iTech Solutions - for all of your IBM i System needs

iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on February 26, 2019

Manually Moving the PCI Fiber Channel Adapter/IOA from Partition B to Partition A Note:  Not shown in this process/steps,  you will need to check and vary off, if needed, the resource using the physical adapter on Partition B, (i.e., tape

Posted on January 23, 2019

In an IBM i environment, you can view the port numbers currently in use on your system with one of these methods.  In these examples, looking for use of local ports 8000 and 8001: Select from the iSeries Navigator, select >

Posted on

With 2019 upon us, it’s natural for one to wonder what’s in store for IBM i in the upcoming year. According to iTech President, Pete Massiello, the outlook for IBM i is looking good for this year. How good? “2019

Posted on

Sure you can use ANZDFTPWD (Analyze Default Passwords) to get a list of IBM i users with default passwords. You can also use some simple SQL in conjunction with the USER_INFO IBM i service in QSYS2 to do the same

Posted on

When using Service Tools, the Select Time Frame screen of the Service Action Log (SAL) option of the Hardware Service Manager (HSM) service tool incorrectly does not allow “From” or “To” dates with the year 2019 or 2020. The SAL

Posted on December 12, 2018

Just a few more days to shop, to work, and to wait for Christmas. I thought I would share a little story about how iTech Solutions helped Santa prepare for Christmas this year. As many of our readers remember, Santa

Posted on November 20, 2018

WRKPRBHave you ever seen on your system in WRKPRB: “Software problem data for QYCDCUSG has been logged.”? Normally this indicates an expired server certificate or an expired Certificate Authority certificate. You should take the following steps to correct the problem:

Posted on November 19, 2018

IBM i on IBM Power Servers is the best server platform in the universe. It is reliable, stable and provides all the tools needed to effectively operate and manage your mission-critical applications.  Most of us on the platform fully agree. 

Posted on October 25, 2018

There are two ways of using this UAK management feature: Manual: A system administrator can manually kick off the process of checking UAK’s expiration date, downloading UAK, and applying UAK. This is accomplished by running the WRKSRVAGT TYPE(*UAK) command. This

Posted on August 29, 2018

If you start have SSH/SFTP/SCP connections to fail with error messages in regards to not matching ciphers, that were working, then stopped working, then this is most likely due to: the partner SSH server or client on the connection is

New call-to-action

Archives