Refactoring RPGLE: Scott Klement’s Copybooks in Free Format RPG If you’ve ever stared at a wall of fixed-format RPG code and wondered how to bring it into the 21st century, you’re not alone. In this video, let’s walk through the process of upgrading Scott Klement’s RPGLE copybooks, transforming legacy column-based RPG into sleek, readable free-format […]| Nick Litten [IBM i AS400 iSeries] Software Developer
If you're curious about the nostalgic world of AS400 RPG programming, come with me and let's dive into the art of printing reports using OUTPUT Specifications| Nick Litten [IBM i AS400 iSeries] Software Developer
Picture this: you're sipping your morning cup of PG Tips Tea, contemplating a third hobnob biscuit dunker, ready to tackle another day of IBM i wizardry, when| Nick Litten [IBM i AS400 iSeries] Software Developer
We are still playing a “game of ketchup” after the Independence Day holiday in the United States. This week, we learn that IBM i Java Development Kit 11 64-bit VMs Fail with UnsatisfiedLinkError After IBM i Java Group PTF Apply. You can find out more about this issue at this link. The affected IBM i| IT Jungle
We are still assembling the information on the new Power11 processor and the Power Systems machines that use them and working on our analysis before they start shipping on July 25. We will do the most thorough job that we can under the circumstances, as always, but we concede that pricing information is very hard| IT Jungle
If you are like me, you are a fan of podcasts, and one of my favorites is IBM Transformers, hosted by Ann Funai. It’s a must-listen for anyone navigating digital transformation or leading change in enterprise IT. With a thoughtful blend of personal stories and practical insights, Transformers goes beyond buzzwords to explore how leaders| IT Jungle
In the vast and varied ecosystems of Earth, few interactions between species have captured the imagination of scientists and casual observers alike as much as the relationship between bottlenose dolphins and puffer fish. This curious dance, often involving the deliberate provocation of the puffer fish to trigger its natural defense mechanism, has led to many| IT Jungle
The new multi-factor authentication (MFA) capability that IBM has built into the IBM i operating system is a real gamechanger in terms of securing the system and preventing unauthorized access to applications and data. However, it lacks some key capabilities that some customers are looking for in an MFA solution, which third-party vendors are eager| IT Jungle
If you are an ASNA shops, there is an important security update that the company wants you to be aware of. This is an important security notification regarding a vulnerability discovered in two ASNA Windows Services: ASNA Assist and ASNA Registrar. ASNA says that it has resolved this vulnerability with updated versions of all supported| IT Jungle
Today is Power11 announcement day, and as sometimes happens during the debut of a new processor and a new platform to go along with it, we do not have all of the details necessary to tell you everything you need to know about the new Power11 processor and the four of the five Power Systems| IT Jungle
Izzi Software today announced the acquisition of CNX Corp., owner of the Valence suite of Web development tools for IBM i. The deal is the first IBM i-related acquisition for Izzi, which was founded last year with a mandate to buy smaller IBM i and mainframe vendors that typically don’t get M&A attention from bigger| IT Jungle
Faced with ever-growing security concerns, IBM i shops are “attacking” the problem and taking real steps to improve their security posture, Fortra says in its latest State of IBM i Security study. It is the second straight year that Fortra has noticed an improvement in IBM i shops’ approach to security. However, there are still| IT Jungle
Brace yourself because the IBM i platform has five security vulnerabilities that you have to analyze and cope with in this week’s issue of the IBM i PTF Guide. Let’s just jump right in and get to it. First, we have Security Bulletin: IBM WebSphere Application Server is affected by arbitrary code execution (CVE-2025-36038), about| IT Jungle
The AS/400, under its many names, turns 37 this coming weekend, and let’s all raise a glass and celebrate this venerable and still relevant platform. Or, perhaps a cup of coffee or tea, depending on your mood. In the meantime, before you toast the IBM i, you have two security vulnerabilities to be aware of.| IT Jungle
In a meeting earlier today and a semi-techie project manager was asking about IBM i job run priorities. He had some firm ideas that every job should run lower| Nick Litten [IBM i AS400 iSeries] Software Developer
