Daily news about IBM i

(This page just shows the latest 20 or so posts, sign up to the daily newsletters to get all of them or join us at Slack)

  • Talsco Weekly: IBM i talent solutions simplify hiring
    by patrick staudacher on 2025-03-01 at 16:10

    Welcome to another edition of Talsco Weekly IBM i Brief:  🏗️ ​IBM shifts to build-to-order for entry Power Systems​. 💼 ​IBM finalizes $6.4B HashiCorp acquisition​. AI:  ​AI agents autonomously complete tasks without human direction ​. 🚀 ​IBM expands Granite model family​. Development:  🎥 ​F-2 Rename Symbol tutorial​. Database:  📊 ​Six foolproof data recovery methods for The post Talsco Weekly: IBM i talent solutions simplify hiring appeared first on IBM i (AS/400, RPG) Recruiting, Staffing & Consulting.

  • Coding in RPG (IBM i/AS400). Checking if a record exists in embedded SQL.
    by Christian Larsen on 2025-02-28 at 21:00

    In this video, I explore two different ways to check if a record exists in SQL when working with embedded SQL in RPG on IBMi! I’ll show you how to do it using WHERE EXISTS (with two different ways) and COUNT, explaining the pros and cons of each method.

  • Configuring PostgreSQL With ZendHQ on IBM i
    by Shlomo Vanunu on 2025-02-28 at 16:02

    The ZendHQ daemon uses database engines to store configuration and historical data. Learn how to configure it with PostgreSQL database in this expert blog.

  • WMCPA iCon 2025
    by Simon Hutchinson on 2025-02-28 at 11:04

    The Wisconsin Midrange Computer Professional Association, WMCPA, will be holding their 38th annual conference March 11 – 13 at Lake Lawn resort, WI. While I will not be there, there are over fifteen other IBM Champions speaking at the conference. The preconference tech day, Tuesday, will hold a workshop on AI by Charlie Guarino and Jesse Gorzinski. The second event is their Business and IT. This is geared towards students and young professionals that are new to business and/or IT. Following these two great events will be a packed panel MC-ed by Mike Pavlak, featuring Charlie Guarino, Jesse Gorzinski, Carol Woodbury, Caracal Keithrafferty and Ajay Gomez. Wednesday and Thursday has several jam packed sessions, student RPG competition, Casino night and sponsor showcase. This is going to be a great conference! Conference page Conference schedule

  • RPG apprentice for warehouse operations
    by Soldier_Engineer on 2025-02-28 at 00:30

    Hello, I will soon start an apprenticeship as a RPG programmer for warehouse operations and wanted to ask if anyone has experience in that and what it’s like? I’m a huge newbie so I have no clue. Do RPG programmers have a future/ are there many open job positions? Does being a RPG programmer make you as rare and irreplaceable as Cobol programmers? I already read that RPG programmers aren’t paid as much as Cobol programmers. Is RPG hard to learn? Is it fun? Is it easier than object oriented programming? submitted by /u/Soldier_Engineer[link][comments]

  • Faster IBM i Backups How VTL and Deduplication Work Together
    by LaserVault on 2025-02-26 at 22:59

    Struggling with slow, inefficient backups? Learn how Virtual Tape Libraries (VTL) and deduplication work together to accelerate IBM i backups, reduce storage costs, and simplify data protection. In this 30-minute webinar, we’ll break down how these technologies optimize backup performance and improve recovery times—so you can protect your data faster and smarter.

  • Making the Most of the Audit Journal
    by Fortra on 2025-02-26 at 21:48

    The audit journal contains so much information that can help an IBM i administrator with everyday tasks, such as what profiles have been created or changed, how commands are being executed, or how many invalid sign-on attempts happened last week. Unfortunately, many don’t realize this information exists or they don’t know how to access it. Watch this webinar to learn how to make your audit journal data more easily accessible and how to set up your audit journal so that critical information doesn’t go unnoticed. Amy will cover: The must-have values for your system security loggingHow to discover journal entries that are taking up space in your receiversHow to run SQL Scripts in Access Client Solutions to access audit journal information Watch now to learn how to make the most of the audit journal! Find out where your systems are secure and where they could be vulnerable with a free IBM i Security Scan: https://www.fortra.com/solutions/ibmi-as400/security-vulnerability-scan

  • Malware on Power Systems Servers: Breaking Down the Myths
    by Fortra on 2025-02-26 at 21:48

    Power security expert Sandi Moore will discuss real-world examples of malware attacks on IBM i, and provide effective tactics for avoiding infections. To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power servers and the network that connects to them.

  • Securing IBM i APIs: Moving Beyond Basic Authentication
    by Daniel Magid on 2025-02-26 at 21:20

    Last month, I had an eye-opening conversation with a development team lead who was in the final stages of completing a several months long project building his company’s first APIs for their IBM i. They were struggling with a few final bugs and some performance issues but he told me that their biggest concern was The post Securing IBM i APIs: Moving Beyond Basic Authentication appeared first on Eradani.

  • How to implement an ML architecture without failing in the attempt
    by albamart on 2025-02-26 at 13:45

    📌 Are you interested in automation, AI, etc? You are in the right place. At SIXE we are going to tell you how to set up a ML architecture avoiding the most common mistakes. Machine Learning (ML) is no longer the future, it is the present. Companies from all sectors are betting on artificial intelligence

  • Faster way to check authority to IFS object with SQL
    by Simon Hutchinson on 2025-02-26 at 11:07

    I could already check my authorization to an object in the IFS using the IFS_OBJECT_PRIVILEGES SQL Table function. If I wanted to check if I was authorized to, let’s say, read the object the Table function still takes time to retrieve columns of data even if I don’t include them in my result set. A better approach would be if I can just check if I am authorized to an IFS object, and have a return code that indicates if I am authorized or not. A new SQL scalar function, IFS_ACCESS, was added as part of the last round of Technology Refreshes, IBM i TR5 and 7.5 TR11, that does this, which makes the time taken to check if I am authorized a whole lot faster. All of examples are going to use a stream file, *STMF, in my folder in the IFS. I can check who and what authorizations they have to the object by using the IFS_OBJECT_PRIVILEGES View: Read more »

  • To Check or Not to Check (Uniqueness)
    by [email protected] (Kent Milligan – IBM Technology Expert Labs) on 2025-02-25 at 21:43

    In Hamlet’s famous ‘To Be or Not To Be’ speech, he wrestles with thoughts about life and death. Obviously, slow application performance is not a life-or-death issue, but it can sometimes feel that way if you’re the developer whose program is slowing down a critical business process. Clients frequently engage our IBM Expert Labs team to analyze applications to identify performance bottlenecks and to identify solutions to improve performance. A couple months ago, I was reviewing the SQL statements embedded within a client’s RPG program. The analysis of the SQL identified a coding pattern where the program would run a SELECT statement against a table and almost immediately turn around and run an INSERT against the same table. The code looked something like the following: SELECT 1 INTO :outhv FROM sometab WHERE col1=:hv1 AND col2=:hv2 AND col3=:hv3 AND col4=:hv4; If sqlCode = 100; INSERT INTO sometab VALUES(:hv1, :hv2, :hv3, :hv4, …) Endif; When I asked the customer about the purpose of this coding pattern, they shared that the columns referenced on the Where clause defined a unique key for the table. Thus, the SELECT statement was being run to verify if the specified key value already exists in the table. If the SELECT statement didn’t return a row, the program would know that there was no possibility of a duplicate key error – meaning that the INSERT statement would run successfully. This explanation led the developer to ask if it was more efficient to have Db2 just check for the duplicate key value on the INSERT statement. With this approach, the program would be running a single SQL statement opposed to the coding pattern above that would result in two SQL statements being executed in the cases where the new values were unique. In general, the fewer calls that you make to Db2 for i (or any database), the faster that your application will run.  I put together a small performance test to verify if less is more when it comes to inserting new rows that may result in a duplicate key error. Essentially, is it faster to check first to avoid the duplicate key exception or not to check by running the Insert statement and relying on Db2 to detect duplicate keys? My performance test used an SQL stored procedure with a loop to insert 1,000 rows – the loop had logic that would cause every other INSERT statement to fail with a duplicate key error. For the “not to check” version of my test, the following condition handler was used to trap the duplicate key error and then allow the stored procedure to continue to run its loop inserting rows. Even with the condition handler in place, Db2 still writes a duplicate key error message into the job log. DECLARE CONTINUE HANDLER FOR SQLSTATE ‘23505’ SET errFlag = ‘Y’ ; I ran each version of the stored procedure multiple times to get a consistent timing. In the end, the “not to check” version of the tests consistently ran 5-6% faster than the “check” version of the procedure which avoided the duplicate key error by first running a SELECT statement. The performance tests essentially showed that the overhead of running the second SQL statement was greater than the overhead of Db2 signaling an error back to the application. These test results reinforce the earlier assertion that performance is usually best when your application program runs the fewest number of SQL statements possible. With this coding pattern related to the insertion of unique keys, the answer to the question posed at the start of this entry is: Not To Check!

  • IBM i: System Management is Simpler Than You Think
    by Roberto De Pedrini on 2025-02-25 at 09:34

    If you work with IBM i, I recommend reading this insightful article by Giancarlo Lui: IBM i System Management: Simpler Than You Think. The author explores tools and approaches to streamline system management, making it… L’articolo IBM i: System Management is Simpler Than You Think proviene da BlogFaq400.

  • How Time and Data Management works on IBM PowerSystems
    by Bart on 2025-02-24 at 23:03

    In this post I explain how date and time management works on an AIX, VIOS, and IBMi LPARs. Setting the time is usually one-time operation, we often take it for granted, as long as everything works well. However, when issues arise, it can become quite puzzling. Information in this post may be particularly useful for… Continue reading How Time and Data Management works on IBM PowerSystems

  • Ordering PTFs automatically
    by Andrea on 2025-02-24 at 20:03

    In the last post, we have seen how to manage defective PTFs automatically using SQL.Today, we will see how it’s easy to check current PTFs level directly from IBM servers. Let me say that is quite important to keep systems update, both in terms of version and PTFs. In this way you are able to The post Ordering PTFs automatically appeared first on All4Power.

