• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM i PTF Guide, Volume 25, Number 10

    March 13, 2023 Doug Bidwell

    Here is what is new this week: Fixes. To be specific: Long Term Support release: 9.2.0.10 client install image for IBM MQ on IBM i release level: 9.2.0.10-IBM-MQC-IBM_i. IBM MQ is also known as WebSphere MQ also known as MQ Series, and it is the message queuing middleware that Big Blue has been selling since 1993. Yup, that is 30 years ago, and this tool is one of the foundations of the microservices movement. It is Kafka-esque. Or, more precisely, Kafka is MQ-esque.

    Anyway, here is the rundown of PTF Groups by IBM i release level since we last …

    Read more
  • Original Refocuses on IBM i Test Automation

    May 1, 2019 Alex Woodie

    Original Software never left the IBM i software market, though it might have seemed that way to some people. But thanks to a new website devoted to exploring issues, challenges, and solutions on the topic of IBM i test automation, the British software company is redoubling its efforts around the midrange platform.

    “We really never un-engaged with it, to be fair,” says Original Software COO George Wilson says of IBM i. “We’ve kind of widened the radar a bit. That was probably 15 years ago. We didn’t want to limit ourselves to the IBM midrange marketplace. What we’ve just done …

    Read more
  • IBM Patches ‘ROBOT’ Flaw in IBM i Crypto Library

    February 21, 2018 Alex Woodie

    IBM has issued patches to fix a serious security problem in the IBM Global Security Kit, or GSKit, a relatively obscure crypto package that implements SSL/TLS encryption algorithms across a variety of IBM products, including IBM i. An old flaw in the underlying RSA crypto algorithm that could let hackers decrypt data in a “side channel” attack has resurfaced under a new moniker: “ROBOT.”

    GSKit is an IBM toolkit that implements various encryption-related functions, including symmetric and asymmetric ciphers, random number generation, hashing algorithms, and encryption key management capabilities, for products that need over-the-wire encryption, including IBM i, Linux, and …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Brace Yourself: Another Power Systems Price Hike Coming May 1
  • Updates Announced for IBM i BRMS And SMTP Email Client
  • AI Will Be Front And Center At POWERUp 2026 Next Week
  • IBM i PTF Guide, Volume 28, Number 16
  • Spring IBM i Tech Refreshes Will Come A Bit Later This Year
  • You Are Much More Than Power Systems, And So Are We
  • Startup Seeks The “Golden Path” for IBM i Modernization
  • What Can IBM Do To Make The Future Power S1112 Mini System Compelling?
  • IBM i PTF Guide, Volume 28, Number 15
  • Bob 1.0 Users Bugged By Lack Of One Feature

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle