Skip to main content

Sort by
Articles

The Cost of Enterprise Downtime

Laura DiDio

September 30, 2021

Enterprise downtime is now more expensive than ever: Some 44% of firms indicate that hourly downtime costs exceed $1 million to over $5 million, exclusive of any legal fees, fines or penalties. Additionally, 91% organizations said a single hour of downtime that takes mission-critical server hardware and applications offline, averages over $300,000 due to lost […]

Articles

The Importance of Cloud-Based HA/DR Technology

Jennifer Goforth Gregory

September 30, 2021

For many organizations, budgeting discussions for disaster recovery (DR) and high availability (HA) have played out in a similar manner for decades: The IT department asks to spend a set amount for capital expenditures and a set amount for operating expenses. However, the infrastructure needed to back up the data center and networks in case […]

E-Books

TechChannel E-book: Why Knowing Your Organization’s Security Needs Can Help Keep Data Locked Down

TechChannel

June 7, 2021

IBM Power Systems hardware and AIX are innately secure—but even top-notch security requires monitoring, patching and security planning to guard against bad actors and keep data locked down. Complacency is a recipe for disaster when it comes to security. An effective security plan requires a multilayered approach that starts with people, then physical security measures, […]

Articles

Announcing IBM i 7.4 TR4 and 7.3 TR10

TechChannel

April 13, 2021

Today, IBM announced the latest round of technology refreshes (TRs)—IBM i 7.4 TR4 and 7.3 TR10. With these latest updates, IBM has prioritized extending automation across various components of the IBM i OS—including the database, security and high availability. IBM i 7.4 TR4 and 7.3 TR10 deliver the following new features: Db2 for i enhancements, including […]

Articles

Is Your Mainframe an Unguarded Fortress?

Dava Stewart

April 12, 2021

Why too many organizations fail to implement adequate security measures on their mainframe operations and how to effectively guard your IBM Z