(This page just shows the latest 20 or so posts, sign up to the daily newsletters to get all of them or join us at Slack)
- IBM i MFA Security: Breaking Down Enterprise Integration Barriersby Daniel Magid on 2025-01-23 at 22:07
Enterprise IBM i MFA security remains a critical challenge for many organizations. Last week, I met with the CIO of a large manufacturing company who was confident their enterprise was fully protected by multi-factor authentication. “We’ve implemented MFA across our entire infrastructure,” he assured me. Then came the pause. “Well, except for the IBM i The post IBM i MFA Security: Breaking Down Enterprise Integration Barriers appeared first on Eradani.
- Fresche Solutions Acquires OmniData Insights to Accelerate AI-Enabled Data Modernization and Expand Beyond IBM ion 2025-01-23 at 20:51
Fresche Solutions Acquires OmniData Insights to Accelerate AI-Enabled Data Modernization and Expand Beyond IBM i
- Fresche Solutions Acquires OmniData Insights to Accelerate AI-Enabled Data Modernization and Expand Beyond IBM iby GlobeNewswire on 2025-01-23 at 20:05
SAN FRANCISCO, Jan. 23, 2025 (GLOBE NEWSWIRE) — Fresche Solutions, a global leader in IBM i modernization and transformation, acquires OmniData Insights, a Microsoft Gold-certified leader specializing in AI-enabled Data and Analytics modernization. This strategic move marks a significant step forward in diversifying Fresche’s portfolio of solutions and services and reinforces its dedication to address the
- IBM Software Download Tips: Three Easy Steps to Make Download Director Work Againon 2025-01-23 at 20:00
This document and video describe the three main tasks customers need to complete to be able to download PTFs and software from IBM websites that use Download Director technology.
- IBM Cyber Vault Introduction 101on 2025-01-23 at 20:00
Join the Advanced Technology Group (ATG) and Expert Tom Bish for an exclusive webinar exploring IBM Cyber Vault blueprint! Discover how this solution can help customers detect and recover from logical corruption of their data due to malicious or accidental causes. Learn the key technologies and concepts used to protect the data, perform validation, forensic analysis, and recovery capabilities to bring a customer back to an operational state as quickly as possible in the event of an attack. This session will focus on the primary environments of IBM Z and i which make use of this blueprint, as well efforts to extend this to Power/AIX. Don’t miss this opportunity to gain invaluable insights into data protection and recovery capabilities and register today!
- Modern Observability: Bridging Legacy Systems to the Futureby Aaron Magid on 2025-01-22 at 18:36
As Chief Architect at Eradani, I frequently work with companies wrestling with a common challenge: how to bring comprehensive monitoring and observability to their mission-critical IBM i applications. During a recent customers-only office hours session, we explored this topic in depth, and I wanted to share some key insights about implementing modern observability practices across The post Modern Observability: Bridging Legacy Systems to the Future appeared first on Eradani.
- RPG Programming ?by cuddlyotter777 on 2025-01-22 at 15:51
Hello! I’m new-ish to AS/400 & iSeries. I began working with it about a year and half ago , which I’m in more of a configuration role – not development. I really enjoy Manhattan iSeries , & I’ve been in debug to read code before & found it very interesting. I’m working if it’s worth learning more about? Or is going to be obsolete here soon? I’m 22 , so I just don’t want to learn something for it to be out the door in the year. submitted by /u/cuddlyotter777[link][comments]
- IBM i Access Client Solutions Might Be Leaking Your Passwordson 2025-01-22 at 11:39
IBM i Access Client Solutions Might Be Leaking Your Passwords
- Identifying code that could fail the “2039 problem”by [email protected] (Simon Hutchinson) on 2025-01-22 at 11:03
As soon as we handled Y2K I thought when we reached date 2039 we would have something in place to prevent the “2039 problem”. What is the “2039 problem”? This only occurs with dates with years that are just two characters. A date data type, character or numeric representation of a date, that has a two character year uses the following rule to determine the century: 40 – 99: Century is assumed to be “19” 00 – 39: The assumption is that the century is “20” We are 24 years away from 2039, but soon there a going to be applications that will need to use dates beyond that year. When I attended COMMON’s Navigate in Toronto, in November 2024, Barbara Morris, IBM’s lead developer for the RPG compiler, told us that it would be up to us, the IBM i developers, to remedy the issue. The way RPG handles dates will remain unchanged. Read more »
- Attackers Exploit IBM i Access Client Solutions on Windows 11 To Steal Passwordson 2025-01-22 at 10:51
A recent investigation has revealed that attackers are exploiting vulnerabilities in IBM i Access Client Solutions (ACS) to steal Windows user credentials. This alarming discovery highlights the risks associated with the WINLOGON authentication mode, which IBM recently deprecated due to compatibility issues with Windows 11’s Local Security Authority (LSA) Protection.
