iTech Solutions - for all of your IBM i System needs

iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on October 25, 2018

There are two ways of using this UAK management feature: Manual: A system administrator can manually kick off the process of checking UAK’s expiration date, downloading UAK, and applying UAK. This is accomplished by running the WRKSRVAGT TYPE(*UAK) command. This

Posted on October 24, 2018

Last week I had a customer with a downed POWER5 system due to hardware failure. The situation: The system bezel said that it couldn’t find the disk drives which could’ve been a number of failing parts. This system had a

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs

Posted on

People are always asking me how often they should be performing PTF maintenance, and when is the right time to upgrade their operating system. I updated this article from last month with the current levels of PTFs. Let’s look at

Posted on October 12, 2018

If you’re looking to make improvements to your IBM i security, then you need to be able to get your whole team on the same page, which sometimes can mean common oppositions. But, does your team know the scary truth

Posted on October 5, 2018

A Word from iTech Solutions President, Pete Massiello. Greetings Mike As Halloween is approaching us, and we are thinking of scary things, trick or treats, and grave yards, I thought that would be the perfect way to start my article.

Archives