Don’t forget to register for the next SAP on #IBMi webcast, where we will discuss the new kernel & changes to profile default values. This kernel will support Business Suite applications far into the future! ibm.biz/ibmi-sap-March…- SAP on IBM i (@SAPonIBMi)13:57 – Mar 14, 2023 Read More
Introduction to /Free I/O Statements
Some things in /Free have not changed from fixed format, like the opcode names for the database I/O: READ, READE, READP, READPE, CHAIN, SETLL, SETGT, UPDATE, WRITE, and DELETE .
And you still have that weird thing where READ, CHAIN, and SETLL can use the file ID in the statement while UPDATE, WRITE, and DELETE must use the record format. Read More
Yotta launches Power Cloud – CIO AXIS by CIO AXIS
Designed for superior performance using IBM Power, Yotta Power Cloud is a public cloud Infrastructure as-a-Service (IaaS) – delivered from Yotta’s award-winning data centers with the highest security, reliability and resiliency to meet the most demanding enterprise workloads.
Yotta Power Cloud is ideally suited for existing IBM Power customers who want to seamlessly expand their workload footprint on the public cloud, without any CAPEX investment in the hardware. Read More
Improving Customer Support with Jira Service Manager Profound Logic
Jira Service Manager is a powerful tool that allows customers to easily enter support tickets, track the status of them, add comments, and see updates from the Profound Logic team.
We believe this switch to Jira Service Manager will greatly improve our customer support experience, and we look forward to continuing to provide our customers with the best possible service. Read More
Penetration Testing – Limited capability users can’t access data…. right? MC Press Online
Many organizations are under the impression that if they simply configure their end-user profiles to be limited capabilities (LMTCPB(*YES)) and set their initial menu to *SIGNOFF, that their end-users will be confined to a menu, can’t run commands and, therefore, are restricted in what they can access. By DXR Security, LLC DXR Security’s Penetration Testing for IBM i can give you peace of mind and help you determine whether your limited users truly are limited. We do that by performing “gray box” pen testing. In other words, we use information about security-relevant system values as well as the authority settings of application libraries and database files together with user profiles that represent a cross-section of end-user roles as input to our tests. Then, we’ll attempt to gain access to and perform tasks on your IBM i. Penetration Testing for IBM i is a great add-on to network penetration tests which identify open ports and unsecure protocols. DXR Security takes penet Read More