Skip to main content

Sort by
Articles

Innovations in the Terminal Emulation Space

Jennifer Goforth Gregory

February 23, 2021

A look at innovations in the terminal emulation space, and what to keep in mind when selecting a terminal emulator vendor

Articles

How Air-Gap Backup and Tape-Based Technology Protect Against Cybercrime

John Shuman

February 10, 2021

Cybercrime is a prevalent topic in today’s news. It’s changing the way business is conducted to maintain data integrity and protection from theft. Data is the life blood of any organization; cybercriminals seek to exploit data from human as well as security vulnerabilities inherent to the software or hardware structures. Much of corporate data today […]

Articles

Why Certificate Rotation Matters to Your Kubernetes and OpenShift Clusters’ Security

David Bisson

February 8, 2021

In a 2019 survey, the Cloud Native Computing Foundation (CNCF) found that a majority (84%) of respondents were running containers in production. That’s 15% more than the previous year. CNCF also learned that the percentage of organizations running 250 or more containers in production was up 28%. So, why is this happening? Organizations are increasingly […]

Articles

The Best Ways to Keep Your Data Private

Brad Smith

January 28, 2021

In the wake of the COVID-19 pandemic, more people have turned to the internet to help get daily tasks safely completed. Whether it’s ordering your next grocery delivery online or hosting video calls from a make-shift home office, technology has become not just a luxury, but a necessity, for many. As vaccines begin to roll […]

Articles

IBM Analytics Products Have a Strong Focus

Joseph Gulla

October 28, 2020

There’s a lot to the analytics software topic, so it helps to understand it using tools like IBM’s analytics products model

Articles

Is Your Data Ready for AI?

Joseph Gulla

October 20, 2020

Analytics products and services can discover meaningful patterns in data that reveal insights that organizations can interpret and communicate to others.

Articles

Sensitive Data Control

Jim Utsler

September 1, 2020

It’s an unfortunate fact of business life that bad actors are out there trolling for sensitive data. For them, the risk-reward is relatively low. For those whose data is breached, though, the costs can be exorbitant, whether from loss of intellectual property (IP), being socked with massive fines or losing customer goodwill. The news isn’t […]

Articles

IBM Tools Support Layered Data Privacy and Protection

Kristin Lewotsky

July 23, 2020

Data today is on the move. It’s traveling from the server to the storage area network, from the enterprise into the cloud, or even to third parties. Although the IBM Z® platform protects data on the platform with pervasive encryption, the data can be vulnerable the moment it leaves the mainframe. Data can be breached […]

Articles

New Levels of Computing Flexibility

Jim Utsler

May 4, 2020

Designing a comprehensive computing environment was once a relatively straightforward endeavor: install a server and other hardware, load an OS and applications, and offer access to end users. This has become a bit more complicated as computing moves outside the confines of data center walls to become part of hybrid multicloud environments, which is a […]

Articles

Meet the New IBM z15 and IBM LinuxONE III Models

Karen E Lewis

April 14, 2020

Every client’s cloud journey is unique—there’s no one-size-fits-all. But most organizations are or will soon be operating in a hybrid multicloud environment. In this environment, you are challenged to keep data secured, systems available and costs manageable. Meeting these challenges requires the right IT infrastructure. Enter the New IBM Z and IBM LinuxONE Models New […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.