Once upon a time, tape backup was the only answer for a Disaster Recovery (DR) strategy. In many cases today, we have found this strategy incomplete and not successful. Often times, tapes are stored next to the system, stored in a closet, in the trunk of a car, or other places where they are unprotected…
DSC: Running IBM i Software Applications in the Cloud
Since the late 1970s, Enterprise Resource Planning (ERP) and financial software have comprised the bulk of software applications run on IBM POWER systems — specifically the IBM i (AS/400, i Series, System i) operating system. This should come as no surprise, as IBM was founded on the premise of producing computers and hardware specifically earmarked for business….
Legacy Data – Legacy Code
We’ve had many conversations lately with clients regarding their need to organize, prioritize, or “do something’ with legacy data and sometimes legacy code. The origins of these conversations are varied from moving off a production technology platform, enterprise software migrations, industry regulations, to sometimes corporate bureaucracy demands. The conversations typically center around having large amounts…
Prioritizing Threats and staying ahead of the Cybercriminals
The methods of attack and the strategies of the people that attack our networks and data resources continue to evolve. Those of us responsible for protecting resources need to stay ahead of the threats. And as the threats change, the cybercriminals are using new tools to obscure their existence and evade detection. Ransomware is a…
Is it time to update your web apps?
Like anything in IT, eventually there will be a time where applications need updating. Web applications and websites will run for a long time, but there will come a time where these web apps are unable to integrate with newer technologies, run slower than before, or have security issues. Any IT department focused on modernization…