John Westcott on Unlocking the Value of Data
June 1, 2023
Db2 for i consultant John Westcott on the business benefits of dimensional modeling
PodcastsThe Case for IBM i and the Cloud
May 23, 2023
This transcript is lightly edited for clarity. Paul Tuohy: Hi everybody and welcome to another iTalk Business with Tuohy. I’m delighted to be joined today—well actually joined again today by Tom Huntington, who is the executive VP of technical solutions at Fortra. Sorry—before we go any further Tom, just to get this out of the […]
PodcastsDebbie Saugen on IBM i Backup and Recovery
May 1, 2023
This transcript is lightly edited for clarity. Charlie Guarino: Hi everybody. This is Charlie Guarino. I’m sitting here today with Ms. Debbie Saugen of Debbie Saugen Consulting. Debbie, you and I have known each other for quite some time and I know you are the recognized worldwide expert on IBM i backup and recovery, […]
ArticlesIBM and Cohesity Collaborate to Offer New Security Solution
March 3, 2023
On March 2, IBM announced that it is partnering with Cohesity to offer a new Storage Defender solution that includes IBM Storage Protect, IBM Storage FlashSystems, IBM Storage Fusion, and Cohesity DataProtect. IBM Storage Defender uses AI and event monitoring to combat the impacts of breaches and cyberattacks as security risks rise in today’s data-driven […]
ArticlesIBM, Lenovo, HPE and Huawei Servers Remain Most Reliable Despite Security and Supply Chain Challenges
December 13, 2022
According to a 2022 ITIC survey, the zSystems mainframe and LinuxONE III recorded 3.15 seconds of unplanned per server/per minute annually—making IBM servers the most reliable
How to Navigate Ransomware Attacks
December 7, 2022
We know from the IBM Cost of a Data Breach Report that the average time to identify and contain a data breach is 277 days–207 days to identify the breach and 70 days to contain the breach. The report also found that the average cost of a data breach is $4.35 million. And we know […]
ArticlesEnable Rapid Ransomware Recovery With IM Software
November 3, 2022
Many people work on the principle that their mainframe is safe from catastrophic attacks because it is different from Linux and Windows platforms. Hackers don’t understand how it works—what they used to call security by obscurity. Unfortunately, mainframes are generally high-value targets with plenty of critical data residing on them. That makes them an enticing […]
ArticlesHow to Create a Business Continuity and Disaster Recovery Plan
June 7, 2022
In IT operations, there is a constant threat of equipment failures, site outages or chaos erupting after work hours. Keeping IT operations uninterrupted is vital to maintaining the security and accessibility of sensitive company data for small businesses and large organizations alike. Doing so requires new business continuity measures, especially as data storage devices continue […]
ArticlesMainframe Security: Are There More Gaps in Your Defenses Than You Thought?
May 16, 2022
Hackers are always trying to find ways into your mainframe and exfiltrate your data. Trying to stay ahead of their ingenuity can be hard work. Luckily, penetration testers are doing that work for us, and we can learn a lot from them about how to strengthen our defenses. Threats to the Mainframe When people talk […]
ArticlesAIX 7.3 Leverages Power10 Processor to Support Customers’ Hybrid Multicloud and AI Endeavors
October 19, 2021
The new AIX 7.3 release brings customers new ways to integrate their mission critical infrastructure with new and enhanced capabilities. IBM designed AIX 7.3 in response to feedback from customers, particularly around extracting business value from data and supporting their hybrid multicloud strategies. Its new features take advantage of the unique capabilities of the Power10 […]