RPG apprentice for warehouse operations Soldier_Engineer

​[[{“value”:”Hello, I will soon start an apprenticeship as a RPG programmer for warehouse operations and wanted to ask if anyone has experience in that and what it’s like? I’m a huge newbie so I have no clue. Do RPG programmers have a future/ are there many open job positions? Does being a RPG programmer make you as rare and irreplaceable as Cobol programmers? I already read that RPG programmers aren’t paid as much as Cobol programmers. Is RPG hard to learn? Is it fun? Is it easier than object oriented programming?
submitted by /u/Soldier_Engineer[link][comments]”}]] Read More 

Making the Most of the Audit Journal Fortra

​The audit journal contains so much information that can help an IBM i administrator with everyday tasks, such as what profiles have been created or changed, how commands are being executed, or how many invalid sign-on attempts happened last week. Unfortunately, many don’t realize this information exists or they don’t know how to access it. Watch this webinar to learn how to make your audit journal data more easily accessible and how to set up your audit journal so that critical information doesn’t go unnoticed. Amy will cover: The must-have values for your system security loggingHow to discover journal entries that are taking up space in your receiversHow to run SQL Scripts in Access Client Solutions to access audit journal information Watch now to learn how to make the most of the audit journal! Find out where your systems are secure and where they could be vulnerable with a free IBM i Security Scan: https://www.fortra.com/solutions/ibmi-as400/security-vulnerability-scan Read More 

Malware on Power Systems Servers: Breaking Down the Myths Fortra

​[[{“value”:”Power security expert Sandi Moore will discuss real-world examples of malware attacks on IBM i, and provide effective tactics for avoiding infections.
To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power servers and the network that connects to them.”}]] Read More 

Securing IBM i APIs: Moving Beyond Basic Authentication Daniel Magid

​[[{“value”:”Last month, I had an eye-opening conversation with a development team lead who was in the final stages of completing a several months long project building his company’s first APIs for their IBM i. They were struggling with a few final bugs and some performance issues but he told me that their biggest concern was
The post Securing IBM i APIs: Moving Beyond Basic Authentication appeared first on Eradani.”}]] Read More 

Verified by MonsterInsights