IBM Systems Magazine Blogs

Advertisement

IBM Systems Magazine Subscribe Box

2017 Solutions Edition

A Comprehensive Online Buyer's Guide to Solutions, Services and Education.

Advertisement

IT Trendz

JOSEPH GULLA
Trend Watch: Security

This is the sixth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis by looking at the interesting and complex topic of security.


SecuringAIX

MICHAEL AM FELT
AIX and NTP

By default AIX uses NTPv3. This probably works fine for an internal-only situation (I hope), but for a server that also talks with the "outside," I recall that NTP shows up fairly frequently in CVE messages.


Open Your i

JESSE GORZINSKI
One Small Program, Two Powerful Messages

To further explain the value of open source, I wanted to highlight a small, open-source Python program. It shows active connections, much like the “netstat” command on other platforms. In all, the program and its implementation are both pretty simple.


i Can

DAWN MAY
PowerVM LinkedIn Group

One of the challenges with IBM i on IBM Power Systems is simply knowing everything you need to know. It’s what you don’t know that can get you into trouble! This blog generally focuses on IBM i information.


iDevelop

JON PARIS AND SUSAN GANTNER
Check Out the Latest in RDi

In the previous blog we discussed the latest RPG enhancements.  Today we will briefly review the latest RDi enhancements. RDi doesn't typically follow the same announcement schedule as IBM i and as of late has started "sneaking" enhancements into fix packs. The latest of these, which take the product to version 9.5.1.1, includes the foundations for what promises to be a really interesting and useful feature for RPGers: Refactoring.


You and i

STEVE WILL
IBM i & RFE – Improving Future Business Value

For many years, IBM has used several methods to get customer input on the direction of the platform that has grown into today’s IBM i. The COMMON organizations in North America and Europe have been instrumental over the past two decades in providing processes for their members to submit requirements for new function to IBM, and those two organizations use their Advisory Councils (CAAC and CEAC) to advocate for the requirements that come from their members. Similarly, the Large Users Group submits requirements to IBM related to IBM i.  These requirement sources, and the groups that help us work with them, have been invaluable as we’ve jointly worked to ensure that IBM i satisfies the needs of our users.


DB2utor

TROY COLEMAN
DB2 12 Pending Column Alterations

Prior to DB2 12 function level V12R1M500, altering column attributes such as data type, precision, scale or length would occur instantly.


AIXchange

ROB MCNELLY
HA and DR Overview

What are the different high availability (HA) and disaster recovery (DR) solutions are available for Power Systems? What are the pros and cons of these different solutions?