Syncsort Blog

Subscribe to Syncsort Blog feed
Covering trends and best practices in data infrastructure optimization, capacity management, data integration, data quality, data availability, security for IBM i and advancing data in the cloud
Updated: 2 hours 13 min ago

IBM POWER vs. x86: The Key Differences

6 hours 47 min ago
What makes System i different from other platforms? A large part of the answer lies in the CPU architectures that System i servers use: System i relies on IBM POWER microprocessors, whereas most other modern computers and servers use the x86 architecture. And just what does System i’s use of POWER chips mean? Let’s take a look at the major factors that distinguish the POWER architecture from x86. History: IBM POWER vs. x86 Although the origins of the POWER architecture and x86 CPUs b...
Categories: News from Vendors

New eBook! Passing Your Next Audit: The Challenges of Properly Securing Your IBM i and Maintaining Compliance

Sat, 08/18/2018 - 13:30
To achieve a security posture that is a real deterrent to theft or fraud – whether perpetrated by external or internal actors – a determined, consistent effort is required that combines the right mix of technologies, expertise and best practices. Syncsort’s eBook, “Passing Your Next Audit: The Challenges of Properly Securing Your IBM i and Maintaining Compliance,”  is intended to give you some insights in this direction. Achieving optimal security on the IBM i isn’t so much a d...
Categories: News from Vendors

How DevOps Changes the Meaning of ‘Mainframe Programmers’

Thu, 08/16/2018 - 13:30
We live in the age of DevOps, and no sector of IT — not even mainframes — remains unchanged. Here’s a look at how DevOps has reshaped the way mainframe programmers work. As you probably know by now if you work in IT, DevOps is an approach to software development and deployment that emphasizes close collaboration between development teams and operations (or “IT Ops”) teams. The driving idea behind DevOps is that by having the programmers who write applications work a...
Categories: News from Vendors

Trading Migration Downtime Costs for Uptime Savings

Wed, 08/15/2018 - 13:30
Last year we conducted a series of surveys that gave us an interesting bird’s eye view of the migration landscape. We found that IT departments were consistently falling short of their RTOs and RPOs and executives lacked confidence in their recovery plans. We also learned out of the thousands of IT managers we talked to, nearly half were delaying migrations that could vastly improve their productivity and business continuity. Why? The high probability and risk of migration-related downtime. Rece...
Categories: News from Vendors

ETL Integration: Best Practices in 30 Seconds

Tue, 08/14/2018 - 13:30
The efficiency of ETL integration can make or break the rest of your data management workflow. Want to get the most from your ETL processes? Keep reading for high-performance ETL integration best practices. Minimize data input The less data that you have going into ETL process, the faster and cleaner your results are likely to be. That’s why you want to strip out any unnecessary data as early in the ETL process as possible. If you have redundant entries in a database, for example, clean th...
Categories: News from Vendors

4 Tips for Optimizing Your Data Infrastructure

Mon, 08/13/2018 - 13:30
Building a data infrastructure is one thing. Building a data infrastructure that is efficient, reliable and cost-effective is another. What can you do to optimize your data infrastructure and keep it running at peak performance? Keep reading for tips on data infrastructure optimization. What Is Data Infrastructure? For the purposes of this article, we’ll define data infrastructure as all of the infrastructure tools and components that help you store, manage, analyze, integrate and back up ...
Categories: News from Vendors

Webcast: Top 5 Encryption Myths for IBM i Users

Sat, 08/11/2018 - 13:30
Syncsort has released their on-demand webcast, “Top 5 Encryption Myths for IBM i Users.” Do you know encryption fact from fiction? With data breaches frequently making the headlines, businesses are losing more business and personally identifiable information than ever. Every industry and company is at risk – public and private. Encryption is one of the best ways to protect this information, but misperceptions related to cost, performance, and ease of use run rampant. View this webcas...
Categories: News from Vendors

Mainframe Training Resources: How to Expand Your Mainframe Skillset

Thu, 08/09/2018 - 13:30
Do you want to learn more about mainframe programming and administration, but are struggling to find mainframe learning resources? If so, this article is for you. Keep reading for a list of easily accessible mainframe training and learning tools. Despite the fact that mainframes remain essential to many IT infrastructures, mainframe training opportunities can be tough to come by. Relatively few colleges teach mainframes (although some do). As a result, many experienced computer scientists and sy...
Categories: News from Vendors

The Hidden Costs of Big Data

Wed, 08/08/2018 - 13:30
How much does big data cost? There are two ways to answer that question: The simplistic way, which looks only at surface-level big data costs, and the comprehensive way, which factors in the “hidden costs of big data” as well. What are the hidden costs of big data, you ask? Keep reading for an overview of the costs that you could easily be overlooking within your big data management processes. Big Data’s Obvious Costs On the surface, the costs associated with managing big data ...
Categories: News from Vendors

Dangers of Encryption on the IBM i (AS/400, iSeries): 7 Pitfalls to Avoid

Tue, 08/07/2018 - 13:30
Syncsort recently acquired the IBM i encryption and security products of Townsend Security. The article below is an update to their popular blog post on the dangers of encryption on the IBM i. IBM’s security implementation on the IBM i platform is good, but that doesn’t mean that it’s immune from data breaches. All PCs and servers on the same network as your IBM i server are potential attack points for a data breach. There’s no doubt that cyber criminals know that the IBM i server is a rich targ...
Categories: News from Vendors

