Skip to main content

Sort by
Articles

Christian Jacobi, Chief Architect for IBM Z Processors, on the New IBM Telum Chip

Brianna Boecker

November 2, 2021

IBM’s new Telum chip fulfills clients’ business imperatives with a new cache infrastructure, optimized core and the ability to embed AI directly into enterprise workloads. First announced at the annual Hot Chips conference, this innovative processor chip enables IBM clients to leverage AI technologies and grow their workloads. Christian Jacobi, Distinguished Engineer and Chief Architect […]

Video

IBM Champion Rob McNelly on the New AIX 7.3 Announcement

Rob McNelly

October 29, 2021

AIX 7.3 was announced on October 19, 2021. Get the details from Rob McNelly in this video.

Articles

AIX 7.3 Leverages Power10 Processor to Support Customers’ Hybrid Multicloud and AI Endeavors

Scott McKinney

October 19, 2021

The new AIX 7.3 release brings customers new ways to integrate their mission critical infrastructure with new and enhanced capabilities. IBM designed AIX 7.3 in response to feedback from customers, particularly around extracting business value from data and supporting their hybrid multicloud strategies. Its new features take advantage of the unique capabilities of the Power10 […]

Articles

Bringing Choice, Consistency and Protection to Hybrid Cloud Strategies

Keelia Estrada Moeller

October 13, 2021

Hybrid cloud has quickly grown in popularity, but with this extensive growth it’s more important than ever for organizations to develop strategies that address cost control, IT complexity, cybersecurity threats and data corruption. When developing a hybrid cloud strategy, notes Scott Baker, VP, Storage Product Marketing for IBM, it’s important for organizations to define what […]

Articles

Latest IBM Storage Announcements Address Key Hybrid Cloud Pain Points for Clients

Keelia Estrada Moeller

October 12, 2021

As hybrid cloud environments grow in popularity, organizations must develop strategies that address increasing IT complexity, public cloud costs, cyberattack threats and other data destructive events. Today, IBM in announcing new capabilities and integrations designed to mitigate these pain points—helping organizations reduce IT complexity, deploy cost-effective solutions and improve cyberresilience across hybrid cloud environments. These […]

Podcasts

Carol Woodbury on Security Strategies and Best Practices

Charlie Guarino

October 4, 2021

Charlie Guarino: Hi everybody. This is Charlie Guarino. Welcome to another edition of TechTalk SMB. I am so happy today to sit down and have a nice chat with the former IBM i security architect of IBM i and the current co-founder of DXR Security, a company that helps organizations change their IBM i security one […]

Articles

The Cost of Enterprise Downtime

Laura DiDio

September 30, 2021

Enterprise downtime is now more expensive than ever: Some 44% of firms indicate that hourly downtime costs exceed $1 million to over $5 million, exclusive of any legal fees, fines or penalties. Additionally, 91% organizations said a single hour of downtime that takes mission-critical server hardware and applications offline, averages over $300,000 due to lost […]

Articles

How Much Does a Data Breach Cost?

Trevor Eddolls

September 21, 2021

For the past 16 years, IBM has published research by the Ponemon Institute in the annual “Cost of a Data Breach Report.” Its 17th report was published at the end of July this year, and perhaps the biggest finding was that 2020 had the highest average cost for a data breach in 17 years. The cost […]

Articles

Random and ‘Almost Random’ Numbers on z/OS

David Stephens

September 17, 2021

Random numbers can come in handy. They can be used to create a unique filename, generate a random new password, or randomly select a record. The good news is that we can obtain random numbers on z/OS. Well, at least some of them are random. COBOL and RANDOM A quick look at the IBM Enterprise […]

Articles

Of Wildcards, Regular Expressions and Mainframe Security

Reg Harbeck

September 14, 2021

As Sigmund Freud might say if he were alive today, “Sometimes, a dash is just a dash.” Of course, if he did, he’d likely be talking about one of the two wildcard characters that do all the heavy lifting in CA ACF2. That’s right: ACF2 only has two wildcard characters—or actually, fewer than two: the […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.