Anna Murray on the Value of Collaboration in an Automated World
October 10, 2022
Reg Harbeck: Hi. I’m Reg Harbeck, and today I’m here with Anna Murray, who is product management director at Rocket Software. Welcome, Anna. Maybe we can start by getting the sense of how did you end up in the mainframe space and at Rocket Software? Anna Murray: Well thanks, Reg, for having me. I really […]
Sponsored Content by
Rocket Software - IBM Z/mainframe
How to Deploy a Simple Grafana Dashboard
September 14, 2022
In this step-by-step tutorial, Jesse Gorzinski explains how to deploy a Grafana backend on IBM i and connect to it from a Grafana container image
ArticlesMaintaining Your AIX Systems
September 8, 2022
Unfortunately, there are a number of people out there testing your security so it is critical that your systems are regularly updated and patched to avoid problems. Normally maintenance consists of updating the HMC (both software and the BMC/PNOR), server firmware, I/O adapter firmware, VIO servers and your AIX system. In all cases, there may […]
ArticlesWork With PTF, Collection Services and Other IBM i 7.5 Hidden Gems: Part 4
August 1, 2022
In this post, I’ll continue reviewing hidden gems found in the 7.5 release. Work With PTF The Work with PTF (WRKPTF) command is now part of the base OS. The command allows you to work with PTFs for a selected product; you can specify the product name, or use the *SELECT option to choose from a […]
ArticlesHow to Create a Business Continuity and Disaster Recovery Plan
June 7, 2022
In IT operations, there is a constant threat of equipment failures, site outages or chaos erupting after work hours. Keeping IT operations uninterrupted is vital to maintaining the security and accessibility of sensitive company data for small businesses and large organizations alike. Doing so requires new business continuity measures, especially as data storage devices continue […]
Log4Shell Part 1: Answering FAQs on the Log4Shell Security Vulnerability
December 14, 2021
Jesse Gorzinksi on the Log4Shell security vulnerability, what it impacts and how to remediate the problem in Java programs
E-BooksTechChannel E-book: Streamline IBM Z Modernization With DevOps Approaches and Hyperscalers
November 8, 2021
As technology and business constantly evolve, so do requirements for change—making modernization top of mind for organizations hoping to keep up with key business objectives and needs. With this in mind, it’s more important than ever to develop an effective modernization strategy that specifically fit these needs. Mainframe-based businesses need to transition to a DevOps […]
E-BooksTechChannel E-book: How to Effectively Monitor and Measure Your Data Center
October 11, 2021
Running an efficient data center requires constant monitoring and measurement. This means understanding everything from storage best practices and tools for maximizing performance. Data temperature, for example, often determines the percentage of budget that gets devoted to storing different types of data. Once you create process maps based on the data’s temperature, you can better […]
Sponsored Content by
Cybernetics
Protecting Data Within New HA/DR Parameters
September 30, 2021
There are two types of organizations in the world: those that have experienced unplanned system downtime and those that will. Of the first group, many have likely tightened up their high availability and disaster recovery (HA/DR) methods and tools as a result of their incidents, moving, for example, to hosted cloud-based HA/DR services. Within the […]
ArticlesThe Importance of Cloud-Based HA/DR Technology
September 30, 2021
For many organizations, budgeting discussions for disaster recovery (DR) and high availability (HA) have played out in a similar manner for decades: The IT department asks to spend a set amount for capital expenditures and a set amount for operating expenses. However, the infrastructure needed to back up the data center and networks in case […]