[[{“value”:”If you are doing the function call/return values thing from a program that actually contains the embedded sub-procedure, then you can use the DFTACTGRP H-spec and just compile the program as CRTBNDRPG .
The first thing I want to say is that this is a technique that can only be used to call a sub-procedure that is embedded in a service program or that is embedded in the module you are doing the function call from.”}]] Read More
Selection Process Open for Kisco’s IBM i Career Development Fellowship
[[{“value”:”We hope that by offsetting training costs, this fellowship will help these shops start career development programs.”
Kisco Information Systems was formed in 1984 to provide high quality data processing services to businesses in the New York Metropolitan area.”}]] Read More
Profound Logic at POWERUp 2024: Navigating Future IT Landscapes Profound Logic
[[{“value”:”Get ready to elevate your IT knowledge at POWERUp 2024 with Profound Logic’s expert-led sessions and our exciting booth activities. Join us to learn, network, and explore!
The post Profound Logic at POWERUp 2024: Navigating Future IT Landscapes appeared first on Profound Logic.”}]] Read More
Planning to upgrade to IBM i 7.5 (Hardware)
Planning to upgrade to IBM i 7.5 (Hardware) Read More
Security Bulletin: IBM i is vulnerable to a local privilege escalation due to an unqualified library call in networking and compiler infrastructure [CVE-2024-25050]
IBM i is vulnerable to a user gaining elevated privilege due to a CL command being called without library qualification in networking and compiler infrastructure as described in the vulnerability details section. This bulletin identifies the steps to take to address the vulnerability as described in the remediation/fixes section. Read More