Skip to main content

Sort by
Articles

Tokenized Encryption Helps Merchants Tackle Security Challenges

Ira Chandler

May 1, 2018

As threats to data security proliferate, the actions taken by the governing bodies are evolving. The governing authority for credit card data is the Payment Card Industry (PCI) Security Standards Council (SSC), which was built by the card brands: Visa, MC, Discover, American Express and JCB. The PCI provides the best practices security standards for […]

Articles

IBM z14 Model ZR1 Is Ready for Cloud, Pervasive Encryption and More

Jim Utsler

May 1, 2018

How can medium-sized businesses solve the conundrum of scaling for business growth with ease and confidence? The answer is the latest lean, mean and super fast player in the IBM Z* product line, the IBM z14* Model ZR1. It hits the field of play with a complete new physical system design. In a world where […]

Articles

Linux on IBM Z Positions Clients to Move Forward

Jeff Reser

May 1, 2018

Through the lens of a new wave of technological advances built around advanced analytics, artificial intelligence (AI), machine learning, container development, blockchain, cloud and data security, a strategy shift is occurring in how mainframes are being used and leveraged. At the same time, mainframes are being refreshed with features around Linux*, pervasive encryption, virtualization and performance—all integrated […]

Articles

Why Clients Rely on Linux on IBM Z and LinuxONE

Shirley S. Savage

May 1, 2018

Today’s demanding workloads require a flexible approach for DevOps and deployment. IBM Z* clients reap the benefits of flexibility by running Linux* along with traditional IBM Z OSes. Organizations also are deploying Linux in standalone IBM Z and LinuxONE* installations. The Linux OS enables clients to use up-to-date technologies for their applications. Linux workloads integrated […]

Articles

Centralized Cloud and Security Management Empowers IT

April 1, 2018

For IBM Power Systems clients, transforming their virtualized data center into a self-service private cloud and protecting it with automated security management just became an easier and more powerful proposition. IBM has introduced important new capabilities by advancing IBM Power Security Center (PowerSC) and Power Virtualization Center (PowerVC) software. Both were recently announced at Think […]

Articles

IBM Framework Helps Clients Prepare for the EU’s General Data Protection Regulation

Jim Utsler

March 1, 2018

General Data Protection Regulation (GDPR) goes into effect on May 25, impacting most every organization—no matter the location—that deals with European Union (EU) data subjects. “Whether an organization has a physical presence in the EU doesn’t matter, even if you’re just marketing to, profiling or collecting information about EU individuals, citizens, residents or visitors. The […]

Articles

IBM Design Thinking Leads to an Elevated User Experience

Brett Martin

February 1, 2018

Before design thinking even had a name, innovative companies saw its value. The premise is straightforward—a product should be designed and built to meet the users’ wants and needs. In 2012, Charlie Hill, IBM Fellow, vice president, Platform Experience, began working with Phil Gilbert, general manager for IBM Design, to co-found IBM Design Thinking. “Design […]

Articles

Enterprises Tap Hybrid Cloud for Agile DevOps and Innovation

M. Sharon Baker

February 1, 2018

After years of talking about it, many large enterprises are making cloud deployments the centerpiece of an overall organizational transformation. Often, they take a hybrid approach that begins with DevOps. They are recognizing driving business innovation and better meeting shifting market demands requires significantly reduced development times and rethinking how developers innovate. They are also […]

Articles

An Application View of Data Is Important for a Point-in-Time Recovery

January 1, 2018

Hardly a week goes by without another report of data being stolen, lost or corrupted. Black hats working for organized crime or unfriendly governments often perpetrate these events, but many are the result of poor planning, carelessness or outright neglect. While most data centers with mainframe footprints have a disaster recovery (DR) strategy with a […]

Articles

A Cloud Managed Service Provider Can Help With Data Protection

Brett Martin

November 13, 2017

Data security is a critical component of a comprehensive risk management strategy. Organizations must analyze their security risk, taking into account factors such as industry, types of data being stored, the value of the data and the threats most likely to impact the business. Then they need to decide how much risk they’re willing to […]