Next Generation – Part 4

Recruiting the IT Community

CEF (COMMON Education Foundation)

CEF is a group within the IBM i community that supports students interested in pursuing IT careers. This organization should not be overlooked when looking for new employees. CEF’s mission provides insight:

As technology continues to evolve at an exponential rate, so does the demand for IT professionals. This growing need presents an unprecedented opportunity for students to embark on an educational track to prepare them for a professional career in Information Technology.

The COMMON Education Foundation (CEF) is providing pathways to engage and educate a new generation of IT talent. One of CEF’s primary missions is to nurture the development and growth of future IT professionals who will manage and support the computing systems of tomorrow. CEF’s strategy is to encourage students and individuals (including those who have business experience and are considering career changes) to seek careers in the information technology industry, while providing them with supplementary educational opportunities along the way.

CEF has a lot of offerings, including:

  • Student Sponsorship
  • Educator Sponsorship
  • Student Scholarship

Student Sponsorship

Students are provided an opportunity to attend the fall COMMON conference through CEF sponsorship. Having students at COMMON events is a win for everyone. Students are rewarded with an opportunity to learn, connect with community members, and get a glimpse at what a potential career utilizing IBM i technology has to offer. Students go back to their local communities enthused and excited to share their experience. Their attendance also goes a long way in connecting students with potential employers. Community members are excited to see fresh faces ready, willing, and able to step forward as the next generation in the field. Community members looking to hire can also make invaluable connections with schools and educators.

Educator Sponsorship

CEF also offers sponsorship opportunities for educators to attend COMMON events. Educators attend sessions, connect with the IT community, and much more. This goes a very long way in helping keep current IBM i curriculum within schools. While attending COMMON events, educators make numerous and invaluable connections. Attending also provides them the opportunity to learn new skills which they can then take back into classroom. This helps prepare students for the workforce.

Student Scholarship

CEF provides student scholarships that are awarded annually. Students apply by filling out an application. The scholarship winner receives funding to help further their education. Throughout the years, CEF has provided scholarship funding for many students studying IT curriculum.

Ongoing Initiatives

The CEF community has many ongoing initiatives to keep encouraging students to pursue IT careers and connect with potential employers. To help raise funds, they hold numerous fundraising activities throughout the year. A favorite among the IT community is the silent auction held at the annual COMMON conference. Members have grown to look forward to the auction and it is a great fundraiser for CEF. Other initiatives include student sponsored contests, raffles at events, merchandise sales, and much more. The community support throughout the years has encouraged the growth of CEF and, with it, the opportunity to bring fresh faces to the work force.

CEF has long been a great friend to the IT community, connecting educators and students with potential employers while building up the next generation. CEF is a nonprofit organization and is always looking for volunteers. Making the effort to volunteer is both fulfilling and productive. Doing so provides opportunity to give back and in return you’re provided much more.

CEF Event


CEF has a lot of resources to offer the community including students, educators and those within the community interested in the future employees. Some of the resources CEF offers include:

  • Career Center
  • COMMON Certification
  • Online Education
  • Video LibraryRecruiting with CEF
  • Blog
  • Partners
  • IBM Academic Initiative
  • Community
  • Connect with Educators and Students
  • Fall COMMON Event
  • Annual COMMON Event
  • Booth at Events
  • Student Sessions and Activities


CEF COMMON Fall ConferenceCEF COMMON Fall Conference

What started with a few students sponsored at COMMON conference events
has grown to a large group each fall.

Support CEF

  • Sponsor a Student
  • Provide a Contribution
  • Contribute to the Silent Auction
  • Volunteer

If you are looking to fill positions don’t overlook CEF. The group has a lot to offer and is a hidden gem. Don’t hesitate to connect. You’ll benefit greatly by doing so. Whether your actively looking or planning, connect with COMMON Education Foundation and consider volunteering or supporting the foundation through initiatives or making a donation. CEF is an anchor ensuring that we do have a next generation on IBM i.

