Don’t forget to register for the next SAP on #IBMi webcast, where we will discuss the new kernel & changes to profile default values. This kernel will support Business Suite applications far into the future! SAP on IBM i (@SAPonIBMi)

​Don’t forget to register for the next SAP on #IBMi webcast, where we will discuss the new kernel & changes to profile default values. This kernel will support Business Suite applications far into the future! ibm.biz/ibmi-sap-March…- SAP on IBM i (@SAPonIBMi)13:57 – Mar 14, 2023 Read More 

Introduction to /Free I/O Statements

​Some things in /Free have not changed from fixed format, like the opcode names for the database I/O: READ, READE, READP, READPE, CHAIN, SETLL, SETGT, UPDATE, WRITE, and DELETE .
And you still have that weird thing where READ, CHAIN, and SETLL can use the file ID in the statement while UPDATE, WRITE, and DELETE must use the record format. Read More 

Yotta launches Power Cloud – CIO AXIS by CIO AXIS

​Designed for superior performance using IBM Power, Yotta Power Cloud is a public cloud Infrastructure as-a-Service (IaaS) – delivered from Yotta’s award-winning data centers with the highest security, reliability and resiliency to meet the most demanding enterprise workloads.
Yotta Power Cloud is ideally suited for existing IBM Power customers who want to seamlessly expand their workload footprint on the public cloud, without any CAPEX investment in the hardware. Read More 

Improving Customer Support with Jira Service Manager Profound Logic

​Jira Service Manager is a powerful tool that allows customers to easily enter support tickets, track the status of them, add comments, and see updates from the Profound Logic team.
We believe this switch to Jira Service Manager will greatly improve our customer support experience, and we look forward to continuing to provide our customers with the best possible service. Read More 

Penetration Testing – Limited capability users can’t access data…. right? MC Press Online

​Many organizations are under the impression that if they simply configure their end-user profiles to be limited capabilities (LMTCPB(*YES)) and set their initial menu to *SIGNOFF, that their end-users will be confined to a menu, can’t run commands and, therefore, are restricted in what they can access. By DXR Security, LLC DXR Security’s Penetration Testing for IBM i can give you peace of mind and help you determine whether your limited users truly are limited. We do that by performing “gray box” pen testing. In other words, we use information about security-relevant system values as well as the authority settings of application libraries and database files together with user profiles that represent a cross-section of end-user roles as input to our tests. Then, we’ll attempt to gain access to and perform tasks on your IBM i. Penetration Testing for IBM i is a great add-on to network penetration tests which identify open ports and unsecure protocols. DXR Security takes penet Read More 

Verified by MonsterInsights