Today’s IT threat landscape is constantly changing, with more new unforeseen threats each day. Data breaches, hacks, ransomware, and malware are more prevalent than ever before. System monitoring and prevention of these attacks has become a top concern of company leaders. Until recently, security has not been a concern for IBM i shops. Many IBM…
What is an “access key” and why you should care
Over the last few months (this being written in September 2018), I have received customer emails asking if I can get them an updated access key. This was something new to me, and I had to do some research to find out what is an updated access key. Come to find out, this was something…
Practical uses for open source solutions
The concept of open source solutions continues to grow in popularity, but what are some practical uses of open source solutions? How are companies using open source today? You may be surprised to know some of the most common languages are also the most popular open source languages today. Your organization may already be using…
IBM Power System CPW Performance Data: POWER8 vs. POWER9 ScaleOut Models
IBM Announced the CPW and rPerf performance benchmark numbers for their new POWER9 ScaleOut servers on 2/27/2018 as promised the day of the server announcement 2/13/2018. You can see the full 26 page PDF document HERE if you are interested in the details. If you’re like 95% of the folks I get to work with in the…
IBM i and POWER9: Extreme Stability with Massive Scalability
I have been patiently waiting for this day, as I can now talk publicly about the servers built around the pound for pound champion of the processor world. We have heard a lot about the POWER9 Chip for high end AI and machine learning workloads, the massive scale of the Summit and Sierra supercomputers, the…