(877) 224-7768 <>
sales@profoundlogic.com <mailto:sales@profoundlogic.com>

iModernize - The Profound Logic Software Blog

IBM i Pulse: March 18, 2016

Posted by Profound Logic on Mar 18, 2016 2:00:00 PM

pulselogo2.png

Welcome back to your favorite IBM i News roundup. We've been trying out a bi-weekly posting schedule for the past few weeks so we could cover more content for you guys. How are you liking it? Let us know in the comments!

We're starting this edition off with an example of how dangerous a security breach on your i could be....

Verizon Outlines Disturbing AS/400 Breach At Water District
by Alex Woodie

  • Cyber intruders who gained access to an AS/400 at a water district were able to manipulate the flow of chemicals into the public water supply, Verizon says in its latest Data Breach Digest.
  • According to details of the breach, the hacktivists first infiltrated KWC's systems by exploiting known security vulnerabilities in a Web-based payment server application that KWC had set up...
  • Making matters worse, the water district stored login credentials for the AS/400 on that front-end Web server, and the AS/400 was directly connected to the Internet.

Source: http://www.itjungle.com/tfh/tfh031616-story01.html

Steve Will on the Role of the Chief Architect and Gaming Strategy
by Paul Tuohy

  • Paul Tuohy talks to IBM chief architect Steve Will about what exactly a chief architect does and how he does it. 
  • "For example corporation needs from the IBM i business to attain a certain level of revenue, a certain level of profit and those are part of the goals that we as a business have to satisfy."
  • "We are far more agile than we used to be when I first took over as chief architect eight years ago or nine years ago, whatever it has been now."

Source: http://www.ibmsystemsmag.com/ibmi/trends/iTALK-WITH-TUOHY/Steve-Will-Architect/

Dealing With A MIN/MAX Quirk
by Ted Holt

  • A database-kind-of-guy-or-gal would think that anything so established would be stable to the point of boredom, but a database-kind-of-guy-or-gal would be wrong...
  • The controversy arises with the use of MIN and MAX as scalar functions.

Source: http://www.itjungle.com/fhg/fhg031516-story02.html

Learn Great Stuff From IBM i Champions At COMMON
by Alex Woodie

  • There are three things that go into making IBM i a great business platform: bullet-proof hardware, reliable software, and exceptional people.
  • All told, the COMMON conference will feature more than 350 sessions by nearly 100 speakers from the IBM i community's best and brightest. That includes non-IBMers RPG guru Scott Klement, a former Power Systems champion; and of course Four Hundred Guru editor Ted Holt.

Source: http://www.itjungle.com/tfh/tfh031416-story02.html

The Most Precious IBM i Resource . . . Women
by Dan Burger 

  • Then think about the IBM midrange community and why the ratio of men to women must be 10 to one, or even greater.
  • Recruiting more women into IT professions is still a beta project. Recruiting women to IBM i environments specifically is pretty much a new frontier. There are a few people exploring this frontier and Enselman is one of them.
  • "The lack of women in the IBM i community is mostly a generational thing," Enselman said.

Source: http://www.itjungle.com/tfh/tfh030716-story03.html

A Change Of Heart: IBM i Shops More Willing To Share

by Dan Burger

  • One of the biggest has been the evolution from being a fortress that locked out all "outsiders" to allowing the system to interact with other systems.
  • Companies are much more comfortable moving data back and forward between IBM i and other platforms compared to just five years ago, says Giacomo Lorenzin.

Source: http://www.itjungle.com/tfh/tfh030716-story02.html

And that's it for this edition! Did I miss anything?

 

Topics: Events & Education

Subscribe to Blog Updates

....and get our "How to Get Full Business Buy-In for Your Modernization Project" ebook!

business buy-in ebook

Recent Posts