The price increases that may or may not be happening to cover increasing costs at IBM continue apace. Some of the price increases we have seen over the past several months might be driven by increasing costs or the expectation of increasing costs, and others might be initiated to drive services and software revenues higher| IT Jungle
Nobody is going to mistake an IBM i conference for a college campus anytime soon. But if the recent POWERUp 2025 conference at Disneyland was any indication, there is a definite trend toward younger professionals working on the platform. While the IBM i youth movement is real, companies will benefit from some simple ways to| IT Jungle
For years, Remain Software was 100 percent devoted to Rational Developer for i (RDi) IBM’s flagship development tool for IBM i. It was a good bet, as the bulk of the market used RDi. However, in recent years, popularity of VS Code has soared, and now Remain is embarking upon a major project to redevelop| IT Jungle
As the capacities on flash and disk arrays continue to embiggen and the desire to keep data around is at a fever pitch as everyone is trying to figure out how to train generative AI models using all of their data, the need for tape backup for transactional and operational data has never been higher.| IT Jungle
It’s pretty quiet this week, which is good. We gave you a lot of stuff to do last week anyway, so now you can really get caught up. The important thing is a new security vulnerability, which is in Security Bulletin: IBM Rational Developer for i is affected by an unspecified Java runtime encryption vulnerability| IT Jungle
At COMMON’s recent POWERUp conference, IT Jungle got a chance to sit down with IBM executives to talk about the IBM i business, upcoming Power announcements, and sundry other topics, like is IBM preparing to finally kill SEU, when will we see IBM i 8.0, and does IBM feel lucky enough to launch Power13? Here’s| IT Jungle
A problem has been brewing for back and archiving needs for entry and some midrange IBM i shops, and we did not know about it until the spit hit the fan last week. Had we known earlier, we could have warned you. And maybe Big Blue could have and should have warned you directly more| IT Jungle
IBM is making progress with Watsonx Code Assistant for i, which is on track to become available as a public preview next month. And while IBM perhaps is running into some challenges with generating RPG code, the long-term potential of agentic AI on IBM i is brighter than ever. As we previously reported, IBM is| IT Jungle
Sometimes you get a bunch of big announcements for the IBM i platform or the Power Systems machinery it runs on, and sometimes there are some smaller things that are interesting to a smaller group of people but no less important in their worlds than the big stuff. So it is this week. In announcement| IT Jungle
It is once again “ketchup week” here at The Four Hundred thanks to the Memorial Day holiday last week in the United States, and that means you get two IBM i PTF Guides for the price of one this week. So let’s start with Volume 27 Number 21 dated May 24. There is a whole| IT Jungle
At the COMMON POWERUp 2025 conference this week, IBM pulled the covers back a bit on Watson Code Assistant for IBM i, the new name for the AI-powered coding assistant that IBM first started talking about one year ago. A public preview of WCA for i is becoming available to a limited number of testers,| IT Jungle
Brace yourselves, everyone. There are seven security vulnerabilities that you have to pay attention to this week for the IBM i platform. Remember, as security guru Carol Woodbury is fond of saying: the IBM i platform is not the most secure platform in the world, but the most securable platform in the world. You must| IT Jungle
Today, I’m diving into the fun world of legacy code modernization from the old AS400 style RPG to the new free-format IBM i Style RPG.| Nick Litten [IBM i AS400 iSeries] Software Developer
Welcome to May, and we start out with PH65941, a notice from Big Blue that IBM WebSphere Application Server is vulnerable to server-side request forgery (CVE-2025-27907 CVSS 4.1). You can check out this link for more details. IBM says that the fix for this APAR is set to be included with WebSphere Application Server 8.5.5.28| IT Jungle
What is the action figure trend? The action figure trend, also known as the “Barbie Box Challenge” or “ChatGPT Action Figure Trend,” is a viral social media phenomenon that emerged in early 2025. It involves users creating AI-generated images of themselves as collectible action figures or dolls, complete with personalized packaging and accessories that reflect […]| Nick Litten [IBM i AS400 iSeries] Software Developer
