Day: October 28, 2020

October 2020 Newsletter

This newsletter includes:

October has been a busy month. Between installs, upgrades, PTFs, managed services, and creating new educational sessions, the staff at iTech has been burning the candle on many ends.

We had our iAdmin Fall IBM i System Administration conference last Tuesday and Wednesday, October 20th and 21st.  With 851 people attending the conference from 48 US states and 56 different countries, we were well represented from all over the globe. That is a lot of IBM i people together for 2 virtual days of conferences.…

Making the Case to Keep Your IBM i

A good CIO will take a hard look at the status quo to determine if it is still the right decision.  While we love our IBM i and don’t want the CIO to consider migration, it’s part of the job. They need to consider future business needs such as availability, scalability, security, and modernization to keep the budget in good shape.  The good news is these are all things that IBM i is poised to help companies to achieve.

The HelpSystems’ 2020 IBM i Marketplace Survey results indicate that security is on the top of the CIO’s list of concerns.  With the shift to having more remote workers, your systems’ security should be a greater concern.  Security was followed by High Availability/Disaster Recovery, Modernizing Applications, IBM i skills, and Data Growth.  These responses highlight how important IBM i is to the business.…

Reviewing MIMIX IBM i Protection Reports

Reviewing your MIMIX protection reports is very important for your MIMIX HA solution. You may have all your data groups synced and your audit reports are running clean but if you are missing replication on libraries and objects you need then you will have issues if you need to switch.

You can access the protection report through the precisely AUI interface. You will sign-on and look at the Analysis tab and this will show you libraries, directories, and folders status of replication. The goal is to have no libraries or objects that are not in a NONE status.…

Accidental Deletes on External Storage: How Volume Protection can Prevent a Disaster

If you have an IBM SAN (Storwize or FlashSystem family) then you may be familiar with the process of deleting volumes within the storage management GUI. It’s basically as simple as right-clicking on a volume and selecting “delete.” Pretty easy, but as we all know sometimes easy is dangerous. Have you ever considered what would happen if you tried to delete something that might actually be in use? IBM has thought of that, too. The delete process is a one-way trip and there are a couple of checks in place to make sure that you’re paying attention before you commit to something so drastic.…

Important Notice Regarding the Latest POWER9 Model G Firmware

If your POWER9 is one of the new refreshed models (9009-41G, 9009-42G, or 9009-22G), then you may be familiar with the fact that your QPRCFEAT system value does not match the processor feature code as ordered from IBM. This is because—while IBM provided unique feature codes for the different processors in the new model—the actual CPU hardware is identical to the original POWER9 models. Internally, the FSP knows that the chips are the same and reports the actual CPU identifier to the Operating System.

This mismatch has already lead to quite a bit of confusion when ordering license keys for 3rd party applications, as many software vendors use the QPRCFEAT value as part of their key generation algorithm. We have had clients order license keys for their brand new system using the ordered processor feature code (EP51 for example) only to find that the keys don’t work on installation day because the new system is reporting a different code (EP11 in this case).…

Demystifying Quality Assurance Processes as pertains to IBM i Systems and Infrastructure

All components of an IT ecosystem need testing and validation. Any professional, or student in MIS, knows this, of course. What is harder is determining how to approach a given modification and the testing needed in a pragmatic fashion. There is a process that can be applied to most initiatives that consist of planning, analysis of the context, definition of tasks, estimation of effort, and risk mitigation.

When we address what needs to be delivered in a pragmatic sense, the priorities are easy to see. Once we start into a project we can get lost in complexity, engineering principles, etc. In order to make QA/Testing accessible, scalable, and reusable, it is best to drill down the process into checklists for procedures. Every organization has someone who knows what they need the system to do – from an admin who gets how to connect the ports, to the AP person who can process a check before we say “deposit”, to an EDI coordinator who knows the JIT threshold. Determining the best way to test usually involves understanding the actual job we need to accomplish and taking the time to break into steps where failure can be determined.…

iAdmin After Party: Live Q&A

iAdmin After Party Live Q&A
Originally recorded on Friday, November 6th

Whether you joined us for iAdmin and would like more questions answered, or you missed the event  — this is your chance to join us for one last iAdmin event. The iAdmin speakers will be there to answer your questions live.

Already have a question? Submit it in the form below when you register.

[ Watch Now ]