IBM i security: 10 major risks and how to avoid them

IBM i security: 10 major risks and how to avoid them

ID-INFO blog Security on IBM i : 10 major risks and how to avoid them Security threats are on the increase. Whether it’s a cyber attack or a virus, identity theft is becoming more and more common, not to mention the fact that certain vulnerabilities can also...
IBM i security: 10 major risks and how to avoid them

IBM i historical users: 2022 summary

ID-INFO blog IBM i legacy users: what you need to know in 2022 Switching to the cloud to keep costs down, security issues, spare parts problems, increased IBM support costs: keeping your AS/400 sometimes has to be earned! Bob Losey’s thoughts on what to...
IBM i: four key trends affecting the market

IBM i: four key trends affecting the market

ID-INFO blog IBM i: four key trends affecting the market These are interesting times for everyone. Indeed, no one could have imagined global containment, or such a widespread pandemic with such restrictions to prevent the virus from spreading. This may be stating the...
IBM i : Dynamic subfiles

IBM i : Dynamic subfiles

ID-INFO blog IBM i: dynamic subfiles You’ve read our previous article on static subfiles. Let’s take a look at the “Dynamic” version. Today’s web services rely on the Hypertext Transfer Protocol (HTPP) to convey information. Using this...