Skip to main content

Sort by
Articles

Log4Shell Part 2: 3 Best Practices for Software Security

Jesse Gorzinski

January 6, 2022

Log4Shell and others provide a constant reminder that IT security is a perpetual task. Jesse Gorzinski highlights three security best practices you should follow to keep software secure.

Articles

Apache Log4j Vulnerability, AIX Tips and Tools, a Look at Time Drift, and More

Rob McNelly

January 4, 2022

IBM Champion Rob McNelly on the Log4j security vulnerability, helpful AIX tips and tools, time drifts on POWER8 and POWER9 servers, and more

Articles

Log4Shell Part 1: Answering FAQs on the Log4Shell Security Vulnerability

Jesse Gorzinski

December 14, 2021

Jesse Gorzinksi on the Log4Shell security vulnerability, what it impacts and how to remediate the problem in Java programs

Video

Learning AIX and IBM i: Courses, Tracks and Certifications

Rob McNelly

December 7, 2021

IBM Champion Rob McNelly on courses, tracks or certifications you can use for developing IBM i and AIX resources internally

Articles

Performance and Management Tools for AIX and Power Systems: Features and Use Cases

Jose Luis Ortega

December 7, 2021

While monitoring and management solutions perform somewhat similar tasks, they’ve traditionally served different enough functions to keep them from being optimally paired as a collaborative unit. Management tools ensure that your system is available, configured properly or optimized and its components are connected correctly and as expected, whereas monitoring tools look for overall system, communication, […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.