MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

June 22, 2009 | Vol 4 Issue 11


In This Issue:

Feature Article - Security
Do You Need to Include Encryption Keys in Your HA/DR Plans?

Key management solutions create, store, serve, and manage the life cycle of the secret keys needed for strong encryption.

patrick_townsendWritten by Patrick Townsend

Security auditors have begun placing new focus on encryption key management. Because the loss of encryption keys can compromise the security of all encrypted information, compliance auditors want enterprise customers to use best practices in the management and protection of encryption keys. This means integrating your encryption key management system into your high availability (HA) and disaster recovery (DR) plans.


Feature Article - System Administration
Next-Generation Technologies for Disaster Recovery and High Availability

A well-designed, well-implemented set of HA and DR technologies will protect an organization against equipment failures, utility interruptions, and natural disasters.

chris_thomasWritten by Chris Thomas

Editor's Note: This article is based on "Next-Generation Disaster Recovery and Availability Technologies for IBM Power Systems," a free white paper downloadable from the MC Press White Paper Center.


The High Availability/Disaster Recovery solution spectrum requires that you consider a technology's ability to protect data and keep operations online or bring them back online quickly. Each class of HA/DR technology exhibits different operating characteristics, providing a distinct range of data protection and downtime avoidance.


Advertorial - SkyView Partners, Inc.
Partner TechTip: Why Should You Care What Happens in Massachusetts?

What happens elsewhere is eventually going to affect you!

carol_woodbury.gifBy Carol Woodbury

Good question. Why should you care what happens in Massachusetts unless you live there? The answer is because what happens in states such as California and now Massachusetts tends to spread to other states. The breach notification law started in California has spread to almost all of the states, and similar ones are being debated across Europe and Asia. If the Massachusetts privacy laws spread like the California law, you'll want to be prepared. Let's take a closer look. 


In the News


Support MC Press - Visit Our Sponsors

Forums Sponsor

Popular Forums



Search Sponsor

Popular Searches