Modernizing software and applications is essential to keep up with technological advancements, ensure compatibility with new operating systems, and improve performance, scalability, and security. In this blog post, we’ll explore the various paths for modernizing software and applications: rehosting, refactoring, rearchitecting, and rebuilding. Rehosting involves moving an application from one environment to another without making…
Updated Solutions for the Modern Workplace
As the landscape of work environments change, remote work becomes more popular; many companies have prioritized the need for solutions in their workspaces to handle scalability, flexibility, and the ability to work safely from anywhere at any time. That’s why Arbor Solutions has an expansive catalog of services offered to our clients to help with…
Even IBM i shops need to be focused on Security
Today’s IT threat landscape is constantly changing, with more new unforeseen threats each day. Data breaches, hacks, ransomware, and malware are more prevalent than ever before. System monitoring and prevention of these attacks has become a top concern of company leaders. Until recently, security has not been a concern for IBM i shops. Many IBM…
Thoughts on Viruses and Malware
I was sitting in a coffee shop with my trusty MacBook a few days ago trying to get some work done (that’s my story anyway). I got to thinking about security as I looked across the coffee shop landscape in front of me, while connected to an unsecured network. Just a couple days prior to…
Is the x86 architecture really the best choice? x86 vs. IBM Power
Regardless of what side of the fence you stand on when it comes to the x86 vs. IBM Power Systems debate this is an interesting video. Every once in a while you have to peek over the fence and see what the other side is up to. Due to my borderline obsession with IBM Power…