Skip to main content

Sort by
Articles

How Can We Create Psychologically Safe Workspaces?

Tiffany Lukk

September 3, 2021

The pandemic has increased our mask usage in more ways than one. In addition to the face coverings we’ve grown used to seeing in our daily lives, as the boundaries between our professional and personal lives grow more and more blurry, many have taken to masking more of their identities in the workplace. In the […]

Articles

Installing an ifix With AIX Live Update

Chris Gibson

September 1, 2021

Chris Gibson explains how to install an AIX security ifix without a reboot

Articles

Kubernetes Container Security Best Practices With Red Hat Advanced Cluster Security for Kubernetes

Cayla Jenkins

August 30, 2021

As we work with organizations who are adopting containers as part of their software development strategy, we have seen container security become a challenge for many, and at times an aftersight. This is not on purpose, but primarily a result of the vast differences between the new technology of containers versus the virtualization model many […]

Articles

The Power of Metadata in the IBM i OS: Part 1

Rick Flagler

August 27, 2021

Developers who work in the IBM i environment may or may not be familiar with the term “metadata.” Metadata can be defined as “data about data.” Metadata has existed within the IBM i OS since the historic days of the System/38, when an integrated Relational Database was introduced. Consider the commands DSPFD and DSPFFD, both […]

Articles

Evil Mainframe Brings Ethical Hacking to the Forefront

Tiffany Lukk

August 26, 2021

When it comes to hacking, there are courses that can teach you to break past the security of almost anything. However, learning how to hack a mainframe usually isn’t one of them. That’s why Chad Rikansrud and Phil Young created Evil Mainframe, the first mainframe penetration testing class. “The IT world at large has benefited […]

Articles

IBM Announces IBM Telum Processor

TechChannel

August 25, 2021

As the first processor that contains on-chip acceleration for AI inferencing, the Telum chip introduces an updated process that aims to prevent fraud

Articles

Interact With the ATLASSIAN Jira Software From Within z/OS

Subhasish Sarkar

August 24, 2021

In this tutorial from BMC's Subhasish Sarkar and Sujit Neb, learn how to interact with ATLASSIAN Jira from a JCL Job that executes on z/OS

Articles

CLI Options for Configuring and Modifying LPARs

Rob McNelly

August 23, 2021

Rob McNelly highlights resources you can use to learn how to create an LPAR without using the HMC GUI, and use the CLI for dynamic LPAR operations

Articles

CICS Security, TLS Enhancement, Updated CICS Documentation and More

Trevor Eddolls

August 23, 2021

The Virtual CICS user group is an online user group that has been meeting for over 10 years. It meets every other month, which works out at six meetings each year. And, at each meeting, there’s a presentation. At the July meeting, Colin Penfold, technical leader for IBM CICS Transaction Server Security, spoke about recent […]

Articles

Containers, Microservices and Open Source: IBM i From Another Perspective

Niels Liisberg

August 19, 2021

If you’ve worked with enterprise software development, I assume you’ve come across concepts like microservices and containers. Perhaps you’ve worked with Kubernetes or OpenShift. And maybe you already develop microservices in Java with the open-source framework Spring Boot and are over the moon about how great GraalVM is. Personally, I use all the above with […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.