How Can We Create Psychologically Safe Workspaces?
September 3, 2021
The pandemic has increased our mask usage in more ways than one. In addition to the face coverings we’ve grown used to seeing in our daily lives, as the boundaries between our professional and personal lives grow more and more blurry, many have taken to masking more of their identities in the workplace. In the […]
ArticlesInstalling an ifix With AIX Live Update
September 1, 2021
Chris Gibson explains how to install an AIX security ifix without a reboot
ArticlesKubernetes Container Security Best Practices With Red Hat Advanced Cluster Security for Kubernetes
August 30, 2021
As we work with organizations who are adopting containers as part of their software development strategy, we have seen container security become a challenge for many, and at times an aftersight. This is not on purpose, but primarily a result of the vast differences between the new technology of containers versus the virtualization model many […]
ArticlesThe Power of Metadata in the IBM i OS: Part 1
August 27, 2021
Developers who work in the IBM i environment may or may not be familiar with the term “metadata.” Metadata can be defined as “data about data.” Metadata has existed within the IBM i OS since the historic days of the System/38, when an integrated Relational Database was introduced. Consider the commands DSPFD and DSPFFD, both […]
ArticlesEvil Mainframe Brings Ethical Hacking to the Forefront
August 26, 2021
When it comes to hacking, there are courses that can teach you to break past the security of almost anything. However, learning how to hack a mainframe usually isn’t one of them. That’s why Chad Rikansrud and Phil Young created Evil Mainframe, the first mainframe penetration testing class. “The IT world at large has benefited […]
IBM Announces IBM Telum Processor
August 25, 2021
As the first processor that contains on-chip acceleration for AI inferencing, the Telum chip introduces an updated process that aims to prevent fraud
ArticlesInteract With the ATLASSIAN Jira Software From Within z/OS
August 24, 2021
In this tutorial from BMC's Subhasish Sarkar and Sujit Neb, learn how to interact with ATLASSIAN Jira from a JCL Job that executes on z/OS
ArticlesCLI Options for Configuring and Modifying LPARs
August 23, 2021
Rob McNelly highlights resources you can use to learn how to create an LPAR without using the HMC GUI, and use the CLI for dynamic LPAR operations
ArticlesCICS Security, TLS Enhancement, Updated CICS Documentation and More
August 23, 2021
The Virtual CICS user group is an online user group that has been meeting for over 10 years. It meets every other month, which works out at six meetings each year. And, at each meeting, there’s a presentation. At the July meeting, Colin Penfold, technical leader for IBM CICS Transaction Server Security, spoke about recent […]
ArticlesContainers, Microservices and Open Source: IBM i From Another Perspective
August 19, 2021
If you’ve worked with enterprise software development, I assume you’ve come across concepts like microservices and containers. Perhaps you’ve worked with Kubernetes or OpenShift. And maybe you already develop microservices in Java with the open-source framework Spring Boot and are over the moon about how great GraalVM is. Personally, I use all the above with […]