Blog

Home>Blog

September 2020

IBM Spectrum Protect, what are best practices to keep in mind when executing the Audit Volume Command?

By |September 21st, 2020|Categories: Backup & Archive|Tags: , , |

Reading Time: 5 minutes

There can be situations when the data on the tape media could be physically corrupted. In such cases, IBM Spectrum Protect can help validate the data is not damaged by using the command explained below. But, what if the data [...]

How service management platforms automate the workplace of tomorrow

By |September 10th, 2020|Categories: BVQ, Other|Tags: , |

Reading Time: 7 minutes

Service Management Platforms are used to structure and automate processes. They enable the tracking of each process and ensure faster response times while automating procedures, which means that the personnel can be better distributed and the service provided is improved [...]

August 2020

Does project management increase business value?

By |August 25th, 2020|Categories: Other|Tags: |

Reading Time: 6 minutes

Certainly, you have already asked yourself why a position involving project management - hereafter referred to as PM - is included in a quotation and whether this position is really necessary for you. Depending on the project, quite large sums [...]

Agile or planned? Which project management method is the right one?

By |August 25th, 2020|Categories: Business Continuity, Other|

Reading Time: 8 minutes

Is there ONE right project management method for all projects? When this question is asked, the answer must be "No". Nevertheless, the question is relevant and must be addressed before or at the beginning of a project. After all, you [...]

Digital Workspace 4.0: The chatbot opens the door to a new era

By |August 18th, 2020|Categories: Other|Tags: , |

Reading Time: 6 minutes

Digital Workspace 4.0 is becoming a business requirement. But if you plan to enter the new era, you are facing the question: Where do I start? How can the new technologies - such as Big Data and Artificial Intelligence - [...]

ESM, ITSM & CSM – The definition chaos

By |August 13th, 2020|Categories: BVQ|Tags: |

Reading Time: 6 minutes

Everyone talks about them, but everyone talks about something different! Enterprise Service Management, IT Service Management and Customer Service Management. As a hypothetical matter, almost every IT decision-maker is currently talking about these topics, but everyone always understands something [...]

Tape Libraries come back to save the day

By |August 4th, 2020|Categories: Backup & Archive|Tags: , , , , , |

Reading Time: 7 minutes

A legacy data storage technology has become the hero of recent times According to the Cyber Observer: The United States ranks highest with 18.2% of all ransomware attacks and 43% of breach victims were small and medium businesses (link). [...]

July 2020

Five reasons for digitizing the workplace

By |July 30th, 2020|Categories: License Management, Other|Tags: , |

Reading Time: 6 minutes

The digital transformation is noticeably increasing in speed. The current corona pandemic in particular is encouraging this development and giving the whole situation an unprecedented boost. Many countries such as Germany and the US are being virtually forced to digitalize [...]

Next-Gen Backup

By |July 15th, 2020|Categories: Backup & Archive, Business Continuity, Other|Tags: , |

Reading Time: 7 minutes

Backup and disaster recovery (DR) are two very important aspects when companies implement hyper-convergent IT infrastructures (HCI). In this blog series, I would like to share some of my experiences during my work as an architect and consultant. The series [...]

Cybersecurity in the financial services industry

By |July 10th, 2020|Categories: Other|Tags: |

Reading Time: 4 minutes

Demanding performance with high risk For the financial services sector, real money is at stake when it comes to cybersecurity. The entire industry has secured a pioneering role for itself through comprehensive measures - including the use of new [...]

Cybersecurity in the public sector

By |July 8th, 2020|Categories: Other|Tags: |

Reading Time: 4 minutes

How do the authorities approach the issue? Compared to the private sector, the public sector faces its unique challenges concerning cybersecurity. It is the responsibility of the authorities to ensure accountability and transparency, keep state and personal secrets secure, [...]

Real-time Analysis of Remote Workstations

By |July 1st, 2020|Categories: Backup & Archive, Business Continuity, Other|Tags: , , |

Reading Time: 7 minutes

Secure handling of a company data in the cloud The current times and the changes caused by the Coronavirus have shown employees as well as employers, that employees must be allowed to work remotely not only in times of crisis. [...]

June 2020

COVID-19: IT infrastructure for provisional hospitals

By |June 29th, 2020|Categories: BVQ for VMware/vSAN, License Management|

Reading Time: 4 minutes

Given the exponential increase in the number of people infected with the Coronavirus, many governments as the German government have adopted a hospital emergency plan. Among other things, this plan provides resources for rehabilitation centres to be upgraded, equipped and converted [...]

zWR – effortless and essential mainframe performance reporting

By |June 6th, 2020|Categories: IBM-Z, zWR Cost Containment, zWR Performance Management|

Reading Time: 6 minutes

Those responsible for mainframe systems management often hear the following concerns: “We have lost mainframe expertise to retirements, losing knowledge of performance and capacity understanding…” and “Our enterprise has few or no tools for capacity planning…” [...]

This website uses cookies and third party services. Ok