Skip to main content

Latest Articles See all

By Phil Allison|Mar 30, 2020

Developing an Audit Process for Data Set Encryption

Once a target environment has been encrypted, monitoring should be put in place to make sure data continues to be encrypted.

By Phil Allison|Mar 30, 2020

Developing an Audit Process for Data Set Encryption

Once a target environment has been encrypted, monitoring should be put in place to make sure data continues to be encrypted.

By Joseph Gulla|Mar 27, 2020

Change Is Part of the DNA of IT

If the past is any gauge, the future will be full of multiple simultaneous streams of growth and change in systems, networks and applications.

By George Ng, Daniel Rosa and Donald Schmidt|Mar 24, 2020

Improve Workload Resilience With z/OS Workload Interaction Correlator and z/OS Workload Interaction Navigator

IBM has two new contributions to the IBM Z family: A data infrastructure provided by z/OS Workload Interaction Correlator and a visualization engine driven by z/OS Workload Interaction Navigator.

By Rob McNelly|Mar 24, 2020

A Great Reason to Revisit Quick Response (QR) Codes

Want remote access to important customer-based service information? It's actually just a QR code away.

IT Strategy See all

By Ilija Acimovic|Mar 16, 2020

How Crypto Revolutions in the Financial Industry Link to Modern-Day Conceptions of Fintech

Cryptocurrencies profoundly influence the fintech sector, disrupting how we transfer our funds, make purchases or even raise money.

By Lourie Goodall|Mar 11, 2020

How Your VTL Can Help Save Money by Becoming a Cloud Object Store

The transparent cloud tiering and DS8000 Object Store features provide a valued cost savings solution to mainframe storage customers.

IBM Systems Webinar Icon

View upcoming and on-demand (IBM Z, IBM i, AIX, Power Systems) webinars.
Register now →

The year 2020

SOLUTIONS DIRECTORY