(Oneil Richardson) A port vulnerability scanner is an application designed to probe a server or host for open ports. Most scanners will run for a 30 minute period, assessing open ports on a host and then producing a report to identify potential security compromises on the enterprise system(s) scanne
Tag: IBM
The DB2Night Show #Z83: Copy Smarter – Unload/Load, DSN1COPY and beyond
(Martin) 96% of our studio audience learned something!Kai described the requirements and issues of copying Db2 data between environments.
TechTip: SQL2XLSX Now Climbs to the Summit of One Million Rows
(Giuseppe Costagliola) As I promised in my previous article, “TechTip: SQL2XLSX – The Starter Kit,” I’m back to present an enhanced version of the utility that I hope you find useful.
Deploy Watson Conversation Chatbots to WordPress
(Hasan Siddiqui) If you’re reading this then you’ve most likely heard all the buzz around chatbots. In fact, you may have come up with a few scenarios where it would be really helpful for you to use one.
The awesome power of Alter table in DB2 12 for z/OS
(Kurt Struyf) In the early days of DB2 for z/OS, pretty much every change to a table would result in an unload-drop-recreate-load of the table.
Converting from 6- to 10-byte RBA/LRSN
(Troy L Coleman) Db2 11 introduced an option to convert the log relative byte address (RBA) and data sharing log record sequence number (LRSN) from the basic 6-byte format to the extended 10-byte format.
Accessing Watson services with Power System servers
(Ahmed Azraq, Soheel Chughtai, Ahmed (Mash) Mashhour, Duy V Nguyen and Reginaldo Marcelo Dos Santos) This IBM Redbooks publication provides an introduction to the Power processor architecture. It describes the IBM Power processor and IBM Power Systems. Highlighting the advantages and benefits of I
Five Data Management Predictions for 2018
(Dave Beulke) Happy New Year! I hope everyone has their 2018 filled with good health, happiness and prosperity. Once again I am offering you my data management predictions for 2018. Thank you all for great support in 2017 and countless emails regarding my conference, user group presentations and blo
Using Apache SystemML for anomaly detection
(Romeo Kienzler) At this point in the series of articles I’ve introduced you to deep learning and long-short term memory (LSTM) networks, shown you how to generate data for anomaly detection, and taught you how to use the Deeplearning4j toolkit. In this fourth article, I talk about Apache SystemML.
IBM Z Trial Program
(Troy L Coleman) Mainframe customers running z/OS know all too well the amount of the work that comes with a proof-of-concept. The process requires months of planning among system programmers, security and storage administrators and end users.