Updating Old Firmware with the OpenBMC Tool
April 23, 2019
Learn how to update old firmware with OpenBMC, along with the tool's basic commands and functionality.
ArticlesAnnouncing IBM i 7.4 and Db2 Mirror for i
April 23, 2019
IBM has announced IBM i 7.4, and a new licensed program product called IBM Db2 Mirror for i.
ArticlesMachine Learning on AIX
April 16, 2019
If you believe that machine learning is strictly for Linux, check out this IBM tutorial on installing and configuring Python machine learning packages on AIX.
ArticlesPrestart Server Jobs and Exit Programs
April 10, 2019
Securing IBM i is essential and it’s important to understand how to control access to your system with prestart server jobs
ArticlesAn Introduction to Problem Analysis
April 9, 2019
The IBM Knowledge Center has a number of documents on problem analysis for AIX, Linux and more.
Choosing the Proper Level for Managing VIOS with NIM
April 2, 2019
This blog contains several links to helpful documents related to managing VIOS with NIM.
ArticlesHow to Send Text Messages From IBM i
April 1, 2019
Communication is often done via email, but a text message can do the trick, too. In fact, you probably already have the tools you need to send a text message installed on your IBM i
ArticlesUse DATA-INTO for Processing Data With RPG
April 1, 2019
XML-INTO helped me with processing XML data, but now I’m being asked to process JSON, CSVs and other types of data. Can RPG help me to do this?
ArticlesData Cleansing is Critical to Business Success
April 1, 2019
Regardless of their size, businesses are increasingly reliant on data analytics to maximize profit and efficiency. But with so much data now available through all sorts of technical applications, how does a business know which numbers to trust? And what happens if a number is off by a decimal point, or a piece of information […]
ArticlesStreamline Regulatory Compliance With a Hybrid Cloud
April 1, 2019
In today’s business climate, just delivering goods and services to customers is no longer enough. Amid an ongoing stream of security breaches, countries, regions and industries around the globe have established regulations governing data protection—data privacy and data security. As a result, enterprises need to demonstrate and maintain compliance around egulations such as the European […]