Once upon a time, tape backup was the only answer for a Disaster Recovery (DR) strategy. In many cases today, we have found this strategy incomplete and not successful. Often times, tapes are stored next to the system, stored in a closet, in the trunk of a car, or other places where they are unprotected…
Legacy Data – Legacy Code
We’ve had many conversations lately with clients regarding their need to organize, prioritize, or “do something’ with legacy data and sometimes legacy code. The origins of these conversations are varied from moving off a production technology platform, enterprise software migrations, industry regulations, to sometimes corporate bureaucracy demands. The conversations typically center around having large amounts…
IBM i V7R4 Announcement
On April 23rd IBM announced the release of IBM I V7R4. Don’t bother calling your favorite IBM Business Partner just yet to get your order rolling. Availability date for the release is June 21st. V7R3 was announced along with a Technical Refresh of V7R3 and a new software product that stole the attention of the…
Endpoint Security
Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…
What is an “access key” and why you should care
Over the last few months (this being written in September 2018), I have received customer emails asking if I can get them an updated access key. This was something new to me, and I had to do some research to find out what is an updated access key. Come to find out, this was something…