Skytap Template Backup and Copy-to-Region for Disaster Recovery

As an IT Pro, you know the importance of having a disaster recovery (DR) plan in place. However, budget constraints can make it difficult to implement a full DR solution. One way to prepare for a disaster is to create an offsite copy of your source data or environment, and a great way to do

IBM i Journal Caching

IBM i journaling is a built-in optional feature of the operating system designed to track any change to a given object.  For example, a library, DB2 database, data queues, IFS (integrated file system), etc. The purpose of journaling is to be able to recover the object in the event of failure. Customers must create a journal

Using Microsoft Azure Data Box for migration of IBM i workloads to Skytap

Skytap partners closely with Microsoft Azure to provide the ability to host IBM Power IBM i (AS/400, iSeries) and AIX application workloads in the cloud. As a Cloud Solutions Architect (or Pre-Sales Engineer), I talk to many customers every day who say they want to move their ‘legacy’ applications running on these platforms onto the

The safest way to live test your ransomware, malware, virus defenses

You aren’t going to release a live virus on your production system, so how do you test your defenses? In the article “The State of Ransomware in 2020“, research suggests that every 11 seconds, some business is being attacked by a cybercriminal. And in the report “The State of Ransomware 2021“, the frequency of attacks

Prove your IBM i Backup is Recoverable: The Cloud Way

Beyond having checklists and runbooks, what else can you do to test your backups? In the comprehensive article called “How to Prove Your IBM i is Recoverable without a Real DR Test,” Tom Huntington from HelpSystems details all the IBM i Save Commands and system objects that should be included within a comprehensive backup. By

Log4J and IBM i

Over the last few months, there have been many blog posts and technical breakdowns written on the vulnerability of the Log4j exploit. There are even memes about it, as it has permeated popular culture with the exploit affecting the highly popular game Minecraft. The Log4J vulnerability is one that had the potential to create mass

Cloud Taxonomy for Non-Production Use Cases for the Cloud

The following use cases are potential ways to use the cloud for non-production use cases. The key is to deliver “quickly” the infrastructure needed to perform a specific need or task. Waiting weeks for infrastructure delivery should be considered an “anti-pattern” since the cumulative time of waiting over the course of a project would be

Join our email list for news, product updates, and more.