• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Four Hundred Monitor, December 8

    December 8, 2021 Jenny Thomas

    As we plod through the remaining weeks of the year, all eyes are on IBM and expectations for the next 12 months after freeing itself from Kyndryl, which should allow for a refocus on growth within the walls of Big Blue. And the pressure is on as we see in the news this week that the stock analysts are keeping careful track of any tremors in IBM’s value. And, of course, you can also count on us here at the Jungle to be watching what happens next in our favorite ecosystem and keeping you in the loop every step of the way.

    Top Stories From Outside The Jungle

    (Nasdaq) Will IBM stock make a substantial return in 2022? Some think it’s possible.

    (Seeking Alpha) Just because Kyndryl has left the building doesn’t mean it’s not a good investment for IBM fans.

    (IBM Newsroom) IBM’s SVP of Software outlines three topics businesses should think about regarding the issue of trust in technology.

    (CIO) Ransomware will continue to plague organizations in the coming year. Here’s seven steps to help defend enterprise data.

    (Bloomberg) Arbitrations continue with hundreds of workers who claim that IBM illegally fired them as part of a scheme to replace older employees with younger ones.

    Redbooks, White Papers, Blogs, and Other Resources

    (COMMON) Now’s the time to renew your COMMON membership, which gives members access to the content library, event discounts, and – new in 2022 – free Boot Camp training access!

    (OpenLegacy) A new blog post on automating the creation and delivery of C# APIs from legacy assets.

    (Manta Technology) Save 30 percent off the complete library during Manta’s year-end sale.

    (Seiden Group Blog) A practical upgrade path to protect your IBM i systems while improving the speed and reliability of your PHP apps.

    (Zend) Weigh in on the state of PHP by taking this survey. Result will be made available in a free report and $50 will be donated to Black Girls Code, a charity focused on empowering girls of color to become innovators and leaders in computer science.

    Chats, Webinars, Seminars, Shows, and Other Happenings

    December 9 – Webinar – Join New Generation Software for an intro to NGS-IQ and find out what it can offer your organization, including, point-click query development, IBM i security, performance, Windows, Web and 5250 development, and run-time interfaces

    December 15 – Webinar – In this free POWERcast, LANSA’s Eugene King will answer the question: Why migrate when you can modernize?

    December 14 – Webinar – Learn how you can integrate mainframe and IBM i systems into your ServiceNow IT workflows in this webinar from Precisely.

    December 15 – Webinar – Despite acknowledging its security benefits, many organizations hesitate to implement a Zero Trust model. What if you took a more incremental, agile approach that allows your organization to make realistic steps toward achieving Zero Trust? Learn the six steps to achieve Zero Trust in this free webinar from Illumino.

    March 15-17, 2022 – Delavan, Wisconsin – The Wisconsin Midrange Computer Professional Association (WMCPA) will be having its annual Spring conference at Lake Lawn Resort in 2022! Join WMPCA for its first in-person conference in two years.

    May 23-26, 2022 – New Orleans, Louisiana – Mark your calendar for POWERUp 2022, which will take place in the heart of the French Quarter. This will be the first in-person POWERUp since 2019! Include this exciting conference in your budget planning and come join the community once again for the most extensive and comprehensive IBM i education and networking available.

    October 3-5, 2022 – St. Louis, Missouri – NAViGATE is COMMON’s annual Fall Conference. This is an event offering unique in-person and virtual networking opportunities that will take place to allow attendees to interact and share knowledge. Details to come.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: FHM, Four Hundred Monitor, IBM i

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS. Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

    800.211.8798 | info@ucgtechnologies.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Supply Chain Problems Cause Power Systems SAS Controller Shortage IBM Updates CMOD for i

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 81

This Issue Sponsored By

  • Maxava
  • ProData
  • ARCAD Software
  • UCG Technologies
  • Raz-Lee Security

Table of Contents

  • Want to Modernize? Great! Now Get to Work
  • Trinity Guard Update Brings Joy to System Values, SIEM Integration
  • IBM Updates CMOD for i
  • Four Hundred Monitor, December 8
  • Supply Chain Problems Cause Power Systems SAS Controller Shortage

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power10 Entry Machines: The Power S1024 And Power L1024
  • Thoroughly Modern: Latest IT Trends – Bring Security, Speed, And Consistency To IT With Automation
  • Big Blue Unveils New Scalable VTL For IBM i
  • As I See It: Thank God It’s Thursday
  • IBM i PTF Guide, Volume 24, Number 32
  • JD Edwards Customers Face Support Decisions
  • Security, Automation, and Cloud Top Midrange IT Priorities, Study Says
  • Cleo and SrinSoft in Integration-Modernization Link Up
  • Four Hundred Monitor, August 3
  • IBM i PTF Guide, Volume 24, Number 31

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.