Skip to main content

Sort by
Articles

IBM Infrastructure’s Role in Cloud, AI and Security

Evelyn Hoover

March 1, 2019

Cloud, artificial intelligence (AI) and security all have underpinnings in infrastructure—the servers, storage and software that power an organization. A purpose-built architecture is critical to achieving the performance needed for current and future business requirements. “Technology alone can’t transform a company, but it’s a very essential ingredient in business transformation,” says Tom Rosamilia, senior vice […]

Articles

The Competitive Edge of POWER9 for Cloud and AI

Jim Utsler

March 1, 2019

Using a system built by a single vendor from the ground up has its benefits. For example, both the hardware and software have been optimized to essentially function as a single entity, removing the complexity involved in multivendor scenarios. Such is the case with IBM POWER9* servers, which make a compelling argument for upgrading from […]

Articles

Time to Look at System Maintenance and Replacing Equipment

Jaqui Lynch

February 1, 2019

Once a year, it’s important to review the hardware that’s installed—and also the levels of the software that’s installed on those servers. It’s important to stay as current as possible to ensure you have the best security and performance. It’s also critical to be on hardware and software that is still in service. This means […]

Articles

IBM Infrastructure Plays a Critical Role in Cloud, AI and Security

Evelyn Hoover

February 1, 2019

Cloud, artificial intelligence (AI) and security all have underpinnings in infrastructure—the servers, storage and software that power an organization. A purpose-built architecture is critical to achieving the performance needed for current and future business requirements. “Technology alone can’t transform a company, but it’s a very essential ingredient in business transformation,” says Tom Rosamilia, senior vice […]

Articles

POWER9 Hardware Supports On-premises Cloud Deployments

Claire O'Leary

October 1, 2018

Early adopters were quick to whip out a company credit card and deploy an instance of the public cloud—Amazon Web Services, for instance. But as security breaches continue to make headlines, organizations realize that the accessibility of the public cloud was dampened by concerns that sensitive—and often mission-critical—data could fall into the wrong hands. Either […]