Identify and Address 5 Top IBM i Security Threats
The IBM i has a well-earned reputation as one of the most secure IT platforms in the world. But actually, that’s something of a misnomer. It would be more correct to say that IBM i is one of the...
The IBM i has a well-earned reputation as one of the most secure IT platforms in the world. But actually, that’s something of a misnomer. It would be more correct to say that IBM i is one of the...
You might have vast amounts of data, but how complete is it? Complete data gives you a fuller picture of your business. Moreover, having complete data helps you make truly informed business...
This blog was originally published as a Syncsort blog. Syncsort has since rebranded to Precisely. It is with tremendous sadness that I share the passing of Aso Tavitian. Aso immigrated to the United...
In April 2019, IBM announced the 7.4 release of the IBM i operating system. Among the many advances in the operating system is the new Db2 Mirror feature. This exciting new capability synchronously...
At least once a year I sit down to watch one of the many televised marathons that happen in cities all around the world. Recently, as the helicopter camera panned away to show thousands of runners at...
High availability is a buzzword in IT today. Usually, it refers to applications and services that are resistant to disruption. But it should also apply to your data. Here’s why. What is it?...
What drives big data success? Your first thought might be analytics accuracy or the amount of data you have available to process. But if you’re not thinking about data quality, you may be...
Streaming data pipelines enable companies to process large amounts of information from a wide variety of sources across the enterprise. However, these pipelines are still a recent innovation for many...
The COVID-19 pandemic is a disruption unlike any we have seen in modern times. As human beings, we look to history to guide us in how we respond to certain situations, but COVID-19 is unprecedented...