Intelligently Connected

ALEBRA TECHNOLOGIES, INC.
3810 Pheasant Ridge Drive NE
Minneapolis, MN 55449

651.366.6140 / Toll-Free:888.340.2727

Data Transfers

Bulk data movement, access, copying and sharing requires a lot of bandwidth and can wreak havoc with interactive applications and other normal network traffic on the same system. 10-15 years ago, people might have expected a slight delay when trying to access data, but in today’s fast paced world people expect information within seconds at anytime from anywhere, from any device. Which means network delays, caused by bulk data transfers, have a negative ripple effect on the internal productivity of your company – and your ability to provide the quality of service needed to attract and retain customers. This could cost you sales and have a negative effect on your bottom line.

What’s the Solution?

This is precisely why we created the z/OpenGate. z/OpenGate creates a channel-to-channel connection that integrates mainframes to Linux, Unix, and Windows (LUW), mainframe to mainframe, LUW to LUW, and mainframes to Hadoop and other HDFS platforms. It’s not only an order of magnitude faster, more secure and reliable than traditional networks, it will also shorten batch run times and lower your mainframe’s MIPS consumption.

Network vs. Channel MIPS

z/OpenGate far exceeds the efficiency of conventional TCP/IP networks.

z/OpenGate was designed to help you improve your customer’s experience by providing anytime, anywhere information access. Improve your bottom line with a cross-platform data integration solution that doesn’t make you wait. Don’t wait. Contact us today.

July 20th, 2017

When moving databases from one system to another, often temporary copies of the unloaded data are created. These copies are called interim copies. Even though these copies are temporary, they can influence the speed and functionality of your overall systems and affect the job functions of some members of your IT team.

Who Do Interim Copies Affect?

The three main job functions affected by are all located in the IT Department and they are:
• The Storage Architect who’s responsible for understanding how IT operations impact storage requirements.
• The Application Architect who is responsible for the overall availability and performance of the end user application.
• The Capacity Planner who is responsible for determining the IT system capacity needed to support current and forecasted workloads that run on the mainframe and open systems servers.

How Do Interim Copies Affect Your Systems?

There are 3 main ways they can affect your systems. They are listed below in order of importance:

1. Creating interim copies requires extra processing steps which takes time. In an age where people expect real-time answers and information, reducing the elapsed time of a unit of work is crucial to providing a real-time response to user requests of all types from any device. Or simply, reducing the time to accomplish a task means a shorter response time from a user’s perspective.

2. They can raise your MIPS (Millions of Instructions Per Second) consumption, which will raise your overall operating costs. Consider this – the average cost per MIPS annually is $4,500. So, if interim copies are consuming an additional 100 MIPS daily, it could cost you an additional $450,000 annually.

3. When interim copies are created they need to be stored. This means you will need extra storage space on a disc drive, which again will raise your overall operating costs.

Addressing the 3 points above will greatly reduce costs and the time your organization is wasting dealing with interim copies. Alebra’s unique solutions can lower operating overhead and enhance enterprise data integration with an extremely fast transport.

Contact us today to learn more about our solutions for interim copies.

July 12th, 2017

encryption

With cyber-attacks on both personal and public computer systems increasing in frequency, protecting your data has never been more important. Attack types have diversified, and ransomware attacks, in which sensitive data is held hostage or even exposed to public viewing, have become an area of particular concern for modern web users.

As the unfortunate experiences of many have made clear, simple password protection, anti-viral software and firewalls are not always sufficient to repel an attack. This is especially true for businesses and other organizations, which have to utilize high volumes of sensitive data on a daily basis. For information of critical sensitivity, many businesses decide to use encryption for protection.

Encryption; we’ve all heard the term, but most of us have only a vague idea of what it really is.

What is Encryption?

In general terms, it’s the process of encoding information so that only authorized parties can access it. The concept is almost as old as communication itself, and coded messages have been used to protect classified information for thousands of years. In the world of computing, encryption consists of converting electronic data into a seemingly incomprehensible form called ciphertext. The algorithm that creates the ciphertext also creates a unique encryption key which can return the information to its original form.

Why is it Used?

Many organizations will collect terabytes (or more) of data throughout their lifespans. Much of this information will be sensitive and may be stored without access or monitoring for long periods of time, making it susceptible to unauthorized access. Here, encryption is advisable.

In fact, the encryption of data has become exponentially more important in recent years, due to the connected nature of our world today. Every day, massive volumes of data are transmitted via the Internet and other networks (e.g. WLANs or Wireless Local Area Networks). Naturally, this transmission further opens data up to theft, destruction and other unwanted access. Deploying encryption can help to eliminate this vulnerability.

However, confidentiality of data is not its only advantage. Due to the design of the algorithms, encryption also provides authentication of the data’s origin and confirmation that the data has not been modified. On the legal side of things, the digital signature of encrypted data also serves of proof of sender and recipient.

What is The Cost of Encryption?

Most organizations (and certainly the ones that have had their data compromised) will agree: you cannot put a financial price on the protection of your data and that of your customers. The inability to protect data can irreversibly destroy a company’s reputation – no one wants to work with an organization that may allow sensitive information to fall into the wrong hands – and may even land you in legal hot water.

However, one must also consider the other main cost of encryption – time. While there are many factors which affect this (type of data, the volume of information, computer processor speed, etc.), generally the higher the quality, the longer it will take.

It must also be remembered that this is a two-step process. First, there is the initial encryption before the transmission or storage of the data. Then, when a second party has received or retrieved the data, one must allow time for the decryption process. This amount of time varies widely – from a few seconds for a small document to hours or even days for massive troves of data.

One must also consider the computer cycles that will be used on each end. ‘Cycles per byte’ is a measurement of the number of clock cycles a microprocessor performs for each byte of data processed. Due to the complexity of encryption, this number can be quite high – meaning that other tasks you may want to complete on your system are slowed down – or must be postponed until the encryption process has ended.

Experienced data security experts, however, can easily discern an encryption option that will suit your organization’s needs, delivering you a cost-effective solution that at the same time adequately protects your data from threats. If certain basic rules are adhered to, to ensure ultimate protection (e.g. replacing easily compromised copper wire with fiber optic, and using trusted encryption standards like AES), encryption can provide real peace of mind for individuals and organizations alike with respect to their data.

If you’d like to learn more or find out which encryption option would best suit your business, contact us today!

July 12th, 2017