We couldn’t extract the content of this article. Here is the URL so you can access it:https://www.linkedin.com/pulse/jenkins-now-speaks-ibm-i-s%C3%A9bastien-julliand-plqqe?utm_source=share&utm_medium=member_ios&utm_campaign=share_via Read More
IBM Champion – Tom Huntington Fortra
Congratulations to Fortra’s Executive Vice President of Technical Solutions, Tom Huntington, for being named a 2025 IBM Champion! Read More
MTI_INFO now includes member name noreply@blogger.com (Simon Hutchinson)
[[{“value”:”As part of the latest round of Technology Refreshes, IBM i 7.5 TR5 and 7.4 TR11, the MTI_INFO Table function was enhanced with the addition of the member or Table partition name the MTI was created over. I have to admit I was surprised this was not included when the Table function was first introduced.
The new column is called TABLE_PARTITION, it is the third column in the results, and is a VARCHAR of a maximum of 128 characters.
If I just wanted to view all of the MTIs in my partition I would use the following statement:
01 SELECT TABLE_SCHEMA,TABLE_NAME,FILE_NAME,
02 TABLE_PARTITION
03 FROM TABLE(QSYS2.MTI_INFO())
04 ORDER BY 1,2
05 LIMIT 5
Read more »”}]] Read More
Started to work with spaghetti code holz093
[[{“value”:”On the other side the company has started to replace the system and they wanna move away from ibm i even though it makes the most sense for them as they mainly process online transactions (its a wms).
Hi guys, I started a couple of months ago at a company with 1 Billion revenue and they are using ibm i as running system.”}]] Read More
Be Afraid: IBM i Security Vulnerabilities in Today’s Connected World Eradani
Step into the hidden world of IBM i security vulnerabilities and discover why traditional approaches are leaving your mission-critical systems exposed in today’s interconnected landscape. This eye-opening, demo-driven session reveals common security gaps and shows exactly how modern threats can compromise systems using basic authentication and native IBM i credentials. Watch as we demonstrate real-world security vulnerabilities and showcase how modern security approaches can protect your valuable business systems. Read More