Itjungle.com

Itjungle.com

mer 4 septembre 2019 0 Par Ibmiiste

Voi­ci un site où trou­ver de tout sur IBM i(system i, iSe­ries, AS400), cela parle aus­si bien de ten­dance éco­no­mique autour de ce sys­tème que de pro­gram­ma­tion, astuces où de pen­sées personnelles.

  • par Timo­thy Pri­ckett Mor­gan
    Today is Power11 announ­ce­ment day, and as some­times hap­pens during the debut of a new pro­ces­sor and a new plat­form to go along with it, we do not have all of the details neces­sa­ry to tell you eve­ry­thing you need to know about the new Power11 pro­ces­sor and the four of the five Power Systems […]
  • par Timo­thy Pri­ckett Mor­gan
    Big Blue has been noo­dling how it might tweak the sub­scrip­tion pri­cing for the P20 and P30 tiers since get­ting feed­back on the first pass it did on its big iron Power Sys­tems machines way back in Februa­ry 2023. That feed­back from the company’s big­gest IBM i cus­to­mers was not enti­re­ly glo­wing, but IBM has […]
  • par Alex Woo­die
    Izzi Soft­ware today announ­ced the acqui­si­tion of CNX Corp., owner of the Valence suite of Web deve­lop­ment tools for IBM i. The deal is the first IBM i‑related acqui­si­tion for Izzi, which was foun­ded last year with a man­date to buy smal­ler IBM i and main­frame ven­dors that typi­cal­ly don’t get M&A atten­tion from bigger […]
  • par Alex Woo­die
    Faced with ever-gro­wing secu­ri­ty concerns, IBM i shops are “atta­cking” the pro­blem and taking real steps to improve their secu­ri­ty pos­ture, Fortra’s says in its latest State of IBM i Secu­ri­ty stu­dy. It is the second straight year that For­tra has noti­ced an impro­ve­ment in IBM i shops’ approach to secu­ri­ty. Howe­ver, there are still […]
  • par Doug Bid­well
    Brace your­self because the IBM i plat­form has five secu­ri­ty vul­ne­ra­bi­li­ties that you have to ana­lyze and cope with in this week’s issue of the IBM i PTF Guide. Let’s just jump right in and get to it. First, we have Secu­ri­ty Bul­le­tin : IBM WebS­phere Appli­ca­tion Ser­ver is affec­ted by arbi­tra­ry code exe­cu­tion (CVE-2025–36038), about […]