Why Clients Rely on Linux on IBM Z and LinuxONE
May 1, 2018
Today’s demanding workloads require a flexible approach for DevOps and deployment. IBM Z* clients reap the benefits of flexibility by running Linux* along with traditional IBM Z OSes. Organizations also are deploying Linux in standalone IBM Z and LinuxONE* installations. The Linux OS enables clients to use up-to-date technologies for their applications. Linux workloads integrated […]
ArticlesCentralized Cloud and Security Management Empowers IT
April 1, 2018
For IBM Power Systems clients, transforming their virtualized data center into a self-service private cloud and protecting it with automated security management just became an easier and more powerful proposition. IBM has introduced important new capabilities by advancing IBM Power Security Center (PowerSC) and Power Virtualization Center (PowerVC) software. Both were recently announced at Think […]
ArticlesThe Special Attributes of Computer Security Hardware
March 12, 2018
Many of us think about security with primarily a software focus. You might be surprised to know about the special security hardware and its role in safeguarding data.
ArticlesIBM Framework Helps Clients Prepare for the EU’s General Data Protection Regulation
March 1, 2018
General Data Protection Regulation (GDPR) goes into effect on May 25, impacting most every organization—no matter the location—that deals with European Union (EU) data subjects. “Whether an organization has a physical presence in the EU doesn’t matter, even if you’re just marketing to, profiling or collecting information about EU individuals, citizens, residents or visitors. The […]
ArticlesIBM Design Thinking Leads to an Elevated User Experience
February 1, 2018
Before design thinking even had a name, innovative companies saw its value. The premise is straightforward—a product should be designed and built to meet the users’ wants and needs. In 2012, Charlie Hill, IBM Fellow, vice president, Platform Experience, began working with Phil Gilbert, general manager for IBM Design, to co-found IBM Design Thinking. “Design […]
Enterprises Tap Hybrid Cloud for Agile DevOps and Innovation
February 1, 2018
After years of talking about it, many large enterprises are making cloud deployments the centerpiece of an overall organizational transformation. Often, they take a hybrid approach that begins with DevOps. They are recognizing driving business innovation and better meeting shifting market demands requires significantly reduced development times and rethinking how developers innovate. They are also […]
ArticlesSecurity Vulnerability Impacts POWER Processors
January 9, 2018
Rob McNelly explains how a security vulnerability affecting microprocessors requires firmware and OS patches for mitigation and protection.
ArticlesAn Application View of Data Is Important for a Point-in-Time Recovery
January 1, 2018
Hardly a week goes by without another report of data being stolen, lost or corrupted. Black hats working for organized crime or unfriendly governments often perpetrate these events, but many are the result of poor planning, carelessness or outright neglect. While most data centers with mainframe footprints have a disaster recovery (DR) strategy with a […]
ArticlesA Cloud Managed Service Provider Can Help With Data Protection
November 13, 2017
Data security is a critical component of a comprehensive risk management strategy. Organizations must analyze their security risk, taking into account factors such as industry, types of data being stored, the value of the data and the threats most likely to impact the business. Then they need to decide how much risk they’re willing to […]
ArticlesThe Future of IT
October 5, 2017
My grandmother never learned to drive. She was born around the time Henry Ford invented the production line and began rolling out Model Ts in vast numbers. Those cars were shipped to every corner of the world and quite a few made it to our shores here in New Zealand. Ours were painted black, too. […]