The Background: During any given year, customers ask us to quote IBM hardware or software maintenance in “less than 1 year” increments. The request might be for invoicing monthly, quarterly, or twice a year – but something less than a full 1-year commitment. This can also be due to the customer moving off an older…
Even IBM i shops need to be focused on Security
Today’s IT threat landscape is constantly changing, with more new unforeseen threats each day. Data breaches, hacks, ransomware, and malware are more prevalent than ever before. System monitoring and prevention of these attacks has become a top concern of company leaders. Until recently, security has not been a concern for IBM i shops. Many IBM…
Modernizing your DR plan and Backups: Virtual Tape Library (VTL)
Once upon a time, tape backup was the only answer for a Disaster Recovery (DR) strategy. In many cases today, we have found this strategy incomplete and not successful. Often times, tapes are stored next to the system, stored in a closet, in the trunk of a car, or other places where they are unprotected…
Legacy Data – Legacy Code
We’ve had many conversations lately with clients regarding their need to organize, prioritize, or “do something’ with legacy data and sometimes legacy code. The origins of these conversations are varied from moving off a production technology platform, enterprise software migrations, industry regulations, to sometimes corporate bureaucracy demands. The conversations typically center around having large amounts…
Is it time to update your web apps?
Like anything in IT, eventually there will be a time where applications need updating. Web applications and websites will run for a long time, but there will come a time where these web apps are unable to integrate with newer technologies, run slower than before, or have security issues. Any IT department focused on modernization…