How to poison a blockchain, and how to prevent it.
This week, the Gizmodo reported that child porn images were uploadedto the Bitcoin Satoshi Vision (BSV) core ledger through the...
This week, the Gizmodo reported that child porn images were uploadedto the Bitcoin Satoshi Vision (BSV) core ledger through the...
We’ve blogged before about starting the CLM components on Linux/Unix. Now let’s talk about staring it (and stopping it) on...
What are Filters? Filters are used to display groups or subsets of data sets in the MVS subsystem. Filters can...
During some courseware authoring I discovered a poorly known (but sufficiently documented) feature in Rational Developer for IBM i (and...
Break down the silos Mainframe development does not and should not be that much different from distributed development. There is...
In a recent project for a z/OS customer, we had to create some custom scripts to kick off a Rational...
Why you should change the default certificates? If you are a user of IBM Rational Team Concert, DOORs Next Generation,...
I recently ran across an issue, one that was low priority, but nagging like a gnat on a hot summer...
The Business Scenario We recently had a challenge where a customer needed full end-to-end SSL/TLS encryption for communcation between IBM...