Key Considerations for an Effective, Long-Term Security Strategy
May 8, 2022
More accessible technology, economic and political volatility, and evolving hacking techniques mean that security personnel face different challenges than they did five years ago. Organizations must develop a reliable security strategy to keep up with data security needs. Part of this strategy begins with the security basics: assess your environment, implement end-user education, enforce password […]
ArticlesIBM, Lenovo, HPE and Huawei Servers Rank as Most Secure Platforms in ITIC Survey
April 20, 2022
IBM, Lenovo, Huawei and Hewlett-Packard enterprise servers ranked as the most secure platforms in an ITIC survey—experiencing the fewest number of successful data breaches
ArticlesIBM Aims for the Hybrid Cloud and Increases Security With the New z16
April 5, 2022
IBM today unveiled the z16 enterprise server, the latest release in its line of IBM Z mainframe systems. The new z16 delivers a slew of embedded, advanced capabilities aimed at hardening security, boosting performance, delivering greater value and cost efficiencies, and making analytics accessible and easy to use for non-data scientists to deliver immediate value. […]
PodcastsSeeing the World Via the Mainframe
April 4, 2022
Reg Harbeck: Hi, I'm Reg Harbeck, and today I'm here with my colleague and co-author Karl-Erik Stenfors, who has been in the mainframe space for a very good long time. Well Karl-Erik, let's start by telling us about how did you end up on the mainframe? Karl-Erik Stenfors: Well, a bit of a point. […]
PodcastsWith Uncertainty, Comes Opportunity: The Shifting IBM Z Workforce
February 23, 2022
Reg Harbeck: Hi. I'm Reg Harbeck and I'm here for the second of a pair of podcasts with Jeff Cherrington. On our first podcast we sort of talked about the background of ASG [Technologies] and Rocket Software and just all that you know, happened in the history of mainframe computing and enterprise computing and how […]
Sponsored Content by
Rocket Software - IBM Z/mainframe
IBM Announces Hybrid Cloud Developments to Accelerate Transformation and Simplify Modernization for Clients
February 14, 2022
In the next step of its roadmap to bring IBM Z and IBM Cloud closer together, IBM has announced Wazi as-a-Service and other key hybrid cloud developments Today, IBM announced a key hybrid cloud development to help clients modernize: IBM Wazi as-a-Service (Wazi aaS), which will bring z/OS development and test-as-a-service to the public cloud […]
ArticlesHow to Send Messages to a Slack Channel From a JCL Job That Executes on z/OS
February 10, 2022
It’s very easy to send messages to a Slack channel from a JCL Job that executes on z/OS. You can achieve this by following the steps below: NOTE: I worked on this proof-of-concept (POC) project on my local Windows machine and therefore, it’s assumed that all instructions pertaining to this POC are tried out by […]
E-BooksHow Collaboration and Education Can Help Close the IBM Z and COBOL Skills Gap
February 7, 2022
How do we maintain interest from new IBM Z and COBOL talent? The keys seem to be: education, collaboration and fun. Dr. Cameron Seay, for example, has taught both COBOL and IBM Z at different schools. It’s not that no one is interested in learning about them; it’s just that the information needs to be […]
PodcastsJeff Cherrington on Rocket Software’s Evolution and IBM Z Contributions
January 31, 2022
Reg Harbeck: Hi, this is Reg Harbeck and today I'm here with my friend and colleague Jeff Cherrington who is the vice president of product management, Z Systems—I think I missed a word or two there—at Rocket Software. So, Jeff, I guess what we're going to talk about today is just the whole journey that Rocket […]
Sponsored Content by
Rocket Software - IBM Z/mainframe
Hashes and How to Create Them on z/OS
January 10, 2022
Hashes can be really handy. Want to confirm that a file was received intact? Compare sender and receiver hashes. Want to see if a file has been updated recently? Compare hashes generated over time. Want a fast key for a lookup table? Use a hash as the key. But what are hashes, and how can […]