iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on August 5, 2020

I remember when I first got was introduced to IBM’s FlashCopy backup technology roughly 8 years ago.  An IBM i engineer who started to embrace external storage for small to mid-sized IBM i shops said to me one day, “If we went with SAN storage, we could flash out a full backup of their whole LPAR in less than 15 seconds”.  To which I responded, “Say what?! That doesn’t sound possible! It sounds like some Houdini magic or something”. Being the guy that needs to know how everything works, I

Posted on July 30, 2020

With the push to secure all data traffic to our critical systems, many organizations are moving to secured versions of classic technology. One project we see repeatedly is the switch from insecure FTP to encrypted FTPS. Not to be confused with SFTP, FTPS stands for FTP over SSL/TLS and it is to FTP what HTTPS is to HTTP. Just like secure web pages, FTPS uses a system of certificates to encrypt and secure FTP transfers. If you’re making the switch to FTPS, you may find that you begin to receive

Posted on

I had an interesting but not surprising conversation with a customer last week to talk about IBM i security. They said: “IBM i is just bulletproof. We don’t have to worry about security. That’s the value of IBM i.” It’s something heard all too often. And that’s my cue to tell someone just how ugly their baby is. I’m not going to sugar coat it because the stakes are far too high. Once again, IBM i is highly securable. Perhaps more than any other operating system ever created. It is

Posted on

When managing your IBM i environment, is time on your side? Do you still manually maintain the system clock on your IBM i system and occasionally adjust it to exactly the right time and/or still manually correct it in the Spring/Fall when we roll the clocks forward/backward?  Well, read on, and we’ll tell you how to configure the system to automatically do that for you so you can put your system’s clock management on full autopilot. Your IBM i operating system includes built-in support for the industry-standard NTP (Network Time

Posted on

Object ownership is very important on IBM i, as often group profiles are used to secure objects, and sometimes programs are compiled to run under the authority of the profile that owns the program. There are times when a decision is made to change the owner of a particular library in order to change the scheme of securing objects, or you may go to restore a library to another system, and realize that the profile that owned the objects on the original system, does not exist on the target system

In Archive