Maintain system integrity and validate all your changes There are many aspects to consider, but commonly at the top of the list is either  a) Re-engineering of the code base to make use of service programs and procedures, or  b) …

Modernizing IBM i applications – Will it break everything? Read more »

Tagged with: ,

Test Data solved in four steps 1. Extract, 2. Scramble, 3. Verify, 4. Roll-back So far we’ve talked about – 1. Extracting & Subsetting, and 2. Scrambling or Obfuscation to create good secure test data.  But what do you do when …

IBM i Data Validation – like Having Super Hero X-Ray Vision. Read more »

Tagged with: , , ,

Test Data solved in four steps 1. Extract, 2. Scramble, 3. Verify, 4. Roll-back Perhaps following on from my previous blog, you’ve got an extract of your live data, an intelligent subset that drives the key test conditions.  OK, but the trouble …

IBM i Data Security: Are you Playing your Cards Right? Read more »

Tagged with: , ,

Test Data solved in four steps 1. Extract, 2. Scramble, 3. Verify, 4. Roll-back The IBM i has arguably the best security record of any business application platform in common use. A great place to be if you have one.  But pressures …

IBM i Data Security: Are you Sitting Comfortably? Read more »

Tagged with: , ,