Contact COMMON Education Foundation


Guest Blogger

Laura Ubelhor Laura Ubelhor owns and operates Consultech Services, Inc., a Rochester, Michigan-based technology consulting company. She is an author of HTML for the Business Developer (MC Press, 2008) and many technology articles. She also helped write the COMMON RPG and Business Computing Professional certification exams. Laura has been involved in the Southeast Michigan IBM i User Group since 1988, serving as group president and lead organizer for the group’s annual MITEC conference. She is also a longtime volunteer for COMMON and has spent much of her career advocating for IT professional education.

Cloud Technology is More Than Just Storage

Cloud Technology is More Than Just Storage

Cloud services and technology originated as storage solutions for businesses but have advanced greatly in the past few years to include options such as cloud-based email, servers, applications, and desktops. These new cloud technologies can benefit your business by providing an updated IT infrastructure that’s secure yet offers the ease of obtaining your business data quickly and efficiently. Continue reading to learn more about a few new ways cloud technology is being introduced in today’s business world.

Cloud-Based Data Backup and Business Continuity

One of the new ways cloud-based technology is being used is providing data backup for businesses. Both small businesses and large enterprises should employ data backup strategies to avoid downtime and minimize the chance of falling victim to data breaches. Cloud-based data backup services for your business may vary depending on factors that include speed to reinstate, protection from local disasters or specific file backups. Work with your IT partner in developing a cloud-based business continuity plan, which will help protect your network data and minimize lost productivity and potential lost revenue.

Desktop and Server Virtualization

Cloud virtualization allows one to run multiple operating systems and applications on a single computer. This practice is rapidly becoming a staple solution for businesses looking to reduce total cost of ownership in expensive hardware, while increasing flexibility and redundancy. Utilizing cloud virtualization allows for more convenient transfers of applications to mobile devices like laptops, tablets and smartphones which means employees can stay connected, securely, even if they’re not in the office.

Consider Cloud Technology

The landscape of business data and network systems changes quickly, talk with your IT partner today to determine if a public, private or hybrid cloud solution is right for your business. The more your IT partner knows about your day-to-day business challenges, the better they can support you in protecting your data, employees and revenue stream.

The Next Generation – Part 3

Guest Blogger – Laura Ubelhor

Read Part 1 and Part 2 of this series.

Connecting with Colleges

Working with colleges to scout out upcoming talent is another great way to bring the next generation onboard. However, as there are so many schools that offer IT programs, it can be difficult to narrow down your search. IBM and the COMMON Education Foundation offer resources to help focus your search and enhance your results.

There are many colleges across the country that include IBM i curriculum, and IBM will help you discover them. To find universities offering this curriculum in your area, visit the IBM i Academic Initiative website. Choose the “Participating schools” link in the right-side toolbar, and a list of schools by state will be displayed. You can also visit its Facebook page or email for more information.

The COMMON Education Foundation (CEF) may also be able to assist you in connecting with colleges in your area. You can find more information by visiting the CEF website. Also, CEF will be at the upcoming COMMON spring conference, POWERUp 2019, May 19-22 in Anaheim, CA. Later in the year, CEF will also attend the COMMON Fall Conference & Expo. If you attend either of these events, visit the Foundation booth. Otherwise, email

Beyond IBM and COMMON, you may also find success by reaching out to colleges directly. Visit their websites. Watch their YouTube presentations. Be persistent. Each college has job boards, and IT instructors or career placement staff can help connect you to students.

These are some of the colleges in the Michigan area teaching IBM i curriculum.

Other colleges teaching IBM i Curriculum.

An opportunity colleges offer to students and companies are job fairs. Click here for an example of a job fair held at Baker, a local Michigan college that offers IBM i curriculum. Also work with colleges to post jobs on career boards and consider working with career placement staff. They are excited to help their students be successful.

Offering an internship is also a way to work with local colleges. Even if the colleges in your area don’t have a specific curriculum for IBM i, there may be some IT students with the desire and aptitude needed to be a great fit. An internship is a wonderful way to determine whether a student would work well within your organization. At some colleges, internships are a curriculum requirement. A student can be provided IBM i training by using in-house mentoring or through a COMMON Academic Membership. COMMON offers FREE membership to students enrolled in a college IT program. The membership continues for two years after they graduate and provides individuals getting ready to enter the workforce with amazing IBM i specific education.

Guest Blogger

Laura Ubelhor owns and operates Consultech Services, Inc., a Rochester, Michigan-based technology consulting company. She is an author of HTML for the Business Developer (MC Press, 2008) and many technology articles. She also helped write the COMMON RPG and Business Computing Professional certification exams. Laura has been involved in the Southeast Michigan IBM i User Group since 1988, serving as group president and lead organizer for the group’s annual MITEC conference. She is also a longtime volunteer for COMMON and has spent much of her career advocating for IT professional education.

The Next Generation – Part 2

Guest Blogger – Laura Ubelhor

Read Part 1 of this series in the December 2018 issue of COMMON.CONNECT.

Local User Groups

When looking for recruits, don’t overlook local user groups. There are many local IBM i user groups across the country, bringing together community members and students. They provide opportunities such as student activities, competitions, and local conferences. Events often feature students and a career information exchange.

Because user groups encourage student growth and introduce the foundations needed for a strong IT career, they are great to reach out to when looking for new IT talent. If you don’t have a group in your local area, it is still worth finding one nearby. Often meetings and activities are made available through WebEx, allowing members to join remotely.

If you are starting from ground zero, a great start is to take one or more of the actions on this list:

  • Reach out to board members
  • Sign up for notifications
  • Join as a user group member
  • Participate in and/or encourage group student activities
  • Engage with other user groups
  • Request to have a job posted on the group site and/or featured within group correspondence
  • Sponsor student attendance at meetings or conferences

Being involved allows you to not only foster the next generation but to also position yourself to scout out future talent.

A local user group can come into play when connecting with local colleges. User groups greatly appreciate suggestions, so don’t be afraid to reach out and suggest a meet-and-greet, networking event, or other student focused activity. Examples of student activities held by the Southeast Michigan IBM i User Group (SEMIUG) include a competition where students coded a game using any tool that was found on IBM i. Another activity involved group members submitting real projects. Students then teamed up with community members to work on these projects, with the winning submission used in an organization’s production environment. We also awarded cash prizes to attract and excite students. An upcoming event planned to kick off in February 2019 includes Watson technology. It is a great way to connect and to provide a great learning experience for everyone while generating wonderful buzz within the community.

Even if you can’t actively become involved in a user group, don’t overlook local conference events. Many groups host events that invite students, and they need sponsors. For example, SEMIUG has an annual sponsored conference called MITEC. During this event, we provide an informal student meet-and-greet, providing organizations an opportunity to connect with students and local schools. The event has grown to be a great option for local organizations looking to hire. We have had significant results, finding that students are ready and seeking opportunities. Often local organizations walk away with new employees. One organization attending our event has found great success, hiring four new student team members to fill vacant positions and replace retiring employees.

Pictures speak a thousand words. The above images show students participating at the MITEC conference. This event is not one of a kind; many other events have similar offerings and goals.

Becoming active in user groups and attending their events with enthusiasm is a great way to start getting to know a potential employee due to the opportunity for networking with students. Often at the events, student attendance is sponsored. Taking the opportunity to sponsor a student is a great way to show support and pique the interest of students seeking jobs, possibly with your company. COMMON is the largest IBM i user group within the U.S. At COMMON’s Fall Conference, many students attend thanks to sponsors and the COMMON Education Foundation. So there is a great opportunity within our own organization to connect with potential recruits. Don’t close the door on national events to seek out student talent as many are ready and willing to relocate for the right opportunity.

Want to find a user group near you? It’s not hard! Check out these great directories from IBM and COMMON!

Read Part 3 of this series.

Guest Blogger

Laura Ubelhor owns and operates Consultech Services, Inc., a Rochester, Michigan-based technology consulting company. She is an author of HTML for the Business Developer (MC Press, 2008) and many technology articles. She also helped write the COMMON RPG and Business Computing Professional certification exams. Laura has been involved in the Southeast Michigan IBM i User Group since 1988, serving as group president and lead organizer for the group’s annual MITEC conference. She is also a longtime volunteer for COMMON and has spent much of her career advocating for IT professional education.

IBM Aims Watson AI at Countering Unconscious Bias in Hiring

The problem of bias in hiring remains acute. Few businesses today deliberately discriminate in their hiring practices. Yet a recent meta-study (a comprehensive review of multiple studies) reveals that hiring discrimination against blacks and Latinos has not significantly improved over the past 25 years. As the Financial Times notes in a recent article, “Bias in the hiring process is prevalent and hard to eradicate.”

Often the issue is not intentional discrimination, but the adverse impact of the unconscious biases we all have.

The term “adverse impact” relates to employment practices that may on the surface seem fair and objective, but that actually have a disproportionately negative effect on a particular set of applicants or workers. In the United States, a company employing policies that are determined to have an adverse impact on protected groups may find itself in legal jeopardy.

IBM Sets Watson to Combat Unconscious Bias in Hiring

Recognizing that unconscious bias in hiring is a serious issue for many organizations, IBM has introduced its Watson Recruitment’s Adverse Impact Analysis capability to help combat the problem. According to Bob Schultz, General Manager, IBM Watson Talent Solutions, the purpose of this new artificial intelligence (AI) product is to help users identify “instances of bias related to age, gender, race, education, or previous employer by assessing an organization’s historical hiring data and highlighting potential unconscious biases.”

The Necessity of Bias-Free Training Data

Schultz notes that IBM honed this new AI tool’s capabilities by working with psychologists to create an unbiased AI scoring system. A critical issue in that effort was ensuring that the AI was trained with data that did not itself contain hidden biases. Aware that some commercial AI products have themselves been shown to be discriminatory (in favor of white males, for example) due to faulty training data, IBM researchers specifically focused on developing training datasets that are free of their own inherent biases. As part of that process, IBM developed a rating system that ranks the relative fairness of an AI platform and explains how it makes its decisions.

The Watson Recruitment’s Adverse Impact Analysis capability was introduced as part of IBM’s largest ever AI toolset release. Customers that have already begun using the product include BuzzFeed and H&R Block.

Domino Diva’s Perspective on the Sale of IBM Domino to HCL

  By guest blogger Kim Greene

The announcement that HCL has purchased certain IBM products for $1.8 billion has spurred a lot of speculation and questions this week.  I have been asked “what is your take on this?” many times, so here goes.

My company has provided consulting services on the IBM Collaboration portfolio for the past 18.5 years, so IBM Domino/Notes/Sametime/Traveler/Verse have been near and dear to my heart for a number of years. When I heard the announcement, my reaction was, YES!!!!!!!

From my perspective that partnership has been a huge success on many fronts, with the biggest one being a new release of the Domino product, 10.0.  This is the first new release of the product since 2013. This isn’t just a new release, it’s an amazing release! The amount of new functionality provided in Domino 10 has the magnitude to encompass the quantity of combined new function provided in releases 7, 8, 8.5, and 9.x.  That is a staggering amount! The hand-cuffs came off in Domino 10, HCL allowed the developers to do things they have wanted to do the past 10 years.  And it really shows.

In July I was one of the few privileged partners, ISVs, and customers who were invited to HCL headquarters for their first “Factory Tour.”  This was an opportunity to meet and work directly with the product leads and developers of IBM Domino/Notes/Sametime/Traveler/Verse to get an “under the covers” glimpse of the new release while providing our input and feedback regarding what should be incorporated in follow-on releases.  During the Factory Tour, we also heard directly from the management team. The message was crystal clear: they understand the value of the product, how integral it is for solving a number of business problems, and their commitment to ensuring the success and longevity of the product.

I have also seen this reflected in the HCL development team.  These are the original Iris and Lotus developers.  When you talk to them about their experience in working for HCL, their eyes light up; their passion for the software they work on shines through so brightly.  They are like kids in a candy store, except rather than gorging themselves on sugary snacks, they are cranking out kick-ass functionality.

With all of this being the result of the HCL/IBM partnership, when I heard HCL was buying Domino and its associated collaboration products, I jumped for joy.  Now HCL has not only development and support of the collaboration stack, with the purchase, it now owns marketing and sales.  To me this is really huge as I do not believe it’s any secret that IBM can’t market its way out of wet paper bag.

With that being said, huge applause goes out to Andrew Manby and his team for the incredible work they have done with the Domino 10 launch events, they have been absolutely stellar. As with the developers and support personnel having transitioned from IBM to HCL with the partnership agreement, I am hopeful with this purchase agreement the same will hold true for the talented people that have gotten IBM Domino noticed again and started the much-needed public resuscitation of the product line to the world.

For those of you who are responsible for Domino in your companies and want to get a leg up on how you can ensure you are getting the most out of your environment while learning about features and functions that are most critical to implement along with tips and tricks from an “in the trenches” perspective, I have created a web education offering that is available at

This education offering has a bonus module on the key enhancements in Domino 10 including automatic cluster database symmetry and repair, replica synchronization tool and concurrency monitoring, along with hot view updating and note deletion logging.  This education offering came about based on concerns I was hearing from attendees and colleagues while speaking at conferences: “conferences only offer sessions on the very latest and greatest, but what about all of the other things I should be doing on a regular basis that are never talked about anymore”.  I took this input and put together a “boot camp” for Domino administrators to cover all of the crucial elements Domino administrators should be aware of while adding in expertise from years of boots on the ground experience that help to accelerate any administrator to the top of their ranks.

I would also like to bring your attention to another aspect of the HCL acquisition of IBM Domino and its affiliated products, the significance of HCL’s commitment to bringing back “the community.”  HCL has started a Client Advocacy program that is part of it’s Collaboration Community (  HCL is going out of their way to engage with their customers, partners, and ISVs to understand what their requirements are, using that input to shape future versions of the product.  I hope you take this opportunity to Join The Community.

As I wrap up this article, I want to address IBM Domino and the IBM i.  As many of you are aware, the past few years have a been a bit tenuous when it came to the commitment to IBM Domino on the IBM i. I am extremely happy to report this is no longer the case.  HCL is fully committed to IBM Domino support on the IBM i and has been actively hiring additional IBM i developers as they have made it extremely clear the IBM i is one of their strategic platforms!

You may be wondering why Domino 10.0 is not available on the IBM i at the time of my writing this article.  This is due to two main items: 1) not having enough IBM i developers on staff, therefore their active recruitment of additional developers and 2) the reality of all of the “legalese” involved in moving not only people but also the associated hardware the developers need in order to deploy and test the software to ensure customers have a rock-solid experience when they upgrade to Domino 10.  So while we may not have Domino 10.0 on the IBM i today, we will have it soon!

To keep up with all of the amazing things happening with Domino and its fellow products, check out and subscribe to Destination Domino:

The future is Yellow. Long live domino!!  #dominoforever #WeAreDomino

Kim Greene is president of Kim Greene Consulting, Inc. specializing in providing consulting services for the IBM Collaboration Solutions portfolio for IBM i (formerly AS/400, iSeries, System i), Windows, and Linux. Kim has over 15 years of experience with IBM Domino and 20 years of experience with the AS/400, iSeries, and i5 platforms. Kim specializes in installing and configuring Domino, Sametime and Connections servers, providing performance analysis, system and application tuning, health checks and security reviews, upgrades and migrations, disaster recovery assessments, high availability solutions, and customized application development.

Kim is also expanding the business to include services related to the fastest growing NoSQL database, MongoDB. Areas of specialization include architecture, performance, and security in addition to skill transfer.

Want to learn more about utilizing Domino? Kim Greene has a COMMON Boot Camp – Domino Administration: The Essentials. Check it out today!

Tips to Make Sure Your Disaster Recovery Plan is Effective

Having access to a quality information technology infrastructure is extremely important for all businesses. If a business suddenly does not have access to its data or systems, it can be very damaging. Because of this, having an effective disaster recovery plan in place is extremely important. There are several tips to follow to ensure your IT disaster recovery plan will be effective and available when you need it most.

Create a Comprehensive Plan

One of the most important parts of disaster recovery is coming up with a disaster recovery plan. This plan should carefully consider the needs of all people in your organization. Because of this, it is important that you include as many people as possible in the process. This will help to ensure that everything that needs to be accounted for is included. You also need to make sure you have a plan for what everyone’s responsibilities are in the event of a disaster.

Be Redundant

When you are completing a disaster recovery plan, you should focus on being redundant with the more significant issues. The last thing that you would want in the event of a disaster is to not have access to your plan because something is not working. Because of this, it would be wise to backup all laptops, backup servers and other data in multiple spots and create a system for checks and balances.

Check the Plan

The most important thing that you need to do is to make sure that you are able to check your disaster recovery plan on a regular basis. Ideally, you should test your disaster recovery strategy at least once per calendar quarter. This will help to ensure that all the systems are in place and functioning properly and that the necessary people properly understand their roles in the disaster recovery process.

Project Management in IT

Software upgrade rollouts. Database and server migrations. Security protocol change implementation. Hardware replacements and upgrades.

At any given time, your IT team is facing a list of projects that need to be completed. (Even more so at smaller companies where the “IT team” is one or two people trying to play catch-up when they’re not wearing one of their other hats.) At times, projects even seem to get added to your to-do list faster than you can cross them off.

Such is the nature of virtually any modern business. Staying current on security, delivering your customers the type of experience they demand, and equipping your employees with the tools they need to succeed requires you to be every bit as proactive about technological upgrades and process improvements as you are about system maintenance and monitoring.

The days when a calendar on your wall and sticky notes on your desk were adequate tools for managing the types of projects your company demands are in the past. Today, if you are going to have any chance of staying ahead of the curve on IT projects (and hopefully, maintain your sanity), you will need to be much more deliberate about your approach, understand how to work on multiple projects simultaneously, understand the proper sequencing for projects, and ensure that you are able to complete these projects in ways that minimize interruptions to your company’s work and your customers’ experience.

There are a myriad of tools designed to help you manage technical projects. There are, of course, classic tools like Microsoft Project, which remains the solution of choice for many companies and is a reasonable standard against which to measure any other potential solution. Other companies have signed large contracts with rapidly-expanding firms offering cloud-based project management platforms to simplify collaborative management and leverage shared data. Other companies embrace open source project management systems and platforms (whether installed locally or in the cloud) to access robust functionality without making a commitment to a single vendor.

No matter what route your company decides to go, it is imperative that you approach technical projects with the degree of intentionality that these solutions are designed to support. Successful project management is dependent on defining a clear scope of work, assigning the necessary resources, carefully and accurately documenting the work that needs to be done and the work that has been done, and following through.

Integrating PowerVC in an IBM i Shop

By Dana Boehler

The speed of business has never been faster. Product release cycles have shrunk to timelines inconceivable in the past. Some fashion retailers are now releasing new product every two weeks, a cycle that historically only happened 4-8 times a year, and certain retailers even have product available immediately after it is displayed on the runway.

The demand for immediate insight into the state of sales numbers, ad campaigns, and other business functions has made the continuous aggregation of data commonplace. And if those factors weren’t pressure enough, the threat of ever-evolving security hazards is generating mountains of updates, code changes, and configuration adjustments — all of which need to be properly vetted before entering a production environment.

All of this activity needs to run on infrastructure that administrators like ourselves must manage, often with fewer coworkers to assist. Thankfully, for those of us running IBM i on IBM Power Systems, IBM has provided a robust cloud management tool that allows us to quickly spin up and spin down systems: PowerVC.

PowerVC allows users to manage existing IBM Power System partitions, create images from those partitions, and deploy new partitions based on those images. More recent versions of PowerVC support IBM i management and deployment (earlier versions did not).

Over the past year, I have been using PowerVC to greatly reduce the amount of time it takes to bring a system into the environment. Typically, creating a new system would take several hours of hands-on keyboard work over the course of a few days of hurry-up-and-wait time. The first time I deployed a partition from PowerVC, however, I was able to reduce that to about an hour, and after more refinements in my deployment, images, and process, I am now down to under 25 minutes. That’s 25 minutes to have a fully deployed, PTF’d system up and running.

The full implications of this may not be readily apparent. Obviously, net new systems can be deployed much more quickly. But more importantly, new modes of development can be more easily be supported. PowerVC supports self-service system provisioning, which enables teams to create their own systems for development, test, and QA purposes, and then tear them down when no longer needed. Since the systems are focused on the task at hand, they do not need the resources a fully utilized environment would need.

There’s more: Templates can be created in PowerVC to give the self-service users different CPU and memory configurations, and additional disk volumes can be requested as well. Post-provisioning scripts are supported for making configuration changes after a deployed system is created. In our environment, we are taking this a step further by integrating PowerVC with Red Hat’s Ansible automation software, which has given us greater flexibility in pre- and post-provisioning task automation.

In practice, using PowerVC removes many of the barriers to efficient development inherent in traditional system deployment models and permits continuous deployment strategies. Using PowerVC, a developer tasked with fixing a piece of code can spin up a clean test partition with the application and datasets already installed, create the new code fix, spin up a QA environment that has all the scripted tests available for testing the code, and then promote the code to production and delete the partitions that were used for development and testing.

You do have to make some changes to the environment in order to support this model. Code needs to be stored in a repository, so it can be kept in sync between all systems involved. The use of VIOS is also required. Additionally, note that when using this type of environment, the administrator’s role becomes more centered around image/snapshot maintenance (used for deployment templates) and automation scripting rather than the provisioning and maintenance of systems.

For full information on the product and its installation, I recommend visiting IBM’s knowledge center.

Guest Blogger

Dana Boehler is a Systems Engineer and Security Analyst at Rocket Software, specializing in IBM i.

Why Should Your Office’s Internet of Things Be Limited?

The Internet of Things (IoT) is taking over everything from home security to personal fitness. It’s even stretching into commercial office spaces. IoT devices offer a lot of remote control and automation, which can help reduce expenses. But they also have their downsides. Here’s why you should limit IoT adoption in your office or make strict policies regarding the devices.

IoT Devices Don’t Have Standard Operating Systems

Programmable tools aren’t traditional computers in the way laptops or even smartphones are. Instead, they have very specific coding that performs a series of functions and transmits the data to your default devices. For example, security cameras can send video footage to a dedicated server, and water or carbon monoxide detectors send the data to the office manager’s phone. But you can only satisfactorily secure the data from one end: the one receiving the information.

Major brands offer consistency, and they are also the brands most likely to integrate seamlessly with your network and main OS in the office. That relative safety is even stronger for must-have office additions like security cameras and access control.

Opening Up Your Network to More Casual Devices Is a Risk

If your company has a BYOD (Bring Your Own Device) policy, then it’s hard to manage full network security under the best of circumstances. But if your coworkers personal IoT devices are trying to hook onto the network (even if they do so unsuccessfully), they could be carrying unknown programs and vulnerabilities. If an outside reader can get a detailed history of what tries to connect to your network, they can learn a lot about your protocols. It’s even worse if a coworker’s personal/business laptop is integrated with their fitness band, home security system, or more. Once a computer accepts a device as ‘trusted’, which is required for syncing for most personal IoT devices, that device has access to everything on the computer. Users just have to hope they don’t have the functionality to do anything with it.