• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Four Hundred Monitor, October 23

    October 23, 2019 Jenny Thomas

    The news of the week seems to be heavily focused on two different topics: quantum computing and ransomware. IBM is looking to establish itself as a quantum computing superpower, and is ready to go to the mat with Google over its claims that Google researchers are leading the pack. And then there are the omnipresent reports of ransomware attacks, which we continue to point out in hopes it reminds our readers to make data protection a high priority. You can find links to some of the highlights (or lowlights in the case of cyberattacks) for both topics below.

    Top Stories From Outside The Jungle

    (Wired) IBM is looking to be the leader in quantum computing, and is taking issue with Google’s claims of quantum supremacy.

    (The New York Times) This article offers a peek into the future of quantum computing at Big Blue.

    (Wall Street Journal) Small practice doctors, dentists, and community hospitals are struggling in the fight against ransomware.

    (SC Magazine) Another school district, this time in California, is hit with a ransomware attack.

    Redbooks, White Papers, Blogs, and Other Resources

    (IBM Developer) Time is running out to nominate an IBM Champion. IBM professionals who demonstrate expertise in and extraordinary support and advocacy for IBM technology, communities, and solutions are viable candidates. The IBM Champion program recognizes innovative thought leaders in the technical community and rewards these contributions by amplifying their voice and increasing their sphere of influence. Make a nomination now through November 4.

    (Medium) This blog updates us on the release of Node.js 13.

    (Profound Logic) Share your Node.js development spaces with others or get inspired by searching other’s completed applications in this free workspace offered by Profound Logic.

    (Connectria) 2019 has been the Year of the Ransomware attack in healthcare, but that’s not the only kind of cyberattack providers need to watch out for.

    (Skytap) Cloud Service is a hot topic for many IT shops. This data sheet explains how Skytap supports AIX, Linux, and IBM i applications running directly alongside x86 in the same application environment.

    Chats, Webinars, Seminars, Shows, and Other Happenings

    October 25 – Washington, D.C. – Join Erwin Earley, Senior Solutions Consultant at Zend by Perforce, Clark Everetts, Senior Professional Services Consultant at Zend by Perforce, and Jesse Gorzinski, Business Architect of open source at the IBM i development lab for a full day dedicated to exploring PHP on IBM i. This post-con day at php[world] is a single-track event and requires a separate ticket, which can be purchased independently or alongside a conference ticket. Session topics include: An overview of the capabilities of PHP on IBM i; building web applications that use your IBM i data; leveraging existing business logic from your ILE programs and artifacts; the three pillars of modernization; what you need to know about IBM’s increasing use of open source with the IBM i platform; how you can use the features in Zend Server to rapidly build and manage applications on the IBM i platform.

    October 30 – Webinar – This 20-minute live event demonstrate how to use virtual tape instead of tape for backup and recovery of IBM Power Systems (iSeries, AS/400, System i, AIX, and Linux). This free webcast includes a live technical demonstration of ViTL, a virtual tape solution created specifically for IBM i systems. This event is for IT directors, managers, administrators, architects, and anyone responsible for their company’s data protection.

    November 5 – Webinar – When your IBM i high availability solution no longer fits your needs, it can be hard to replace that complex environment. On this live webinar, HelpSystems experts will introduce you to the new HA transition technology available with Robot HA software. It takes a smart, step-by-step approach to moving your replication rules, instead of carelessly converting them in bulk.

    November 11-13 – Virginia Beach, Virginia – Do you run IBM i? Network with fellow peers at the annual MAGiC conference. IBM i Chief Architect Charlie Guarino will keynote and featured speakers include: Charlie Guarino of Central Park Data Systems; Mike Pavlak of Fresche Solutions; Larry Bolhuis of Frankeni Technology Consulting; and Erwin Earley of Rogue Wave Software, Inc.

    November 12-14 – Orlando, Florida – The Profound Logic User Seminar (PLUS) is three days of intense, product-focused learning with workshops, labs, and educational sessions. Get in-depth, hands-on instruction from Profound Logic experts for a fraction of the cost of on-site training. Learn at your pace with multiple session tracks. Attend a day dedicated to hands-on product workshops. Network with fellow Profound Logic customers and partners.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: FHM, Four Hunded Monitor, IBM i

    Sponsored by
    Raz-Lee Security

    Raz-Lee Security is the leader in security and compliance solutions that guard business-critical information on IBM i servers. We are committed to providing the best and most comprehensive solutions for compliance, auditing, and protection from threats and ransomware. We have developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.

    Raz-Lee’s flagship iSecurity suite of products is comprised of solutions that help your company safeguard and monitor valuable information assets against intrusions. Our state-of-the-art products protect your files and databases from both theft and extortion attacks. Our technology provides visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, unauthorized users and malicious insiders.

    With over 35 years of exclusive IBM i security focus, Raz-Lee has achieved outstanding development capabilities and expertise. We work hard to help your company achieve the highest security and regulatory compliance.

    Key Products:

    • AUDIT
    • FIREWALL
    • ANTIVIRUS
    • ANTI-RANSOMWARE
    • MULTI-FACTOR AUTHENTICATION
    • AP-JOURNAL
    • DB-GATE
    • FILESCOPE
    • COMPLIANCE MANAGER
    • FIELD ENCRYPTION

    Learn about iSecurity Products at https://www.razlee.com/isecurity-products/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    IBM i PTF Guide, Volume 21, Number 42 Data Protection in the New Regulated Era

    Leave a Reply Cancel reply

TFH Volume: 29 Issue: 62

This Issue Sponsored By

  • ProData Computer Services
  • Maxava
  • New Generation Software
  • iTech Solutions
  • T.L. Ashford

Table of Contents

  • Digging Into the Latest IBM i TRs
  • Java License Fallout Continues Impacting IBM i Shops
  • Data Protection in the New Regulated Era
  • Four Hundred Monitor, October 23
  • IBM i PTF Guide, Volume 21, Number 42

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power Systems Did Indeed Grow Revenues Last Year
  • The IBM Power Trap: Three Mistakes That Leave You Stuck
  • Big Blue Decrees Its 2023 IBM Champions
  • As I See It: The Good, the Bad, And The Mistaken
  • IBM i PTF Guide, Volume 25, Number 5
  • N2i Gains Traction Among IBM i Newbies
  • Realizing The Promise Of Cross Platform Development With VS Code
  • 2023 IBM i Predictions, Part 3
  • Four Hundred Monitor, January 25
  • Join The 2023 IBM i Marketplace Survey Webinar Tomorrow

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.