iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on August 27, 2020

Below is a table of the major group PTFs for the last few releases. This is what we are installing for our customers on iTech Solutions Quarterly Maintenance program.

Posted on August 26, 2020

I’ve been doing quite a bit of Domino upgrades to 10.0.1 and 11.0.1 recently. What HCL has done in terms of product updates have been outstanding. Their documentation however leaves a lot to be desired. I can’t seem to find any decent documentation for upgrading Domino to 11.0.1. So, I’ve built my own installation instructions for you. First, you’ll have to set your environment variable of DOMINO_INSTALL_TYPE. Most shops I’ve been upgrading are enterprise servers, which is a 2. Use the following command: ADDENVVAR ENVVAR(DOMINO_INSTALL_TYPE) VALUE(2)

Posted on

Deck: Users with *ALLOBJ special authority is a no good, terrible, very bad idea. One cool thing about working for iTech Solutions is the boss doesn’t nickel and dime our team’s education, resources, and technology. We need to practice on new hardware, so we got a POWER9. We need practice with external storage, so we got a V5030. We need to practice on virtual tape libraries, so we got one from Cybernetics. I have a presentation in the Fall called IBM i Security: Perception vs Reality. I needed to test

Posted on

Do you want to know, in real-time, who/what is connecting to the TCP/IP environment on your IBM i?  Need to know how much data is going outbound and coming inbound for any specific TCP/IP connection, and have immediate access to a bunch of other cool IP environment metrics and capabilities and control?  Well, the tool to do so is right at the tip of your fingers, and knowing how to use it is absolutely essential to the effective management of your IBM i’s network connectivity. The NETSTAT command on your

Posted on August 5, 2020

I remember when I first got was introduced to IBM’s FlashCopy backup technology roughly 8 years ago.  An IBM i engineer who started to embrace external storage for small to mid-sized IBM i shops said to me one day, “If we went with SAN storage, we could flash out a full backup of their whole LPAR in less than 15 seconds”.  To which I responded, “Say what?! That doesn’t sound possible! It sounds like some Houdini magic or something”. Being the guy that needs to know how everything works, I

Posted on July 30, 2020

Below is a table of the major group PTFs for the last few releases. This is what we are installing for our customers on iTech Solutions Quarterly Maintenance program.

Posted on

I had an interesting but not surprising conversation with a customer last week to talk about IBM i security. They said: “IBM i is just bulletproof. We don’t have to worry about security. That’s the value of IBM i.” It’s something heard all too often. And that’s my cue to tell someone just how ugly their baby is. I’m not going to sugar coat it because the stakes are far too high. Once again, IBM i is highly securable. Perhaps more than any other operating system ever created. It is

Posted on

When managing your IBM i environment, is time on your side? Do you still manually maintain the system clock on your IBM i system and occasionally adjust it to exactly the right time and/or still manually correct it in the Spring/Fall when we roll the clocks forward/backward?  Well, read on, and we’ll tell you how to configure the system to automatically do that for you so you can put your system’s clock management on full autopilot. Your IBM i operating system includes built-in support for the industry-standard NTP (Network Time

Posted on

Object ownership is very important on IBM i, as often group profiles are used to secure objects, and sometimes programs are compiled to run under the authority of the profile that owns the program. There are times when a decision is made to change the owner of a particular library in order to change the scheme of securing objects, or you may go to restore a library to another system, and realize that the profile that owned the objects on the original system, does not exist on the target system

Posted on June 24, 2020

Run the DSPTAP *LABELS command to *PRINT. To determine how much save/restore data is on a cartridge, add all the file lengths and multiple by (block length less 4096). This gives you how many bytes are written to the tape.

Posted on

The world has a lot for us to disagree about, but if there’s one thing we can get the whole world to agree on, is that passwords are a major pain. Passwords are the necessary mechanism for securing many things, but where passwords are not required and still allow for secure authentication is where everyone would prefer to be. IBM i has had the option for public key authentication for SSH users for a long time now. It allows you to establish SSH connections without having to provide a password.

Posted on

The sweetest things in life are free, right? If you have ever had a complex support case with the IBM i support team in Rochester, they may have instructed you to install the “QMGTOOLS” system utility to gather and also possibly send critical problem-solving information to them to help resolve your system’s issue.  The “MG” in “QMGTOOLS” stands for “Must Gather” as the genesis of the tool was a requirement to package a bunch of commands that collect information that “must be gathered” to resolve certain kinds of support issues. 

In Archive