• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Data Is Streaming Into The Cloud, Including From IBM i

    November 14, 2022 Alex Woodie

    We are in the midst of a vast migration of data into public clouds, as companies seek to leverage technological innovation occurring in the cloud for competitive advantage. While there are no IBM i runtimes in the public cloud yet, IBM i shops are still getting value by moving their valuable Db2 for i data into the cloud, often using streaming technologies and tools like Apache Kafka and Apache Camel, as well as an updated ETL offering from IBM.

    It is tough to understate the magnitude of the transition to the public cloud is having on the $4 trillion IT …

    Read more
  • Kyndryl Wants to Connect Your IBM i to Microsoft Azure

    October 12, 2022 Alex Woodie

    Kyndryl, the former IBM division known as Global Technology Services (GTS), last week unveiled an expanded partnership with Microsoft that will see it helping IBM i and System z customers integrate their applications and data with Microsoft Azure, specifically its low-code, no-code development platform called Power.

    Kyndryl’s alliance with Microsoft will make it easier for companies to leverage the valuable data and business logic contained in their midrange and mainframe assets as they develop new applications in the Microsoft Power Platform, which is a low-code, no-code development environment.

    “Basically, it provides a low-code, no-code environment in Azure for programmers,” …

    Read more
  • More IBM i Security Flaws Revealed

    July 13, 2022 Alex Woodie

    The summer slowdown might have started in your particular business, but things are just getting warmed up IBM security researchers, who disclosed a series of new vulnerabilities across IBM i products over the past couple of weeks, including IBM i Merlin, WAS Liberty, OpenSSL, the Digital Certificate Manager, and Zlib.

    On June 27, IBM disclosed that the collection of open source and proprietary tools and technology it’s brought together as IBM i Modernization Engine for Lifecycle Integration (Merlin) suffers from no fewer than 16 separate security flaws.

    Among the most series of these flaws is a CVE-2022-22965, a data binding …

    Read more
  • Log4j Hits Heritage Version of Navigator for i – No Patch Coming

    January 12, 2022 Alex Woodie

    IBM i shops running the old version of the Navigator for i client should be aware that the software is vulnerable to the Log4j security vulnerability, and there will be no patch to fix it, IBM says in a new security bulletin. There will, however, be fixes coming to other vulnerable components, including IWS, IAS, and IBM i Access Client Solutions (ACS), IBM says.

    Just before we hit the holiday break, the extremely severe Apache Log4j security vulnerability was disclosed to the world, resulting in a frantic effort to patch servers, desktops, refrigerators – just about anything with a …

    Read more
  • Controlling IBM i Access With Exit Points

    March 29, 2021 Bill Hammond

    Today, the job of managing security on IBM i can be complicated, requiring dynamic technologies and processes that can respond quickly to ever-evolving threats and new regulations. Ransomware and other malware can, and has, infected IBM i systems and effective access control is a major weapon in the battle to secure your IBM i. There are many different approaches and technologies you can use to keep your IBM i secure.

    Using the exit points provided by the IBM i operating system can be a powerful tool to monitor and secure four important levels of access within the IBM i:

    • Networks
    …

    Read more
  • Locking Down Exit Point And IFS Vulnerabilities On IBM i

    March 24, 2021 Pauline Brazil Ayala

    It’s true that the IBM i server is among the most securable servers on the planet. But all too often, customers do not take the time to secure their environments properly. This is particularly true for two of the most oft-neglected components of the IBM i environment: exit points and the IFS.

    IBM introduced exit points with the launch of OS/400 V3R1 way back in 1994. We remember that version well here at Trinity Guard, because soon after that, we developed the industry’s first exit point monitoring software for the AS/400 at PentaSafe, the spiritual predecessor of our company. …

    Read more
  • Why You Need To Implement Exit Point Security – Now

    June 15, 2020 Rich Loeber

    As everyone knows, the only truly secure computer is one that is not networked to any other system or any client, and that has no users doing anything at all on the system. And if you really want to be honest about it, you should probably turn its power off. Then, it would be perfectly secure – and perfectly useless as well.

    To make any system useful, it has to be opened up so it can be reached by the world, and it may be hard to remember this now, three decades after the client/server and Internet revolutions, but there …

    Read more
  • Guru Classic: Tuning SQL Environments On i

    March 4, 2020 Paul Tuohy

    Author’s Note: This article was originally published in November 2015. This was one of the first DB2 for i Services that I used in anger. I have used a lot since.

    One of the frustrating things about being a speaker at conferences is that when you want to attend another session with a topic that piques your interest, it invariably clashes with when you are speaking. But every now and again, the scheduling gods work in your favor. Such was the case when I spoke at the excellent International i-Power 2015 conference at Wyboston Lakes Executive Centre in the UK. …

    Read more
  • IBM Bolsters ACS with Database and Administrative Goodies

    May 15, 2019 Alex Woodie

    Amid the many enhancements that IBM has delivered with IBM i 7.4 and IBM i 7.3 TR6 is a new release of Access Client Solutions (ACS), which has become the go-to client interface that many IBM i professionals use to access the system for a variety of tasks. Database engineers and system administrators are the big winners with this release.

    There’s no denying that IBM delivered a whopper of release with IBM i 7.4 and its sidekick, IBM i 7.3 TR6. There’s been so much news – starting with the availability and security enhancements in Db2 Mirror and Authority Collection …

    Read more
  • Drilling Down Into Db2 Mirror for IBM i

    May 6, 2019 Timothy Prickett Morgan

    We did our initial coverage of the new Db2 Mirror for the IBM i operating system’s integrated database two weeks ago, and now it is time to dig in a little deeper. Elsewhere in this week’s issue of The Four Hundred, we have gotten feedback from the suppliers of high availability clustering and disaster recovery software for the IBM i platform as to how Db2 Mirror compete with as well as complements their wares. And in this story, we will be digging a little deeper into Db2 Mirror itself.

    As we explained, Db2 Mirror creates an active-active database …

    Read more

Previous Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power Systems Did Indeed Grow Revenues Last Year
  • The IBM Power Trap: Three Mistakes That Leave You Stuck
  • Big Blue Decrees Its 2023 IBM Champions
  • As I See It: The Good, the Bad, And The Mistaken
  • IBM i PTF Guide, Volume 25, Number 5
  • N2i Gains Traction Among IBM i Newbies
  • Realizing The Promise Of Cross Platform Development With VS Code
  • 2023 IBM i Predictions, Part 3
  • Four Hundred Monitor, January 25
  • Join The 2023 IBM i Marketplace Survey Webinar Tomorrow

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle