Skip to main content

Dawn May

Contributor

Dawn May is an IBM i consultant. She owns Dawn May Consulting, LLC in the Greater Boston area. Dawn is also a former Senior Technical Staff Member with IBM.

Sort by
Articles

Visualize System Monitor Data for IBM i

Dawn May

March 10, 2023

My blog Getting Started with IBM i Navigator System Monitors, Revisited explained how to set up system monitors in Navigator for i. Once you have system monitors up and running, you will want to look at the monitor data on a regular basis. There are three options:  Visualize Monitor Data, Visualize Monitor Data (new tab) […]

Articles

Getting Started with IBM i Navigator System Monitors, Revisited

Dawn May

February 21, 2023

Dawn May explains how to set up system monitors in Navigator for i

Articles

Alerting for System Limits on IBM i

Dawn May

January 26, 2023

IBM i automatically tracks many system limits and allows you to review these limits using various IBM i services, such as the QSYS2.SYSLIMITS view. There are many monitored categories, such as database, journal, work management and file system limits. See the System Health Services topic in the IBM i Knowledge Center for the full list […]

Articles

A Look at Upcoming COMMON Events

Dawn May

January 4, 2023

COMMON is the preeminent organization offering the best educational opportunities for IBM Power Systems professionals. We’ve been busy setting up 2023, so let’s look at what is coming this year.  iHAXLABS Kicking off the year is a LoopBack Hackathon that is being held in conjunction with Common Europe and is branded as iHAXLABS. This event […]

Articles

IBM i Services Update

Dawn May

December 19, 2022

I am happy to announce that IBM delivered another round of updates to IBM i Services with the Db2 Group PTF released earlier this month. This blog reviews my favorite enhancements. QSYS2.COMMAND_INFO is a new service to return command information similar to DSPCMD. With no WHERE clause, you can populate a list of all commands […]

Articles

Ways to Work With Your JVMs in Navigator for i

Dawn May

November 22, 2022

One of my very first i Can blogs was “Work With Your JVMs,” written when the JVM CL commands (WRKJVMJOB, DSPJVMJOB, PRTJVMJOB, and GENJVMDMP) were added in the 6.1 release. Since that time, IBM added additional ways to work with your JVMs. This post provides updated information on the features available in Navigator for i […]

Articles

Navigator Tidbits: Exploring New Features

Dawn May

October 24, 2022

I spent some time exploring new features of Navigator for i and this post reviews just a few cool things I found. Security Configuration Information Under the Security tasks, there is a new task called Security Configuration Info. This returns all the information available from the QSYS2.SECURITY_INFO service, which is a really nice way to […]

Articles

Alternate Subsystem Routing in Navigator

Dawn May

September 29, 2022

Navigator for i allows you to configure and manage subsystems. It also provides several options to set up subsystem routing. This post reviews these features in Navigator, along with the newest one—alternate subsystem routing. Managing subsystems with Navigator has been around for quite some time. You can create and manage subsystem descriptions with the tasks […]

Articles

Continuing IBM i Education: COMMON Fall Events

Dawn May

September 14, 2022

I am a big advocate for continuing education. Whether self-study with online materials or attending user group meetings, keeping current with technology is critical for career success. I do online self-study frequently. When I have questions I head straight to the internet. I also make it a point to attend local user group meetings—in my […]

Articles

Explore the Security Audit Journal With Navigator for i

Dawn May

August 31, 2022

Navigator for i, which I previously referred to as New Nav, is now simply called Navigator. I recommend using this version for most tasks. From now on, I will use the term Heritage Navigator when referencing Old Nav. An exciting new feature is the ability to work with your security audit journal entries. Everyone should […]