Artificial Intelligence Month

The Risks of Unregulated AI: What to Know

The Risks of Unregulated AI: What to Know

Throughout the past decade, artificial intelligence (AI) technology has quickly become part of everyday life. Smartphones come equipped with AI-backed voice recognition software that can answer simple questions and maximize the use of your device. Even facial...

read more
Using AI for Monitoring Hybrid Environments

Using AI for Monitoring Hybrid Environments

Understanding and optimizing application performance is pivotal for businesses in the increasingly complex landscape of hybrid IT environments. Rod Dyson, Senior Director of Software Engineering at Rocket Software, explored this topic in a webinar hosted by Planet...

read more

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Latest

Hide your privates

Hide your privates

My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!) in a variety of places and I wasn’t very happy about it. I have several different servers that I connect to. There are a few GitHub systems, a Linux system, and of course...

Recover Quickly With Surgical Precision

Recover Quickly With Surgical Precision

Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing data corruption whether through malicious intent, human error or failure of hardware or software. It provides an air gapped backup of the operating...

How to solve the Data Privacy issue for test data

How to solve the Data Privacy issue for test data

You may be aware of data privacy regulations such as Europe’s GDPR (General Data Protection Regulation) or California’s CCPA (California Consumer Privacy Act) that, among other things, ban you from using production data with personally identifiable information, such...

CICS Security – ADCD and Dallas Z ISV RDP

CICS Security – ADCD and Dallas Z ISV RDP

In RACF security terminology, CICS is a resource manager. Resource manager security can be enabled or disabled. Dallas Z ISV RDP provided CICS security is disabled. Why? CICS manages many resources where enabling security requires decisions about which specific CICS...

Sign up to receive the latest mainframe information

This field is for validation purposes and should be left unchanged.

Upcoming Events

TRIVIA – Mainframe Firsts

TRIVIA – Mainframe Firsts

Mainframes have a reputation for being rock-solid, reliable…and maybe a little mysterious (to outsiders at least). But behind the green screens and acronyms lies a rich history of innovation that has shaped the modern computing world.  From groundbreaking hardware...

read more
A Decade in Purple Chucks: Celebrating Planet Mainframe

A Decade in Purple Chucks: Celebrating Planet Mainframe

When a group of mainframers started a part-time mainframe blog 10 years ago, they never imagined it would become a leading website for mainframe industry news. For over a decade, we’ve shared ideas, explored new innovations, and highlighted the people shaping the...

read more
TRIVIA – Mainframes and Their Rivals

TRIVIA – Mainframes and Their Rivals

For decades, mainframes have stood quietly at the heart of global enterprise computing, but they haven’t been without competition. From the rise of minicomputers to the spread of UNIX systems and the open-source movement, each wave of innovation has challenged the...

read more