article thumbnail

Modernizing the mainframe for the digital era

CIO Business Intelligence

I’m a banking technologist,” says the CIO for retail, business, and digital banking at M&T Bank. He’s doing just that on the bank’s IBM Z system mainframes, for which the bank has written some 10 million lines of code over the years. The bank’s use of its mainframes is two-pronged. M&T Bank.

IBM 144
article thumbnail

Regulatory Compliance and Red Hat Security

Linux Academy

Virtually every industry, from healthcare to banking and everything in between, has rules for how businesses handle data. The Linux Audit system is a great solution. Your security team can use the Linux Unified Key Setup (LUKS) to encrypt and decrypt physical disks to keep data secure when not in use. Compliance Scanning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #81

Scott Lowe

Here’s a handy list of deprecated Linux network commands and their replacements. Konstantin Ryabitsev has a series going on securing a SysAdmin Linux workstation. Part 1 covers how to choose a Linux distribution, and part 2 discusses some security tips for installing Linux on your SysAdmin workstation. Virtualization.

Vmware 60
article thumbnail

Cloud Migration Fundamentals

Linux Academy

Cloud computing is not just about having virtual servers in an off-premises data center. When I was with Red Hat, I had the opportunity to work with a team from a leading bank. I was part of a conversation with the bank’s CIO after they had completed their first migration to the cloud.

Cloud 60
article thumbnail

Guide to Protect Yourself from Identity Theft Online

Galido

The identity of a person is formed by their personal data such as name, telephone, address, photographs, social security number, bank account numbers … In short, any data that allows identifying that person. Consequently, it is important to understand exactly what identity theft is and what the consequences of this crime are.

Banking 81
article thumbnail

Technology Short Take #39

Scott Lowe

Ethan Banks also muses on the need for abstraction. Craig Matsumoto of SDN Central helps highlight a recent (and fairly significant) development in networking protocols—the submission of the Generic Network Virtualization Encapsulation (Geneve) proposal to the IETF. I’d love to hear others’ thoughts on this.

article thumbnail

Hottest tech skills to hire for in 2020

Hacker Earth

This can be attributed to the fact that Java is widely used in industries such as financial services, Big Data, stock market, banking, retail, and Android. A great performance benefit of ReactJS is its ability to update virtual DOM. Studies reveal that Java is one of the most popular programming languages used by developers.