Log4Shell Part 2: 3 Best Practices for Software Security
January 6, 2022
Log4Shell and others provide a constant reminder that IT security is a perpetual task. Jesse Gorzinski highlights three security best practices you should follow to keep software secure.
ArticlesApache Log4j Vulnerability, AIX Tips and Tools, a Look at Time Drift, and More
January 4, 2022
IBM Champion Rob McNelly on the Log4j security vulnerability, helpful AIX tips and tools, time drifts on POWER8 and POWER9 servers, and more
ArticlesThe History of Business Computing Part 1: Counting the Benefits
December 20, 2021
How did we go from the joy of the freedom that personal, commodity computing brought us, to unidimensional cynicism about industrial-strength computing, valuing everything by gross costs without a consideration of the nature and amount of what was being delivered? For that matter, how did we get to a place where requests for proposals (RFPs) […]
ArticlesAre Containers on Mainframes Safe?
December 20, 2021
Let’s just start with some basics: What is a container? A container is a standard unit of software that packages up code and all of its dependencies, so the application runs quickly and reliably in different computing environments. In effect, this container can be taken from one computing platform to another, and it will still […]
ArticlesWhat Is the TLS Handshake Process?
December 15, 2021
A vast majority of web applications and websites today use the HTTPS protocol that enables data encryption between the client and server. It is, therefore, always a good idea to have at least a very basic understanding of how the whole encryption process works—how the encryption begins and how it is established, and that is […]
Log4Shell Part 1: Answering FAQs on the Log4Shell Security Vulnerability
December 14, 2021
Jesse Gorzinksi on the Log4Shell security vulnerability, what it impacts and how to remediate the problem in Java programs
ArticlesChristian Jacobi, Chief Architect for IBM Z Processors, on the New IBM Telum Chip
November 2, 2021
IBM’s new Telum chip fulfills clients’ business imperatives with a new cache infrastructure, optimized core and the ability to embed AI directly into enterprise workloads. First announced at the annual Hot Chips conference, this innovative processor chip enables IBM clients to leverage AI technologies and grow their workloads. Christian Jacobi, Distinguished Engineer and Chief Architect […]
VideoIBM Champion Rob McNelly on the New AIX 7.3 Announcement
October 29, 2021
AIX 7.3 was announced on October 19, 2021. Get the details from Rob McNelly in this video.
ArticlesAIX 7.3 Leverages Power10 Processor to Support Customers’ Hybrid Multicloud and AI Endeavors
October 19, 2021
The new AIX 7.3 release brings customers new ways to integrate their mission critical infrastructure with new and enhanced capabilities. IBM designed AIX 7.3 in response to feedback from customers, particularly around extracting business value from data and supporting their hybrid multicloud strategies. Its new features take advantage of the unique capabilities of the Power10 […]
ArticlesBringing Choice, Consistency and Protection to Hybrid Cloud Strategies
October 13, 2021
Hybrid cloud has quickly grown in popularity, but with this extensive growth it’s more important than ever for organizations to develop strategies that address cost control, IT complexity, cybersecurity threats and data corruption. When developing a hybrid cloud strategy, notes Scott Baker, VP, Storage Product Marketing for IBM, it’s important for organizations to define what […]