[[{“value”:”Welcome to another edition of Talsco Weekly IBM i Brief: 💼 Izzi launches to acquire IBM i software companies. 💰 IBM Power eyes $2B annual revenue milestone. 📈 IBM reports strong Q4 earnings, AI momentum. AI: 📋 IBM is executing it’s AI Playbook. 🖥️ IBM plans AI-ready mainframe launch. Development: 💻 Andy Youens launches comprehensive
The post Talsco Weekly: Hidden RPG Talent appeared first on IBM i (AS/400, RPG) Recruiting, Staffing & Consulting.”}]] Read More
IBM i User Groups: Why Local Tech Communities Still Matter in 2025 Mitch Hoffman
[[{“value”:”IBM i User Groups have been the backbone of the midrange computing community for decades. As technology increasingly pushes us toward virtual interactions, local user groups remain vital for professional growth, networking, and knowledge sharing. Local technology User Groups (aka Regional User Groups, or RUGs) have been the social fabric of the technology community since
The post IBM i User Groups: Why Local Tech Communities Still Matter in 2025 appeared first on Eradani.”}]] Read More
Latest Recording: Tricks with Spool Files Using SQL
We know you want to learn new skills. But you don’t live near an IBM i user group, and your job and other responsibilities make it difficult to attend conferences. So, we’re bringing IBM i Champion, Simon Hutchinson, to you. Watch the recording of this webcast. Read More
How to Modernize Fast and Within Budget (Quick Guide) David Uptmor
[[{“value”:”You can modernize IBM i applications without the challenges that usually come with it. Transform your software and overcome budget constraints, RPG developer shortage, and winding timelines using this guide.
Discover modular modernization approaches and professional low-code development solutions to get started on the right path.
Download our latest guide and takeaway:
Strategies for successful, disruption-free IBM i modernization
Technologies to consider to maximize your resources and optimize your development processes
Planning tips on ensuring a smooth transition and securing buy-in from stakeholders”}]] Read More
IBM i API Security: Best Practices for Protecting System Credentials Daniel Magid
[[{“value”:”IBM i API security has become a critical concern as organizations expand their integration strategies. Many IBM i teams unknowingly compromise their system security through outdated IBM i access authentication practices. The most concerning vulnerability? Using and storing IBM i credentials for IBM i access from other systems is a practice that creates multiple security
The post IBM i API Security: Best Practices for Protecting System Credentials appeared first on Eradani.”}]] Read More