Rimini Supports IBM i Environments with New Outsourcing Biz Alex Woodie

​In addition to delivering application support services for JD Edwards and SAP running on IBM i, the Las Vegas company is also offering to manage the full stack of technology upon which these ERP systems run.
Rimini describes Rimini ONE as “an outsourcing service program that offers a comprehensive set of unified, integrated services to run, manage, support, customize, configure, connect, protect, monitor, and optimize enterprise applications, databases, and technology software.” Read More 

Debbie Saugen on IBM i Backup and Recovery About the author

​Debbie, you and I have known each other for quite some time and I know you are the recognized worldwide expert on IBM i backup and recovery, disaster recovery, high availability, and things like that and surely, you’ve done so many podcasts and webinars and sessions on these topics but today I want to put you a little bit more in the hot seat and talk about topics that may be a little beyond the realm of that.
First of all, let’s talk about stewardship of this data, because that backup tape is literally the keys to the vault, the entire company right there, and somebody with any malicious intention—whether if Joe loses control of that tape and someone acquires it somehow and is able to get the information off of it—I mean are these things that you typically have in conversation like that when you have these less than formal arrangements with offsite storage. Read More 

Security Bulletin: OpenSSL for IBM i is vulnerable to denial of service attacks and the ability for remote attacker to obtain sensitive information due to multiple vulnerabilities.

​OpenSSL for IBM i is vulnerable to a denial of service caused by error in certificate verification (CVE-2023-0464), a denial of service caused by arbitrary pointers to memcmp (CVE-2023-0286), denial of service caused by a double-free error (CVE-2022-4450), denial of service caused by use-after-free error (CVE-2023-0215), and the ability for a remote attack to obtain sensitive information caused by a timing-based side channel in RSA decryption (CVE-2022-4304) as described in the vulnerability details section. IBM i has addressed the vulnerabilities in OpenSSL with a fix as described in the remediation/fixes section. Read More 

Robot | Discover Easy and Affordable High Availability Fortra

​Interested in learning more about how Robot HA can help you get a handle on IBM i high availability, click here to schedule a demo: https://www.fortra.com/products/high-availability-software-ibm-i/demoWe often hear from the IBM i customers that their current high availability solution is difficult to use and requires a full-time expert solely dedicated to managing the HA solution. This might make sense for an organization with 10 plus partitions, but even that solution should be self-healing and self-notifying.Watch as IBM Champion Tom Huntington and Carlos Nolting demonstrate how easy it is to navigate Robot HA and the simplicity it brings to creating new rules. They also discuss why Robot HA is so affordable and cover a few of its ease-of-use features, including:-Straightforward terminology-Self-healing functionality-Easy role swapsIf your solution is too expensive and too time-consuming to maintain, watch this webinar to discover an easy-to-use alternative.Watch now! Read More 

Verified by MonsterInsights