Skip to main content

Sort by
Articles

Will You Be The Next Victim Of Ransomware?

Ben Wuest

September 11, 2017

Ransomware is malicious software that has been covertly installed on a device, such as your laptop or phone, which encrypts your private data and demands a monetary ransom for restoring the data to its original format. If the data is highly sensitive, the ransom may be the threat of public disclosure of the private data. […]

Articles

Java on z Systems Delivers Portability, Security and Other Benefits

Valerie Dennis Craven

July 24, 2017

As people expect quick, secure transactions available any time, anywhere, modernization and innovation on the mainframe are necessary to meet these needs. Java* is at the heart of such transformation. An IDC study, “The Business Value of the Connected Mainframe for Digital Transformation” (ibm.co/2pf8asQ), places Java at the center of both modernization and innovation on […]

Articles

IBM Z Pervasive Encryption Marks a Paradigm Shift for Security

Evelyn Hoover

July 17, 2017

Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]

Articles

IBM Machine Learning for z/OS Gives Clients the Tools to Make Better, Faster Decisions

Gene Rebeck

July 5, 2017

A customer seeks a home-improvement loan to accommodate her growing home-based business. The bank’s loan officer looks at her credit score. It’s not bad, but it also suggests there’s a high probability she won’t be able to pay back the loan. The loan officer says as much to his manager. Not long thereafter, his boss […]

Articles

Keeping IBM Machine Learning on z/OS Next to the Data Enhances Analytics

Jim Utsler

July 5, 2017

Machine learning isn’t some sort of sci-fi-y attempt to make mechanical overlords. Rather, it’s a method by which users can train computers to recognize and even predict patterns in data and, based on machine-learning models, help them make better decisions based on historical, recent and up-to-the-minute information—no matter the format. Machine learning represents an acute […]

Articles

How does z/OS data set encryption differentiate itself from other types of encryption for data at rest?

Cecilia Carranza Lewis

July 3, 2017

As clients begin their journey with pervasive encryption, they consider how best to protect their data in order to satisfy regulatory compliances and avoid potential data breaches. They often wonder how data set encryption differentiates itself from other types of encryption for data at rest, specifically hardware-level encryption. Understanding the value of each type of […]

Articles

Exploring DevOps Process and Tools

Joseph Gulla

June 19, 2017

In last week’s post, “Exploring Enterprise DevOps,” I wrote that it’s often useful to look at DevOps solutions that IT companies are promoting and intuit the problems that they are addressing. I listed four main areas centered on modernization, testing, speed, risk and language. These include: Discover, understand and analyze enterprise application logic to modernize […]

Articles

Exploring Enterprise DevOps

Joseph Gulla

June 12, 2017

This week, I am starting a two-part series on enterprise DevOps. Let me begin with the term enterprise then I’ll move on to DevOps. Enterprise Meant Mainframe To many of us, enterprise means mainframe. It wasn’t always that way but when mainframes became an out-of-favor platform in the 1990s, we started using the more indirect […]

Articles

IBM Lab Services Helps Clients Stay Vigilant Against Data Hackers

Gene Rebeck

June 1, 2017

In July 2015, an operator noticed some heavy UNIX* System Service (USS) activity that seemed highly suspicious. Some scripts were sending spam messages all over the world from the client’s mainframe. The client called IBM Systems Lab Services for z Systems* and LinuxONE*, and the Lab Services team sprang into action. The team of highly […]

Articles

From Military to Mainframe

Holly Eamon

June 1, 2017

Working as a z/OS* systems programmer on an infrastructure team is not quite the role Torrie McLaughlin once envisioned for her career. But both the job and the journey that led her to it are rewarding. “I get a big kick out of knowing that the system I work on every day is the backbone […]