Teaching IBM Power skills in a free online IBM i Internship Program for university students and IT professionals around the world Read More
Iteration and Conditional Operation with debug Programmers IO
Teaching IBM Power skills in a free online IBM i Internship Program for university students and IT professionals around the world Read More
Announcing IBM i Migrate While Active, Plus the Latest IBM i Technology Refresh Andrew Wig
[[{“value”:”Brandon Pederson, IBM i and Power product marketing manager, gives an overview of IBM’s newest offerings
The post Announcing IBM i Migrate While Active, Plus the Latest IBM i Technology Refresh appeared first on TechChannel.”}]] Read More
Audit Journal Data Mart [email protected] (Simon Hutchinson)
[[{“value”:”This is something that caught my attention when the latest Technology Refreshes were announced: the ability to create a database of journal entry types entries. I had been doing something similar using the CREATE TABLE SQL statement and various of the Audit journal entry services, AUDIT_JOURNAL_xx. But these additions added functionality that makes it easier for me to extract the journal entries from the System Audit Journal, QAUDJRN.
The two new additions are:
MANAGE_AUDIT_JOURNAL_DATA_MART: SQL procedure that uses the various AUDIT_JOURNAL_xx to create an output table.
AUDIT_JOURNAL_DATA_MART_INFO: SQL View that displays information about all the files created with the MANAGE_AUDIT_JOURNAL_DATA_MART SQL procedure.
Read more »”}]] Read More
Security Bulletin: IBM Java SDK and IBM Java Runtime for IBM i are vulnerable to confidentiality, availability, and integrity impacts due to multiple vulnerabilities.
IBM® SDK Java™ Technology Edition and IBM® Runtime Environment Java™ used by IBM i are vulnerable to a remote attacker causing confidentiality impact (CVE-2024-21145), availability impact (CVE-2024-21144), integrity impact (CVE-2024-21131), and denial of service (CVE-2024-27267) as described in the vulnerability details section. This bulletin identifies the steps to take to address the vulnerabilities as described in the remediation/fixes section. Read More