Trends in the Modern, Connected and Secure Z Ecosystem: Ensono’s View
May 16, 2022
Reg Harbeck: Hi. I'm Reg Harbeck and today I'm here with Lisa Dyer, who is the global VP and mainframe line of business leader, and Steven Perva, who is senior mainframe modernization engineer with Ensono. Rather than telling you more about Ensono, let's start by Lisa, if I could ask you, tell us both about […]
Sponsored Content by
Ensono
How to Create a Security Strategy That’s Built to Last
May 15, 2022
More accessible technology, economic and political volatility, and evolving hacking techniques mean that security personnel face different challenges than they did five years ago. Organizations must develop a reliable security strategy to keep up with data security needs. Part of this strategy begins with the security basics: assess your environment, implement end-user education, enforce password […]
Sponsored Content by
Blair Technology Solutions inc.
Filtering IP Addresses With AIX IPSec
May 10, 2022
I want to deny IP address 8.211.1.243 from accessing my AIX system (for inbound connections). The first step is to enable IPSec on the AIX. This example is for ipsec_v4. # smit ipsec4 –> Start/Stop IP Security –> Start IP Security Start IP Security [Now and After Reboot] + Deny All Non_Secure IP Packets [no] […]
ArticlesThe Open Mainframe Project Mentorship Program: The Next Generation of Mainframe Talent
May 10, 2022
“It’s a fantastic thing to know that as a community we have the ability to give back to the broader ecosystem,” says John Mertic, Director of Program Management at the Linux Foundation. For the past six years, Mertic and several other staff have coordinated the Open Mainframe Project Mentorship Program, helping participants learn valuable mainframe […]
ArticlesUse Nginx to Make Web Content Zoom!
May 9, 2022
In this blog from Jesse Gorzinski, learn why nginx might be the biggest hidden gem in the open-source ecosystem
E-BooksKey Considerations for an Effective, Long-Term Security Strategy
May 8, 2022
More accessible technology, economic and political volatility, and evolving hacking techniques mean that security personnel face different challenges than they did five years ago. Organizations must develop a reliable security strategy to keep up with data security needs. Part of this strategy begins with the security basics: assess your environment, implement end-user education, enforce password […]
PodcastsA Look at IBM i 7.5 and Merlin
May 5, 2022
Paul Tuohy: Hi everyone and welcome to another iTalk with Tuohy. Delighted to be joined today by not one person but two people and two of my favorite people to do iTalks with. You can probably guess who they are given the time of year it is and what’s going on this week or in […]
ArticlesRouting Work by User Profile and More Hidden IBM i 7.5 and IBM i 7.4 TR6 Gems
May 3, 2022
IBM has announced IBM i 7.5 and IBM i 7.4 TR6. A new release is a big deal and there are a huge number of great enhancements. Steve Will’s article, Announcing IBM i 7.5, 7.4 TR6, IBM i Merlin, is one of the best places to start for an overall review. You should also listen […]
ArticlesAnnouncing IBM i 7.5, 7.4 TR6, IBM i Merlin
May 3, 2022
IBM has unveiled the next major release of IBM i—7.5—as well as IBM i 7.4 TR6 and a brand new product called Merlin. Get the details in this blog from Steve Will.
VideoMigrating LPARs to the Cloud
April 26, 2022
Today I want to talk about migrating LPARs to the cloud. Where are you on your cloud journey? Have you just begun thinking about it? Are all of your systems currently running in the public cloud? Are you running a proof of concept or some test and development machines in the cloud? Have you decided […]
ArticlesCan IMS Connect to the Outside World?
