Day: March 23, 2020

Tracking The Source of a Bad Password

We had a customer recently who had someone locking out a service account on IBM i. This service account ran their BI dashboard. The question was asked: “how can we find out who did this?”

Using the audit journal, we have the ability to find out where the bad password requests came from. When you narrow down the where, the who becomes much easier to figure out.

If you are auditing your security events (which you should be) then you can do the following steps. You’ll need your QAUDLVL system value to include *AUTFAIL and *SECURITY. If you don’t audit security events, check this IBM technote to start doing so:…

ProtecTIER Backup Migration Made Easy

Effective with IBM’s announcement in 2018 for the withdrawal from marketing of their ProtecTIER hardware and software products and their intention to announce the “End of Support” for ProtecTIER products to be effective in November 2020, those IBM customers that are utilizing the IBM ProtecTIER products will need to have a plan for moving off the ProtecTIER appliance before the end of this year.

The following ProtecTIER hardware and software products were affected by that announcement:


  • ProtecTIER TS7650G: 3958-DD4, 3958-DD5, and 3958-DD6
  • ProtecTIER TS7620: 3959-SM2 and 3959-EXP
  • ProtecTIER software versions 3.3.x and 3.4.x

iTech Solutions has a lot of experience with the Virtual Tape Library (VTL) environment and we would recommend that current customers of the IBM ProtecTIER products consider the Cybernetics suite of VTL products as a replacement for their environments.…

The Effects of COVID-19 on the IBM i Ecosystem

This article was originally written for and published on MC Press Online. The original article can be found here.

With supply chain uncertainty, it makes sense to not delay your 2020 purchase of POWER9 and storage.

The new COVID-19 virus is making its way around the globe. In response, governments are issuing travel embargoes, companies are ordering staff to work from home if possible, and people are stocking up on groceries, fuel, and water.

IBM has recently requested its workers in China, Japan, South Korea, and Italy work from home and has designed contingency plans for employees elsewhere (the details of those plans were unavailable at the time of writing this article). Participation at conferences, meetings, and trade shows will be evaluated on an individual basis. Company travel is restricted to some locations, and just recently IBM cancelled its in-person participation at the RSA cyber security conference in San Francisco from February 24–28, along with other tech giants like AT&T and Verizon. There are no stated plans for IBM to scale down participation for other conferences. My guess is they’re in a wait-and-see mode like most companies: reduce risk as events unfold.…

Pete’s Perspective – Open Source

This article was originally written and posted within  2020 February COMMON Connect. The original article can be found here.

Open Source?

Yeah, I put a question mark at the end.  Most times when people think of Open Source, they are thinking Python, PHP, Java, Swift, Ruby, C# and JavaScript to name a few.  Most people don’t associate Open Source with systems management or operating systems.  In fact, most people don’t even think that open source is ready for enterprise corporate programming.  When open source started taking off, about 30 years ago, I could see the potential, but I was concerned if people would be willing to move it into production.  Would it remain in the labs, colleges, and with the programming underworld, or would it ever be able to see the light of day?  Many years have passed, and I think we are finally seeing over the past 10 years more and more companies embracing open source.  As they should.…