Monthly Archives:

Cozzi Tools 2012 Runtime Library and Commands Released “Into the Wild”

Bob Cozzi has released the latest version of his runtime library and commands for COZTOOLS “into the wild” (i.e., available for free download). According to Bob’s Web site: The COZTOOLS library includes a set of RPG IV-friendly subprocedures that link to one of the … Continue reading

Posted in News | 1 Comment

IBMer Lora Powell Explains Changes to IBM i Performance Collections Starting at 6.1

Lora Powell, the lead for the Performance Tasks Gui in IBM Systems Director Navigator, sat in for Dawn May in Dawn’s i Can column in IBM Systems Magazine this month. In this column, Lora explains the changes that were made … Continue reading

Posted in IBM i Tech Info | Comments Off on IBMer Lora Powell Explains Changes to IBM i Performance Collections Starting at 6.1

Steve Will: You and i Column on Mobilizing IBM i Applications

Steve will has a new column on using Mobile Devices to interface mobile devices to IBM i applications. Best to use as a primer introduction to mobile i or as Steve likes to call it: Mobilizing IBM i. You can read … Continue reading

Posted in IBM i Tech Info | Comments Off on Steve Will: You and i Column on Mobilizing IBM i Applications

Official: LinkedIn’s Statement on Stolen Passwords and Next Steps for Compromised Accounts

Here’s the link to LinkedIn’s statement about the compromised passwords and what they will do about it. Evidently, LinkedIn thinks they know which passwords have been compromised as they will disable those passwords and send instructions to the users on … Continue reading

Posted in LinkedIn and Twitter | Comments Off on Official: LinkedIn’s Statement on Stolen Passwords and Next Steps for Compromised Accounts

Has Your LinkedIn Password Been Hacked?

Update 5:11 CST – Another slew of articles coming out and it looks like the passwords have probably been compromised. Best default is to change your LinkedIn password NOW and the passwords for any other site that use the same … Continue reading

Posted in LinkedIn and Twitter | Comments Off on Has Your LinkedIn Password Been Hacked?

New iTech Solutions Newsletter: How Often Should You IPL?

Pete Massiello has a nice article in his latest iTech Solutions Newsletter about how often you should IPL your IBM i box. According to Pete, you should IPL sparingly for one simple reason: database performance. Confused? Don’t be. Pete wraps … Continue reading

Posted in IBM i Tech Info | Comments Off on New iTech Solutions Newsletter: How Often Should You IPL?

iPerimeter: Nice IBM i Timeline from System/3 to PureSystems

Update 6/4/12 – When I originally wrote this, the link to iPerimeter was broken. The link is fixed now…Joe Mandy Shaw at iPerimeter put up a nice IBM i timeline starting with the System/3 and going all the way up to … Continue reading

Posted in IBM i Tech Info, opinion | Comments Off on iPerimeter: Nice IBM i Timeline from System/3 to PureSystems

IT Jungle: EMC Unveils New VMAX, IBM i Support for FAST Technology

From Alex Woodie at IT Jungle: EMC yesterday announced that it now supports IBM i with its FAST VP (Fully Automated Storage Tiering for Virtual Pools) technology, which enables data inside EMC arrays to be automatically moved between traditional disk … Continue reading

Posted in Misc | Comments Off on IT Jungle: EMC Unveils New VMAX, IBM i Support for FAST Technology

Worth complaining about…Telling IBM to call an IBM i an IBM i

At the same time I was complaining yesterday about how IBM couldn’t call the IBM i operating system an IBM i in a post about the legacy of the IBM i and how it inspired PureSystems, comes this tweet from Steve Pitcher. @stevencpitcher #IBMi folks, … Continue reading

Posted in Misc | Comments Off on Worth complaining about…Telling IBM to call an IBM i an IBM i