Skip to main content

Sort by
Articles

Sensitive Data Control

Jim Utsler

September 1, 2020

It’s an unfortunate fact of business life that bad actors are out there trolling for sensitive data. For them, the risk-reward is relatively low. For those whose data is breached, though, the costs can be exorbitant, whether from loss of intellectual property (IP), being socked with massive fines or losing customer goodwill. The news isn’t […]

Articles

IBM Tools Support Layered Data Privacy and Protection

Kristin Lewotsky

July 23, 2020

Data today is on the move. It’s traveling from the server to the storage area network, from the enterprise into the cloud, or even to third parties. Although the IBM Z® platform protects data on the platform with pervasive encryption, the data can be vulnerable the moment it leaves the mainframe. Data can be breached […]

Articles

New Levels of Computing Flexibility

Jim Utsler

May 4, 2020

Designing a comprehensive computing environment was once a relatively straightforward endeavor: install a server and other hardware, load an OS and applications, and offer access to end users. This has become a bit more complicated as computing moves outside the confines of data center walls to become part of hybrid multicloud environments, which is a […]

Articles

Meet the New IBM z15 and IBM LinuxONE III Models

Karen E Lewis

April 14, 2020

Every client’s cloud journey is unique—there’s no one-size-fits-all. But most organizations are or will soon be operating in a hybrid multicloud environment. In this environment, you are challenged to keep data secured, systems available and costs manageable. Meeting these challenges requires the right IT infrastructure. Enter the New IBM Z and IBM LinuxONE Models New […]

Articles

How Crypto Revolutions in the Financial Industry Link to Modern-Day Conceptions of Fintech

Ilija Acimovic

March 16, 2020

The financial sector experienced turmoil in the past decade. We don’t have to hand cash or credit cards to our taxi drivers anymore as we can use an app instead. Furthermore, we can easily send money to our friends and family via Payoneer and Paypal, never leaving the comfort of our homes. What’s more, today […]

Articles

z15: Next-Gen Security and Resiliency for Hybrid Multicloud

Angela Fresne

September 12, 2019

On Sept. 12, IBM announced the new IBM z15. The mantra for this new generation of the enterprise platform is “the cloud you want with the privacy and security you need,” announcing to the world that IBM Z is ready to help integrate sensitive workloads into the hybrid multicloud. IBM is rolling out major steps […]

Articles

Streamline Regulatory Compliance With a Hybrid Cloud

Kristin Lewotsky

April 1, 2019

In today’s business climate, just delivering goods and services to customers is no longer enough. Amid an ongoing stream of security breaches, countries, regions and industries around the globe have established regulations governing data protection—data privacy and data security. As a result, enterprises need to demonstrate and maintain compliance around egulations such as the European […]

Articles

The Competitive Edge of POWER9 for Cloud and AI

Jim Utsler

March 1, 2019

Using a system built by a single vendor from the ground up has its benefits. For example, both the hardware and software have been optimized to essentially function as a single entity, removing the complexity involved in multivendor scenarios. Such is the case with IBM POWER9* servers, which make a compelling argument for upgrading from […]

Articles

IBM Infrastructure’s Role in Cloud, AI and Security

Evelyn Hoover

March 1, 2019

Cloud, artificial intelligence (AI) and security all have underpinnings in infrastructure—the servers, storage and software that power an organization. A purpose-built architecture is critical to achieving the performance needed for current and future business requirements. “Technology alone can’t transform a company, but it’s a very essential ingredient in business transformation,” says Tom Rosamilia, senior vice […]

Articles

Compliance Requires Layered Security

Kristin Lewotsky

March 1, 2019

Businesses need to worry about more than just developing products and services for their customers. They need to deliver those products and services while complying with a plethora of standards and regulations governing how data can be collected, processed, stored and transferred. These standards range from highly specific documents covering niche markets like healthcare, to […]