Skip to main content

Sort by
Articles

Log4Shell Part 2: 3 Best Practices for Software Security

Jesse Gorzinski

January 6, 2022

Security is as important a topic as ever! Organizations everywhere are grappling with their approach to cybersecurity. In my previous post, I addressed some basics about the highly-publicized “Log4Shell” security vulnerability. Log4Shell and others provide a constant reminder that IT security is a perpetual task. A properly protected technology stack requires certain best practices to be […]

Articles

Apache Log4j Vulnerability, AIX Tips and Tools, a Look at Time Drift, and More

Rob McNelly

January 4, 2022

System security is no laughing matter. Well, occasionally it’s a laughing matter, but I’ll get to that in a moment. On Dec. 15 IBM issued a security bulletin regarding a vulnerability in Apache Log4j that affects the Power HMC. Check the IBM PSIRT blog for the latest updates: “… Product teams are releasing remediations for […]

Articles

The History of Business Computing Part 1: Counting the Benefits

Reg Harbeck

December 20, 2021

How did we go from the joy of the freedom that personal, commodity computing brought us, to unidimensional cynicism about industrial-strength computing, valuing everything by gross costs without a consideration of the nature and amount of what was being delivered? For that matter, how did we get to a place where requests for proposals (RFPs) […]

Articles

Are Containers on Mainframes Safe?

Trevor Eddolls

December 20, 2021

Let’s just start with some basics: What is a container? A container is a standard unit of software that packages up code and all of its dependencies, so the application runs quickly and reliably in different computing environments. In effect, this container can be taken from one computing platform to another, and it will still […]

Articles

What Is the TLS Handshake Process?

Subhasish Sarkar

December 15, 2021

A vast majority of web applications and websites today use the HTTPS protocol that enables data encryption between the client and server. It is, therefore, always a good idea to have at least a very basic understanding of how the whole encryption process works—how the encryption begins and how it is established, and that is […]

Articles

Log4Shell Part 1: Answering FAQs on the Log4Shell Security Vulnerability

Jesse Gorzinski

December 14, 2021

You’ve likely heard of the Log4Shell (aka “LogJam”) security vulnerability that was recently published. It has gotten a lot of press, and understandably so; it can be easy to exploit, and it can allow an attacker to perform remote code execution. You definitely shouldn’t ignore this one! To help you understand what this means, I’ve […]

Articles

Christian Jacobi, Chief Architect for IBM Z Processors, on the New IBM Telum Chip

Brianna Boecker

November 2, 2021

IBM’s new Telum chip fulfills clients’ business imperatives with a new cache infrastructure, optimized core and the ability to embed AI directly into enterprise workloads. First announced at the annual Hot Chips conference, this innovative processor chip enables IBM clients to leverage AI technologies and grow their workloads. Christian Jacobi, Distinguished Engineer and Chief Architect […]

Video

IBM Champion Rob McNelly on the New AIX 7.3 Announcement

Rob McNelly

October 29, 2021

As I finished running 13.1 miles at the Lake Powell half marathon, I realized that I had not told you about the AIX 7.3 announcement from IBM. The announcement letters are easy enough to find on the IBM website. 7.3 was officially announced on October 19, and although there is more than just the AIX announcement, […]

Articles

AIX 7.3 Leverages Power10 Processor to Support Customers’ Hybrid Multicloud and AI Endeavors

Scott McKinney

October 19, 2021

The new AIX 7.3 release brings customers new ways to integrate their mission critical infrastructure with new and enhanced capabilities. IBM designed AIX 7.3 in response to feedback from customers, particularly around extracting business value from data and supporting their hybrid multicloud strategies. Its new features take advantage of the unique capabilities of the Power10 […]

Articles

Bringing Choice, Consistency and Protection to Hybrid Cloud Strategies

Keelia Estrada Moeller

October 13, 2021

Hybrid cloud has quickly grown in popularity, but with this extensive growth it’s more important than ever for organizations to develop strategies that address cost control, IT complexity, cybersecurity threats and data corruption. When developing a hybrid cloud strategy, notes Scott Baker, VP, Storage Product Marketing for IBM, it’s important for organizations to define what […]