Skip to main content

Sort by
Articles

Basic AIX Security Strategies and Best Practices

Jaqui Lynch

April 20, 2021

Security is a very hot topic for a good reason. So much of our personally identifying data is now being stored that the security break-ins that have been happening have most likely affected everyone reading this article. Additionally, the penalties now for breaches of the various standards (HIPAA, PCI, etc) are significant. Good security requires […]

Articles

Cloud Computing to Address Europe’s Growing Data Infrastructure Needs

Saloni Walimbe

April 15, 2021

Rapid penetration of IoT technologies and proliferating smartphone usage has prompted a growth in big data applications. This, in turn, has led to the accelerated development of data centers worldwide. In Europe, in light of the global crisis triggered by the COVID-19 pandemic, several noted companies like Microsoft, Alibaba and NTT have made strategic investments […]

Articles

Accelerating Clinical Trials With Big Data Analytics

Keelia Estrada Moeller

April 14, 2021

We’ve seen several groundbreaking scientific discoveries and technological breakthroughs over the last few years—from the second coming of mRNA, to gene therapies and cell therapies, and of course—emerging COVID-19 treatments and vaccines. If there’s anything this pandemic has taught us, it’s the importance of science and medical research. But these groundbreaking discoveries didn’t emerge out […]

Articles

Defend Your Mainframe Data From Internal Threats

Trevor Eddolls

April 12, 2021

In some blissful past that probably never really existed, mainframe users sat in corporate offices, working on 3270 terminals, and you trusted them because you saw them every day and spoke to them regularly. Nowadays, the world isn’t like that. Mainframe users are most likely accessing the mainframe from a laptop, tablet, or phone. Many […]

Articles

Why Having a Backup and Recovery Plan Improves IBM i Vitality

Jennifer Goforth Gregory

March 26, 2021

Monitoring the vitality of your IBM i system is a cornerstone of keeping your business running 24-7. A key component of IBM i’s vitality includes recovering quickly after a disaster with the least amount of disruption to your customers and revenue streams. Debbie Saugen has heard all the excuses for why a company isn’t prioritizing […]

Articles

The Cybersecurity Market Is Rapidly Growing

Lauren Borchart

March 12, 2021

With the rise of internet usage and availability has also come an increase in cybercrimes like scamming, phishing and hacking. This has created a high demand for cybersecurity protocols and policies to help keep enterprises safe from cyber-attacks. According to a 2020 report from Global Market Insights (GMI), the cybersecurity market has been flourishing in […]

Articles

Innovations in the Terminal Emulation Space

Jennifer Goforth Gregory

February 23, 2021

A look at innovations in the terminal emulation space, and what to keep in mind when selecting a terminal emulator vendor

Articles

How Air-Gap Backup and Tape-Based Technology Protect Against Cybercrime

John Shuman

February 10, 2021

Cybercrime is a prevalent topic in today’s news. It’s changing the way business is conducted to maintain data integrity and protection from theft. Data is the life blood of any organization; cybercriminals seek to exploit data from human as well as security vulnerabilities inherent to the software or hardware structures. Much of corporate data today […]

Articles

Why Certificate Rotation Matters to Your Kubernetes and OpenShift Clusters’ Security

David Bisson

February 8, 2021

In a 2019 survey, the Cloud Native Computing Foundation (CNCF) found that a majority (84%) of respondents were running containers in production. That’s 15% more than the previous year. CNCF also learned that the percentage of organizations running 250 or more containers in production was up 28%. So, why is this happening? Organizations are increasingly […]

Articles

The Best Ways to Keep Your Data Private

Brad Smith

January 28, 2021

In the wake of the COVID-19 pandemic, more people have turned to the internet to help get daily tasks safely completed. Whether it’s ordering your next grocery delivery online or hosting video calls from a make-shift home office, technology has become not just a luxury, but a necessity, for many. As vaccines begin to roll […]