Artificial Intelligence Month

The Risks of Unregulated AI: What to Know

The Risks of Unregulated AI: What to Know

Throughout the past decade, artificial intelligence (AI) technology has quickly become part of everyday life. Smartphones come equipped with AI-backed voice recognition software that can answer simple questions and maximize the use of your device. Even facial...

read more
Db2 Workload Performance on Fire

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Latest

Introducing Cyber Security Month

Introducing Cyber Security Month

We trust you've appreciated our September series, centered around Db2. Over the past few weeks, we've had the pleasure of sharing over 10 fresh, original Db2 articles with our dedicated audience. Today, we are thrilled to introduce an engaging new theme for...

Make Security Your Competitive Advantage

Make Security Your Competitive Advantage

“If you spend more on coffee than on IT security, you will be hacked.”  That was according to Richard Clarke, former special advisor on cybersecurity to the US President. He added, “What’s more, you deserve to be hacked,” which does seem a little harsh. Maybe...

Securing CICS with RACF

Securing CICS with RACF

Implementing CICS Security with RACF can be a complex and demanding process. In order to do it to a level that creates a good balance can take time and requires good knowledge and understanding of both CICS and RACF. So I will explain the various steps in securing...

Db2 for z/OS: SEPARATE_SECURITY and SECADM

Db2 for z/OS: SEPARATE_SECURITY and SECADM

 In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem, there is a parameter named SEPARATE_SECURITY. This ZPARM was introduced with Db2 10, and its purpose is to enable a Db2 for z/OS-using...

Quantum Safe Cryptography Overview

Quantum Safe Cryptography Overview

Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum computers will be advanced enough to cut the strength of symmetric key algorithms (such as AES, 3DES and RC4) by half, and...

Sign up to receive the latest mainframe information

This field is for validation purposes and should be left unchanged.

Upcoming Events

TRIVIA – Observability and Resiliency

TRIVIA – Observability and Resiliency

At Planet Mainframe, September is the month that we pay special attention to two critical pillars of modern mainframe operations — observability and resiliency.  Observability goes beyond traditional monitoring by providing deep insights into applications,...

read more
TRIVIA – Mainframe Firsts

TRIVIA – Mainframe Firsts

Mainframes have a reputation for being rock-solid, reliable…and maybe a little mysterious (to outsiders at least). But behind the green screens and acronyms lies a rich history of innovation that has shaped the modern computing world.  From groundbreaking hardware...

read more
A Decade in Purple Chucks: Celebrating Planet Mainframe

A Decade in Purple Chucks: Celebrating Planet Mainframe

When a group of mainframers started a part-time mainframe blog 10 years ago, they never imagined it would become a leading website for mainframe industry news. For over a decade, we’ve shared ideas, explored new innovations, and highlighted the people shaping the...

read more