April 21, 2022
Information Management System (IMS) was developed by IBM, with Rockwell and Caterpillar Inc., starting in 1966 as a bill of materials system for the Apollo space program. It went live in 1968, making it over 50 years old. Like everything else on the mainframe, it has been updated and extended since that time. As you […]
ArticlesIBM, Lenovo, HPE and Huawei Servers Rank as Most Secure Platforms in ITIC Survey
April 20, 2022
IBM, Lenovo, Huawei and Hewlett-Packard enterprise servers ranked as the most secure platforms in an ITIC survey—experiencing the fewest number of successful data breaches
ArticlesTips on the HMC, VIOS, LPAR and More
April 20, 2022
It’s always nice to hear from readers. Even better is when I can confirm that my information is helping techies in the real world. My colleague Eric Hopkins recently put my invscout script to work for one of his clients. Here’s his story: I have a customer who has smartly blocked outbound traffic to the […]
ArticlesThe Importance of Belonging in the Mainframe Community
April 19, 2022
By definition, belonging is a unique, subjective experience that relates to the desire to connect with others—according to American psychologist Carl Rogers. It’s how a person feels supported, respected, heard and valued; how they can feel proud of themselves and the others around them. So, how can the mainframe community make belonging a reality for […]
ArticlesIBM i Next Gen Apps: The Modernization Approach
April 14, 2022
The first cornerstone of IBM i strategy is to provide solution developers with everything they need to be successful. The solution developers we serve include both Independent Software Vendors (ISVs) and the programming teams who create software for specific customers—whether as employees of those customers, or as independent contractors and consultants. Of the thousands of […]
ArticlesMessage Monitors in New Navigator
April 11, 2022
IBM is updating New Navigator (New Nav) on a regular basis and there are a lot of enhancements that have been added over the past few months. This post highlights new functions in Message Monitors. IBM’s documentation on Message Monitors overview has complete details. You find Monitors in as shown in Figure 1: Message Monitor […]
ArticlesHighlights From the 2022 X-Force Threat Intelligence Index
April 8, 2022
The annual X-Force Threat Intelligence Index from IBM Security is always a sobering read, and the 2022 edition is no exception. Here, we highlight some of the key security findings, statistics and trends in the report. Cyberattacks by the Numbers This year’s report outlines that phishing was the most common cause of cyberattacks in 2021. […]
ArticlesBig Things Coming for IBM i in 2022
April 6, 2022
Well, well, well. Back again! It’s been about six months since I published a blog post, and about two years since I worked with the good people at TechChannel. I’m happy to bring the “You and i” blog back “home.” Of course, if I only post once every six months, it won’t mean much … […]
ArticlesIBM Aims for the Hybrid Cloud and Increases Security With the New z16
April 5, 2022
IBM today unveiled the z16 enterprise server, the latest release in its line of IBM Z mainframe systems. The new z16 delivers a slew of embedded, advanced capabilities aimed at hardening security, boosting performance, delivering greater value and cost efficiencies, and making analytics accessible and easy to use for non-data scientists to deliver immediate value. […]
ArticlesLeveraging IBM i and RPG for Web Servicing
April 4, 2022
Another day in the life of a developer as another web service takes to production. Not an extraordinary task but this time the process was smooth sailing. What made it so painless? What led to the decisions of using certain programs over others? In this article I will explain why I chose IBM i as […]
PodcastsSeeing the World Via the Mainframe
April 4, 2022
Reg Harbeck: Hi, I'm Reg Harbeck, and today I'm here with my colleague and co-author Karl-Erik Stenfors, who has been in the mainframe space for a very good long time. Well Karl-Erik, let's start by telling us about how did you end up on the mainframe? Karl-Erik Stenfors: Well, a bit of a point. […]
ArticlesThe Importance of Mainframe Documentation
April 4, 2022
The discovery of Egyptian hieroglyphics was the event that led to the definitions of the formal writing system that was once used in ancient Egypt as part of the native language. Egyptian hieroglyphics had more than 1,000 distinct characters that were used to tell the stories associated with the time. In the same vein, telling […]
PodcastsThe Importance of Refactoring
April 1, 2022
Charlie Guarino: Hi everybody, this is Charlie Guarino. Welcome to another edition of TechTalk SMB. This month I am joined by what I'm going to say is a household legend in our industry: Mr. Ted Holt. He has been in our community for years and years. Ted has worked in the IT industry for over […]
ArticlesSteve Will’s ‘You and i’ Blog Finds New Home on TechChannel
March 31, 2022
TechChannel is pleased to announce that Steve Will, chief architect for IBM i, will be sharing his insights in his popular “You and i” blog series on our website. In his first post in early April, you’ll learn about some exciting things coming up for IBM i. Follow Will’s “You and i” blog series to […]
ArticlesRFE Moves From developerWorks to IBM Ideas
March 28, 2022
IBM now has a company-wide user interface where clients can submit requests for enhancements (RFEs) to any IBM product, and IBM i and RDi just transitioned to that tool in March. For years IBM i and RDi requests have been submitted using the developerWorks RFE tool, where you could vote and comment on these requests for enhancements. For those of you who submitted […]