• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback on Google Trends: IBM i Traffic Piddling Compared to iSeries

    October 25, 2010 Hey, TPM

    AS400, without the slash, still leads the pack.

    –Crowell

    Indeed it do. Here’s the same search, with no slash in the AS400. (You can run the query yourself against Google Trends by clicking here. Take a gander:

    Google Trends for i

    Google Trends for various AS/400-related terms. (Click graphic to enlarge.)

    It’s like IBM never changed the name of the platform, or more precisely, it kept trying and met with less and less success with each name it tried. Well, it isn’t just like that, of course–that is exactly and precisely what happened. No metaphor required.

    –TPM

    Hello, Timothy:

    This was an eye-opener for me, including Google Trends, which I never used. I showed this to my CEO who was impressed . . . until he plugged in “security” (separately), “compliance” (also separately) and “PCI”. All three show a downward trend, which doesn’t see reasonable. Maybe we’re not reading the chart correctly?

    –Eli

    That does seem kind of odd, doesn’t it? But perhaps people are less concerned with security than they need to be and more concerned with other things, such as the price of gold and what Lindsay Lohan is up to.

    But seriously, when I do the search with all three, which you can do yourself by clicking here, I get this:

    Google Trends for i

    Google Trends for the terms security, PCI, and compliance. (Click graphic to enlarge.)

    To my eye, security concerns are on the rise after a lull in 2007 and 2008 (how much of this is related to homeland security and home security, I can’t say), PCI has only recently drifted down (and heaven only knows how much of this content has to do with the PCI bus and not the Payment Card Industry standard). Compliance looks dead flat to me, but that is because the relative traffic is low. The interesting bit is that the news reference volume for all three terms together and for security by itself are on the rise.

    RELATED STORIES

    Google Trends: IBM i Traffic Piddling Compared to iSeries

    Job Word Cloud Redux: The AS/400 Sees Some Improvement

    Looking for AS/400 Work? Check Out This Site

    Reader Feedback on Forget About Platforms, Let’s Talk About Jobs

    Forget About Platforms, Let’s Talk About Jobs

    Server Branding 101: Big Name, Big Game?

    A Word Cloud of IBM Server Brand Names



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 19, Number 38 -- October 25, 2010

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    How Do I Record a PC5250 Macro? Numina Voice Picking Boosts Productivity of Wisconsin Warehouse

    Leave a Reply Cancel reply

TFH Volume: 19 Issue: 38

This Issue Sponsored By

    Table of Contents

    • IBM i Competes with AIX/Oracle on Power 720s, Gets Beat on 750s
    • iManifest Powers On in Japan
    • Power Systems Not Quite Rebounding Yet in Q3
    • As I See It: My Name is Bond–Jane Bond
    • Job Site Data Shows IT Jobs Down Across the Board
    • Reader Feedback on Google Trends: IBM i Traffic Piddling Compared to iSeries
    • IBM Moves Power Systems Factories from Ireland to China and Singapore
    • Gartner Says IT Spending Growth to Be Tepid Through 2014
    • Selected Power Systems Features and Upgrades Get the Axe
    • IBM Snaps Up Another BI Tool Maker

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Why Open Source Is Critical for Digital Transformation
    • mrc Refreshes IBM i Low-Code Dev Tool
    • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
    • Four Hundred Monitor, March 3
    • IBM i PTF Guide, Volume 23, Number 9
    • Doing The Texas Two Step From Power9 To Power10
    • PHP’s Legacy Problem
    • Guru: For IBM i Newcomers, An Access Client Solutions Primer
    • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
    • Some Practical Advice On That HMC-Power9 Impedance Mismatch

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2021 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.