• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Kisco Locks Down IBM i Report Distribution

    October 28, 2020 Alex Woodie

    Users will gain more control over how their IBM i spool files are distributed and displayed, with a new release of WebReport/i, which is Kisco Information Systems’ spool file utility automatically reformatting and distributing spool files.

    WebReport/i can reformat IBM i spool files in a variety of different ways. It can change them into HTML, RTF, PDF, XLS, XLSX, TIF or CSV formats, and it can also distribute them via HTTP, FTP, email, Google Drive, Dropbox, and even fax.

    With Release 14, which was unveiled earlier this month, Kisco has shored up the security of the product. Specifically, when posting …

    Read more
  • Network Security: Don’t Trust And Verify

    October 21, 2020 Rich Loeber

    When your system is connected to a network, you cannot always guarantee the integrity of the person at the far end of a network connection. If your system is connected to the Internet, ethics go out the window altogether. You have to assume that the person at the far end is a bad guy, then proceed from there. With this tip, we’ll outline an approach to this problem that may help you to focus in on how to deal with the bad guys wherever they may be.

    Internet bad guys generally fall into two categories, sneaks and bullies. The bullies …

    Read more
  • Kisco Extends Two Factor Authentication To Green Screens

    July 27, 2020 Alex Woodie

    Companies that still rely on 5250 greenscreens to get work done can now lock down those sessions with a new two-factor authentication feature recently delivered in Kisco Information Systems’ i2Pass offering. The New York company is also giving customers of its iEventMonitor solution new capabilities to automatically respond to error messages in a remote fashion.

    Green screens, if you haven’t noticed, are not going away. Despite the ubiquity of Web and mobile interfaces for new development, there’s a large number of applications that require users to log into a 5250 terminal emulation session to get the job done. For companies …

    Read more
  • Why You Need To Implement Exit Point Security – Now

    June 15, 2020 Rich Loeber

    As everyone knows, the only truly secure computer is one that is not networked to any other system or any client, and that has no users doing anything at all on the system. And if you really want to be honest about it, you should probably turn its power off. Then, it would be perfectly secure – and perfectly useless as well.

    To make any system useful, it has to be opened up so it can be reached by the world, and it may be hard to remember this now, three decades after the client/server and Internet revolutions, but there …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i 7.3 TR12: The Non-TR Tech Refresh
  • IBM i Integration Elevates Operational Query and Analytics
  • Simplified IBM i Stack Bundling Ahead Of Subscription Pricing
  • More Price Hikes From IBM, Now For High End Storage
  • Big Blue Readies Power10 And IBM i 7.5 Training for Partners
  • IBM Delivers More Out-of-the-Box Security with IBM i 7.5
  • Groundhog Day For Malware
  • IBM i Community Reacts to IBM i 7.5
  • Four Hundred Monitor, May 11
  • IBM i PTF Guide, Volume 24, Number 19

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle