Skip to main content

Sort by
Articles

Use z/OS Resources and Tools for Data Protection

Patrick Fitzsimmons

October 2, 2017

The IBM z/OS* platform, with its unmatched reliability, availability and serviceability, outstanding I/O bandwidth and secure environment, provides an excellent platform for data protection. This is especially true if that client data already is on the mainframe, as the features of this hardware and software platform promote reliable and scalable data protection. If your organization […]

Articles

Future of Testing

Joseph Gulla

September 25, 2017

This is the last post in this series on enterprise testing. The focus has been on both system and application programmers in an enterprise systems setting. The first post described enterprise testing and explained the many challenges that programmers experienced 40 years ago in deploying defect free software. The next two posts discussed system programmers […]

Articles

Focus on Application Testing

Joseph Gulla

September 18, 2017

This is the third post in this series on system and application testing on enterprise systems. In this post, I discuss the daunting job of being a mainframe application programmer and how he or she goes about testing. The testing scope can cover everything from deployment of a new release of ISV software to a […]

Articles

Will You Be The Next Victim Of Ransomware?

Ben Wuest

September 11, 2017

Ransomware is malicious software that has been covertly installed on a device, such as your laptop or phone, which encrypts your private data and demands a monetary ransom for restoring the data to its original format. If the data is highly sensitive, the ransom may be the threat of public disclosure of the private data. […]

Articles

Java on z Systems Delivers Portability, Security and Other Benefits

Valerie Dennis Craven

July 24, 2017

As people expect quick, secure transactions available any time, anywhere, modernization and innovation on the mainframe are necessary to meet these needs. Java* is at the heart of such transformation. An IDC study, “The Business Value of the Connected Mainframe for Digital Transformation” (ibm.co/2pf8asQ), places Java at the center of both modernization and innovation on […]

Articles

IBM Z Pervasive Encryption Marks a Paradigm Shift for Security

Evelyn Hoover

July 17, 2017

Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]

Articles

IBM Machine Learning for z/OS Gives Clients the Tools to Make Better, Faster Decisions

Gene Rebeck

July 5, 2017

A customer seeks a home-improvement loan to accommodate her growing home-based business. The bank’s loan officer looks at her credit score. It’s not bad, but it also suggests there’s a high probability she won’t be able to pay back the loan. The loan officer says as much to his manager. Not long thereafter, his boss […]

Articles

Keeping IBM Machine Learning on z/OS Next to the Data Enhances Analytics

Jim Utsler

July 5, 2017

Machine learning isn’t some sort of sci-fi-y attempt to make mechanical overlords. Rather, it’s a method by which users can train computers to recognize and even predict patterns in data and, based on machine-learning models, help them make better decisions based on historical, recent and up-to-the-minute information—no matter the format. Machine learning represents an acute […]

Articles

How does z/OS data set encryption differentiate itself from other types of encryption for data at rest?

Cecilia Carranza Lewis

July 3, 2017

As clients begin their journey with pervasive encryption, they consider how best to protect their data in order to satisfy regulatory compliances and avoid potential data breaches. They often wonder how data set encryption differentiates itself from other types of encryption for data at rest, specifically hardware-level encryption. Understanding the value of each type of […]

Articles

Exploring DevOps Process and Tools

Joseph Gulla

June 19, 2017

In last week’s post, “Exploring Enterprise DevOps,” I wrote that it’s often useful to look at DevOps solutions that IT companies are promoting and intuit the problems that they are addressing. I listed four main areas centered on modernization, testing, speed, risk and language. These include: Discover, understand and analyze enterprise application logic to modernize […]