[[{“value”:”Welcome to another edition of Talsco Weekly IBM i Brief: 🔍 IBM i PTF Guide Highlights. 💻 IBM Power9 machines: Secondhand market analysis. 📈 Db2 Web Query partnership ends. Imitation is the greatest form of flattery for the IBM i. Career: 🌱 How to stay relevant in the job market as an RPG Developer. The
The post Talsco Weekly: How to stay relevant in the job market as an RPG Developer appeared first on IBM i (AS/400, RPG) Recruiting, Staffing & Consulting.”}]] Read More
What’s New in ZendPHP | Zend by Perforce
[[{“value”:”The Zend team is excited to announce the immediate availability of two new features for ZendHQ, role-based authentication, and the ability to access JobQueue from CLI PHP scripts.
JobQueue, included in the ZendHQ extension for ZendPHP, makes it easier than ever for teams to defer, schedule, monitor, and manage jobs and job queues in their PHP applications.”}]] Read More
How Virtual Tape Outperforms Physical Tape for IBM i Backups LaserVault
Watch this recorded live webinar to gain valuable insights into the power of using virtual tape, including: • Save time with faster backup and faster recovery • Easily accommodate growing data needs • Reduce the need for manual intervention through automation • Have more dependable backups with increased reliability and security• Streamline management including remote access and control• Free up IT personnel with greater speed and efficiency Read More
IBM i Group PTFs with level
A list of the IBM i Group PTF documents with level Read More
Security Bulletin: IBM Java SDK and IBM Java Runtime for IBM i are vulnerable to confidentiality impacts and a timing-based side-channel attack due to multiple vulnerabilities.
IBM® SDK Java™ Technology Edition and IBM® Runtime Environment Java™ used by IBM i are vulnerable to confidentiality impacts [CVE-2024-20952, CVE-2024-20918, CVE-2024-20921, CVE-2024-20926, CVE-2024-20945] and a timing-based side-channel attack [CVE-2023-33850] as described in the vulnerability details section. This bulletin identifies the steps to take to address the vulnerabilities as described in the remediation/fixes section. Read More