Skip to main content

Sort by
Articles

Log4Shell Part 2: 3 Best Practices for Software Security

Jesse Gorzinski

January 6, 2022

Log4Shell and others provide a constant reminder that IT security is a perpetual task. Jesse Gorzinski highlights three security best practices you should follow to keep software secure.

Articles

Apache Log4j Vulnerability, AIX Tips and Tools, a Look at Time Drift, and More

Rob McNelly

January 4, 2022

IBM Champion Rob McNelly on the Log4j security vulnerability, helpful AIX tips and tools, time drifts on POWER8 and POWER9 servers, and more

Articles

The History of Business Computing Part 1: Counting the Benefits

Reg Harbeck

December 20, 2021

How did we go from the joy of the freedom that personal, commodity computing brought us, to unidimensional cynicism about industrial-strength computing, valuing everything by gross costs without a consideration of the nature and amount of what was being delivered? For that matter, how did we get to a place where requests for proposals (RFPs) […]

Articles

Are Containers on Mainframes Safe?

Trevor Eddolls

December 20, 2021

Let’s just start with some basics: What is a container? A container is a standard unit of software that packages up code and all of its dependencies, so the application runs quickly and reliably in different computing environments. In effect, this container can be taken from one computing platform to another, and it will still […]

Articles

What Is the TLS Handshake Process?

Subhasish Sarkar

December 15, 2021

A vast majority of web applications and websites today use the HTTPS protocol that enables data encryption between the client and server. It is, therefore, always a good idea to have at least a very basic understanding of how the whole encryption process works—how the encryption begins and how it is established, and that is […]

Articles

Log4Shell Part 1: Answering FAQs on the Log4Shell Security Vulnerability

Jesse Gorzinski

December 14, 2021

Jesse Gorzinksi on the Log4Shell security vulnerability, what it impacts and how to remediate the problem in Java programs

Articles

Christian Jacobi, Chief Architect for IBM Z Processors, on the New IBM Telum Chip

Brianna Boecker

November 2, 2021

IBM’s new Telum chip fulfills clients’ business imperatives with a new cache infrastructure, optimized core and the ability to embed AI directly into enterprise workloads. First announced at the annual Hot Chips conference, this innovative processor chip enables IBM clients to leverage AI technologies and grow their workloads. Christian Jacobi, Distinguished Engineer and Chief Architect […]

Video

IBM Champion Rob McNelly on the New AIX 7.3 Announcement

Rob McNelly

October 29, 2021

AIX 7.3 was announced on October 19, 2021. Get the details from Rob McNelly in this video.

Articles

AIX 7.3 Leverages Power10 Processor to Support Customers’ Hybrid Multicloud and AI Endeavors

Scott McKinney

October 19, 2021

The new AIX 7.3 release brings customers new ways to integrate their mission critical infrastructure with new and enhanced capabilities. IBM designed AIX 7.3 in response to feedback from customers, particularly around extracting business value from data and supporting their hybrid multicloud strategies. Its new features take advantage of the unique capabilities of the Power10 […]

Articles

Bringing Choice, Consistency and Protection to Hybrid Cloud Strategies

Keelia Estrada Moeller

October 13, 2021

Hybrid cloud has quickly grown in popularity, but with this extensive growth it’s more important than ever for organizations to develop strategies that address cost control, IT complexity, cybersecurity threats and data corruption. When developing a hybrid cloud strategy, notes Scott Baker, VP, Storage Product Marketing for IBM, it’s important for organizations to define what […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.