Skip to main content

Sort by
Articles

Highlights From Common Europe Congress 2023

Torbjörn Appehl

July 6, 2023

Common Europe Congress 2023 has come to an end. After such a project there is a feeling of emptiness that everybody involved can recognize. For me, it’s not a bad feeling; it’s a positive feeling that I’ve done everything I could to make the best Congress possible. And it certainly was a great one, breaking several records: […]

Articles

IBM z16 and Power10 Deliver Highest Reliability Among Mainstream Servers for 15th Consecutive Year

Laura DiDio

July 5, 2023

The IBM z16 mainframe lives up to its reputation for delivering “zero downtime.” The latest z16 server, introduced in April 2022, delivers nine nines—99.9999999%—of uptime and reliability. This is just over 30 milliseconds of per server annual downtime, according to the results of the ITIC 2023 Global Server Hardware, Server OS Reliability Survey. ITIC’s 2023 […]

Articles

Google’s Bard Spins Some Tales About IBM Power Systems and AIX

Rob McNelly

June 22, 2023

I assume none of you live under a rock, so you’ve most likely heard about people’s experiences toying around with ChatGPT and other AI solutions. I decided to get in on the fun, so recently I put Google’s bot—it’s called Bard—through its paces. I wanted to see what Bard knows about IBM Power Systems and […]

Articles

Building a Digital-First Strategy With IBM i

Neil Tardy

June 13, 2023

When it comes to modernizing IBM i environments, often the biggest challenges aren’t technical. Many enterprises simply don’t know where to begin. Puneet Kohli sees it all the time. As president of application modernization at Rocket Software, Kohli is charged with helping clients navigate the challenges and recognize that IBM i is well-suited to help […]

E-Books

Securing Your Business in an Ever-Changing IT Landscape

May 10, 2023

Fortra's Amy Williams and IBM Security Evangelist Westley McDuffie on how to protect your business from constant security threats, using tactics like penetration testing and strategies like zero trust