iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on April 12, 2017

This newsletter includes: IBM i 7.1 End of Life Ensuring that your IBM i isn’t Vulnerable to Attacks Saving and Restoring External Stored Procedures Jump Start Performance with DB2 Symmetric Multiprocessing Release levels and PTFs Well it seems like it is speaking time, all the conferences are upon us and we have people speaking at all the major conferences. You can see in the events section where we will be over the next 2 months, and we hope to see you there.  If you stop by our booth, ask for an

Posted on April 4, 2017

If you believe your IBM i is 100% secure from attacks both inside and outside the firewall, then you are probably at risk. Many companies are under a false sense of security that their data is safe just because it resides on IBM i. A good IBM i administrator should be able to demonstrate that their systems are being proactively assessed and interrogated to minimize the risk of security vulnerabilities. Regardless of architecture, no system is 100% secure. However, when security is viewed as an operating strategy rather than a

In Archive