Picking Apart An Ebullient GenAI Spending Forecast Timothy Prickett Morgan

​[[{“value”:”In one of the big ironies of our time, companies are embedding AI acceleration functions into PCs that most consumers do not actively want while at the same time datacenter operators (be they captive or independent) are actively trying to get AI compute engines (mostly Nvidia and sometimes AMD GPUs) so they can train their GenAI and other machine learning models – and they can’t get enough of these accelerated servers.
Because a lot of PCs are already enhanced with AI functions, more and more PCs are falling under the label of an “AI PC,” and therefore the market for …
The post Picking Apart An Ebullient GenAI Spending Forecast appeared first on IT Jungle.”}]] Read More 

IBM i PTF Guide, Volume 27, Number 13 Doug Bidwell

​[[{“value”:”Good day, good people of IBM i Land. This week we start out with two security vulnerabilities and a known issue to beware of the BLOB!
Let’s start with the security vulnerabilities.
First we have Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a denial of service due to Netty (CVE-2025-25193), which you can find out more about at this link. IBM WebSphere Application Server Liberty versions 21.0.0.2 through 25.0.0.3 are affected.
Second, we have Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a denial of service due to Apache CXF (CVE-2025-23184), and here is …
The post IBM i PTF Guide, Volume 27, Number 13 appeared first on IT Jungle.”}]] Read More 

D and P Position-less Specs, Part Two

​[[{“value”:”As with data structures, if a subfield associated with a P-spec is the name of an RPG opcode, then you have to use the dcl_parm thing on the front of the subfield definition.
Fortunately, things for the PI and PR specs are done pretty much the same way as normal data control statements are.”}]] Read More 

SQL 101: DDL Recap-Are Views and Logical Files the Same Thing?

​[[{“value”:”For the moment, just know that View_Students_Classes_1 and Index_Students_By_Name allowed me to create an SQL version of a LF over PFSTM that uses STNM as a key.
By pressing Page Down, you’ll note that it also includes the SQL statement that was used to create the view, which is nice.”}]] Read More 

Understanding IBM i System Values: Set the Tone for Security Fortra

​IBM i security system values set the tone for how your organization tackles IBM i security threats.The Fortra team talks to a lot of IBM i professionals who don’t realize that system values affect secure communications, who can create a program that adopts authority, the number of sessions a user can have, and much more.In this webinar, IBM Champion Amy Williams delves into the critical system values for IBM i and what you must prioritize. You will discover:- Critical shipped (default) values that need to be changed- How to monitor for changes to values- Which system value changes require an IPL- Methods to prevent unauthorized changes to security system valuesFind out where your systems are secure and where they could be vulnerable with a free IBM i Security Scan: https://www.fortra.com/solutions/ibmi-as400/security-vulnerability-scan Read More 

Verified by MonsterInsights