Top Stories

POWER > BUSINESS STRATEGY > POWER8

Migrating to POWER8 Systems

POWER > BUSINESS STRATEGY > POWER8

Coverage of IBM's OpenPOWERSummit Announcements

POWER > BUSINESS STRATEGY > POWER8

PowerHA for SMB

POWER > BUSINESS STRATEGY > POWER8

New Severs Designed for Smaller Environments

Latest Blog Post

Joseph Gulla

JOSEPH GULLA | IT Trendz | RSS

Trend Watch: Open-Source Software

This is the fifth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis of trends, this time looking at open-source software.

Jesse Gorzinski Photo

JESSE GORZINSKI | Open Your i | RSS

One Small Program, Two Powerful Messages

To further explain the value of open source, I wanted to highlight a small, open-source Python program. It shows active connections, much like the “netstat” command on other platforms. In all, the program and its implementation are both pretty simple.

Michael AM Felt

MICHAEL AM FELT | SecuringAIX | RSS

AIX and NTP

By default AIX uses NTPv3. This probably works fine for an internal-only situation (I hope), but for a server that also talks with the "outside," I recall that NTP shows up fairly frequently in CVE messages.

Dawn May

DAWN MAY | i Can | RSS

Copy an Open Spooled File

In the past, you could not copy a spooled file when it was still open; if you attempted the copy, it would fail with CPF3482, “Copy request failed. Spool file &1 is open.”  The spooled file had to be completed before the copy would be allowed.

Jon Paris and Susan Gantner

JON PARIS AND SUSAN GANTNER | iDevelop | RSS

Check Out the Latest in RDi

In the previous blog we discussed the latest RPG enhancements.  Today we will briefly review the latest RDi enhancements. RDi doesn't typically follow the same announcement schedule as IBM i and as of late has started "sneaking" enhancements into fix packs. The latest of these, which take the product to version 9.5.1.1, includes the foundations for what promises to be a really interesting and useful feature for RPGers: Refactoring.

Steve Will

STEVE WILL | You and i | RSS

IBM i & RFE – Improving Future Business Value

For many years, IBM has used several methods to get customer input on the direction of the platform that has grown into today’s IBM i. The COMMON organizations in North America and Europe have been instrumental over the past two decades in providing processes for their members to submit requirements for new function to IBM, and those two organizations use their Advisory Councils (CAAC and CEAC) to advocate for the requirements that come from their members. Similarly, the Large Users Group submits requirements to IBM related to IBM i.  These requirement sources, and the groups that help us work with them, have been invaluable as we’ve jointly worked to ensure that IBM i satisfies the needs of our users.

Troy Coleman

TROY COLEMAN | DB2utor | RSS

Using Installation SYSOPR Authority

These days, most enterprises limit access to sensitive data to only those users who need to see this information to do their jobs. In the meantime, security features have evolved over the past few DB2 releases.

Rob McNelly

ROB MCNELLY | AIXchange | RSS

A POWER9 Roadmap

I want to point you to Jeff Stuecheli's POWER9 presentation from January's AIX Virtual User Group meeting. This information doesn't involve specific announcements or new models, but it provides an informative look the capabilities of the chip itself.

IBM Systems Magazine Subscribe Box

2017 Solutions Edition

A Comprehensive Online Buyer's Guide to Solutions, Services and Education.