IBM Z Pervasive Encryption Marks a Paradigm Shift for Security
July 17, 2017
Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]
ArticlesIBM Machine Learning for z/OS Gives Clients the Tools to Make Better, Faster Decisions
July 5, 2017
A customer seeks a home-improvement loan to accommodate her growing home-based business. The bank’s loan officer looks at her credit score. It’s not bad, but it also suggests there’s a high probability she won’t be able to pay back the loan. The loan officer says as much to his manager. Not long thereafter, his boss […]
ArticlesKeeping IBM Machine Learning on z/OS Next to the Data Enhances Analytics
July 5, 2017
Machine learning isn’t some sort of sci-fi-y attempt to make mechanical overlords. Rather, it’s a method by which users can train computers to recognize and even predict patterns in data and, based on machine-learning models, help them make better decisions based on historical, recent and up-to-the-minute information—no matter the format. Machine learning represents an acute […]
ArticlesBankwest Modernizes Its Mainframe Integration Environment
July 5, 2017
UP CLOSE Customer: Bankwest Headquarters: Perth, Australia Business: Retail and business banking services Challenge: Reducing complexity between front- and back-end banking platforms Solution: Taking advantage of Java on the mainframe to reduce reliance on traditional middleware Hardware: An IBM z Systems zEnterprise BC12 Software: IBM WebSphere Application Server Liberty, Open Services Gateway initiative (OSGi) applications, […]
ArticlesHow does z/OS data set encryption differentiate itself from other types of encryption for data at rest?
July 3, 2017
As clients begin their journey with pervasive encryption, they consider how best to protect their data in order to satisfy regulatory compliances and avoid potential data breaches. They often wonder how data set encryption differentiates itself from other types of encryption for data at rest, specifically hardware-level encryption. Understanding the value of each type of […]
Exploring DevOps Process and Tools
June 19, 2017
In last week’s post, “Exploring Enterprise DevOps,” I wrote that it’s often useful to look at DevOps solutions that IT companies are promoting and intuit the problems that they are addressing. I listed four main areas centered on modernization, testing, speed, risk and language. These include: Discover, understand and analyze enterprise application logic to modernize […]
ArticlesExploring Enterprise DevOps
June 12, 2017
This week, I am starting a two-part series on enterprise DevOps. Let me begin with the term enterprise then I’ll move on to DevOps. Enterprise Meant Mainframe To many of us, enterprise means mainframe. It wasn’t always that way but when mainframes became an out-of-favor platform in the 1990s, we started using the more indirect […]
ArticlesIBM Lab Services Helps Clients Stay Vigilant Against Data Hackers
June 1, 2017
In July 2015, an operator noticed some heavy UNIX* System Service (USS) activity that seemed highly suspicious. Some scripts were sending spam messages all over the world from the client’s mainframe. The client called IBM Systems Lab Services for z Systems* and LinuxONE*, and the Lab Services team sprang into action. The team of highly […]
ArticlesFrom Military to Mainframe
June 1, 2017
Working as a z/OS* systems programmer on an infrastructure team is not quite the role Torrie McLaughlin once envisioned for her career. But both the job and the journey that led her to it are rewarding. “I get a big kick out of knowing that the system I work on every day is the backbone […]
ArticlesJohn Rhodes and Roger Hammer on Solving Customer IT Challenges
April 5, 2017
In this sponsored advertising content series, zTalk Business with Reg Harbeck, Reg talks with John Rhodes and Roger Hammer of CM First Group at SHARE in San Jose about their work developing tools for analyzing and documenting legacy applications, and how they help organizations and systems integrators understand their mainframe code and large system code. Reg: […]