February 2018

Career Enhancing Technical Intelligence

Issue 29

WEBINAR: 5 IBM i Message Pain Points (and How to Solve Them)

You arrive at your desk. The system is waiting on a message from last night’s backup. While fixing that, your CIO asks why the subsystem that serves your website isn’t available. She leaves, and someone calls to say their report hasn’t arrived. You resort to DSPMSG QSYSOPR... Sound familiar?

It’s hard to be proactive when’re you’re busy fighting fires. Watch this webinar and see how Robot Console helps you manage your IBM i environment by exception.

Watch Now

FREE Download

iSeries Server - IP Packet Filtering

This article shows how to configure the IP Packet Filter and describes an example of using the filter to log a journal entry each time the FTP server is accessed.

Download Here

Microsoft Excel and Word for the iSeries
Learn More Here

Word of the Month

[ ep - uh - stee - mik ]

of or relating to knowledge or the conditions for acquiring it.

Give us your feedback

Click here

To learn more about advertising with us, click here.

IBM z14 Pervasive Encryption Protects All Data

More than 9 billion data records have been lost or stolen since 2013, according to digital security company Gemalto’s Breach Level Index (breachlevelindex.com ). Only 4 percent of those breaches were "secure," meaning the data was encrypted. A report by Solitaire Interglobal Ltd. and sponsored by IBM, "Pervasive Encryption, A New Paradigm for Protection" (ibm.co/2z8eFBS) found that only 2.13 percent of enterprise data within data centers is encrypted.

"The reality is that encryption is largely absent from corporate data centers," says Nick Sardino, program director, IBM Z* Offering Management. "The low rate for encryption is extremely shocking and disappointing."

Continued at IBM

Interesting But Useless Fact:

Half of all bank robberies take place on a Friday.