I needed to create an agent in a Lotus Notes Database that would delete documents older than a certain date. My need was to delete some internet stats in my web stats DB. Here is the code for the agent. It is very basic, but it works.

read more →

Took a few years, but finally got #1 position on #1 page rank for my full name and in the Google auto search type-ahead. This should be very useful as it is all organic and natural and not based on clever Google SEO cheats. Google’s updates have not affected any of my ranking so far.. read more →

Some simple concepts that help with using Jython to deploy applications. When installing an application and you want to know all the options for binding resources and virtual hosts etc in your Jython script, the quickest way to learn is to record a deployment using the console. In my example I am using WebSphere Application.. read more →

I am posting this post to see how long it takes for Google to rank me #1 for his key word “Steve Robinson the Legend” I often take the  micky at myself, and try to have a bit of fun more these days. I am often very serious and spend all my time publishing information.. read more →

07 Feb 2012
February 7, 2012

Uninstall WebSphere 8

February 7, 2012 Uncategorized 0 Comment

Introduction This document is a sample of the training material provide for my new WebSphere Application Server 8 Training courses ready later in the year. Keep an eye on http://www.ptutraining.com as we prepare the new business. This document explains the steps involved in uninstalling WAS cleanly. It is important to understand a re-installation within the.. read more →

As seen in the error below, I was trying to run the update installer to install a WXS iFix. WXS being WebSphere eXtreme Scale. the reason was simple. As you can see the log says that the Product Location: opt/IBM/WebSphere/WXS but as you can see it was missing a / it should have been: /opt/IBM/WebSphere/WXS… read more →

Entrepreneurship is the pursuit of opportunity without regard to resources currently controlled. I personally loved this sentence! In essence it sums up who and what I aim to be. What’s an Entrepreneur? The Best Answer Ever This classic 25-word definition pares entrepreneurship to its essence and explains why it’s so hard. And so addictive. Read.. read more →

9. Encrypting the Security Audit Log    1 9.a Configuring Keystore and certificate required for encryption    2 9.b Audit record encryption configuration    7 9. Encrypting the Security Audit Log The Audit log can be encrypted to make the information unavailable for intruders. Configuration is a two step process. The keystore is to be configured with a digital certificate in.. read more →

After a default install of WAS you may decide that you no longer want the WebSphere Application Server profile to be associated with a window service. This little guide, shows you how to use the wasservice.exe command to unstitch a Was profile from a Window service. In this example I have WebSphere Application Server 7.. read more →

The problem is that there is not virtual host directive for names hosts and so IHS cannot find any information to serve for SSL Wildcard general Hot Config ie DocumentRoot # # Use name-based virtual hosting. # NameVirtualHost * # # VirtualHost example: # Almost any Apache directive may go into a VirtualHost container. #.. read more →