[[{“value”:”Good day, good people of IBM i Land. This week we start out with two security vulnerabilities and a known issue to beware of the BLOB!
Let’s start with the security vulnerabilities.
First we have Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a denial of service due to Netty (CVE-2025-25193), which you can find out more about at this link. IBM WebSphere Application Server Liberty versions 21.0.0.2 through 25.0.0.3 are affected.
Second, we have Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a denial of service due to Apache CXF (CVE-2025-23184), and here is …
The post IBM i PTF Guide, Volume 27, Number 13 appeared first on IT Jungle.”}]] Read More
D and P Position-less Specs, Part Two
[[{“value”:”As with data structures, if a subfield associated with a P-spec is the name of an RPG opcode, then you have to use the dcl_parm thing on the front of the subfield definition.
Fortunately, things for the PI and PR specs are done pretty much the same way as normal data control statements are.”}]] Read More
SQL 101: DDL Recap-Are Views and Logical Files the Same Thing?
[[{“value”:”For the moment, just know that View_Students_Classes_1 and Index_Students_By_Name allowed me to create an SQL version of a LF over PFSTM that uses STNM as a key.
By pressing Page Down, you’ll note that it also includes the SQL statement that was used to create the view, which is nice.”}]] Read More
Understanding IBM i System Values: Set the Tone for Security Fortra
IBM i security system values set the tone for how your organization tackles IBM i security threats.The Fortra team talks to a lot of IBM i professionals who don’t realize that system values affect secure communications, who can create a program that adopts authority, the number of sessions a user can have, and much more.In this webinar, IBM Champion Amy Williams delves into the critical system values for IBM i and what you must prioritize. You will discover:- Critical shipped (default) values that need to be changed- How to monitor for changes to values- Which system value changes require an IPL- Methods to prevent unauthorized changes to security system valuesFind out where your systems are secure and where they could be vulnerable with a free IBM i Security Scan: https://www.fortra.com/solutions/ibmi-as400/security-vulnerability-scan Read More
The Many Meanings of Modernization, With IBM’s Amy Anderson Andrew Wig
[[{“value”:”Modernization is a continuous process that goes beyond code re-writes, IBM’s Amy Anderson tells Charlie Guarino on TechTalk SMB
The post The Many Meanings of Modernization, With IBM’s Amy Anderson appeared first on TechChannel.”}]] Read More