IBM Delivers Tech Preview for iAccess on Mobile Devices
As part of the launch of IBM i 7.2 way back in May, IBM promised us a new “mobile perspective” for the IBM i Access for Web product that would allow systems administrators to manage the server from...
View ArticleEnforcive’s Cross-Platform Security Mandate
Auditors don’t really care what kinds of servers you run in your institution–they just want to be sure their security settings are set appropriately and the exceptions duly noted. Now, thanks to the...
View ArticleSimulated Role Swaps–Maxava’s Secret Weapon
It may sound trite, but during a disaster you can expect the unexpected. No matter how much planning you put into your disaster preps, chances are good you overlooked something. It’s also true that,...
View ArticleBCD Advances PHP-on-i Development in WebSmart
BCD Software has supported the PHP language with its WebSmart suite of IBM i development tools for several years. But with the last week’s unveiling of WebSmart version 10.6, the Chicago-based company...
View ArticleMost Innovative IBM i Products: A FHS Year in Review
Where will IBM i products go in 2015? They will likely look a lot like 2014, which was heavy on mobile and Web development technologies, open standards, and security. Let’s take a stroll through the...
View ArticleIBM Issues More POODLE Patches, Warns Not to Use SSLv3
IBM i shops that continue to use SSLv3 to encrypt their communications are susceptible to the POODLE security vulnerability and could have their data compromised, IBM warned today in a security...
View ArticleIBM: CMOD for i ‘Alive and Well’
In last week’s The Four Hundred, we ran a story titled “Content Manager OnDemand For i Withdrawn In 2016.” It turns out that the product is very much alive. “It is alive and well,” Tim Rowe, the...
View ArticleManageEngine Bolsters Password Sync Tool
A new release of ManageEngine‘s cross-platform password synchronization tool, ADSelfService Plus, should make it easier for administrators to ensure that native password changes made from Windows are...
View ArticleJack Henry Sharpens Digital Marketing with ‘Kernel’
Banks are sitting on a treasure trove of data about their customers’ purchasing activity, but largely lack the tools to enable them to capitalize on it. Bank software giant Jack Henry & Associates...
View ArticleA Better Way to View IBM i Journal Contents?
IBM provides a fairly suitable command, DSPJRN, for retrieving journal information. It tells you why the data in a file changed, which program changed, and what user was responsible. The only thing it...
View ArticleIBM Delivers Tech Preview for iAccess on Mobile Devices
As part of the launch of IBM i 7.2 way back in May, IBM promised us a new “mobile perspective” for the IBM i Access for Web product that would allow systems administrators to manage the server from...
View ArticleEnforcive’s Cross-Platform Security Mandate
Auditors don’t really care what kinds of servers you run in your institution–they just want to be sure their security settings are set appropriately and the exceptions duly noted. Now, thanks to the...
View ArticleSimulated Role Swaps–Maxava’s Secret Weapon
It may sound trite, but during a disaster you can expect the unexpected. No matter how much planning you put into your disaster preps, chances are good you overlooked something. It’s also true that,...
View ArticleBCD Advances PHP-on-i Development in WebSmart
BCD Software has supported the PHP language with its WebSmart suite of IBM i development tools for several years. But with the last week’s unveiling of WebSmart version 10.6, the Chicago-based company...
View ArticleMost Innovative IBM i Products: A FHS Year in Review
Where will IBM i products go in 2015? They will likely look a lot like 2014, which was heavy on mobile and Web development technologies, open standards, and security. Let’s take a stroll through the...
View ArticleIBM Issues More POODLE Patches, Warns Not to Use SSLv3
IBM i shops that continue to use SSLv3 to encrypt their communications are susceptible to the POODLE security vulnerability and could have their data compromised, IBM warned today in a security...
View Article