Deploying and running an RPG application on OpenShift? It Could Work!Parte 6 Read More
Coding in RPG (IBM i/AS400). Copying information from a table to another without duplicating data Christian Larsen
In this example video, I’d like to show you a simple example of how to copy information from a table to another, without duplicating data.
4:39 Copying the information from the first table to the second table using the except operator Read More
A screen a story – Sometimes a question mark is not enough Rudi van Helvoirt
By now you must be getting used to seeing a new version of IBM i Access Client Solutions (ACS) every time a new Technology Refresh (TR) is released – you are keeping your ptf’s up to date aren’t you?! In the official announcement letter we can read what is new for ACS, but most people
The post A screen a story – Sometimes a question mark is not enough appeared first on PowerWire.eu. Read More
[Webinar] Bring Your Own Tools (BYOT) to the DevOps Workflow Anastasiia Samarina
In this webinar, we’ll discuss and demonstrate how to use ARCAD for DevOps integrations, tooling options for IBM i (RDi, VS Code, Jenkins, Jira, Azure, and more), and best practices for getting started.
The post [Webinar] Bring Your Own Tools (BYOT) to the DevOps Workflow appeared first on ARCAD Software. Read More
Silent Signal Discovered a Critical Vulnerability in IBM i Silent Signal
BUDAPEST, Hungary, July 07, 2023 (GLOBE NEWSWIRE) — Silent Signal, a leading technology provider of state-of-the-art ethical hacking services and solutions, discovered and reported a vulnerability to IBM, that has been confirmed and identified under CVE-2023-30990 .
Silent Signal is an independent information security company providing state-of-the-art ethical hacking services and solutions. Read More