Resources

Article

Optimizing Containers, Kubernetes and OpenShift

The container deployment model offers component autonomy, elasticity, and scalability in a way that no other framework has done before. But to reap the benefits, you need to adopt new ways of managing and optimizing your environments and their underlying resources. Learn how to manage the performance and resource planning of container workloads.
Article

Eight Different Ways to Use HA at My Organization

A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
Article

IBM on IASP for PowerHA Implementations

You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Article

FlashCopy: Pros and Cons

IBM System Storage FlashCopy might seem like magic. But do the benefits for IBM i business continuity outweigh the hidden costs? Read on to find out.
Article

Interacting with Powertech SIEM Agent for IBM i

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Article

Comparing Different Methods for Calculating Health and Risk

How do you calculate IT health and risk ? There are different methods you can use, depending on your needs. The most common methods for determining IT infrastructure health are: Threshold comparison Enhanced threshold comparison Event detection Variation from normal Allocation comparison Queuing theory for health On the other hand, the most common methods for calculating IT infrastructure risk are...
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Article

How Recoverable Is My IBM i?

See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Article

Global IT Management Survey 2016—NewsWorthy Analysis

Results of a Kelton survey in which IT departments in large enterprises are tasked with responding to numerous business-impacting issues on any given day, including equipment failures, fluctuating website demand, and data security.
Article

Vityl and ITIL

TeamQuest (a Fortra company) can help organizations improve their chances at a successful ITIL implementation through the ITIL best practices listed in this article.