Data Governance: 5 Big Ideas for 2018

Mon, 08/06/2018 - 13:30
It’s 2018, and the data governance strategy that worked for you in the past may no longer be up to par. Fortunately, you can improve it. Here are five strategies for making your data governance strategy even better. As companies grow, new technologies emerge and new types of data-related challenges appear, the strategy you use to govern your data may need to be updated. New compliance frameworks may impact your business. You might be collecting data from more sources. And you are probably ...
Categories: News from Vendors

New eBook! How to Address the Top 5 Mainframe Security Vulnerabilities

Sat, 08/04/2018 - 13:30
In today’s modern IT infrastructures, the mainframe resides as a critical processor within the network, making it susceptible to external threats and attacks. Defined user accounts within the system can be leveraged to access and compromise secured resources. These types of attacks can occur when account information is maliciously compromised or it simply can occur when employees are disgruntled or careless. Syncsort’s eBook, “How to Address the Top 5 Mainframe Security Vulnerabiliti...
Categories: News from Vendors

Expert Interview (Part 3): Dr. Sourav Dey on Data Quality and Entity Resolution

Thu, 08/02/2018 - 13:30
At the recent DataWorks Summit in San Jose, Paige Roberts, Senior Product Marketing Manager at Syncsort, had a moment to speak with Dr. Sourav Dey, Managing Director at Manifold. In the first part of our three-part interview Roberts spoke to Dey about his presentation which focused on applying machine learning and data science to real world problems. Dey gave two examples of matching business needs to what the available data could predict. In part two, Dey discussed augmented intelligence, the p...
Categories: News from Vendors

High Availability Architecture: A Real-Life Blueprint To Use and Share

Wed, 08/01/2018 - 13:30
What does it take to achieve high availability? The short answer is “a lot.” Building highly available infrastructure requires investing in multiple infrastructure components, tools, and processes. For the longer answer to building a high-availability architecture, keep reading. What Is High Availability? Simply put, high availability means that everything hosted on your infrastructure is resilient against disruptions. Keeping computer systems highly available means taking several de...
Categories: News from Vendors

Expert Interview (Part 2): Dr. Sourav Dey on Augmented Intelligence and Model Explainability

Tue, 07/31/2018 - 13:30
At the recent DataWorks Summit in San Jose, Paige Roberts, Senior Product Marketing Manager at Syncsort, had a moment to speak with Dr. Sourav Dey, Managing Director at Manifold. In the first part of our three-part interview Roberts spoke to Dr. Dey about his presentation which focused on applying machine learning to real world requirements. Dr. Dey gave two examples of matching business needs to what the available data could predict. Here in part two, Dr. Dey discusses augmented intelligence, t...
Categories: News from Vendors

Expert Interview (Part 1): Dr. Sourav Dey on Applying Machine Learning to the Real World

Mon, 07/30/2018 - 13:30
At the recent DataWorks Summit in San Jose, Paige Roberts, Senior Product Marketing Manager at Syncsort, had a moment to speak with Dr. Sourav Dey, Managing Director at Manifold. In the first of this three part interview Roberts spoke to Dr. Dey about his presentation which focused on applying machine learning to real world requirements. Dr. Dey gives two examples of matching business needs to what the available data can predict. Roberts: So, let’s get started! Can you introduce yourself and whe...
Categories: News from Vendors

New Webcast! Top Ten Tips for IBM i Security and Compliance

Sat, 07/28/2018 - 13:30
Users and IT administrators have the belief that the IBM i is a secure system on its own, but what is the actual truth here? While the IBM i is known to be a highly securable system, it also presents unique challenges to security auditors and system administrators alike. Syncsort has released an on-demand webinar titled, “Top Ten Tips for IBM i Security and Compliance,” to show the best ways to safely secure your system. Achieving a secure and compliant IBM i environment is often a c...
Categories: News from Vendors

Capacity Management: What is your Capacity for Success?

Thu, 07/26/2018 - 13:30
In today’s world of constant and ever accelerating change we have the tendency to discard the old and look for the new. This is true for all sorts of consumer items, but it is often true for the ideas we have and the processes we use too. New must be better just because it’s new, so anything that sounds antiquated starts off with a low rating. Capacity Management is a bit like that. It sounds like something we did twenty or thirty years ago (it was!) and it sounds like it’s all about physical bi...
Categories: News from Vendors

High Availability and Disaster Recovery: Expect the Unexpected

Wed, 07/25/2018 - 13:30
As summer moves along, we continue with our latest summer school session. Last week we kicked off with Capacity Management. Today, we’ll take some time to recap High Availability. What Is High Availability? High availability refers to the ability of an application, service or other IT resources to remain constantly accessible, even in the face of unexpected disruptions. In most cases, when people talk about high availability, they’re thinking about applications and services. Using au...
Categories: News from Vendors

Database Migration: How Long Should it Take?

Tue, 07/24/2018 - 13:30
Database migration takes time. But how long, exactly, should you expect a database migration to last? Which factors influence the length of time that data migration requires? We explore in this article. What Is Database Migration? A database migration is any type of movement of data from one database to another. Database migrations come in many forms. They could involve simply moving data from one database instance to another database instance of the same type; for example, you might transfer da...
Categories: News from Vendors

Pages