- Attackers Exploit IBM i Access Client Solutions on Windows 11 To Steal Passwordson 2025-01-22 at 08:47
Attackers Exploit IBM i Access Client Solutions on Windows 11 To Steal Passwords
- Practical Middleware: Combining RPG and Node.json 2025-01-22 at 01:07
Figure 2: RPG program GETCUST, which returns data from the customer master file I’m going to wrap the RPG program in a function so that it’s easily accessible from SQL.
- Vulnerability Archeology: Stealing Passwords with IBM i Access Client Solutionsby b on 2025-01-21 at 12:18
As part of our ongoing research of the IBM i platform we monitor news and updates related to the platform. Two weeks ago IBM published a support article about a compatibility issue affecting IBM i Access Client Solutions (ACS) when running on Windows 11 24H2. The “no man’s land” between system boundaries is always a playground for hackers, and this article was fascinating because it pointed to the Local Security Authority subsystem of Windows:
- 2025 Outlook: IBM i Innovations & Trends | Maxava Insightsby Ash Giddings on 2025-01-21 at 02:07
As we step into 2025, the tech landscape continues to evolve at an unprecedented pace. At Maxava, we keep a close eye on industry trends…
- Rewrite: Building a Fresh Foundation for Your IBM i Applicationsby Profound Logic on 2025-01-20 at 17:05
Explore strategic approaches to rewriting IBM i applications. Learn how Profound AppEvo’s methodology ensures successful transformation while maintaining business continuity and enabling innovation. The post Rewrite: Building a Fresh Foundation for Your IBM i Applications appeared first on Profound Logic.
- How to implement a simple IBM i monitor – part 1by Andrea on 2025-01-20 at 08:28
One of the most important allies of a sysadmin is a good monitoring system. In this first tutorial, I will show you how it’s so easy implementing an IBM i system monitor using features that are already included in the OS without using third part software. To do that, we are going to use IBM The post How to implement a simple IBM i monitor – part 1 appeared first on All4Power.
- 2025 IBM i Predictions, Part Twoby Alex Woodie on 2025-01-20 at 05:10
With new wall calendars and a new (old) guy in the White House, change is in the air as we start off 2025. That much was obvious from the first installment of IBM i predictions, which ran last week. This second batch of predictions may be even bolder than the first. We’re in the midst of a shakeup in the tech job market, thanks to several years of elevated inflation, emergence of cloud computing, and new technologies like AI. How does that impact the IBM i job market? For insight, we turn to Bob Langieri, the owner of Excel Technical … The post 2025 IBM i Predictions, Part Two appeared first on IT Jungle.
- Guru: Creating An RPG Stored Procedure With Parametersby Mike Larsen on 2025-01-20 at 05:10
There are times we need to build processes that will be used across different platforms. An example is a pricing routine. When a system needs to get pricing, we need to make sure the price the customer pays is the same regardless of how the order was created in our system. One way to create this functionality is using web services. Another way we can provide this functionality is through stored procedures. This series of tips will focus on different ways we can build stored procedures on IBM i. For the first part, I created an RPG program (Figure 1) … The post Guru: Creating An RPG Stored Procedure With Parameters appeared first on IT Jungle.
- Beta For RPG Coding Assistant On Track for 2Q25by Alex Woodie on 2025-01-20 at 05:10
IBM is ramping up development of the AI-based RPG Code Assist and expects to have a working prototype ready for testing by the end of the first quarter, IBM i chief technology officer Steve Will said in a webinar last month. The goal is to have a beta ready for during the second quarter and general availability hopefully in the second half of the year, he added. Large language models (LLMs) such as OpenAI’s GPT and Google’s Gemini have taken the world by storm, and companies are investing tens of billions of dollars in the nascent tech to gain … The post Beta For RPG Coding Assistant On Track for 2Q25 appeared first on IT Jungle.
- IBM i PTF Guide, Volume 27, Numbers 1 And 2by Doug Bidwell on 2025-01-20 at 05:05
With these two first editions of the IBM i PTF Guide, we start the patching of the venerable descendant of the OS/400 operating systems for 2025. And so, it still being January, we can wish you all a happy and prosperous New Year and, for those of you who are struggling because of natural disasters, medical issues, or economic woes, we feel your pain. It is hard for a lot of us right now. With that, let us dive into the first and second of the Guides for 2025. With Numero Uno, there was not a whole lot going … The post IBM i PTF Guide, Volume 27, Numbers 1 And 2 appeared first on IT Jungle.