Users can utilize the system request function to pause the job access the System Request Menu. This menu enables users to send and view messages, switch to a secondary, terminate the current job. However, this poses a potential security risk since the default public authority for the Request Menu is set to *USE when the […]| Nick Litten [IBM i AS400 iSeries] Software Developer
Just a reminder that as part of the April 8 announcements, IBM Software Support content is changing to require entitlement check for software patches. See more at this link, but the gist of it is that IBM Software Support Troubleshooting, Question & Answer, and How To documents are changing to require entitlement. This means that| IT Jungle
Welcome to the magical world of PUB400, where your IBM i dreams come true—assuming you can connect to it first!| Nick Litten [IBM i AS400 iSeries] Software Developer
It may be hard to believe, but with the launch of IBM i 7.6 today, it has been 13,440 days since OS/400 V1R1 was announced on June 21, 1988, and Big Blue has delivered 27 distinct releases of the OS/400 and IBM i platform with dozens of Technology Refresh interim updates between releases in the| IT Jungle
Big Blue today announced IBM i 7.6, the first new release of the operating system in three years. While version 7.6 brings a range of enhancements, arguably the biggest new feature is the addition of multi-factor authentication directly into the operating system, which will make adopting MFA simple and represent a “massive security improvement” at| IT Jungle
Good day, good people of IBM i Land. This week we start out with two security vulnerabilities and a known issue to beware of the BLOB! Let’s start with the security vulnerabilities. First we have Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a denial of service due to Netty (CVE-2025-25193), which you| IT Jungle
Who would win in a fight between AS400 Client Access and IBM i ACS? In a hypothetical showdown between IBM Client Access (the legacy AS400 version) and IBM i Access Client Solutions (ACS), it’s less a fight and more a generational beatdown – ACS would come out on top, hands down. IMHO of course. Think […]| Nick Litten [IBM i AS400 iSeries] Software Developer
As part of our ongoing research of the IBM i platform we monitor news and updates related to the platform. Two weeks ago IBM published a support article about a compatibility issue affecting IBM i Access Client Solutions (ACS) when running on Windows 11 24H2. The “no man’s land” between system boundaries is always a playground for hackers, and this article was fascinating because it pointed to the Local Security Authority subsystem of Windows:| Silent Signal Techblog
Preface| Silent Signal Techblog
Preface| Silent Signal Techblog
Post-exploitation is a crucial element of any attack aiming for realistic objectives, so it is no surprise that the topic is extensively researched, resulting in a trove of information that defenders can rely on to design and implement countermeasures. Unfortunately, owners of IBM i systems do not have the luxury of access to such information right now. This was one of the main ideas we discussed with Ben Williams of Chilli IT, who was kind enough to introduce us to IBM’s Brunch and Learn w...| Silent Signal Techblog
In our first blog post of 2023, we continue our series about penetration testing IBM i. This time we look into how the so-called Adopted Authority mechanism can be abused for privilege escalation if privileged scripts are not implemented with enough care.| Silent Signal Techblog
Our next journey takes us into the infrastructure of a bank. One element of the infrastructure was an IBM i (AS/400) server, and the only piece of information we got to conduct the penetration test was its IP address. We had been collecting a list of common application and service users during previous pentests, so we could check their existence on this host using 5250 and POP3 protocols. By the way, the server exposed 63 remote services – are all of them really necessary? Our first step ma...| Silent Signal Techblog
When you get the chance to take a look at the IT systems of financial institutions, telcos, and other big companies, where availability has been a key business concern for decades, you’ll find, that some critical operations run through some obscure systems, in many cases accessed via nostalgic green-on-black terminals, the intricacies of which only a few people inside the company truly know. These systems might be IBM i’s – or as many senior folks know, “AS/400” or “iSeries” –...| Silent Signal Techblog