Skip to main content

Sort by
Articles

How does z/OS data set encryption differentiate itself from other types of encryption for data at rest?

Cecilia Carranza Lewis

July 3, 2017

As clients begin their journey with pervasive encryption, they consider how best to protect their data in order to satisfy regulatory compliances and avoid potential data breaches. They often wonder how data set encryption differentiates itself from other types of encryption for data at rest, specifically hardware-level encryption. Understanding the value of each type of […]

Articles

Exploring DevOps Process and Tools

Joseph Gulla

June 19, 2017

In last week’s post, “Exploring Enterprise DevOps,” I wrote that it’s often useful to look at DevOps solutions that IT companies are promoting and intuit the problems that they are addressing. I listed four main areas centered on modernization, testing, speed, risk and language. These include: Discover, understand and analyze enterprise application logic to modernize […]

Articles

Exploring Enterprise DevOps

Joseph Gulla

June 12, 2017

This week, I am starting a two-part series on enterprise DevOps. Let me begin with the term enterprise then I’ll move on to DevOps. Enterprise Meant Mainframe To many of us, enterprise means mainframe. It wasn’t always that way but when mainframes became an out-of-favor platform in the 1990s, we started using the more indirect […]

Articles

IBM Lab Services Helps Clients Stay Vigilant Against Data Hackers

Gene Rebeck

June 1, 2017

In July 2015, an operator noticed some heavy UNIX* System Service (USS) activity that seemed highly suspicious. Some scripts were sending spam messages all over the world from the client’s mainframe. The client called IBM Systems Lab Services for z Systems* and LinuxONE*, and the Lab Services team sprang into action. The team of highly […]

Articles

From Military to Mainframe

Holly Eamon

June 1, 2017

Working as a z/OS* systems programmer on an infrastructure team is not quite the role Torrie McLaughlin once envisioned for her career. But both the job and the journey that led her to it are rewarding. “I get a big kick out of knowing that the system I work on every day is the backbone […]

Articles

Benefit From Non-Disruptive Modernization With IBM API Connect

Joseph Gulla

May 15, 2017

This is the third article in a series about modernization of enterprise applications. The first article, Modernize Legacy Systems to Enable Full Potential, gives an overview of legacy systems, modernization tactics, benefits, strategies, risk and cost as well as challenges and areas of focus like updating the user interface and data modernization. The second article, […]

Articles

Development Methods and Architectural Styles

Joseph Gulla

May 1, 2017

This is the first in a series on how applications are developed, with a focus on development methods and architectural styles that are gaining in significance. Methods aren’t the same as styles and some pairings work well together. This discussion starts with a bit of history. Development Methods or Philosophies Computer applications have been developed […]

Articles

Blockchain Works With Systems of Record to Integrate Data

Shirley S. Savage

May 1, 2017

Distributed ledger technology blockchain links with existing systems of record (SOR) application servers and data managers. They share information and assets securely and immutably between external parties. It can be used to track the lifecycle of a car, a financial transaction or sources of food ingredients. (Learn more about how various industries are using the […]

Articles

John Rhodes and Roger Hammer on Solving Customer IT Challenges

Reg Harbeck

April 5, 2017

In this sponsored advertising content series, zTalk Business with Reg Harbeck, Reg talks with John Rhodes and Roger Hammer of CM First Group at SHARE in San Jose about their work developing tools for analyzing and documenting legacy applications, and how they help organizations and systems integrators understand their mainframe code and large system code. Reg:  […]

Articles

Why Organizations Should Reconsider Their Current Chargeback Systems

Roger Rogers

April 1, 2017

Imagine Mary, Fred and George are gathered for a budget meeting with Ellen, their company’s CIO, to discuss another budget shortfall. Ellen asks, “What caused this million-dollar shortfall?” George says, “We think it’s related to the decision by accounting to shift one of their major workloads from our Power Systems* platforms to our VMware tower. […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.