[[{“value”:”QAUDJRN is the primary source for IBM i security event information and its journal entries can be transferred to a SIEM.
For complete enterprise threat visibility, many organizations are now requiring IBM i security event information to be collected and aggregated into their enterprise SIEM systems.”}]] Read More
Security Bulletin: IBM i is vulnerable to a user gaining elevated privileges due to an unqualified library call [CVE-2024-55898].
IBM i is vulnerable to a user with the capability to compile or restore a program to gain elevated priviliges due to an unqualified library call as described in the vulnerability details section. This bulletin identifies the steps to take to address the vulnerability as described in the remediation/fixes section. Read More
Seven Valuable Capabilities for IBM i Message & Resource Monitoring Doug Demagistris
[[{“value”:”Integration with Service Desk and ticketing software is becoming a critical feature for IBM i message and resource monitoring software.
To that end, here are seven capabilities your IBM i Message and Resource monitoring solution should possess to enable total visibility over your IBM i environment and increase your ability to resolve issues quickly.”}]] Read More
Understanding System Integration Patterns: From Point-to-Point APIs to Event-Driven Architecture Eradani
In this technical deep dive, we explore the challenges of point-to-point API integrations in modern software systems. Using a practical example with customer, billing, and plan management systems, we demonstrate how a simple change can require multiple custom integrations. Learn why traditional API approaches can lead to complex integration meshes and set the stage for understanding a more efficient event-driven architectural approach. Perfect for software architects, developers, and anyone interested in modern system design patterns.Contact us today at eradani.com to learn more! Read More
Question from a clueless IT guy in the dark. thegreatcerebral
[[{“value”:”That’s why I say it’s kind of like trying to be inside a Windows Server and trying to query from Windows the version of VMWare/Hyper-V we are running, you just can’t.
The “upgrade” that was done before essentially is the same kind of one we are looking to do again where we are running, I’m going to use the terms I know, in something like a VM or docker container inside of the AS/400.”}]] Read More