Itjungle.com

Itjungle.com

mer 4 septembre 2019 0 Par Ibmiiste

Voi­ci un site où trou­ver de tout sur IBM i(system i, iSe­ries, AS400), cela parle aus­si bien de ten­dance éco­no­mique autour de ce sys­tème que de pro­gram­ma­tion, astuces où de pen­sées personnelles.

  • par Timo­thy Pri­ckett Mor­gan
    We have been on the hunt to get you pri­cing on entry Power11 machines in the P10 and P20 IBM i soft­ware tiers to give you a sense of the rela­tive price/performance of the Power11 machines com­pa­red to their Power10 pre­de­ces­sors. There are dozens of pos­sible confi­gu­ra­tions of entry, midrange, and enter­prise machines in these […]
  • par Alex Woo­die
    As the lar­gest pro­vi­der of IBM i‑based ERP sys­tems that isn’t named Oracle or SAP, Infor wields a signi­fi­cant amount of influence over the midrange mar­ket­place. Com­pa­nies that run XA, LX, and Sys­tem 21 rely on Infor to keep their ERP sys­tems up-to-date and viable with chan­ging busi­ness and tech­no­lo­gy requi­re­ments. To that end, Infor […]
  • par Alex Woo­die
    Rocket Soft­ware recent­ly put the fini­shing touches on a range of updates for Rocket DevOps, its suite of auto­ma­tion, change mana­ge­ment, and tes­ting solu­tions for IBM i. The top enhan­ce­ments cus­to­mers will find are two-way Git inte­gra­tion, AI-powe­red ano­ma­ly detec­tion, unit tes­ting enhan­ce­ments, and sup­port for IBM i DevOps work­flows in Micro­soft Azure Pipe­lines. It’s […]
  • par Timo­thy Pri­ckett Mor­gan
    We don’t expect a lot of announ­ce­ments from IBM at this point in the year rela­ting to the Power Sys­tems plat­form, and in fact, we don’t expect a lot of announ­ce­ments from Big Blue at all. Except maybe for the usual end-of-year “work­load reba­lan­cing,” the 2025 edi­tion of that we saw recent­ly being repor­ted in […]
  • par Doug Bid­well
    Last week, we told you about two secu­ri­ty vul­ne­ra­bi­li­ties with Java on the IBM i plat­form, and this week we have ano­ther one that you need to cope with. This vul­ne­ra­bi­li­ty is Secu­ri­ty Bul­le­tin : IBM i is affec­ted by Remote Code Exe­cu­tion, Dese­ria­li­za­tion of Untrus­ted Data, and Impro­per Access Controls vul­ne­ra­bi­li­ties in IBM Java SDK […]