Tokenized Encryption: Real-Time System Control
Scott Forstie on the Importance of Database Engineers
Linux on z Systems Accelerates New and Traditional Workloads
Clients Use Cognitive Computing to Solve Business Challenges
MAINFRAME > TRENDS > SECURITY
Tokenized Encryption: Getting Started
AIX > ADMINISTRATOR > SECURITY
Newer Security Technology Goes on the Offensive
AIX > TRENDS > IBM ANNOUNCEMENTS
IBM Forges HA/DR Strategic Partnerships
AIX > ADMINISTRATOR > PERFORMANCE
Recognizing the Efficiency Benefits of CPU Threading
View all upcoming and recorded Webinars hosted by IBM Systems Magazine
>>VIEW ALL UPCOMING AND ON DEMAND WEBINARS
MICHAEL AM FELT |
By default AIX uses NTPv3. This probably works fine for an internal-only situation (I hope), but for a server that also talks with the "outside," I recall that NTP shows up fairly frequently in CVE messages.
ROB MCNELLY |
I want to point you to Jeff Stuecheli's POWER9 presentation from January's AIX Virtual User Group meeting. This information doesn't involve specific announcements or new models, but it provides an informative look the capabilities of the chip itself.
10 Tips for Securing Your AIX Servers Content by HelpSystems
Thursday, March 16 — 10 PT / Noon CT / 1 ET On Demand until April 16th. Watch Here Now!
BareMetal Backup and Recovery for Linux Servers and VMs! Content by Storix.
1000 times faster nmon Analyzer!
Read how nmon analyzers measure up here.
View all News Updates
>> Visit the IBM IT Infrastructure Website
0 Results Found for February 2017
Next 6 Months: Apr 2017 | May 2017 | Jun 2017 | Jul 2017 | Aug 2017 | Sep 2017
IBM Systems Magazine is a trademark of International Business Machines Corporation. The editorial content of IBM Systems Magazine is placed on this website by MSP TechMedia under license from International Business Machines Corporation.
©2017 MSP Communications, Inc. All rights reserved