Posts tagged “ClearPath”
Wednesday, May 20th, 2015
It’s hard, even for a Midwesterner like me, not to gloat about this achievement. We decided years ago to seamlessly migrate our Dorado clients from proprietary CMOS platforms to Intel based platforms with full architecture compatibility. Our plan was to first ship smaller, lower performance systems and then deliver increasingly higher performing products until we [...]
Wednesday, April 29th, 2015
The MCP operating system has security thought and built in – does your operating system? This post, third in a series about security and how security is about how you think, discusses recently released version of ClearPath MCP software.
Tuesday, April 14th, 2015
In order to think about security, we’ve got to think about what we’re really trying to accomplish. How do we answer the million-dollar question “How do I know that I’m secure?”
Wednesday, April 1st, 2015
The term “security” is too broad to describe what it really means. It’s really the way that you think about a certain problem or idea. It’s a thought process which starts at the beginning and never ends.
Wednesday, March 18th, 2015
Apex reporting, included in ClearPath OS 2200 Release 16.0, help support a “defense in depth” strategy and facilitate compliance with policies, regulations, and standards.
Wednesday, February 11th, 2015
Poor quality deployment will degrade an otherwise well-constructed system. It matters that rigorous engineering standards are applied to the activities involved: initial installation and ongoing operation, providing resilience, and handling updates and new releases.
Friday, December 12th, 2014
I’ve just visited Lapland again for my annual discussion with Elf Tietokone, the CIO of SantaSystems. Elf had called me to say there had been some exciting developments he wanted to tell me about. So, full of anticipation, I set off.
Monday, November 10th, 2014
The production of software systems is frequently described as a branch of engineering yet the quality of too many applications is not good enough. What can we learn from other forms of engineering to improve quality of IT systems?
Tuesday, October 21st, 2014
The nightmare of identity theft affects tens of millions of people every year. It disrupts lives, damages reputations, creates financial loss, and provides a cloak of anonymity to criminals.
Wednesday, October 1st, 2014
Balancing security risk against business opportunity is an ongoing challenge. Today’s decision about which risks are high for you and which are low will no longer be appropriate when external factors change. That’s why you should plan to regularly re-evaluate your risk management decisions.