How to use SQL to find files needing Reorganisation Terry Bartlett

​[[{“value”:”While there are quite a few methods for finding candidates for Reorganise Physical Files (RGZPFM), lots of them are old and some of them take a long time and resources to get results. So here is a new one using ACS Run SQL Scripts, that may be faster and is more controllable. Lets start with
The post How to use SQL to find files needing Reorganisation first appeared on PowerWire.”}]] Read More 

Top Technology Trends for IBM i Professionals Maia Samboy

​[[{“value”:”Beyond Legacy Thinking: Embracing the Future of the IBM i All too often, I hear executives dismiss the IBM i as a legacy system slated for replacement. But that couldn’t be further from the truth. Innovative companies worldwide continue to leverage the rock-solid IBM i as the core platform for adopting cutting-edge technologies like AI,
The post Top Technology Trends for IBM i Professionals appeared first on Eradani.”}]] Read More 

List unused virtual devices Simon Hutchinson

​[[{“value”:”All virtual devices are just device descriptions, object type ‘ *DEVD ‘, with the object attribute of ‘ DSPVRT ‘.
In all my years of dealing with auditors this was the first time I had been asked this question.”}]] Read More 

Security Bulletin: IBM WebSphere Application Server Liberty for IBM i is vulnerable to weak TLS security, cross-site scripting, denial of service, and a server-side request forgery due to multiple vulnerabilities.

​IBM WebSphere Application Server Liberty for IBM i is vulnerable weaker than expected TLS security [CVE-2023-50312], cross-site scripting with JavaScript code [CVE-2024-27270], and sending specially crated requests to cause denial of service [CVE-2024-25026, CVE-2024-27268, CVE-2024-22353] and a server-side request forgery [CVE-2024-22329] as described in the vulnerability details section. This bulletin identifies the steps to take to address the vulnerabilities as described in the remediation/fixes section. Read More 

Verified by MonsterInsights