More Power to You: A Closer Look at the Power10 E1080 Server
September 13, 2021
On September 8, 2021 IBM announced the first server in the Power10 range—the E1080 with an order number of 9080-HEX. The general availability (GA) date for the system is September 17, 2021, and this system is the next generation of POWER servers. Hardware Technology The E1080 is similar to the E980 in that it uses […]
ArticlesLiam Allan Expands Development Accessibility With the Code for IBM i Extension
September 13, 2021
Sometimes the best way to create new technology is to continue using standards that have already been proven successful, while simultaneously making them more accessible. This was Liam Barry Allan’s thought process when he first started Code for IBM i, an open-source Visual Studio (VS) Code extension for all IBM i development needs. Allan is […]
ArticlesUsing the New SQL HTTP Functions (Part 1 of 2)
September 8, 2021
As I’ve mentioned in past ramblings, IBM’s investment in open source extends into some of the core components of the operating system. The rich catalog of IBM i Services (sometimes called “SQL Services”) is a fantastic illustration of this concept. The data queue services, for instance, provide an integration point between database activity and Apache Camel. The JSON […]
ArticlesIBM Delivers a Frictionless Hybrid Cloud Experience With the New Power10-Equipped E1080 Server
September 8, 2021
Today, IBM announced the new IBM Power E1080 server—the first in a new family of servers based on the new IBM Power10 processor. With the Power10-equipped E1080 server, IBM is providing clients with a frictionless hybrid cloud experience across their entire IT infrastructure. The Power E1080 server is built around the revolutionary IBM Power10 processor. […]
ArticlesDitch DSPLOG—History Log Info Is Superior
September 7, 2021
The history log is a great repository of messages on your IBM i partition; all messages sent to QSYSOPR, QSYSMSG and QCFGMSGQ are also sent to the history log. There are many functions that log additional messages to the history log, although they may not send those messages to the system operator message queue. Mining […]
How Can We Create Psychologically Safe Workspaces?
September 3, 2021
The pandemic has increased our mask usage in more ways than one. In addition to the face coverings we’ve grown used to seeing in our daily lives, as the boundaries between our professional and personal lives grow more and more blurry, many have taken to masking more of their identities in the workplace. In the […]
ArticlesInstalling an ifix With AIX Live Update
September 1, 2021
Chris Gibson explains how to install an AIX security ifix without a reboot
ArticlesKubernetes Container Security Best Practices With Red Hat Advanced Cluster Security for Kubernetes
August 30, 2021
As we work with organizations who are adopting containers as part of their software development strategy, we have seen container security become a challenge for many, and at times an aftersight. This is not on purpose, but primarily a result of the vast differences between the new technology of containers versus the virtualization model many […]
ArticlesThe Power of Metadata in the IBM i OS: Part 1
August 27, 2021
Developers who work in the IBM i environment may or may not be familiar with the term “metadata.” Metadata can be defined as “data about data.” Metadata has existed within the IBM i OS since the historic days of the System/38, when an integrated Relational Database was introduced. Consider the commands DSPFD and DSPFFD, both […]
ArticlesEvil Mainframe Brings Ethical Hacking to the Forefront
August 26, 2021
When it comes to hacking, there are courses that can teach you to break past the security of almost anything. However, learning how to hack a mainframe usually isn’t one of them. That’s why Chad Rikansrud and Phil Young created Evil Mainframe, the first mainframe penetration testing class. “The IT world at large has benefited […]