Field

Name

 

Description

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Change

image

The

Resource

Management

Utility

 

determines the

output

image

siz

 

size

 

that

is

the

same

 

 

as

the

input

image

size. If

either

the

ima

 

 

 

length value

in

the

input image

size

is

zero,

the

Resource

Man

 

 

 

Utility

does

not

 

create

the

page

segment,

and

issues

an

error

 

 

 

 

You

can

change

the

output

image

size. Select

one

of

the

follow

 

 

 

 

Y

(Yes)

You

will change

the

output

image size. When you select

 

 

 

 

 

 

 

this value, the parameter prompts to specify the image

 

 

 

 

 

 

 

appearance.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

N

(No)

The

output

 

image

size

is

the same as the input image

 

Degree

of

Specify

the

degree

of

clockwise

rotation of the output image

 

rotation

can

specify

0, 90, 180, and 270 for

this

parameter.

 

 

 

 

 

Authority

Specifies

the

authority

given

 

to

users

who

do

not

have

speci

 

 

 

 

to

the

page

segment,

 

who

are

not

on the authorization list, and

 

 

 

 

user

group

has

no

 

specific

authority

to

the

page

segment.

 

 

 

 

 

You can specify the following values for

this

parameter:

 

 

 

 

 

 

*LIBCRTAUT

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The

system

 

determines the

authority

for

the

page

segme

 

 

 

 

 

 

 

by using the value specified for the Create

authority

 

 

 

 

 

 

 

(CRTAUT parameter) on the Create Library command

 

 

 

 

 

 

 

 

 

 

(CRTLIB) for the library containing the page segment to

 

 

 

 

 

 

 

created. If the value specified on the

Create author

 

 

 

 

 

 

 

prompt

(CRTAUT

 

parameter)

is

changed,

the

new

value

will

 

 

 

 

 

 

 

not

affect this page segment.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

*CHANGE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Change

authority

allows

the

user

to

perform

all

operation

 

 

 

 

 

 

 

on the page segment except those limited to the owner

 

 

 

 

 

 

 

controlled by object existence authority and object

 

 

 

 

 

 

 

 

management authority. The user can change the page

 

 

 

 

 

 

 

 

 

segment

and

perform

basic

functions on the page segment.

 

 

 

 

 

 

 

Change

authority

provides

object

operational

authority

an

 

 

 

 

 

 

 

all

data

authority.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

*ALL

 

 

All

authority

allows

the

user

to

perform

all

operations

o

 

 

 

 

 

 

 

page segment except those limited to the owner or

 

 

 

 

 

 

 

 

 

controlled

 

by

 

authorization

list

management

authority. The

 

 

 

 

 

 

 

user

controls

the

existence

of

the

page segment,

speci

 

 

 

 

 

 

 

the security for the page segment, changes the page

 

 

 

 

 

 

 

segment, and performs basic functions on the page

 

 

 

 

 

 

 

 

 

segment. The user cannot transfer ownership of the page

 

 

 

 

 

 

 

segment.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

*USE

 

 

Use

authority

allows

the

user to perform basic operat

 

 

 

 

 

 

 

the

page

 

 

segment,

such

 

as

read

a

page

segment. The

us

 

 

 

 

 

 

 

is prevented from changing the page segment. Use

 

 

 

 

 

 

 

 

 

authority provides object operational authority, read

 

 

 

 

 

 

 

 

authority,

 

 

and

execute

 

authority.

 

 

 

 

 

 

 

 

 

 

 

 

*EXCLUDE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Exclude authority prevents the user from accessing the

 

 

 

 

 

 

 

segment.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Authorization-list-name

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Specify the name of the

authorization list that is use

 

 

 

 

 

 

 

secure the page segment object

to

be

created.

 

 

 

Text

'description'

 

Specify

the

description

text

that

briefly

describes

the

 

 

 

 

The description text should be specified with no more than 50

 

 

 

 

characters

of

text

and

enclosed

in

apostrophes.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

326 AFP Utilities for AS/400 User’s Guide

Page 346
Image 346
IBM AS/400 manual Resource Management Utility Determines Output

AS/400 specifications

The IBM AS/400, now known as the IBM iSeries, is a midrange computer system that has been a cornerstone of enterprise computing since its introduction in 1988. Designed to provide a robust platform for business applications, the AS/400 is celebrated for its reliability, scalability, and integrated database capabilities.

One of the key features of the AS/400 is its Integrated Operating Environment, which blends hardware and software resources seamlessly. This integration allows businesses to execute diverse workloads, ranging from traditional applications to modern web-based services, all on a single platform. The operating system, OS/400 (now IBM i), offers a rich set of APIs and tools for developers, simplifying application development and management.

Another standout characteristic of the AS/400 is its built-in database, DB2 for i. This powerful relational database management system allows for efficient data handling and provides advanced features such as support for SQL, XML, and JSON, making it easier for businesses to manage their data and integrate it with other systems. The database's tight integration with the operating system enables high performance and security.

In terms of scalability, the AS/400 can accommodate small businesses as well as large enterprises, with the ability to support hundreds of users simultaneously. Its architecture allows for easy upgrades in hardware, meaning that organizations can scale their systems without replacing the entire infrastructure.

Security is another critical attribute of the AS/400. With a sophisticated security model, it offers built-in user authentication, access control, encryption, and auditing capabilities to protect data and applications from unauthorized access.

The AS/400 also supports multiple programming languages, including RPG, COBOL, Java, and PHP, giving organizations the flexibility to choose the development tools that best fit their needs. This diversity helps maintain legacy applications while also developing new ones that leverage modern technologies.

Moreover, the platform supports both traditional green-screen interfaces and modern graphical user interfaces, allowing organizations to transition smoothly into contemporary user experience paradigms.

Overall, the IBM AS/400 stands out as a resilient, flexible, and secure computing platform that enables organizations to effectively manage their business operations, streamline processes, and adapt to changing market demands. Its unique combination of integrated features and capabilities ensures that it remains relevant in today's fast-paced technology landscape.