RPG Toolbox 5.0 Gets Its Own Technology Refresh

Tuesday, October 22, 2013 Posted by

RPG Toolbox 5.0 Set for Release in NovemberIn anticipation of IBM’s V7R1 technology refresh 7, we’ve been working on an update to our popular RPG Toolbox™ product.  It was the very first product for Linoma Software and is still one of our most popular tools. Thousands of IBM i shops have already used this tool to successfully modernize their RPG programs and convert their fixed format C specifications to free form.

The new RPG Toolbox version 5.0 will now also convert the traditional H, F, D and P specifications into free form syntax.  It will include many customization options to allow you to choose how operations are converted and how the syntax will be styled.

The 5.0 release is planned for December and will allow the free form conversion to be performed from RDi, PDM and the command line. For more information about the new release of RPG Toolbox 5.0, check out the official announcement.

Current RPG Toolbox customers who are active on maintenance will be able to update to the new version at no additional charge.  You can download a free trial of our current version  and we’ll let you know as soon as the updates are ready.

 

 

IFS Files Can Be Automatically Encrypted
with Crypto Complete 3.3

Tuesday, September 24, 2013 Posted by

Crypto Complete™, one of the most popular encryption solutions for the IBM i, just took things to a whole new level.  Version 3.3 now allows users to automatically encrypt files stored on the Integrated File System (IFS).

IFS Automatic Encryption“We don’t think there is any other solution out there that provides this feature,” said Ron Byrd, Senor Engineer for Crypto Complete.  “Based on feedback we were getting from our customers, it seemed like the obvious next step for us.”

Version 3.3 can automatically protect the contents of any sensitive IFS files including PDF documents, text files, Excel spreadsheets, binary objects and other graphics files.

Administrators can designate which folders should be encrypted, and from then on, Crypto Complete will automatically encrypt any new files or data as soon as they are added to those targeted IFS folders.

Encrypted files will then automatically decrypt when accessed by specifically authorized users or groups. Tracking who accesses files is carefully logged with detailed audit trails.

Find out more about the newest release of Crypto Complete in this official announcement.

Five reasons we love tradeshows

Tuesday, September 10, 2013 Posted by

We’re packing up our displays and stocking up on brochures because this fall, we’re on the road again.  Our tradeshow schedule is busier than ever, and our team is covering events all over the country.

In the era of virtual meetings, video calling and event streaming, you might wonder why we even bother to exhibit at live conferences.

Here are five reasons we love tradeshows.

1. We meet lots of new people.

It’s fun to watch people stroll by our display and see the light bulb go on when they realize that we address issues that have been driving them crazy.  It’s even better to hear their incredulous reactions when we explain how much easier we can make their jobs.  Sometimes they’ll tell us about other solutions that have disappointed them, and that’s a great opportunity to share how our software might be a better fit.

2.  We talk at length with customers.Linoma Software at COMMON

We love when customers stop by our booth.  Often we’ve only talked to them on the phone or through an online meeting, so it’s good to meet them in person.  Sometimes they have questions that we can solve on the spot, and sometimes they want to get the inside scoop about what’s next in the development cycle.  Occasionally we can even get them on video sharing their experiences with GoAnywhere or Crypto Complete.

Here’s one of our senior developers, Ron Byrd, talking with longtime GoAnywhere customer Jit Sewchan of ScotiaBank.

3. We catch up with industry colleagues.

Tradeshows give us a chance to talk with other IT professionals, software developers, industry media and sales reps who are in the trenches with us.  It’s helpful to hear others’ perspectives about industry trends, and to get caught up on the newest players and products in the space.

4. We have fun.

Yes, the days can be long, but tradeshows aren’t all work and no play.  When the exhibit hall closes, we always find something fun to do.  The team will explore local restaurants, perhaps meet up with customers or colleagues, and we’ve even been known to track down a foosball table for some serious competition.

5. We sell software.

Obviously it wouldn’t be worth the investment if tradeshows didn’t benefit the bottom line, and they definitely do.  We think our success with tradeshows is because they give us the opportunity to talk with people, to listen to their challenges, and to explain how we believe we can help. Even if we don’t turn everyone into customers immediately, we’ve now given them something to think about when they are ready to find a solution.

Just in case you’ll be hitting the tradeshow circuit this fall, here are some of the places you’ll be able to find us:

Stop by our booth.  We always have chocolate!

 

Data Breaches Threaten Companies Worldwide

Monday, July 15, 2013 Posted by

As technology staffs contend with ongoing changes to the data distribution landscape, it is important to keep abreast of data security risks and to understand the significant importance of properly managing customer’s private data.

data breachThe Ponemon Institute recently released its annual data breach report which provides stats on data security issues and trends.  With more than 277 companies involved and 1400 individuals interviewed, this report provides a current and unique perspective of potential security risks associated with even the smallest data breach.

Below are highlights of the report which indicates data breaches remain a difficult challenge.

  • The report identifies three key causes of data breaches worldwide:
    • Malicious Attacks – 37%
    • Negligence – 35%
    • System Errors – 29%
  • The average per capita costs of a data breach increased to $136 per capita over the $130 per capita from the previous year.
  • The US had the highest total per incident cost of $5,403,644.
  • In 2013 the average number of breached records was 23,647
  • Healthcare, Financial and Pharmaceutical industries continue to be the top industries with the highest per capita costs incurred.

Ironically, the report noted that organizations that notified victims too soon following a data breach actually incurred higher costs. This is an indication that an incident management plan should be in place to properly mitigate the data breach event.

It’s clear, based on the data in this report, that companies need to look beyond technology solutions that secure systems and communications.  It is important that the human factors are considered like employee training and creating an incident management plan to provide a full proof data security strategy.

Take a look at the full 2013 Ponemon Institute Data Breach report for more information on the top reasons that data breaches occurred and ways to decrease the risks and costs associated with them.

For information on how your company can build a better strategy to avoid data breaches, download our free white paper “Defending Against Data Breach: Developing The Right Strategy for Data Encryption.”

 

1.800.949.4696  |  sales@linomasoftware.com  |  privacy policy
Copyright ©1994 - 2012 Linoma Software  |  All rights reserved