Top Stories and Breaking News
(Mouse over headlines to see story abstracts)
Featured Product: VISION SOLUTIONS
The Undisputed Leader in IBM i
HA Saves the Day--Read How
When your business faces the perils
of downtime and data loss,
MIMIX Availability swoops in
with protection and recovery
that is second to none!
Meets strict RPO and RTO
Scales from SMB to Enterprise
Easy to monitor and manage
December 31, 2016: Volume 18, Number 53|
December 24, 2016: Volume 18, Number 52
December 17, 2016: Volume 18, Number 51
December 10, 2016: Volume 18, Number 50
December 3, 2016: Volume 18, Number 49
November 26, 2016: Volume 18, Number 48
Copyright © 1996-2016 Guild Companies, Inc. All Rights Reserved.
Guild Companies, Inc., 50 Park Terrace East, Suite 8F, New York, NY 10034
If you can say one thing about the AS/400 through IBM i community, it is one that demonstrates the longevity of ideas that are ahead of their time. IT Jungle, which has been publishing since July 2001, is one of the whippersnappers in this market, although The Four Hundred in various forms has been publishing since July 1989. And still, we are young.
With another year almost in the books for the IBM i community, we thought it was time to reminisce on the top stories of 2016. Security vulnerabilities, hacked AS/400s, blockbuster acquisitions, new releases of the operating system, and major conferences all garnered their share of digital ink. Here's a rundown on the top IBM i-related stories making news this year.
Legacy applications tend to outlive the predictions of their imminent demise. The trouble they cause can be costly, though, as maintenance and vanishing skills for out-of-date programming languages are problems. Modernizing applications remains a priority in many IBM midrange shops, where reuse of existing IBM i 5250 screens and RPG (and COBOL) code is being closely examined. Tools like Accelerator from Surround Technologies and Newlook from Looksoftware are getting attention, too.
IBM i shops that find it difficult to track the state of their backups across IBM and non IBM platforms may want to check out the latest product news from Rocket Software. Last week the company announced that its Servergraph Professional product now supports IBM i, thereby enabling customers to view BRMS backup status alongside that of other backup tools, like NetBackup and TSM.
We made it through 2106, and 2017 is upon us. May the new year bring you and your loved ones peace, joy, and love. Let's end 2016 with some of the comments you've sent my way in response to the tips and articles we've sent your way.
I'm trying to use a SELECT/INTO embedded SQL statement in an RPG program that accesses a table that includes a BLOB(20K) column. The INTO target is an externally defined data structure based on the table. However, I get compiler errors unless I remove the BLOB column from the table. What's up with that?
In an earlier tip, I began a series on how I do things using RDi that some people seem to prefer doing in PDM. In that first tip, I talked about various ways to copy a source member. In this tip, I'll talk about compiling with RDi.
There is, we think, a bit of a resurgence in the IBM i community when it comes to software change management tools, which have always been one of the workhorse pillars of the vendor community and one of the key functions that need to be automated in the datacenter.
Starting next month, a broad swath of IBM i professionals along the eastern seaboard will have their very own local user group (LUG) to call home. Dubbed the Mid-Atlantic Group of IBM i Collaborators, or MAGIC, the group hopes to create a sense of IBM i community across a large region of the country where visible support for the platform was lagging.
IBM i storage strategy remains heavily dependent on tape. Even beyond the IBM midrange, around 75 percent of all data is stored on tape. Old habits die hard, even when alternatives become easier and less expensive to manage. A good example is the Universal Backup Device designed by LaserVault. In its original form, it's an IBM i backup appliance that appears as a tape device. Now it works in VM environments as well.
Last week, an email from Computer Economics advised me of an updated report on IT spending and staffing. CE has cranked out these reports on an annual basis for many years, which is useful for long-term comparisons. These days, however, the short-term comparisons are almost microscopic. There are times when it is wise to expect the unexpected, but this isn't one of them.
The IBM i operating system is proprietary; its Licensed Internal Code (LIC) is private, and good luck getting into the innards of DB2 for i. But for all the top-secret code running in an IBM i server, there's a surprising amount of open source technology available for the platform, too. Here are the top seven open source products every IBM i shop should have, or at least be aware of.
We are coming into the home stretch for the Power Systems and IBM i business here in 2016, and there are still some things going on that we need to tell you that Big Blue is up to with the product line. We have discovered that IBM is giving away certain licensed program products for the IBM i operating system for free, and that it is also mothballing a bunch of peripherals starting next year.
As we prepare to step onto the IBM midrange escalator to 2017, one of the areas of high interest is disaster recovery and high availability. Maxava, one of the leading vendors in those fields, added subscription-based, multi-platform systems monitoring to its feature set in early 2016 and as the year winds down it is expanding its managed service provider (MSP) business to take its software to a more localized level.
The IBM i server is unlike any other computer system on the planet, with unique architectural elements like single level storage and TIMI that simplify programming and boost security. But the 64-bit RISC server also has unique performance characteristics, especially compared to its X64 brethren. To ensure long-term success with the platform, it's critical to maximize performance.
Why work hard to find a back door when you can go through the front door? This is the gist of the enlightened hacker mind, which understands there is an excess of user profiles equipped with administrative privileges floating around most shops. Now new software from Townsend Security can detangle the complexity of authority levels and give intelligent SIEM tools the data they need to keep hackers out of IBM i.