• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Top of Mind as Massive Hacks Continue

    December 4, 2024 Alex Woodie

    The calendar indicates peace and joy, but instead a sense of dread and fear permeates business, as the number and scope of security breaches grows and new regulations loom on the horizon. Ransomware, in particular, is proving itself to be a thorny issue for companies of all sizes, including IBM i shops.

    The latest mega-hack involved Chinse state actors infiltrating the American telecommunications backbone, where they not only accessed huge numbers of call detail records (CDRs) – which they used for counter-espionage purposes – but also read text messages and listened to Americans’ phone calls.

    Known as Salt Typhoon, the …

    Read more
  • IBM Bolsters New Nav With Job Scheduler And More

    April 24, 2023 Alex Woodie

    IBM i professionals finally can access the Advanced Job Scheduler from Navigator for i as a result of the new Technology Refreshes (TRs) that IBM unveiled on April 11. But the job scheduler is just one of a number of new capabilities that IBM is bringing to the snazzy new Web-based interface for administrators and power users, which Big Blue would very, very much like for you to use.

    When IBM debuted the new Navigator for i in the fall of 2021 with release of IBM i 7.3 TR11 and 7.4 TR5, it figured it had the luxury of time …

    Read more
  • Why Maxava High Availability?

    February 27, 2023 Ash Giddings

    Software-based logical replication for IBM i remains a popular solution for high availability and disaster recovery due to its ability to adapt over the years to changing environments like co-locations and the cloud. Maxava HA is known for its efficiency and scalability, but what else sets it apart for large enterprises worldwide?

    Negligible CPU Consumed On Production Server

    The Audit Journal (QAUDJRN) is a valuable tool for protecting the IBM i server with over 70 auditable events. However, in large environments, it can become overwhelmed with hundreds of thousands of entries every minute. Some logical replication solutions heavily rely on …

    Read more
  • Thoroughly Modern: Good Security Is Just As Important As Good Code

    June 13, 2022 Pauline Brazil Ayala

    Can my IBM i really be hit with a virus? Can it be hit with ransomware?

    These are the questions I regularly get from clients as a security expert with more than 20 years of experience. With the pervasiveness of these ransomware threats and sophisticated cyberattacks that we’re seeing in recent times, it only makes sense that we pay close attention to these threats.

    Security on the IBM i is a complex topic, and it is not one that is easily tackled with a few bullet points and tweaks of systems settings. Just like programming on the platform, for that …

    Read more
  • Groundhog Day For Malware

    May 11, 2022 Steve Pitcher

    Say it with me: IBM i is NOT immune to malware.

    A couple of years ago, I wrote a piece called The Real Effects of Malware on IBM i. I thought it laid out a pretty fun, yet frighteningly serious, story of having an argument with a gentleman on Facebook regarding what’s IBM i fact vs fiction regarding malware and how myself and my iTech Solutions colleague Nathan Williams proved it out with some homemade malware and hosed a test system in the process. It really just says everything it needs to.

    So a few weeks ago I’m on …

    Read more
  • In The IBM i Trenches With: LaserVault

    March 21, 2022 Timothy Prickett Morgan

    When somebody says they have been doing the same job for three or four decades, that is a big deal in the 21st century because that kind of long-term employment is just not something anyone counts on. In the OS/400 and IBM i market, such constancy and longevity is, well, normal. Unremarkable. Expected. Good.

    So it is with Brad Jensen, the founder and chief executive officer of Electronic Storage Corporation, a company that is perhaps best known for its LaserVault virtual tape library software, but since the company was founded in 1989 in Tulsa, Oklahoma, it …

    Read more
  • IBM i Community Predictions for 2022, Part 2

    January 12, 2022 Alex Woodie

    The new year is upon us, which means it’s time for predictions. We continue where we left off on Monday with our second installment of predictions from the IBM i community.

    The way Fresche Solutions Chief Product Officer Marcel Sarrasin sees it, 2022 will be a period of heightened competition in the business jungle.

    “Technology advancements and changing markets will drive new competitive threats in 2022, creating the urgent need for new digital solutions to help companies thrive, survive and grow,” Sarrasin says. “Focus will be on new IT products and applications that will deliver improved business processes, pave the …

    Read more
  • Ransomware Attacks Hit Closer To Home

    July 12, 2021 Alex Woodie

    Fifteen hundred organizations around the world had their data locked up in the latest ransomware attack, including grocery store chains and schools. It’s unclear if any IBM i shops were included in the attack, which a Russian hacking group claimed credit for. But it’s clear that ransomware is a growing threat to all organizations, including IBM i shops.

    On July 2, as hundreds of millions of Americans hunkered down for the long Independence Day holiday weekend, hackers using the REvil were just getting started. The Russian-affiliated hacking group had already done the hard work of exploiting a five-year-old security flaw …

    Read more
  • Malware Threats and Cyber-Recovery on IBM i

    May 26, 2021 Brian Barth

    Cyber threats have evolved from the traditional vectors of theft and direct attacks to more financial driven cyber destruction and extortion, especially via ransomware. Hospitals, manufacturers, universities and financial institutions have all been attacked in the last year, and the rate of attacks is increasing as networks become more accessible to support remote workers. The Colonial Pipeline attack has demonstrated that even the critical infrastructure that supports our supply chains is not invulnerable.

    In 2021, more than three quarters of attacks are financially motivated, and over half of those attacks are ransomware – an attack in which files are typically …

    Read more
  • Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    May 17, 2021 Alex Woodie

    The ransomware outbreak hit home for millions of Americans last week when attackers shut down a major East Coast pipeline as well as a hospital network on the West Coast. For IBM i shops, the events are a potent reminder to re-evaluate network security and data protection systems to ensure they’re resilient from attack.

    You could be forgiven for thinking you were watching an episode of Mr. Robot last week as news spread of the shutdown of Colonial Pipeline network, which provides 45 percent of the gasoline for the entire East Coast of the United States through 5,500 miles of …

    Read more

Previous Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle