Welcome to another edition of Talsco Weekly
- IBM i Brief: 📢 IBM i TR6 release causes confusion.
- AI + Security: 🚨 AI Misuse Cases Revealed in March Report.
- Career: 💡 Learn by solving real problems. 💼 Aging Workforce Study Shows Evolving Priorities.
- Development: What is React?
- Database: 💻 Database Modernization Without Business Disruption.
- Hiring: 💼 IBM i Talent Market Shows Evolution in 2025.
- Security & Administration: 🔒System Request Menu Security. 🚀IBM Launches Manzan.
IBM i Brief
📢 IBM i TR6 release causes confusion
IBM released IBM i 7.6 and 7.5 TR6 on April 8, shipping April 18. While 7.6 launched as planned, 7.5 TR6, used by 32% of the base, was delayed. IBM split updates into software and hardware, delivering 7.5 TR6 via cumulative PTFs, not a single package, frustrating users. Confused? Read more here.
AI + Security
🚨 AI Misuse Cases Revealed in March Report
Anthropic’s March 2025 report uncovered sophisticated actors exploiting AI models, including an influence-as-a-service operation managing 100+ social media bots, credential stuffing targeting IoT cameras, and recruitment fraud campaigns.
The report highlights how threat actors are adapting to leverage AI for malicious purposes, from automating social media manipulation to enhancing technical capabilities beyond their skill level. The full report can be read here.
Key Takeaway:
The Shift: AI vendors like Anthropic are now openly addressing malicious uses of their models. It is signaling a shift toward transparency driven by AI’s growing enterprise impact.
This openness underscores the dual-use nature of AI, where its power to innovate is matched by risks that demand robust safeguards.
Going forward, enterprises must balance AI’s transformative potential with the ethical and security challenges it introduces.
Career
💡 Learn by solving real problems
Developers acquire new skills most effectively by actively solving practical challenges rather than passive learning methods like watching tutorials.
💼 Aging Workforce Study Shows Evolving Priorities
Companies need to adapt their talent strategies as research shows older workers prioritize autonomy and meaningful work, yet few organizations effectively integrate these experienced professionals.
Development
What is React?
We consistently work with IBM i clients that are leveraging this powerful Javascript library to extend the reach of their core IBM i Applications.
The How, Where, and When to Use React
- How: React builds modern web UIs for IBM i apps, integrating via APIs or Node.js on IBM i.
- Where: React enhances IBM i apps on web browsers, mobile devices, or hybrid apps using frameworks like React Native.
- When: Use React when modernizing IBM i apps, adding responsive UIs, or connecting to web-based services and analytics.
Learn How to Get Started with React
Whether you’re a seasoned developer or just starting out, understanding React can significantly enhance your development capabilities. Here’s what you need to know to begin your React journey:
- Master the fundamentals of JavaScript first
- Understand React’s component-based architecture
- Practice with hands-on projects and tutorials
- Join the React community for support and resources
A great place to rub elbows with fellow IBM i-ers and dive into React would be at PowerUp this month.
Dive into the world of React, the popular JavaScript library for building dynamic user interfaces. In this session, we will cover React from the ground up, including why you might want to use it over vanilla JavaScript and how it works, all the way up to more advanced concepts, such as state management and react hooks.
Database
💻 Database Modernization Without Business Disruption
IBM i shops can now modernize their Db2 databases without extended downtime using MDRapid’s innovative database transformation solution.
The tool enables critical database updates, including file reorganization, DDS to SQL DDL conversion, and field modifications, all while keeping applications running.
With features like background data transformation, concurrent updates, and robust rollback capabilities, organizations can confidently implement database changes with minimal business impact.
Hiring
💼 IBM i Talent Market Shows Evolution in 2025
The landscape of IBM i recruitment is shifting as companies face the dual challenge of preserving legacy system knowledge while adapting to modern development needs. Many organizations are now offering hybrid work arrangements and emphasizing modernization projects to attract skilled professionals.
Security & Administration
🔒System Request Menu Security
IBM i administrators can restrict user access to system request functions through menu controls, enhancing system security and preventing unauthorized job management.
How Secure is Your IBM i?
While the IBM i is known for its robust security architecture, this advantage only exists when properly implemented and maintained. Organizations often become complacent with basic security measures, but today’s interconnected landscape requires a more comprehensive approach. With the IBM i now supporting various web services and APIs, implementing multi-factor authentication (MFA), regular penetration testing, and proactive monitoring has become crucial.
From passive logging to active monitoring and proactive prevention, we have a product for every step of the IBM i (AS/400) security journey. Key security measures should include:
- Implementing 2FA/MFA for all user accounts
- Regular penetration testing to identify vulnerabilities
- Real-time security monitoring and alerts
- Comprehensive audit logging of system access
- Network security controls for API and web service endpoints
Securing your IBM i is a dual responsibility. If you haven’t already seen this, watch the video replay of this webinar with Steve Will and Carol Woodbury on April 23, 2025.
In summary: IBM i 7.6 delivers powerful security enhancements, including multi-factor authentication (MFA) to thwart attacks like social engineering. New default password settings bolster security, while security by design ensures compliance with industry standards. Flexible MFA rollouts and vendor integration simplify implementation. Proactive vulnerability reporting, accurate software inventories, and regular updates are vital to counter rising IBM i attacks. If you’re an IBM i Manager, Developer, or Systems Administrator, this information is critical. Click here to learn how to secure your system!
The tech giant introduces a new open-source event monitoring tool for IBM i that consolidates multiple event types into a single interface, supporting various endpoints including HTTP, email, and cloud services. Read all about it on TechChannel and GitHub.
What is Manzan and who is it for?
Manzan is an open-source event monitoring tool developed by Jesse Gorzinski for IBM i systems. It was designed to simplify system operations and monitoring by streamlining tasks and making routine system administration more manageable. The tool is ideal for:
- IBM i System Administrators looking to consolidate monitoring tasks
- IT professionals who need simplified event tracking across multiple endpoints
- Organizations wanting to streamline their system operations
- Teams seeking an integrated solution for monitoring system events
Join
Sign up for Talsco Weekly to get the latest news, insight and job openings for the IBM i professional.
Contact us
If you are an RPG programmer looking to explore opportunities or a client who is looking for a talented IBM i professional, please contact us. We look forward to assisting you.
Share
Do you know of someone who could benefit from Talsco Weekly? If so, please use the social media buttons to spread the word. Thank you!