June 16, 2023
- LEAD ARTICLE: Open Source Starter Guide for IBM i Developers: Language Basics
- FEATURED VIDEO: A Moment with Carol Woodbury: Taking the Mystery Out of Group Profiles
- FEATURED NEWS: IBM to Grant $5 Million In-Kind for Schools to Boost Cybersecurity, Together with Enhanced Skilling on AI
- NEWS HIGHLIGHT: IBM Launches $100 Million Partnership with Global Universities to Develop Novel Technologies Towards a 100,000-Qubit Quantum-Centric Supercomputer
- WHITE PAPER DOWNLOAD: Profound Logic Solution Guide
- WEBCAST LEARNING: Low Code: A Digital Transformation of Supply Chain and Logistics
- UPCOMING EVENT: OCEAN TechCon23 - July 27 - 29, 2023
I don’t plan to spend a lot of time in the minutiae of the Ruby language. The goal of this series is to give you enough to go on to get started.
By Pete Helgren
Editor's Note: This article is excerpted from chapter 6 of Open Source Starter Guide for IBM i Developers, by Pete Helgren.
And although Ruby is based on POLA, there is enough “surprise!” in the way things work that it is worthwhile to go over some of the basic things and at least point out where I got either derailed or stumped. Sometimes, Grasshopper, all you need is a little enlightenment!
IBM to Grant $5 Million In-Kind for Schools to Boost Cybersecurity, Together with Enhanced Skilling on AI
With cyberattacks on the rise across schools, IBM Education Security Preparedness Grants have already benefited more than 350,000 students globally
Now in its third year, grants are expanding to offer students and teachers access to cyber and AI skills through IBM SkillsBuild
By IBM Systems
In response to the growing threat of ransomware attacks against schools around the world, IBM (NYSE: IBM) today announced it will provide in-kind grants valued at $5 million to help address cybersecurity resiliency in schools. Since its creation in 2021, the IBM Education Security Preparedness Grants program has expanded globally, and this year will also include enhanced offerings from IBM SkillsBuild on topics including AI and cybersecurity.
More than ever, there is a demand for IT to deliver innovation.
Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.Get your copy of this important guide today! Download your copy today!
Supply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals.
Group profiles help with role-based access on the IBM i.
By Carol Woodbury
Join Carol in this video to understand a bit more about group profiles and how you can use them to implement role-based access on your IBM i. She illustrates how you can take advantage of group profiles in your organization to help quickly grant proper authorities for roles.
Want to learn more about the benefits of Pen Testing your IBM i? Contact us today at www.dxrsecurity.com