…because now you can! Now you can properly check everything in depth to help avoid collateral damage for any change, and you don’t have to have a complete picture of the application before you start. As well as giving IBM …

Testing IBM i in depth. If you are going to do it – please do it properly. Read more »

Tagged with: , ,

Technology moves on but will your core applications still work as expected? There are many technologies which, at the time, we could not imagine a world without. Many of us will remember when there was a phone box on every …

IBM i Client Access is dead- Long Live IBM i ACS (Access Client Solutions) Read more »

Tagged with:

Maintain system integrity and validate all your changes There are many aspects to consider, but commonly at the top of the list is either  a) Re-engineering of the code base to make use of service programs and procedures, or  b) …

Modernizing IBM i applications – Will it break everything? Read more »

Tagged with: ,

Test Data solved in four steps 1. Extract, 2. Scramble, 3. Verify, 4. Roll-back So far we’ve talked about – 1. Extracting & Subsetting, and 2. Scrambling or Obfuscation to create good secure test data.  But what do you do when …

IBM i Data Validation – like Having Super Hero X-Ray Vision. Read more »

Tagged with: , , ,