Top 21 Tech/IT Conferences of 2017
BY Stephen WattsStephen Watts

Whether you are a CEO, developer, IT professional, customer, or simply an employee in the technology field, staying current on the latest tech and IT trends can be a job within itself. Technology is constantly changing, and if you want to be able to work with … [Read More...]

IT Security Vulnerability vs Threat vs Risk: What’s the Difference?
BY Stephen WattsStephen Watts

In today’s world, data and protecting that data are critical considerations for businesses. Customers want to ensure that their information is secure with you, and if you can’t keep it safe, you will lose their business. Many clients with sensitive information … [Read More...]

Competitive Benefits of Enterprise ITSM versus Ad-hoc ITSM
BY Joe HertvikJoe Hertvik

In my last post, I discussed the difference in benefits and business drivers realized between organizations employing an Enterprise Information Technology Service Management (ITSM) strategy versus organizations employing an Ad-hoc ITSM strategy. Today, let’s … [Read More...]

Four P’s of ITIL Service Design
BY Stephen WattsStephen Watts

Simply put, the four P’s of ITIL Service Design are: People Products Partners Processes We’ve seen it all before: a spectacular launch of a new product or an overdue upgrade. And then the complaints start coming in – key features not working, … [Read More...]

Five Tips for Your Modern Mainframe
BY Bronna ShapiroBronna Shapiro

A variety of challenges impact mainframe systems management and are driving companies to look for ways to meet the ever-increasing demands, speed, and complexity of digital business. IT budgets are tight. Skilled mainframe experts are retiring at a rapid rate … [Read More...]

IMS Still Rules the World – and Digital Business
BY Tom VogelTom Vogel

Is your company running IMS? If so, you know how valuable and dependable it has always been. IMS is the critical backbone of some of the largest systems for major financial, transportation, and government entities and customer end-user applications - like ATM … [Read More...]

Why It’s Time to Re-think Mainframe Performance Management
BY Paul VallelyPaul Vallely and John McKennyJohn McKenny

The mainframe is arguably the most cost-effective platform for the bigger, faster, always available demands of digital business. Yet despite its central role at large enterprises, many IT leaders are disinvesting in mainframe performance management. This is in … [Read More...]

Understanding LOBs in DB2 and the Explosion of Unstructured Data
BY Carolyn HenryCarolyn Henry

Do you know where all your unstructured data is? Do you know what applications are storing unstructured data in DB2? Can you be sure that your data is secure? Don’t let what you don’t know hurt you. BMC's LOBMaster for DB2® provides the assurances you need to … [Read More...]

How Changes to the EU’s General Data Protection Plan Regulation Impact Your Business
BY Allison CramerAllison Cramer

The clock is ticking As digital business expands and consumers increase their online activities, protecting privacy and ensuring security is more important than ever. The EU General Data Protection Plan Regulation (GDPR) becomes effective in May 2018, with … [Read More...]

Microservices vs SOA: What’s the Difference?
BY Stephen WattsStephen Watts

Microservices Architecture (MSA) and Service-Oriented Architecture (SOA) both rely on services as the main component. But they vary greatly in terms of service characteristics. SOA defines 4 basic service types as depicted below. Business services … [Read More...]