• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • New Nav for i Brings New Stuff to You

    May 25, 2022 Alex Woodie

    With the recent launch of IBM i 7.5, IBM added several compelling new features to “New Nav,” the new version of IBM Navigator for i that debuted less than a year ago. Among the goodies that all you IBM i admins out there will get are support for the audit journal, integration with Content Manager OnDemand for i, and updates to Performance Data Investigator, among other additions.

    IBM launched a remake of IBM Navigator for i with last September’s Technology Refresh for 7.3 and 7.4. The company rewrote Navigator from the ground up in Angular, a JavaScript framework for building …

    Read more
  • Guru: IBM i Unauthenticated Access

    April 25, 2022 Bruce Bading

    One of the greatest threats to any network, host, or server is unauthenticated access where an attacker can gain local or remote access with no credentials that can lead to a Critical rating with the following descriptions (CVSS v3.1 User Guide (first.org).

    Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)

    Integrity Impact Complete (There is a total compromise of system integrity, and a complete loss of system protection resulting in the entire system being compromised.)

    Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render …

    Read more
  • Controlling IBM i Access With Exit Points

    March 29, 2021 Bill Hammond

    Today, the job of managing security on IBM i can be complicated, requiring dynamic technologies and processes that can respond quickly to ever-evolving threats and new regulations. Ransomware and other malware can, and has, infected IBM i systems and effective access control is a major weapon in the battle to secure your IBM i. There are many different approaches and technologies you can use to keep your IBM i secure.

    Using the exit points provided by the IBM i operating system can be a powerful tool to monitor and secure four important levels of access within the IBM i:

    • Networks
    …

    Read more
  • Db2 And SQL Services Get Upgrades With TRs

    October 12, 2020 Alex Woodie

    Among the biggest enhancements that IBM is bringing to IBM i with the latest batch of Technology Refreshes are new capabilities added to the integrated Db2 database and, specifically, the slew of SQL-based services that retrieve all types of data from the platform for IBM i professionals.

    As we previously told you, IBM has decided to rename SQL Services, which were the collection of pre-defined SQL queries that recreate traditional IBM i commands and sometimes bring something entirely new. The growing gaggle of services (or perhaps it’s a herd?) are now being officially referred to as IBM i services, …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23
  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle