Join the Advanced Technology Group (ATG) and Expert Tom Bish for an exclusive webinar exploring IBM Cyber Vault blueprint! Discover how this solution can help customers detect and recover from logical corruption of their data due to malicious or accidental causes. Learn the key technologies and concepts used to protect the data, perform validation, forensic analysis, and recovery capabilities to bring a customer back to an operational state as quickly as possible in the event of an attack. This session will focus on the primary environments of IBM Z and i which make use of this blueprint, as well efforts to extend this to Power/AIX. Don’t miss this opportunity to gain invaluable insights into data protection and recovery capabilities and register today! Read More
RPG Programming ? cuddlyotter777
[[{“value”:”Hello! I’m new-ish to AS/400 & iSeries. I began working with it about a year and half ago , which I’m in more of a configuration role – not development. I really enjoy Manhattan iSeries , & I’ve been in debug to read code before & found it very interesting. I’m working if it’s worth learning more about? Or is going to be obsolete here soon? I’m 22 , so I just don’t want to learn something for it to be out the door in the year.
submitted by /u/cuddlyotter777[link][comments]”}]] Read More
Modern Observability: Bridging Legacy Systems to the Future Aaron Magid
[[{“value”:”As Chief Architect at Eradani, I frequently work with companies wrestling with a common challenge: how to bring comprehensive monitoring and observability to their mission-critical IBM i applications. During a recent customers-only office hours session, we explored this topic in depth, and I wanted to share some key insights about implementing modern observability practices across
The post Modern Observability: Bridging Legacy Systems to the Future appeared first on Eradani.”}]] Read More
Attackers Exploit IBM i Access Client Solutions on Windows 11 To Steal Passwords
[[{“value”:”A recent investigation has revealed that attackers are exploiting vulnerabilities in IBM i Access Client Solutions (ACS) to steal Windows user credentials.
This alarming discovery highlights the risks associated with the WINLOGON authentication mode, which IBM recently deprecated due to compatibility issues with Windows 11’s Local Security Authority (LSA) Protection.”}]] Read More
Identifying code that could fail the “2039 problem” [email protected] (Simon Hutchinson)
[[{“value”:”As soon as we handled Y2K I thought when we reached date 2039 we would have something in place to prevent the “2039 problem”.
What is the “2039 problem”? This only occurs with dates with years that are just two characters. A date data type, character or numeric representation of a date, that has a two character year uses the following rule to determine the century:
40 – 99: Century is assumed to be “19”
00 – 39: The assumption is that the century is “20”
We are 24 years away from 2039, but soon there a going to be applications that will need to use dates beyond that year. When I attended COMMON’s Navigate in Toronto, in November 2024, Barbara Morris, IBM’s lead developer for the RPG compiler, told us that it would be up to us, the IBM i developers, to remedy the issue. The way RPG handles dates will remain unchanged.
Read more »”}]] Read More