We’ve had many conversations lately with clients regarding their need to organize, prioritize, or “do something’ with legacy data and sometimes legacy code. The origins of these conversations are varied from moving off a production technology platform, enterprise software migrations, industry regulations, to sometimes corporate bureaucracy demands. The conversations typically center around having large amounts…
Prioritizing Threats and staying ahead of the Cybercriminals
The methods of attack and the strategies of the people that attack our networks and data resources continue to evolve. Those of us responsible for protecting resources need to stay ahead of the threats. And as the threats change, the cybercriminals are using new tools to obscure their existence and evade detection. Ransomware is a…
Is it time to update your web apps?
Like anything in IT, eventually there will be a time where applications need updating. Web applications and websites will run for a long time, but there will come a time where these web apps are unable to integrate with newer technologies, run slower than before, or have security issues. Any IT department focused on modernization…
IBM i V7R4 Announcement
On April 23rd IBM announced the release of IBM I V7R4. Don’t bother calling your favorite IBM Business Partner just yet to get your order rolling. Availability date for the release is June 21st. V7R3 was announced along with a Technical Refresh of V7R3 and a new software product that stole the attention of the…
Endpoint Security
Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…