Technology
Code With Confidence by Working Smarter
By Nicole Fagen | Apr 23, 2025
z/OS ISPF Git Interface (ZIGI) — An Introduction to Git Usage for the Developer Using ISPF
By Lionel B. Dyck and Henri Kuiper | Apr 14, 2025
Cathode-Ray Tubes (CRTs) — An Embedded Cultural Memory
Reg Harbeck | Mar 28, 2025
CICS Vulnerabilities Uncovered — And How to Secure Your CICS Applications
Serena Agusto-Cox | Feb 17, 2025
If You’re in the Know, You Know: 5 Reasons the Mainframe Is More than Relevant Today
Greg Lotko | Jan 23, 2025
Dan Dirkse’s Top 20 Tips from His ISPF Master Class
Dan Dirkse | Dec 17, 2024
What Is Network Segmentation, and Why Do You Need It?
Chris Meyer, Mark Wilson, and Brian Marshall | Dec 6, 2024
Technology Economy: The Return on Investment of IT Asset Class Management
Serena Agusto-Cox | Nov 25, 2024
AI Generates Exponentially More Mainframe Data Storage. Do You Have a Plan?
Perry Jones | Oct 22, 2024
Beating the Quantum Clock: Today’s Security Against Tomorrow’s Threats
Jessica Doherty | Oct 21, 2025
File Integrity Monitoring (FIM) What’s the Deal?
Mark Wilson | Oct 16, 2025
Cybersecurity Is All Our Concern: 7 Steps to Mitigate the Risks
Niall Ashley | Oct 7, 2025