Like anything in IT, eventually there will be a time where applications need updating. Web applications and websites will run for a long time, but there will come a time where these web apps are unable to integrate with newer technologies, run slower than before, or have security issues. Any IT department focused on modernization…
IBM i V7R4 Announcement
On April 23rd IBM announced the release of IBM I V7R4. Don’t bother calling your favorite IBM Business Partner just yet to get your order rolling. Availability date for the release is June 21st. V7R3 was announced along with a Technical Refresh of V7R3 and a new software product that stole the attention of the…
Endpoint Security
Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…
What is an “access key” and why you should care
Over the last few months (this being written in September 2018), I have received customer emails asking if I can get them an updated access key. This was something new to me, and I had to do some research to find out what is an updated access key. Come to find out, this was something…
Practical uses for open source solutions
The concept of open source solutions continues to grow in popularity, but what are some practical uses of open source solutions? How are companies using open source today? You may be surprised to know some of the most common languages are also the most popular open source languages today. Your organization may already be using…