(This page just shows the latest 20 or so posts, sign up to the daily newsletters to get all of them or join us at Slack)
- Profound Logic & PersonalSoft Lead the Charge in Futurization at BINTEC 2024by Profound Logic on 2024-10-10 at 20:36
Profound Logic and PersonalSoft showcase their Futurization Alliance at BINTEC 2024, revolutionizing IBM i legacy system transformation. Join the futurization revolution and future-proof your business. The post Profound Logic & PersonalSoft Lead the Charge in Futurization at BINTEC 2024 appeared first on Profound Logic.
- Programming in ILE RPG – Defining Standalone Variables & Assigning Initial Values to Data – MC Press Onlineon 2024-10-10 at 19:17
Although the database might not support some very large fields, character data items defined in an ILE RPG program generally have higher limits, up to about 16 MB. A typical use for a standalone variable might be as a counter to count the number of transactions being processed, as an intermediate variable to temporarily hold a value for later processing, as an accumulator to keep running track of year-to-date sales amounts, or as an indicator to represent whether a condition is true.
- Practical RPG: AI and IBM ion 2024-10-10 at 18:52
I asked it a simple question: with two files, CUSTOMER and TASKS both keyed by field CUSNUM, write RPG code to read every record in the CUSTOMER file, and if there is no record in the TASKS file, set the status to C. There are really only two ways to use an LLM to help you code: ask questions of an existing LLM or build your own.
- The Strategic Benefits of Using a Virtual Tape Solution for Data Disaster Recovery of IBM Power Systemsby Ax Synar on 2024-10-10 at 17:16
As digital infrastructures become increasingly complex and data volumes surge, the need for robust disaster recovery strategies is more urgent than ever for organizations running IBM Power Systems. Data disaster recovery must be a top priority to avoid downtime, financial loss, and damage to their reputation. Traditional tape backups, once the standard for data protection, The post The Strategic Benefits of Using a Virtual Tape Solution for Data Disaster Recovery of IBM Power Systems appeared first on LaserVault.
- IBM i Password Reset Using Red Hat Ansible – Meridian ITby Meridian IT Ltd on 2024-10-10 at 11:24
Using IBM Power and curious how simple it is to get started? Watch this quick video to see how you easily can execute Red Hat Ansible in VSCode against an IBMi from a developer view. This is a simple use case of changing an IBMi user profile from a developer perspective.
- NHMUG calls it a dayby Simon Hutchinson on 2024-10-10 at 10:02
I am always saddened to learn that an IBM i Local User Group, LUG, stops functioning. Yesterday, I learned the New Hampshire Midrange User Group, NHMUG, announced on their website that they were disbanding. You can read their announcement here. This just leaves one IBM i user-related organization in the New England region, the Northeast Users Groups Conference. NEUGC holds an annual conference, see their website for details of the 2025 conference. If you have any updates for any other IBM i related LUG please let me know via the Contact form on the right. For a list of all the active IBM i User Groups I have found check out the user groups page.
- Opcode Session 2by Programmers IO on 2024-10-10 at 04:49
Teaching IBM Power skills in a free online IBM i Internship Program for university students and IT professionals around the world.
- Splitting a PDF using RPG and PDFBoxby ImRickyT on 2024-10-10 at 03:19
I wrote an article on LinkedIn about splitting a PDF document based on page numbers using RPG and a OpenSource project PDFBox. Hope it helps someone. Plan on releasing one that splits based on Text in the PDF document. https://www.linkedin.com/pulse/splitting-pdf-rpg-java-pdfbox-ricky-thompson-lnuue submitted by /u/ImRickyT[link][comments]
- Robot | What to Do When AS/400 Talent Retiresby Fortra on 2024-10-09 at 23:26
Interested in learning more about IBM i Automation and its potential impacts on your business? Click here: https://www.fortra.com/solutions/ibmi-as400/contactYou may have heard this story, “…we’ll be moving off IBM i (AS/400) in two years”.What are the reasons behind this? Often, it is because a company is having a hard time finding staff familiar with IBM i or a new CTO who came from an environment without IBM i doesn’t understand its value to the business and would prefer to change platforms.When companies try to move off IBM i, they discover the time to migrate takes much longer than anticipated, the new platform doesn’t provide the promised business value, or the project goes way beyond the planned budget.Watch this webinar from IBM i experts Tom Huntington and Chuck Losinski where they help you understand:-The business value in sticking with IBM i-The resources available to help you with staffing-Support and development ideas that you might not have consideredWatch today to learn why staying on IBM i remains a practical option for organizations with retiring AS/400 talent.
- IBM i PTF Guide, Volume 26, Number 39by Doug Bidwell on 2024-10-09 at 19:56
Brace yourself, there is lots of stuff going on in PTF Land this week. To begin with, there are three security vulnerabilities. First, we have Security Bulletin: IBM HTTP Server (powered by Apache) for IBM i is vulnerable to a remote attacker causing a denial of service, executing arbitrary code, and mapping URLs to filesystem locations due to multiple vulnerabilities. You can find out more about this vulnerability at this link. The patches are as follows, by release: 7.5 SJ01738 SJ02179 7.4 SJ01739 SJ02177 7.3 SJ01752 SJ02176 7.2 SJ01751 SJ02130 Second, we have Security Bulletin: IBM i (V6.1, 7.1, … The post IBM i PTF Guide, Volume 26, Number 39 appeared first on IT Jungle.
- IBM i TR Boosts Db2 for i Functionalityby Kent Milligan – IBM Technology Expert Labs on 2024-10-09 at 15:31
Prior to this latest round of enhancements, Db2 for i always generated the same cursor name (i.e., SQL_TABLE_CURSOR) for every UDTF. The new cursor name generation algorithm should allow the NOT FENCED option to be used in more cases enabling your UDTFs to run faster.
- Eradani Taps GenAI for IBM i Integration Boostby Alex Woodie on 2024-10-09 at 04:11
Eradani introduced a new product last month that uses the power of generative AI to simplify the development of code for integration projects involving IBM i. The company says the new product, dubbed Eradani Assist, will allow customers to use natural language to tell the product to build specific application and data integrations, and the product will leverage one or more large language models (LLMs) to generate the integration code. Eradani calls its flagship product, Eradani Connect, an “integration hub” that manages communication into and out of the IBM i platform. The software supports application and data integration projects that … The post Eradani Taps GenAI for IBM i Integration Boost appeared first on IT Jungle.
- IBM Preps Delivery of 10th-Gen DS8000 Arrayby Alex Woodie on 2024-10-09 at 04:06
IBM is gearing up to begin delivery of the tenth generation of the DS8000, its high-end storage arrays for IBM i, AIX, z/OS, and other servers. Due to ship October 25, the upgraded DS8000 features a number of features designed to enhance data storage in z/OS mainframe environments, but IBM i shops will also see some benefits, too. Now in its 20th year, the DS8000 still roams the highest echelons of storage area networks (SAN) for large enterprises. Built with high availability and performance in mind, the DS8000 is designed to power the most important applications for the biggest companies … The post IBM Preps Delivery of 10th-Gen DS8000 Array appeared first on IT Jungle.
- Four Hundred Monitor, October 9by Jenny Thomas on 2024-10-09 at 04:06
It’s October so I am sure you all know what we are celebrating: Cybersecurity Awareness Month! Yes, the month of goblins, ghouls, and pumpkin spice lattes, is also celebrated in some circles to raise awareness about cyber risks and encourage everyone to engage in safe online practices. Cybersecurity Awareness Month began 20 years ago in 2004, and the theme this year is “Secure Our World,” which may be difficult considering it is expected that by 2025 there will be 3.5 million unfilled cyber security jobs due to a lack of skilled professionals and a growing need to secure more and … The post Four Hundred Monitor, October 9 appeared first on IT Jungle.
- IBM Unveils Client Option for Power Systems Virtual Serverby Andrew Wig on 2024-10-08 at 21:45
IaaS offering lets users move workloads to the cloud with no re-platforming or re-factoring, alleviating cost and migration issues The post IBM Unveils Client Option for Power Systems Virtual Server appeared first on TechChannel.
- End of an Eraby [email protected] (Doug Davie) on 2024-10-08 at 17:57
End of An Era After more than 30 years of being together as an IBM midrange users group, the team at NHMUG have made the hard decision to disband. With Covid-19 behind us or at least mostly at bay, we’d hoped to resume in person meetings of NHMUG. However, there have been many obstacles over the past few years including but not limited to a lack of funding to a lack of resources of the current board, age related retirements and the ability to get training remotely. Per our bylaws any monies left over will be distributed to the NEUGC team. We hope to see you all at the NEUGC Conference in the Spring of 2025.Get more info by visiting them at www.neugc.org
- Carol Woodbury’s Security Advice from CIO Summit at OCEAN 2024by Alan Seiden on 2024-10-08 at 15:23
I had the privilege of hosting security expert Carol Woodbury as she led a roundtable discussion at this past summer’s OCEAN TechCon. Carol is IBM i Security SME and Senior Advisor with our friends at Kisco Systems. Several of Carol’s observations made a strong impression on both me and our CIO guests. Here are just a few. Security is a Lifestyle “Security is a lifestyle, not a one-time event.” Security requires regular evaluation and change over time. Without it, security settings degrade and new threats remain unaddressed Data Sprawl A term first mentioned at the conference by IBM’s Scott Forstie,… The post Carol Woodbury’s Security Advice from CIO Summit at OCEAN 2024 appeared first on Seiden Group.
- Security Bulletin: Vulnerability in MD5 Signature and Hash Algorithm affects IBM i (CVE-2015-7575).on 2024-10-08 at 13:04
The MD5 “SLOTH” vulnerability on TLS 1.2 affects IBM i.
- Fall 2024 TRs announcedby [email protected] (Simon Hutchinson) on 2024-10-08 at 09:38
The Fall Technology Refreshes for IBM i 7.5, TR5, and 7.4, TR11, were announced this morning. Having a quick glance at the announcement documentation from IBM it would appear that the two have the identical changes: Db2 of i (SQL) 14 enhancements 9 new additions RPG 3 new additions Read more »
- Cyber Security & Foundations for a More Secure IBM iby Joe Whitehurst on 2024-10-08 at 08:12
Cyber Security on the IBM i – It’s not easy, but it doesn’t have to be hard. With Cyber Security being the top concern for IBM i professionals for the sixth year running, Andy Nicholson talks through some foundations you can build for better Cyber Security on your IBM i (AS40/ iSeries) systems. And below The post Cyber Security & Foundations for a More Secure IBM i appeared first on Proximity.