
Identify and Address 5 Top IBM i Security Threats
The IBM i has a well-earned reputation as one of the most secure IT platforms in the world. But actually, that’s something of a misnomer. It would be more correct to say that IBM i is one of the...
The IBM i has a well-earned reputation as one of the most secure IT platforms in the world. But actually, that’s something of a misnomer. It would be more correct to say that IBM i is one of the...
You might have vast amounts of data, but how complete is it? Complete data gives you a fuller picture of your business. Moreover, having complete data helps you make truly informed business...
If your company is like 70% of the Fortune 500, it continues to use mainframes for its most business-critical IT workloads. In such organizations, finding ways to get more bang for the mainframe...
This blog was originally published as a Syncsort blog. Syncsort has since rebranded to Precisely. It is with tremendous sadness that I share the passing of Aso Tavitian. Aso immigrated to the United...
In April 2019, IBM announced the 7.4 release of the IBM i operating system. Among the many advances in the operating system is the new Db2 Mirror feature. This exciting new capability synchronously...
Many companies today depend on Splunk ES (Enterprise Security) as the foundation of their cybersecurity program. Splunk ES ingests data from throughout the organization’s IT infrastructure,...
Data is at the heart of everything you do. To make better decisions, you need the fullest, most detailed picture possible. That’s where data enrichment comes into the picture. In this blog post,...
With increases in data breaches, the topics of data encryption and its importance are appearing more often in public discussions of data security. There is also increased confusion about the...
At least once a year I sit down to watch one of the many televised marathons that happen in cities all around the world. Recently, as the helicopter camera panned away to show thousands of runners at...