Learning & Resource Center
Learn from IBM certified administrators who have been on actual jobs so you get an excellent hands on with on-the-job scenarios.
Note: - This walkthrough uses Fedora 30 and uses a desktop so would work for similar configurations. Also you need to have atleast 4vCPUs, 9GB RAM and 35GB disk space. The RAM is a hard stop so make sure you have around 10GB on the Desktop/Laptop that you are using...
If you do not have Ansible already installed then you can install using the command below. (All commands and files used are available for download at the end of the guide) yum install ansible -y Create an Ansible directory in your home folder and navigate inside...
Important things to know about nodes and clusters. IBM i cluster resource services provide mechanism and management services. These services group IBM i systems, partitions and resources working together as a unified system. Clusters provide application...
IBM i hardware based high availability & disaster recovery technologies are being embraced by a number of big and small enterprises. The cornerstones of IBM i hardware based high availability & disaster recovery are iASP and IBM i Cluster A switchable iASP...
Prerequisite - This guide assumes that you already have a kubernetes cluster running on IBM cloud. If not you can create one following this guide. 1. Click on create new resource on your Kubernetes dashboard.2. While in the create from input section, click on Learn...
Do you want to try out Kubernetes on IBM Cloud for free? Read along for step by step instructions! (Disclaimer - Note that for some geographies, you might have to provide a credit card for a free trial but you still won't be charged for the free tier that this...
Do I need cloud computing?The evolution of technology in this age is geared towards rapid development and "self-healing" techniques.Businesses are implementing newer technologies much faster than ever before. As slower adaptation would mean losing market share to...
We all know and have worked on the AS400 for years, we still did when it was called the Iseries and we still do when it is called the IBMi. Apart from the changes in name that many people are comfortable and not comfortable about, there is one question that...
The developments on the IBMi platform are almost as classic as the Fitzgerald fiction novel depicting Benjamin Button where the protagonist is born old and gets younger as time passes. IBMi instead of getting "older", becoming a legacy system and fading away is...
Backups keep your data safe and protected! Hardware failures such as defective hard disks, sudden system errors after a program update, Computer Viruses, Ransomwares and Trojans are only a few of the threats against computer data. Sudden data loss can easily cause...
Frequently Asked Questions
is IBMi a legacy system?
IBM i operating system enables the IBM Power platform to support a wide variety of business applications, and can co-exist alongside IBM AIX and Enterprise Linux
IBM i offers an upgrade path so that application software written for previous operating systems on IBM syestem I can be migrated to current supported hardware without needing to be modified or recompiled.
Is open source secure ?
Open source is not automatically more secure than closed source. The difference is with open source code you can verify for yourself (or pay someone to verify for you) whether the code is secure. With closed source programs you need to take it on faith that a piece of code works properly, open source allows the code to be tested and verified to work properly.
Open source also allows anyone to fix broken code, while closed source can only be fixed by the vendor.
Over time this means open source projects (like the Linux kernel) tend to become more secure people more people are testing and fixing the
The future of IBMi
from midsize distributors and manufacturers to retailers and banks. Some of the biggest companies in the world, like Honda and Toyota, are IBM i users. You can also find IBM i servers in government institutions, from small county assessors in Texas to the United States Air Force. It’s used by some of the biggest names in media (Walt Disney Co.) to some of the most well-known sports teams (Chicago Cubs). The website All400s publishes a spreadsheet that contains the names of tens of thousands of known IBM i, i5, iSeries, and AS/400 users around the world. SEA Software is one of many IBM i vendors who sponsor this site. Check it out if you’d like more information about who is part of the IBM i community.
The IBM i Roadmap document also commits to releasing the next release of IBM i – dubbed “IBM i Next” – in early 2022 and supporting it through 2030. The following release, “IBM i Next +1,” is currently slated to ship in early 2025 and be supported well past 2032. IBM is essentially promising customers that applications running on IBM i today will continue to run on future releases of the operating system for well over a decade. This should allow CIOs to sleep well at night.
Which companies are using open source
- More than half of respondents (53 percent) across all industries say their organization has an open source software program or has plans to establish one.
- Large companies are about twice as likely to run an open source program than smaller companies (63 percent vs. 37 percent.)
- Based on the 49 respondents that self-identified as working at a company on the Forbes Global 2000 list, we expect that the number of large companies with open source programs will triple by 2020.
Compatible ERP systems running on IBMi
SAP, ERP JD Edwards, Infor ERP are some of the most prominent ERPs that work better on the IBMi
Ransomware decryption tool
Every ransomware is different and there could be various ways to decrypt. Check nomoreransom.org to see if a tool is available to decrypt the ransomware affecting you or you can get in touch with us for advice using the chat on the right hand side.
How is Ransomware recovery done ?
Ransomware encrypts your files rendering them unusable. We attempt to decrypt the key if possible or try alternate methods. Since every ransomware words differentl, reach out to us for your specific use case and we will try our best to assist.
How is IBMi training different with Iseries Portal
Our trainers are Ex IBM employees with plenty of on-the-job experience deaing with IBM clients. So you get to grasp an understand ing of real life scenarios with examples.