  • RPG Free and option(*convert) for paramters
    by Roberto De Pedrini on 2025-02-24 at 13:48

    In his recent article “RPG Free and option *convert” , Aldo Succi explores the *CONVERT option in the RPG language, highlighting how this directive allows the compiler to automatically convert parameters passed to a procedure… L’articolo RPG Free and option(*convert) for paramters proviene da BlogFaq400.

  • Common Europe Congress 2025 -2 to 5 June
    by Bruno Taverne on 2025-02-24 at 10:16

    L’article Common Europe Congress 2025 -2 to 5 June est apparu en premier sur M81.

  • 03 Unlocking IBM i’s Full Potential – A Masterclass with Tim Rowe
    on 2025-02-24 at 01:02

    03 IBM i explorers, you’re in for a treat! In this episode of The Incredible i Show, we sit down with Tim Rowe, Senior Technical Staff Member for Application Development & Systems Management at IBM. Tim is a powerhouse when it comes to modernizing IBM i, and today, he’s bringing us the latest on IBM Navigator, security enhancements, and what’s next for the platform.We’ll dive into:✅ How TLS Wizards are simplifying security configurations✅ The game-changing updates to Audit Journals & Data Marts✅ Why Migrate While Active is revolutionizing system management✅ What’s coming next in IBM i’s roadmap (hint: big things in April!)Tim Rowe, STSM – Application Development & Systems ManagementEmail: [email protected] – http://ibm.biz/IBMi_ACSNavigator – http://ibm.biz/IBMi_Nav4iOne incredible Th(i)ng!  Products, gadgets, recipes, music or things we are loving right now.Tim’s pick for this week:Lunch with Scott Forstie & hanging out on the pitch with his son in California! Peg’s pick for this week:IBM Champion – 4 years running! Upcoming EVENTS:WMCPA, March 11-13, 2025 i-UG South Conference, March 13, 2025NEUGC, April 7-9, 2025 POWERUp 2025, Anaheim, CA – May 19-22, 2025SHOW SPONSORS:LightedgeCOMMONCheck out our website and LinkedIn page, and like and subscribe to all those things!Interested in sharing your IBM i story? Want to sponsor the podcast? We want to hear from you! Reach out to Peg.Email: [email protected]

  • 03 Unlocking IBM i’s Full Potential – A Masterclass with Tim Rowe
    on 2025-02-24 at 00:12

    03 IBM i explorers, you’re in for a treat! In this episode of The Incredible i Show, we sit down with Tim Rowe, Senior Technical Staff Member for Application Development & Systems Management at IBM. Tim is a powerhouse when it comes to modernizing IBM i, and today, he’s bringing us the latest on IBM Navigator, security enhancements, and what’s next for the platform.We’ll dive into:✅ How TLS Wizards are simplifying security configurations✅ The game-changing updates to Audit Journals & Data Marts✅ Why Migrate While Active is revolutionizing system management✅ What’s coming next in IBM i’s roadmap (hint: big things in April!)Tim Rowe, STSM – Application Development & Systems ManagementEmail: [email protected] – http://ibm.biz/IBMi_ACSNavigator – http://ibm.biz/IBMi_Nav4iOne incredible Th(i)ng!  Products, gadgets, recipes, music or things we are loving right now.Tim’s pick for this week:Lunch with Scott Forstie & hanging out on the pitch with his son in California! Peg’s pick for this week:IBM Champion – 4 years running! Upcoming EVENTS:WMCPA, March 11-13, 2025 i-UG South Conference, March 13, 2025NEUGC, April 7-9, 2025 POWERUp 2025, Anaheim, CA – May 19-22, 2025SHOW SPONSORS:LightedgeCOMMONCheck out our website and LinkedIn page, and like and subscribe to all those things!Interested in sharing your IBM i story? Want to sponsor the podcast? We want to hear from you! Reach out to Peg.Email: [email protected]

  • Talsco Weekly: Are We In The Golden Age of the IBM i?
    by patrick staudacher on 2025-02-23 at 22:06

    Welcome to another edition of Talsco Weekly IBM i Brief:  🔒 ​IBM i users prioritize cybersecurity above all else​. 🔐 ACS password vulnerabilities raise IBM i security concerns. Development: 💻​VS Code and GitHub Copilot revolutionize RPG development. ⚙️ ​New SQL View simplifies IBM i configuration status monitoring. Hiring:  🏆Is the IBM i About To Enter The post Talsco Weekly: Are We In The Golden Age of the IBM i? appeared first on IBM i (AS/400, RPG) Recruiting, Staffing & Consulting.

Verified by MonsterInsights