OS V2.5, the IBM operating system designed for hybrid cloud and artificial intelligence

IBM recently released "IBM z / OS V2.5", which stands out as a next-generation operating system for IBM Z and which is designed to accelerate customer adoption of hybrid cloud and artificial intelligence (AI) and to drive application modernization projects.

It is mentioned that this new version has new features that make it easier to use IBM z / OS Container Extensions and they give developers access to a broader selection of AI-based tools, frameworks, and libraries, including Linux-based container applications that they can deploy within the z / OS platform. Other new AI capabilities include support for tools like TensorFlow and IBM Watson Machine Learning for z / OS.

With the looming threats posed by recent ransomware attacks, IBM also focused on strengthening cybersecurity capabilities by expanding its pervasive encryption. to new types of data sets, such as the basic sequential format and large format SMS managed data sets. This enables users to encrypt data without the need for application changes, as well as more easily address compliance issues.

“IBM relies heavily on hybrid cloud and artificial intelligence, and we are strongly focused on bringing new innovations such as artificial intelligence and new security capabilities to IBM Z to help our clients go earlier, faster, in their modernization trips. For our clients, IBM z / OS V2.5 brings new security and resiliency features to the platform, enabling them to infuse real-time AI into every business transaction, imperatives that have become more urgent during the transition pandemic. " Discuss, Ross Mauri, CEO of IBM Z, 

Also iIncludes features to help legacy users more easily modernize their mainframe environments by enabling closer interoperability with mainframe and cloud-based tools. The company has added new interoperability between Java and Cobol by extending the support of the two programming environments to 31-bit and 64-bit in parallel, making modernization efforts easier to achieve.

On the security side y to deal with recent threats such as ransomware attack by SolarWinds and Colonial Pipeline in critical infrastructure, IBM z / OS V2.5 helps address these challenges by revealing a wide range of enhancements in the areas of authentication, authorization, logs, system integrity, system availability and security, data, data encryption in transit and at rest, and data privacy in general, including:

  • Systematic encryption extended to new types of data sets: Basic-format sequential data sets and SMS-managed large-format data sets are now included, allowing users to encrypt data without modifying the data application and simplifying data processing. compliance.
  • Anomaly mitigation capabilities that leverage Predictive Failure Analysis (PFA), Runtime Diagnostics, Workload Manager (WLM), and JES2 to help better detect abnormal behavior in near real time, enabling customers to proactively resolve potential problems.

While to offer a secure and scalable environment for the hybrid cloud, OS V2.5 brings new features that support application modernization and provide a cloud-native experience on z / OS such as new features to integrate cloud storage through transparent cloud tiering and support for cloud layer support of object access method, helping to reduce operational expenses with data transfer to storage environments in the hybrid cloud.

Finally, as for the general availability of IBM z / OS V2.5, it is scheduled for September 30, 2021. If you want to know more about it, you can check the details In the following link.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.