Itjungle.com

Itjungle.com

mer 4 septembre 2019 0 Par Ibmiiste

Voi­ci un site où trou­ver de tout sur IBM i(system i, iSe­ries, AS400), cela parle aus­si bien de ten­dance éco­no­mique autour de ce sys­tème que de pro­gram­ma­tion, astuces où de pen­sées personnelles.

  • par Alex Woo­die
    Nvi­dia became the world’s most valuable com­pa­ny thanks to its power­ful GPUs, which can be used to train mas­sive AI models contai­ning tril­lions of para­me­ters. But those GPUs can also be used to acce­le­rate tra­di­tio­nal SQL ana­ly­tics on struc­tu­red data sit­ting in a data lake, as IBM’s cus­to­mer Nest­lé found out in a recent deploy­ment. Nest­lé is […]
  • par Alex Woo­die
    UPDATED : Izzi Soft­ware has part­ne­red with a pair of com­pa­nies with connec­tions to IBM midrange and main­frame sys­tems, inclu­ding Capri­corn Infor­ma­tion Sys­tems, a New York pro­vi­der of IBM i tech­ni­cal ser­vices, and Blue­house, a soft­ware dis­tri­bu­tor with a glo­bal net­work of sel­lers. Izzi emer­ged in ear­ly 2025 with a goal to buy smal­ler, foun­der-led software […]
  • par Doug Bid­well
    Hap­py Spring eve­ryone ! We are well into Day­light Savings Time and have lon­ger – mea­ning brigh­ter – eve­nings, so it is hard not to be opti­mis­tic about the spring, sum­mer, and fall ahead. This week, we have one notice and two secu­ri­ty vul­ne­ra­bi­li­ties to start with. Let’s get to it. Let’s start with the OSP-Distribution […]
  • par Timo­thy Pri­ckett Mor­gan
    IBM i shops have a lot of options when it comes to get­ting off­site data pro­tec­tion for their sys­tems of record. We want to unders­tand what you are doing, and how that might change. Like many IBM i shops, you pro­ba­bly back up your sys­tems to tape and then store tapes off­site, or you might […]
  • par Alex Woo­die
    The nature of cyber­se­cu­ri­ty threats is always chan­ging, which requires constant vigi­lance by those who value secu­ri­ty. IBM i is just as expo­sed to threats as any other net­wor­ked ope­ra­ting sys­tem on the pla­net, but it’s also unique in cer­tain ways, which actual­ly makes secu­ri­ty har­der. To get the low­down on how these phe­no­me­na interrelate […]