February 15, 2023
February 15, 2023 | Volume 12 Issue 78
- LEAD ARTICLE: Can Security and Artificial Intelligence (AI) Mix?
- FEATURE ARTICLE: Artificial Intelligence, Part 2: Artificial Intelligence, Machine Learning, and Deep Learning
- FEATURE ARTICLE: Artificial Intelligence (AI) Use Cases: Finance and Insurance
- FEATURE ARTICLE: Penetration Testing - Do you need proof that Menu Security is sufficient?
- NEWS HIGHLIGHT: Fresche Solutions Acquires Silveredge Consulting to Expand Application Support Services and ERP Capabilities
- WHITE PAPER: Why Migrate When You Can Modernize?
- EVENT: Tuesday, February 21, 2023 OCEAN Meeting - How Does RDi Compare with VS Code’s IBM i Extension?
Can Security and Artificial Intelligence (AI) Mix?
Carol investigates the use of AI and its implications on IBM i Security
By Carol Woodbury
You can’t read or listen to any business, technical, or security-related news without hearing the term “AI” (Artificial Intelligence). With Microsoft’s investment in ChatGPT causing interest to explode, warnings are in almost every security-related newsletter I subscribe to. Examples include research showing how AI is being used by non-programmers to write malware, news articles regarding concerns that students will simply use ChatGPT to write their term papers, and an IBM i user group presentation showing how you can use ChatGPT to write RPG code. I decided it was time I check it out for myself. Not being familiar with how to use ChatGPT, I watched a YouTube video to get started. Then I had to decide how to put ChatGPT to the test.
IBM Quantum Computer Demonstrates Next Step Towards Moving Beyond Classical Supercomputing
Artificial Intelligence, Part 2: Artificial Intelligence, Machine Learning, and Deep Learning
Artificial Intelligence (AI), and to a lesser extent, Machine Learning (ML) and Deep Learning (DL) are three popular terms you hear frequently. And for good reason – they represent a major step forward in how computers can be used to solve problems. Read Part 1, Understanding Data.
By Roger Sanders
When Google DeepMind’s AlphaGo program defeated 18-time world champion Lee Sedol in March 2016, all three terms were used by the media to describe how DeepMind won. But, although these terms are often used interchangeably, they are not the same. Instead, you can think of AI, ML, and DL as a set of Russian dolls nested within each other, with the largest, outermost doll being AI and the smallest, innermost doll being DL (leaving ML in the middle).
Artificial Intelligence (AI) Use Cases: Finance and Insurance
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the financial world.
By Roger Sanders
The implications are vast, though most banks are still in the early stages of adopting these technologies – a recent survey conducted by Narrative Science and the National Business Research Institute found that 32% of financial services executives are already using AI technologies like predictive analytics, recommendation engines, and voice recognition.
Why Migrate When You Can Modernize?
Explore the main considerations you should be aware of before embarking on a (migration or modernization) project. Take a deeper dive into business motivations and factors that could potentially influence your decision to migrate or modernize your existing IT platform and its risks.
More than ever, there is a demand for IT to deliver innovation.
Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.
Node Webinar Series Pt. 1: The World of Node.js on IBM i
Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
watch now!
Low Code: A Digital Transformation of Supply Chain and Logistics
Learn how businesses leverage Low-Code to continue to deliver value through digital transformation. Discover how the power of Low-Code is helping many businesses evolve their supply chain, increase ROI, and achieve more tangible results.
Watch this webcast now.
Easiest Way to Save Money? Stop Printing IBM i Reports
The thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
Manage your reports with the Robot Report Management Solution.
Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.
Comply in 5! Well, actually UNDER 5 minutes!!
TRY the one package that solves all your document design and printing challenges on all your platforms.
Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.
Penetration Testing - Do you need proof that Menu Security is sufficient?
Many organizations which believe that menu-based security is sufficient to protect their IBM i data scoff at the idea that their information is vulnerable. So why not prove it?
By DXR Security, LLC.
Penetration Testing for IBM i will provide you with the proof that users can access information from outside of your application menus … or they can’t. Or perhaps you haven’t made this assertion but it’s coming from your application vendor. Yet you’ve seen presentations and read articles that make you uncomfortable and you’re wondering whether the assertion that menu-based security is sufficient to protect your organization’s data is true. Why not get evidence – one way or the other?