In this article, Dawn explains the tools available to capture information about the TLS protocols and cipher suites that are used. This information is essential to eliminate the use of weak protocols and ciphers.
This IBM Support document reviews how the IBM i Administration Runtime Expert provides an interface where you can compare end point IBM i systems to a central system to see the PTFs are missing. You then have the option to send, load and apply the missing PTFs to the end point systems.
PowerWire published IBM i, AIX, and Linux news on its web site. You can also subscribe to their monthly newsletter.
This article provides an overview of what workload groups are and why you should use them.
This IT Jungle Guru Tech Tip reviews the Physical System charts in the Performance Data Investigator and why you should review this information.