With the publication of the Spectre and Meltdown vulnerabilities last year the new class of hardware security threads has been discovered. Everyone needs to protect against them. For Linux and System Z the most important best practice is to stay … Read the rest
You might have heard IBM talking about “pervasive encryption”. In this post we take a look at what’s behind this. With every encryption scheme there is the problem of access to the keys. … Read the rest
The latest version of the Principles of Operations (PoP – z/Architecture Principles of Operation SA22-7832-12) which includes all the new z15 instructions is now available. Be aware that this is a real large pdf!
I’ve been asked multiple times … Read the rest