iTech Solutions - for all of your IBM i System needs

iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

6 Steps to Execute an IBM i Security Project
Posted on November 26, 2018

Regulations (FISMA, HIPPA, SOX, and more) are forcing companies to evaluate how they protect their sensitive data. Industries such as finance, insurance, and healthcare have the most pressure to comply with these regulations which are geared towards protecting consumers private information. 

Posted on November 20, 2018

People are always asking me how often they should be performing PTF maintenance, and when is the right time to upgrade their operating system. I updated this article from last month with the current levels of PTFs. Let’s look at

Posted on

WRKPRBHave you ever seen on your system in WRKPRB: “Software problem data for QYCDCUSG has been logged.”? Normally this indicates an expired server certificate or an expired Certificate Authority certificate. You should take the following steps to correct the problem:

Posted on

As I wrap up my Managed Services series for 2018 and prepare for 2019, I want to end by talking about system health. A common misperception about MSP is that all the hardware being used by our customers is hosted.

Posted on November 19, 2018

IBM i on IBM Power Servers is the best server platform in the universe. It is reliable, stable and provides all the tools needed to effectively operate and manage your mission-critical applications.  Most of us on the platform fully agree. 

Posted on November 5, 2018

A Word from iTech Solutions President, Pete Massiello. Greetings Mike As Halloween is approaching us, and we are thinking of scary things, trick or treats, and grave yards, I thought that would be the perfect way to start my article.

Posted on October 25, 2018

There are two ways of using this UAK management feature: Manual: A system administrator can manually kick off the process of checking UAK’s expiration date, downloading UAK, and applying UAK. This is accomplished by running the WRKSRVAGT TYPE(*UAK) command. This

Posted on October 24, 2018

Last week I had a customer with a downed POWER5 system due to hardware failure. The situation: The system bezel said that it couldn’t find the disk drives which could’ve been a number of failing parts. This system had a

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs

Posted on

People are always asking me how often they should be performing PTF maintenance, and when is the right time to upgrade their operating system. I updated this article from last month with the current levels of PTFs. Let’s look at