Skip to main content

Sort by
Articles

Trend Watch: Business Intelligence and Business Analytics

Joseph Gulla

April 10, 2017

This is the eighth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this brief article, I’ll continue my point-in-time analysis with a focus on the subjects of business intelligence (BI) and business analytics (BA). Has BI and BA entered a new era in […]

Articles

John Rhodes and Roger Hammer on Solving Customer IT Challenges

Reg Harbeck

April 5, 2017

In this sponsored advertising content series, zTalk Business with Reg Harbeck, Reg talks with John Rhodes and Roger Hammer of CM First Group at SHARE in San Jose about their work developing tools for analyzing and documenting legacy applications, and how they help organizations and systems integrators understand their mainframe code and large system code. Reg:  […]

Articles

Trend Watch: Service Oriented Architecture and Web Services

Joseph Gulla

April 3, 2017

This is the seventh post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis with a focus on the subject of integration, and a discussion on service oriented architecture (SOA) and web services like representational state transfer (REST) […]

Articles

Tokenized Encryption: Details Become Design

Jim Schesvold

April 3, 2017

Once a project such as PCI compliance is approved, the first step is to hold a kickoff meeting. There are numerous reasons for a kickoff meeting: The CIO affirms the project’s importance and defines objectives, team members can acquaint themselves with each other, determine deadlines, identify potential obstacles and possible solutions, and establish requirements. But […]

Articles

Keep Data out of Danger

John McKenny

April 3, 2017

If you haven’t seen “Attack of the Killer LOBs” yet, it’s coming soon to a DB2* environment near you. No, this isn’t a new science fiction movie—it’s a lurking danger in your environment today. Your vital data may have already been compromised, leaving you with a customer service, legal and compliance nightmare. Even worse, because […]

Articles

What to Consider When Using a Cloud or Managed Service Provider

Gene Rebeck

April 3, 2017

Workloads are getting bigger. To manage all of this information and application data, businesses have a few options: store workloads on a company-owned server, tap the storage space of a managed service provider (MSP) or go with a hybrid model that combines a private, on-premises cloud with an MSP. So, how does a business decide? […]

Articles

Tips for Techies on Showing the Value of Their Services

Anthony English

April 3, 2017

People with strong technical backgrounds may not consider themselves good sellers. They prefer to install, upgrade, migrate and troubleshoot. But selling is a skill everyone must use, even if no money actually changes hands. Applying for jobs, writing proposals and emails, and participating in meetings are all types of selling because they involve uncovering a […]

Articles

Why Organizations Should Reconsider Their Current Chargeback Systems

Roger Rogers

April 1, 2017

Imagine Mary, Fred and George are gathered for a budget meeting with Ellen, their company’s CIO, to discuss another budget shortfall. Ellen asks, “What caused this million-dollar shortfall?” George says, “We think it’s related to the decision by accounting to shift one of their major workloads from our Power Systems* platforms to our VMware tower. […]

Articles

PowerVM LinkedIn Group

Dawn May

March 28, 2017

PowerVM is IBM's advanced virtualization on Power Systems. Learn more about it in the PowerVM LinkedIn group.

Articles

Trend Watch: Security

Joseph Gulla

March 27, 2017

This is the sixth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis by looking at the interesting and complex topic of security. z/OS Security When someone says “mainframe security” you probably think RACF. However, if you […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.