Trend Watch: Business Intelligence and Business Analytics
April 10, 2017
This is the eighth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this brief article, I’ll continue my point-in-time analysis with a focus on the subjects of business intelligence (BI) and business analytics (BA). Has BI and BA entered a new era in […]
ArticlesJohn Rhodes and Roger Hammer on Solving Customer IT Challenges
April 5, 2017
In this sponsored advertising content series, zTalk Business with Reg Harbeck, Reg talks with John Rhodes and Roger Hammer of CM First Group at SHARE in San Jose about their work developing tools for analyzing and documenting legacy applications, and how they help organizations and systems integrators understand their mainframe code and large system code. Reg: […]
ArticlesTrend Watch: Service Oriented Architecture and Web Services
April 3, 2017
This is the seventh post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis with a focus on the subject of integration, and a discussion on service oriented architecture (SOA) and web services like representational state transfer (REST) […]
ArticlesTokenized Encryption: Details Become Design
April 3, 2017
Once a project such as PCI compliance is approved, the first step is to hold a kickoff meeting. There are numerous reasons for a kickoff meeting: The CIO affirms the project’s importance and defines objectives, team members can acquaint themselves with each other, determine deadlines, identify potential obstacles and possible solutions, and establish requirements. But […]
ArticlesKeep Data out of Danger
April 3, 2017
If you haven’t seen “Attack of the Killer LOBs” yet, it’s coming soon to a DB2* environment near you. No, this isn’t a new science fiction movie—it’s a lurking danger in your environment today. Your vital data may have already been compromised, leaving you with a customer service, legal and compliance nightmare. Even worse, because […]
What to Consider When Using a Cloud or Managed Service Provider
April 3, 2017
Workloads are getting bigger. To manage all of this information and application data, businesses have a few options: store workloads on a company-owned server, tap the storage space of a managed service provider (MSP) or go with a hybrid model that combines a private, on-premises cloud with an MSP. So, how does a business decide? […]
ArticlesTips for Techies on Showing the Value of Their Services
April 3, 2017
People with strong technical backgrounds may not consider themselves good sellers. They prefer to install, upgrade, migrate and troubleshoot. But selling is a skill everyone must use, even if no money actually changes hands. Applying for jobs, writing proposals and emails, and participating in meetings are all types of selling because they involve uncovering a […]
ArticlesWhy Organizations Should Reconsider Their Current Chargeback Systems
April 1, 2017
Imagine Mary, Fred and George are gathered for a budget meeting with Ellen, their company’s CIO, to discuss another budget shortfall. Ellen asks, “What caused this million-dollar shortfall?” George says, “We think it’s related to the decision by accounting to shift one of their major workloads from our Power Systems* platforms to our VMware tower. […]
ArticlesPowerVM LinkedIn Group
March 28, 2017
PowerVM is IBM's advanced virtualization on Power Systems. Learn more about it in the PowerVM LinkedIn group.
ArticlesTrend Watch: Security
March 27, 2017
This is the sixth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis by looking at the interesting and complex topic of security. z/OS Security When someone says “mainframe security” you probably think RACF. However, if you […]