Just kidding. I'm not trying to incite any violent behavior.
You may think I'm posturing but I actually caught a rogue vendor programmer mucking about, causing damage and then lying about it. That was the punishment I jokingly thought should fit the crime. Point sent and received loud and clear. In the end all was forgiven and the precedent was set: either behave or begone. This is a business and not playtime for programmers.
When vendors are on my system I want as much control as possible. This includes controlling not only what users sign on to the system, but when. Vendors are not above the law although many think they are. It's time for you to crack the whip (remember...figuratively) and put the fear of Steve (or whatever your name is) into them.
Here's an article I wrote that shows how to control sign on behavior on your iSeries. Have fun.
Friday, February 11, 2011
Thursday, February 10, 2011
I'm wondering what is the easiest way to have all archived mail files look more obvious to users. Seems like people are forwarding messages more often inadvertently while in their archived mail. Comments please.