• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM i PTF Guide, Volume 25, Number 10

    March 13, 2023 Doug Bidwell

    Here is what is new this week: Fixes. To be specific: Long Term Support release: 9.2.0.10 client install image for IBM MQ on IBM i release level: 9.2.0.10-IBM-MQC-IBM_i. IBM MQ is also known as WebSphere MQ also known as MQ Series, and it is the message queuing middleware that Big Blue has been selling since 1993. Yup, that is 30 years ago, and this tool is one of the foundations of the microservices movement. It is Kafka-esque. Or, more precisely, Kafka is MQ-esque.

    Anyway, here is the rundown of PTF Groups by IBM i release level since we last …

    Read more
  • Original Refocuses on IBM i Test Automation

    May 1, 2019 Alex Woodie

    Original Software never left the IBM i software market, though it might have seemed that way to some people. But thanks to a new website devoted to exploring issues, challenges, and solutions on the topic of IBM i test automation, the British software company is redoubling its efforts around the midrange platform.

    “We really never un-engaged with it, to be fair,” says Original Software COO George Wilson says of IBM i. “We’ve kind of widened the radar a bit. That was probably 15 years ago. We didn’t want to limit ourselves to the IBM midrange marketplace. What we’ve just done …

    Read more
  • IBM Patches ‘ROBOT’ Flaw in IBM i Crypto Library

    February 21, 2018 Alex Woodie

    IBM has issued patches to fix a serious security problem in the IBM Global Security Kit, or GSKit, a relatively obscure crypto package that implements SSL/TLS encryption algorithms across a variety of IBM products, including IBM i. An old flaw in the underlying RSA crypto algorithm that could let hackers decrypt data in a “side channel” attack has resurfaced under a new moniker: “ROBOT.”

    GSKit is an IBM toolkit that implements various encryption-related functions, including symmetric and asymmetric ciphers, random number generation, hashing algorithms, and encryption key management capabilities, for products that need over-the-wire encryption, including IBM i, Linux, and …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle