Skip to main content

Sort by
Articles

The GDPR Is New, but the Requirements Aren’t

George Faucher

July 1, 2018

Data breach studies are revealing shocking statistics. In a 2017 study (ibm.co/2Bir60B), IBM and Ponemon Institute found that the average time it took to discover a data breach was 191 days. In addition, a recent Protenus study (bit.ly/2jUv7gI) found that it took one healthcare organization over four years to discover a data breach. With digital […]

Articles

Rabobank Transforms Its Payments System With DevOps on IBM Z

Shirley S. Savage

July 1, 2018

When global financial services provider Rabobank decided to renovate its payments system four years ago, it took a broad view of the project. The bank assessed its hardware, its payments processing requirements and the need for end-to-end testing of its processes. The result was a payments system built on IBM Z* using DevOps to provide […]

Articles

Tokenized Encryption Helps Merchants Tackle Security Challenges

Ira Chandler

May 1, 2018

As threats to data security proliferate, the actions taken by the governing bodies are evolving. The governing authority for credit card data is the Payment Card Industry (PCI) Security Standards Council (SSC), which was built by the card brands: Visa, MC, Discover, American Express and JCB. The PCI provides the best practices security standards for […]

Articles

IBM z14 Model ZR1 Is Ready for Cloud, Pervasive Encryption and More

Jim Utsler

May 1, 2018

How can medium-sized businesses solve the conundrum of scaling for business growth with ease and confidence? The answer is the latest lean, mean and super fast player in the IBM Z* product line, the IBM z14* Model ZR1. It hits the field of play with a complete new physical system design. In a world where […]

Articles

Linux on IBM Z Positions Clients to Move Forward

Jeff Reser

May 1, 2018

Through the lens of a new wave of technological advances built around advanced analytics, artificial intelligence (AI), machine learning, container development, blockchain, cloud and data security, a strategy shift is occurring in how mainframes are being used and leveraged. At the same time, mainframes are being refreshed with features around Linux*, pervasive encryption, virtualization and performance—all integrated […]

Articles

Why Clients Rely on Linux on IBM Z and LinuxONE

Shirley S. Savage

May 1, 2018

Today’s demanding workloads require a flexible approach for DevOps and deployment. IBM Z* clients reap the benefits of flexibility by running Linux* along with traditional IBM Z OSes. Organizations also are deploying Linux in standalone IBM Z and LinuxONE* installations. The Linux OS enables clients to use up-to-date technologies for their applications. Linux workloads integrated […]

Articles

Centralized Cloud and Security Management Empowers IT

April 1, 2018

For IBM Power Systems clients, transforming their virtualized data center into a self-service private cloud and protecting it with automated security management just became an easier and more powerful proposition. IBM has introduced important new capabilities by advancing IBM Power Security Center (PowerSC) and Power Virtualization Center (PowerVC) software. Both were recently announced at Think […]

Articles

The Special Attributes of Computer Security Hardware

Joseph Gulla

March 12, 2018

Many of us think about security with primarily a software focus. You might be surprised to know about the special security hardware and its role in safeguarding data.

Articles

IBM Framework Helps Clients Prepare for the EU’s General Data Protection Regulation

Jim Utsler

March 1, 2018

General Data Protection Regulation (GDPR) goes into effect on May 25, impacting most every organization—no matter the location—that deals with European Union (EU) data subjects. “Whether an organization has a physical presence in the EU doesn’t matter, even if you’re just marketing to, profiling or collecting information about EU individuals, citizens, residents or visitors. The […]

Articles

IBM Design Thinking Leads to an Elevated User Experience

Brett Martin

February 1, 2018

Before design thinking even had a name, innovative companies saw its value. The premise is straightforward—a product should be designed and built to meet the users’ wants and needs. In 2012, Charlie Hill, IBM Fellow, vice president, Platform Experience, began working with Phil Gilbert, general manager for IBM Design, to co-found IBM Design Thinking. “Design […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.