Subscribe to the 5 Minute Briefing Data Center email newsletter

Five Minute Briefing - Data Center
April 5, 2021

Five Minute Briefing - Data Center: April 5, 2021. Published in conjunction with SHARE Inc., a bi-weekly report geared to the needs of data center professionals.

News Flashes

ASG Technologies, a provider of solutions for the information-powered enterprise, has unveiled new capabilities for its DevOps value stream management platform, ASG-Enterprise Orchestrator 4.2. The release further enables infrastructure and operations and DevOps teams to visualize, orchestrate, and automate development and operational value streams spanning mainframe to cloud.

IBM has announced a series of new and updated capabilities for developers designed to deliver intelligent application analysis throughout the DevOps pipeline.

The latest release of Red Hat Integration is now available and includes an expanded list of target databases with a new connector for IBM Db2. The announcement was made in a Red Hat blog post.

SunTec, a relationship-based pricing and billing company, has announced that its award-winning platform Xelerate is now available on IBM Z and IBM LinuxONE, allowing large banks that host much of their applications and operational data on IBM Z to rapidly and non-intrusively enhance the capabilities of their legacy core systems, to deliver contextual and hyper-personalized customer experience and offerings.

News From SHARE

It's been quite a year for working women, and it wouldn't be right to close out Women's History Month 2021 without recognizing the women of SHARE. That's why, for this month's Message From SHARE, I'm turning the tables and asking some of our SHARE Virtual Summit Women in IT panelists a few questions.

Think About It

The first step to defending against both privileged credential hijacking and insider threats is using role-based access control (RBAC). RBAC enables companies to grant privileges that are absolutely needed, and only for a specific time. However, not all RBAC is created equal and it's imperative to take security to the next level with functional access control (FAC).