Skip to main content

Sort by
Articles

IBM Z Pervasive Encryption Marks a Paradigm Shift for Security

Evelyn Hoover

July 17, 2017

Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]

Articles

IBM Machine Learning for z/OS Gives Clients the Tools to Make Better, Faster Decisions

Gene Rebeck

July 5, 2017

A customer seeks a home-improvement loan to accommodate her growing home-based business. The bank’s loan officer looks at her credit score. It’s not bad, but it also suggests there’s a high probability she won’t be able to pay back the loan. The loan officer says as much to his manager. Not long thereafter, his boss […]

Articles

Keeping IBM Machine Learning on z/OS Next to the Data Enhances Analytics

Jim Utsler

July 5, 2017

Machine learning isn’t some sort of sci-fi-y attempt to make mechanical overlords. Rather, it’s a method by which users can train computers to recognize and even predict patterns in data and, based on machine-learning models, help them make better decisions based on historical, recent and up-to-the-minute information—no matter the format. Machine learning represents an acute […]

Articles

Bankwest Modernizes Its Mainframe Integration Environment

Jim Utsler

July 5, 2017

UP CLOSE Customer: Bankwest Headquarters: Perth, Australia Business: Retail and business banking services Challenge: Reducing complexity between front- and back-end banking platforms Solution: Taking advantage of Java on the mainframe to reduce reliance on traditional middleware Hardware: An IBM z Systems zEnterprise BC12 Software: IBM WebSphere Application Server Liberty, Open Services Gateway initiative (OSGi) applications, […]

Articles

How does z/OS data set encryption differentiate itself from other types of encryption for data at rest?

Cecilia Carranza Lewis

July 3, 2017

As clients begin their journey with pervasive encryption, they consider how best to protect their data in order to satisfy regulatory compliances and avoid potential data breaches. They often wonder how data set encryption differentiates itself from other types of encryption for data at rest, specifically hardware-level encryption. Understanding the value of each type of […]

Articles

Exploring DevOps Process and Tools

Joseph Gulla

June 19, 2017

In last week’s post, “Exploring Enterprise DevOps,” I wrote that it’s often useful to look at DevOps solutions that IT companies are promoting and intuit the problems that they are addressing. I listed four main areas centered on modernization, testing, speed, risk and language. These include: Discover, understand and analyze enterprise application logic to modernize […]

Articles

Exploring Enterprise DevOps

Joseph Gulla

June 12, 2017

This week, I am starting a two-part series on enterprise DevOps. Let me begin with the term enterprise then I’ll move on to DevOps. Enterprise Meant Mainframe To many of us, enterprise means mainframe. It wasn’t always that way but when mainframes became an out-of-favor platform in the 1990s, we started using the more indirect […]

Articles

IBM Lab Services Helps Clients Stay Vigilant Against Data Hackers

Gene Rebeck

June 1, 2017

In July 2015, an operator noticed some heavy UNIX* System Service (USS) activity that seemed highly suspicious. Some scripts were sending spam messages all over the world from the client’s mainframe. The client called IBM Systems Lab Services for z Systems* and LinuxONE*, and the Lab Services team sprang into action. The team of highly […]

Articles

From Military to Mainframe

Holly Eamon

June 1, 2017

Working as a z/OS* systems programmer on an infrastructure team is not quite the role Torrie McLaughlin once envisioned for her career. But both the job and the journey that led her to it are rewarding. “I get a big kick out of knowing that the system I work on every day is the backbone […]

Articles

John Rhodes and Roger Hammer on Solving Customer IT Challenges

Reg Harbeck

April 5, 2017

In this sponsored advertising content series, zTalk Business with Reg Harbeck, Reg talks with John Rhodes and Roger Hammer of CM First Group at SHARE in San Jose about their work developing tools for analyzing and documenting legacy applications, and how they help organizations and systems integrators understand their mainframe code and large system code. Reg:  […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.