Trend Watch: Open-Source Software
This is the fifth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis of trends, this time looking at open-source software.
AIX and NTP
By default AIX uses NTPv3. This probably works fine for an internal-only situation (I hope), but for a server that also talks with the "outside," I recall that NTP shows up fairly frequently in CVE messages.
One Small Program, Two Powerful Messages
To further explain the value of open source, I wanted to highlight a small, open-source Python program. It shows active connections, much like the “netstat” command on other platforms. In all, the program and its implementation are both pretty simple.
Copy an Open Spooled File
In the past, you could not copy a spooled file when it was still open; if you attempted the copy, it would fail with CPF3482, “Copy request failed. Spool file &1 is open.” The spooled file had to be completed before the copy would be allowed.
Check Out the Latest in RDi
In the previous blog we discussed the latest RPG enhancements. Today we will briefly review the latest RDi enhancements. RDi doesn't typically follow the same announcement schedule as IBM i and as of late has started "sneaking" enhancements into fix packs. The latest of these, which take the product to version 220.127.116.11, includes the foundations for what promises to be a really interesting and useful feature for RPGers: Refactoring.
IBM i & RFE – Improving Future Business Value
For many years, IBM has used several methods to get customer input on the direction of the platform that has grown into today’s IBM i. The COMMON organizations in North America and Europe have been instrumental over the past two decades in providing processes for their members to submit requirements for new function to IBM, and those two organizations use their Advisory Councils (CAAC and CEAC) to advocate for the requirements that come from their members. Similarly, the Large Users Group submits requirements to IBM related to IBM i. These requirement sources, and the groups that help us work with them, have been invaluable as we’ve jointly worked to ensure that IBM i satisfies the needs of our users.
Using Installation SYSOPR Authority
These days, most enterprises limit access to sensitive data to only those users who need to see this information to do their jobs. In the meantime, security features have evolved over the past few DB2 releases.
A POWER9 Roadmap
I want to point you to Jeff Stuecheli's POWER9 presentation from January's AIX Virtual User Group meeting. This information doesn't involve specific announcements or new models, but it provides an informative look the capabilities of the chip itself.