• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • What Koch’s $2.5 Billion Infor Investment Means For IBM i

    November 28, 2016 Alex Woodie

    Koch Equity Development LLC, the private equity arm of Koch Industries, will invest more than $2 billion into IBM i ERP giant Infor, the companies announced last week. Infor says it will use the cash to expand its business, while news reports say some of it will go to pay off earlier investors in the company.

    Infor wouldn’t comment on questions about what exactly it’s going to spend KED’s reported $2.5 billion investment, beyond what it said in the press release. Even IBM i customers would benefit, an Infor spokesman said. “All existing and future customers will reap

    … Read more
  • QTEMP Is A Different Animal

    November 15, 2016 Hey, Ted

    I have a problem with an FTP script. I wish to send a file in QTEMP to a remote system, but the script tries to send the file from QGPL instead. The PUT command does not tell which library to send the file from because our standards prohibit the use of hard-coded library names. Any thoughts will be appreciated.

    –Al

    I commend you and other wise people in your shop for outlawing the hard-coding of library names, Al. The library list is a wonderful feature of IBM i, a feature that is sorely missing from other database systems. I have

    … Read more
  • SQL PL–The LOOP Loop

    November 15, 2016 Ted Holt

    In the previous episode of this exciting series, I wrote about FOR, arguably the most useful of the SQL PL looping structures. Next in line of usefulness, in my opinion, is the LOOP structure. Like the rest of SQL PL, this is an easy structure to master, and I am pleased to write about it.

    In its simplest form, the syntax of the LOOP structure is as follows:

    LOOP - body - END LOOP
    

    Here is a more realistic version of the syntax:

    label: LOOP - body - END LOOP label
    

    The body contains any assortment of simple statements

    … Read more
  • Calling SQL Functions From RPG, A Service Program

    November 15, 2016 Paul Tuohy

    Note: The code accompanying this article is available for download here.

    In this article I would like to introduce a service program that provides RPG subprocedure “wrappers” for using SQL scalar functions. This means you can use an SQL scalar function as if it were an RPG built-in function.

    Using an SQL scalar function can be a lot easier than using the RPG alternative:

    • Use the UPPER function instead of defining two translation strings and using %XLATE.
    • Use DAYNAME function instead of calculating the day of the week and using an array to provide the day name.
    • Using the
    … Read more
  • You’re Hired! Finding Your Next IBM i Pro

    November 14, 2016 Dan Burger

    The skills shortage dilemma for IBM i shops is a reality. It’s also an excuse. New technologies are being introduced rapid fire in IT and each has a learning curve that is being handled by people who choose to do so. It takes time and effort. This is enterprise computing. It’s slightly more difficult than learning to play the kazoo. But nearly every IBM midrange system admin or RPG programmer started out being thrown into the deep end of the pool.

    You don’t find new employees with the enterprise skill sets of someone with 10, 20, or 30 years of

    … Read more
  • Mad Dog 21/21: Of Possible Interest

    November 14, 2016 Hesh Wiener

    Jacob ben Wolf Kranz was, in the second half of the 18th century, the Preacher of Dubno or, in Yiddish, the Dubner Magid. Dubno is a small city in the Ukraine. Two and a half centuries later, Virginia Rometty, the Big Cheese of Big Blue, appears to have heard at least one of the Magid’s tales. Assisted by the Magid’s sagacity, Rometty has soothed the savages of the sell side, beguiled the barbarians of the buy side and inveigled that illustrious investor on the outside, the Oracle of Omaha, Warren Buffet.

    Janet Yellen: The head of the Federal Reserve Bank

    … Read more
  • IBM i Shops Do Less To Get More Done

    November 14, 2016 Dan Burger

    Offloading workloads seems to be a popular pastime for more and more IBM i shops. Some of that work goes to other platforms, but we also see the managed service providers (MSPs) with IBM i capabilities picking up jobs. Traditionally this has been disaster recovery service, but production environments are headed that way as well as shops take a closer look at internal IT staff capabilities and set business priorities. Workload distribution has become a strategic necessity.

    The trend of moving production IT environments to managed service providers continues to be steady among midsize companies with IT staff tied up

    … Read more
  • Vulnerabilities In 3DES Encryption Put It Out To Pasture In IBM i

    November 14, 2016 Alex Woodie

    IBM i customers should stop using 3DES, also known as Triple DES, ciphers due to the SWEET32 vulnerabilities that could leave sensitive information unprotected as it moves between client and server via the OpenSSL and OpenVPN protocols. This was the gist of a security alert sent last week by IBM, which also issued new PTFs to address the problems in its own IBM i products.

    On November 4, IBM issued security bulletin N1021697, which discussed what to do about so-called SWEET32 security vulnerabilities in OpenSSL and OpenVPN. The security problems, which are detailed in CVE-2016-2183 (for OpenSSL) and

    … Read more
  • IBM Cuts Core And Memory Pricing On Entry Power Iron

    November 14, 2016 Timothy Prickett Morgan

    We are always trying to get IBM to do more to promote the IBM i platform and the Power Systems hardware that comprises the physical part of that platform. In days gone by, Big Blue used to make very public and loud pronouncements regarding its ability to bring customers more value for the dollar, often above and beyond the Moore’s Law capacity increases that are just part of the chip business and usually at the tail end of the product cycle as we are now with the Power8 machines that have been shipping since April 2014.

    IBM is not as

    … Read more
  • Cybersecurity Is Hot, But Don’t Overlook Physical Security

    November 9, 2016 Alex Woodie

    Cybersecurity played a major role in the run-up to yesterday’s presidential election, as Russian hackers leaked private communications and attempted to influence the outcome of the election. They weren’t successful, largely because elections remain mostly a manual affair in United States. But it did serve as a reminder of the need to protect critical American institutions in both the cyber and physical worlds.

    In a recent report, the Department of Homeland Security identified 16 infrastructure sectors that are vital to the safety, security, and health of the United States and its people. You’ll find sectors you’d expect to find there,

    … Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • To Comfort The Afflicted And Afflict The Comfortable
  • How FalconStor Is Reinventing Itself, And Why IBM Noticed
  • Guru: When Procedure Driven RPG Really Works
  • Vendors Fill In The Gaps With IBM’s New MFA Solution
  • IBM i PTF Guide, Volume 27, Number 27
  • With Power11, Power Systems “Go To Eleven”
  • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
  • Izzi Buys CNX, Eyes Valence Port To System Z
  • IBM i Shops “Attacking” Security Concerns, Study Shows
  • IBM i PTF Guide, Volume 27, Number 26

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle