Tag Archives: jes2

IT Security Audits for IBM zOS Systems from Top Secret Perspective

An information technology security audit is a manual or systematic measurable technical assessment of an information system. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system access controls, and analyzing physical access to the systems. … Continue reading

Posted in IBM zEnterprise Servers, Risk Management | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Migration of System z Servers

In Memory of Levent Durdu Perfect friend, unfailing colleague, guiding leader we lost very early 1955 – 24 April 2008 Levent Durdu Anısına Erken yitirdiğimiz mükemmel dost, yorulmaz iş arkadaşı, yol gösterici lider 1955 – 24 Nisan 2008 Existing Environments … Continue reading

Posted in IBM zEnterprise Servers, Project Management | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment