REALITY: Dispel the myths of IBM i data access and bring data to your desktop quickly with SEQUEL. From simple ad hoc queries to executive dashboards, SEQUEL delivers IBM i data in the format that works best for you. SEQUEL is the fastest, easiest way to access your IBM i data.
A comprehensive HA/DR environment includes the ability to "go back in time" using snapshots and continuous data protection.
Written by Rich Krause
The term "high availability" can be confusing in the IBM Power Systems realm because the definition of the term is different in the IBM i and AIX worlds. In IBM i shops, HA is achieved by setting up a backup system and using an HA product to replicate applications, along with business and system data, from the production server to the backup in real-time or near real-time. The result is a hot-standby backup server that is fully ready to take over operations at any time.
Security concerns abound when it comes to cloud computing. In an online poll recently conducted by Unisys Corporation, 51% of 312 attendees said that security and data privacy concerns remain the most significant impediment to the adoption of cloud computing. Another poll conducted by Unisys in a June 2009 webinar showed by 72% of the respondents cited security as their greatest concern for moving workload to the cloud. Are these concerns justified or is it simply the fear of the unknown? Let's take a look.
Over the years I've published a lot on security best practices. In fact, our SkyView Risk Assessor product is based on all of those recommendations. But today I feel a bit contrarian so I've decided to post a few "worst practices." And like my "best practices" these are based on my years of experience in the security world.
Worst practice #1 - when asked how all users ended up with *ALLOBJ special authority, the answer was, "I didn't want to take calls in the middle of the night - so I just gave everyone *ALLOBJ."
Worst practice #2 - No auditing. No joblogs. History log cleared. The reason - lack of storage. Also meant that there was a significant lack of evidence when we were called in to investigate a breach that had occurred on their network!