In this free webinar, @Kyndryl will overview the main challenges of IBM i modernization and discuss best practices for addressing them. Join Richard Baird on March 23, 2023 @ 11:00AM (CT) for this #POWERCast! Register today: #IBMiEducation #COMMONug COMMON – A Users Group (@COMMONug)

​In this free webinar, @Kyndryl will overview the main challenges of IBM i modernization and discuss best practices for addressing them. Join Richard Baird on March 23, 2023 @ 11:00AM (CT) for this #POWERCast! Register today: bit.ly/3yEysXW #IBMiEducation #COMMONug pic.twitter.com/9g0D8DtO4g- COMMON – A Users Group (@COMMONug)07:15 – Mar 15, 2023 Read More 

Improved SQL built in function for calculating difference between timestamps Simon Hutchinson

​I had written about the Db2 built in function TIMESTAMPDIFF, which is used to calculate the difference between two timestamps and return the difference in various different units of time. In the latest Technology Refreshes, IBM i 7.5 TR1 and IBM i 7.4 TR7, a new and improved built in function, TIMESTAMPDIFF_BIG, was introduced. TIMESTAMPDIFF had issues in being able to correctly return the difference in microseconds. IBM’s documentation says that the new TIMESTAMPDIFF_BIG will do that correctly. The syntax of the two built in functions, BiF, is the same: Read more » Read More 

Penetration Testing – Limited capability users can’t access data…. right? MC Press Online

​Many organizations are under the impression that if they simply configure their end-user profiles to be limited capabilities (LMTCPB(*YES)) and set their initial menu to *SIGNOFF, that their end-users will be confined to a menu, can’t run commands and, therefore, are restricted in what they can access. By DXR Security, LLC DXR Security’s Penetration Testing for IBM i can give you peace of mind and help you determine whether your limited users truly are limited. We do that by performing “gray box” pen testing. In other words, we use information about security-relevant system values as well as the authority settings of application libraries and database files together with user profiles that represent a cross-section of end-user roles as input to our tests. Then, we’ll attempt to gain access to and perform tasks on your IBM i. Penetration Testing for IBM i is a great add-on to network penetration tests which identify open ports and unsecure protocols. DXR Security takes penet Read More 

Verified by MonsterInsights