Latest Blog Post

Joseph Gulla

JOSEPH GULLA | IT Trendz | RSS

ECC Conference: To Improve Education in Large Systems

This is the first of three posts on the Enterprise Computing Community (ECC) Conference that I attended June 14 to 16  in the mid-Hudson Valley of New York at Marist College. In this first post, I explain the ECC—its beginnings, focus and the structure of the conference that was the group’s seventh annual national event.

Michael AM Felt

MICHAEL AM FELT | SecuringAIX | RSS

Updating to the Latest AIX Technology Level

How about an update on the latest Technology Level on AIX? Why bother updating to the latest TL? Well, hopefully you’re already using aixpert for your basic hardening. If you’re not, I recommend using -- as a starting point -- the CIS benchmark for AIX 6.1 or 7.1. 

Dawn May

DAWN MAY | i Can | RSS

Introduction to IBM i System Limits and Maximum Capacities

We all know that IBM i is a very scalable platform. It supports businesses from the very small to the very large. However, as the workload running on an IBM i partition increases and becomes large, knowing the limits of your system becomes increasingly important.

Jon Paris and Susan Gantner

JON PARIS AND SUSAN GANTNER | iDevelop | RSS

3 RDi Gotchas

Readers of our blog know that we're both users and big fans of RDi. Every now and then, we're surprised by something about our favorite development tool. Sometimes they are good surprises, sometimes not so good and sometimes just baffling. This week we thought we'd fill readers in on some of the surprises we've run into recently in hopes it may help keep some others from being similarly confused. We have itmes in all three categories to talk about.

Steve Will

STEVE WILL | You and i | RSS

Sometimes Silence Is a Good Sign

Well, hello, readers! My friendly neighborhood editor reminded me that I have not published something in this blog for, oh, 30 or 40 years, and perhaps it was time to write something about IBM i.

Troy Coleman

TROY COLEMAN | DB2utor | RSS

More on Safe Access Path Changes

Last week I discussed some parameters that are designed to prevent poor access path changes following a REBIND. As a follow-up, I want to tell you about another new feature introduced in DB2 11 that allows you to not only see current access paths, but determine if a new REBIND will introduce a poor access path change.

Rob McNelly

ROB MCNELLY | AIXchange | RSS

A Message Worth Repeating

I needed a bigger vehicle. Given my work with Boy Scouts, I spend considerable time on the road, hauling boys and their camping gear.

I wanted something big enough to comfortably contain eight or nine people and capably transport a trailer of supplies. I also wanted something that was reliable, well-maintained and a good value. I knew it'd take some time. Decently priced used vehicles like that don't become available every day, and they typically sell within hours of being advertised. But after a few months of searching craigslist, I found a Chevy Suburban that fit my needs and requirements.

IBM Systems Magazine Subscribe Box

Search Companies



Search Products