• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Clearing Up IBM i Security Confusion

    December 9, 2015 Alex Woodie

    IBM i is a mature operating system that gives enterprises several ways to accomplish tasks. But sometimes this richness can generate confusion over the best way to accomplish something. For example, when should you use adopted authority in your applications, and when should you use user profile swapping? IBM i security expert Carol Woodbury recently addressed some of these questions.

    “I will often get questions about things like adopted authority or swapping profiles, and what’s the difference or are they the same,” Woodbury, the former OS/400 security architect at IBM, said in a recent “Coffee with Carol” Webinar hosted

    …

    Read more
  • Happy Holidays From IT Jungle

    December 9, 2015 Timothy Prickett Morgan

    The weather may not know it in most of the Northern Hemisphere, but the holiday season will soon be fast upon us and that means it is time to put away the pens and keyboards here at IT Jungle and to spend some time with family and friends.

    The Four Hundred has been a part of the IBM midrange community almost as long as the AS/400 and its progeny have been around, and like the AS/400 itself, The Four Hundred has antecedents that have an even longer history. The point is, we have been listening and learning about the IBM

    …

    Read more
  • A Rising Tide

    December 7, 2015 Timothy Prickett Morgan

    The system business is roaring along in 2015, and it looks like the industry might devour a historic number of machines this year, if the first three quarters are any indication. The amount of capacity that companies are consuming is staggering, and not something the analysts at IDC or Gartner talk about when they put out their quarterly figures. But we like to think these things through.

    It looks like Power Systems sales are on the rise, too. So maybe, just maybe, a tide is rising that will lift all boats a little. (Provided interest rate increases or some other

    …

    Read more
  • Fresche Legacy Gets $6 Million Infusion To Expand

    December 7, 2015 Dan Burger

    It might surprise some people to read about companies that are investing in the IBM midrange platform. After all, at least one of the top research and analysis firms has had IBM i, and before that the iSeries, and before that the AS/400, on a death watch for something like a dozen years or so. Not everyone believes that. And here’s a $6 million reason why the IBM i market is worthy of investment.

    When IBM i ISV Fresche Legacy looked for an investor that could give the application modernization software company a lift, it found rather quickly what it

    …

    Read more
  • ISVs In Denial About Software Licensing

    December 7, 2015 Alex Woodie

    “The only constant. . . is change.” That cliché is enough to induce a vigorous eye roll from hardened IT pros, but it’s actually apropos for the IT industry, which feeds off disruption like the Kardashians feed on media attention. Now, a pair of new studies indicate a large number of software vendors are ill equipped to handle the current round of cloud- and mobile-induced IT chaos.

    The rise of powerful smartphones and tablets has eliminated the need to have a Windows PC or laptop to access many enterprise software applications. That’s a huge win for enterprise software users and

    …

    Read more
  • As I See It: Revolving Door

    December 7, 2015 Victor Rozek

    Just when you think the excesses and oddities of the Internet can no longer surprise, along come reports of an online ISIS “help desk”–24/7 assistance for the budding jihadist. Well, it turns out the reports were inaccurate. It’s not a single point of contact, but a “decentralized, multi-platform recruit outreach,” according to West Point’s Combating Terrorism Center. Regardless, trolling for expendable volunteers willing to detonate themselves for your cause certainly marks a departure from the ordinary array of bile-flavored hate sites.

    Suicide bombers originate in many countries, and are subject to a variety of cultural influences. But if they have

    …

    Read more
  • IBM i Horror Story With A Happy Ending

    December 7, 2015 Dan Burger

    Users of IBM i and its predecessors have had their share of horror stories. Those on any other business computing platform can say the same. However, I think it’s fair to say the IBM midrange platform is no worse than any other and is better than its competition in many ways. But that doesn’t make it a fairy tale. Evidence of this is the IBM Entitled Systems Support. Also known as the portal to hell.

    For just about anyone who has tried to order a product or a product upgrade from IBM, this is a horror story. The needle on

    …

    Read more
  • IBM Patches Pair of Security Flaws in iAccess for Windows 7.1

    December 2, 2015 Alex Woodie

    IBM last month revealed the presence of a pair of security vulnerabilities in iAccess for Windows 7.1, including one that could allow a local cybercriminal to take control of the Windows PC running the iAccess software, and another that could be used to launch a denial of service attack. Big Blue patched both flaws with a PTF.

    IBM provided some details of the security flaws with a Security Bulletin N1020996 published November 18, which is the same day it released PTF number SI57907 to fix the flaws in iAccess for Windows 7.1.

    The buffer overflow flaw that was given the

    …

    Read more
  • Urgent Need for Application Modernization Seen at the Federal Level

    December 2, 2015 Alex Woodie

    Security breaches. Downtime. Poor performance. These are some of the problems federal IT managers expect to encounter if they continue to run legacy applications as they now exist, according to a recent study from MeriTalk. But instead of ditching the old applications and writing new ones from scratch, MeriTalk advocates a selective modernization approach that blends new and old.

    MeriTalk, a public-private partnership that addresses IT issues in the federal government, recently tackled the topic of legacy modernization with a report titled “Future Ready Applications: The Modern Legacy.” The November 18 study involved responses from 150 federal IT managers,

    …

    Read more
  • Remain Taps JIRA to Heighten Change Management Collaboration

    December 2, 2015 Dan Burger

    Controlling the chaos of collaboration from an application development perspective has proved to be a valuable asset for many IBM midrange customers. Better code, with the bugs worked out before it goes into production, saves time and money compared to debugging and redesigning after the fact. The value goes beyond writing code because collaboration applies to many business oriented teams and numerous end users who are effected sometimes for the better and other times for the worse.

    Project tracking comes in many flavors, so Remain Software is integrating its application lifecycle management tool, TD/OMS, with multiple popular options. Its latest

    …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22
  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle