[[{“value”:”Figure 2: RPG program GETCUST, which returns data from the customer master file
I’m going to wrap the RPG program in a function so that it’s easily accessible from SQL.”}]] Read More
Vulnerability Archeology: Stealing Passwords with IBM i Access Client Solutions b
As part of our ongoing research of the IBM i platform we monitor news and updates related to the platform. Two weeks ago IBM published a support article about a compatibility issue affecting IBM i Access Client Solutions (ACS) when running on Windows 11 24H2. The “no man’s land” between system boundaries is always a playground for hackers, and this article was fascinating because it pointed to the Local Security Authority subsystem of Windows: Read More
2025 Outlook: IBM i Innovations & Trends | Maxava Insights Ash Giddings
As we step into 2025, the tech landscape continues to evolve at an unprecedented pace. At Maxava, we keep a close eye on industry trends… Read More
Rewrite: Building a Fresh Foundation for Your IBM i Applications Profound Logic
[[{“value”:”Explore strategic approaches to rewriting IBM i applications. Learn how Profound AppEvo’s methodology ensures successful transformation while maintaining business continuity and enabling innovation.
The post Rewrite: Building a Fresh Foundation for Your IBM i Applications appeared first on Profound Logic.”}]] Read More
How to implement a simple IBM i monitor – part 1 Andrea
[[{“value”:”One of the most important allies of a sysadmin is a good monitoring system. In this first tutorial, I will show you how it’s so easy implementing an IBM i system monitor using features that are already included in the OS without using third part software. To do that, we are going to use IBM
The post How to implement a simple IBM i monitor – part 1 appeared first on All4Power.”}]] Read More