• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Checks Drive Consulting Biz for Briteskies

    June 14, 2021 Alex Woodie

    With high-profile ransomware attacks becoming the norm and calls for a federal cybersecurity department gaining steam, there’s a distinct uneasiness when it comes to the security of corporate computer systems. That uptick in awareness is helping to drive business for Briteskies, the Cleveland, Ohio-based IT consultancy that has made IBM i security a cornerstone of its business.

    Briteskies was founded in 2000 primarily as a JD Edwards specialist for organizations in the Great Lakes region. Over the years, the company has expanded into other niches, including Magento e-commerce systems, custom RPG development, and computer security.

    The market for IBM i …

    Read more
  • Malware Threats and Cyber-Recovery on IBM i

    May 26, 2021 Brian Barth

    Cyber threats have evolved from the traditional vectors of theft and direct attacks to more financial driven cyber destruction and extortion, especially via ransomware. Hospitals, manufacturers, universities and financial institutions have all been attacked in the last year, and the rate of attacks is increasing as networks become more accessible to support remote workers. The Colonial Pipeline attack has demonstrated that even the critical infrastructure that supports our supply chains is not invulnerable.

    In 2021, more than three quarters of attacks are financially motivated, and over half of those attacks are ransomware – an attack in which files are typically …

    Read more
  • Guru: Generate SQL for Dependents

    May 24, 2021 Paul Tuohy

    Way back in October 2014, in the article Find A View Of A View Of A View. . ., I detailed a stored procedure that, given the name of a table or a view, provides the full list of dependent views and all of their dependents and all of their dependents, etc. This is a stored procedure that has served me well in the world of DDL, where it is common to have views of views of views.

    In this article I will describe a follow-on stored procedure that will generate the DDL for a given table/view and all …

    Read more
  • Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    May 17, 2021 Alex Woodie

    The ransomware outbreak hit home for millions of Americans last week when attackers shut down a major East Coast pipeline as well as a hospital network on the West Coast. For IBM i shops, the events are a potent reminder to re-evaluate network security and data protection systems to ensure they’re resilient from attack.

    You could be forgiven for thinking you were watching an episode of Mr. Robot last week as news spread of the shutdown of Colonial Pipeline network, which provides 45 percent of the gasoline for the entire East Coast of the United States through 5,500 miles of …

    Read more
  • Locking Down Exit Point And IFS Vulnerabilities On IBM i

    March 24, 2021 Pauline Brazil Ayala

    It’s true that the IBM i server is among the most securable servers on the planet. But all too often, customers do not take the time to secure their environments properly. This is particularly true for two of the most oft-neglected components of the IBM i environment: exit points and the IFS.

    IBM introduced exit points with the launch of OS/400 V3R1 way back in 1994. We remember that version well here at Trinity Guard, because soon after that, we developed the industry’s first exit point monitoring software for the AS/400 at PentaSafe, the spiritual predecessor of our company. …

    Read more
  • Feeling Insecure About The Weak Security At Most IBM i Shops

    February 8, 2021 Timothy Prickett Morgan

    It is always a wonder to us that, in this day and age, every IBM i shop, which is by definition running mission critical workloads, is not using high availability clustering of systems in their datacenter, disaster recovery and failover of some type or another to a remote site, and supplemental security to lock down those parts of the system that are not, by default within the IBM i platform, locked down.

    It’s a bit of a mystery. Of the 120,000 to 150,000 unique customers running IBM i platforms in the world, maybe 20,000 have some sort of HA/DR and …

    Read more
  • New Release Of ACS Now Available

    December 9, 2020 Alex Woodie

    IBM delivered a new release of Access Client Solutions (ACS) last week, right on schedule. With ACS version 1.1.8.6, users will find a host of new features designed to accelerate their productivity across a range of uses.

    ACS is the Java-based utility that has become one of the most used (and useful) ways that administrators, programmers, and engineers can interact with the IBM i server. The software, which is free to IBM i customers on maintenance, features a 5250 emulator, 5250 printer emulation, data transfer capabilities, IFS file viewing, spool file management, and a virtual console for LAN and HMC …

    Read more
  • Big Blue Bolsters IBM i High Availability And Data Resiliency

    October 19, 2020 Alex Woodie

    High availability and data resiliency are critical topics in the minds of business owners these days, especially in light of the summer’s disasters, both natural and manmade. To that end, in the latest batch of Technology Refreshes, IBM has bolstered the services that provide high availability and data resilience in IBM i, PowerHA, and BRMS.

    Backup, Recovery, and Media Services (BRMS) is the licensed product that thousands of IBM i shops use to automate their backups and recoveries. Those backups usually involving tape, which was cited by 48 percent of IBM i shops in the 2020 IBM i Marketplace Survey …

    Read more
  • Db2 And SQL Services Get Upgrades With TRs

    October 12, 2020 Alex Woodie

    Among the biggest enhancements that IBM is bringing to IBM i with the latest batch of Technology Refreshes are new capabilities added to the integrated Db2 database and, specifically, the slew of SQL-based services that retrieve all types of data from the platform for IBM i professionals.

    As we previously told you, IBM has decided to rename SQL Services, which were the collection of pre-defined SQL queries that recreate traditional IBM i commands and sometimes bring something entirely new. The growing gaggle of services (or perhaps it’s a herd?) are now being officially referred to as IBM i services, …

    Read more
  • How The Latest TRs Bolster The Core IBM i OS

    October 7, 2020 Alex Woodie

    Yesterday was Technology Refresh (TR) day for IBM and its IBM i operating system, and Big Blue didn’t disappoint. The company unveiled new releases of IBM i 7.4 and 7.3 that bring a slew of new capabilities to the core operating system as well as surrounding offerings like Db2 Mirror, ACS, and RDi. In this article, we’ll look at enhancements to the core OS and related key features.

    During a COMMON webcast Tuesday, IBM i Chief Architect Steve Will touched broadly on a number of enhancements that soon will be available in the TRs. Most of the new capabilities will …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle