAAUS *LE "222"')
View Discussion | May 24, 2013 12:17 PM
As400 Opnqryf command
Yes, Export Notes is good and helpful utility that convert
Domino v8.5 nsf mail file to Outlook .pst without any removal or variation in
information as well as it manages same folder structure after Lotus Notes to
View Discussion | May 24, 2013 10:59 AM
Lotus Notes administration, Lotus Notes Conversion, Lotus Notes to .PST, Notes Administration
Thank you all i am able to achive this with ought RUNSQLSTM,but able to achive this through 2 processes .
View Discussion | May 24, 2013 9:57 AM
AS400 - Embedded SQL
I have used sharing because otherwise my Rcvf was not getting the records that satisfy the QrySlt condition mentioned in Opnqryf.
I have Dclf, ovrdbf share(*Yes), opnqryf, and Rcvf on both the CL programs. But the Opnryf QrySlt condition is different in both the CL. As I said, if the file reads till Eof, I dont have any issues. The issue appears only if I read one record alone. And from your response I understood we cannot deletet the ODP just by closing the file and deleting the override. And my programs are not Clle, they are CLPs. If I make Share(*No) do I need to change the scope to *Job inorder to read the Qryslt records using Rcvf?
View Discussion | May 24, 2013 7:13 AM
As400 Opnqryf command