Tagged In:
Storage Power Systems Mainframes AI IBM Systems Lab Services
Related Tags
Newest by Date Newest by Title Oldest by Date Oldest by Title
Cloud infrastructure designed for your business model
When we talk about cloud, one of the most important challenges for cloud service providers is changing the old thinking about protecting data. With all of the cyberattacks being launched on companies, there’s no doubt that security is extremely ...
Data breaches: The threat is real
The threat is real. You see it in the newspaper headlines and on your TV news channel. As predicted years ago, data is now the new oil. As with any valuable resource, it has become the main target for criminal organizations. In the past, the threat ...
The IBM Z cloud-ready data center dream is now available
Today IBM announces the availability of its cloud-ready IBM z14 based on a single-frame design, originally unveiled in April 2018. In response to the desires of cloud service providers, managed service providers and enterprise customers, the now ...
6 ways to enhance your IT infrastructure
AI and cloud technologies are having a disruptive impact on IT, affecting everything from compute and storage requirements to developer tools. As a result, the hardware you procure today should not only meet your expectations, but it also should ...
Easier availability, easier on your wallet with the IBM Spectrum Protect suite
2017 was a great year for IBM data protection. We added many new features to our award-winning ...
Data security threats: Staying ahead of the curve
Data loss of some magnitude is almost a certainty in any enterprise. The loss can be due to anything from a minor mishap by a user, a stolen laptop or a system-wide cyberattack, to a catastrophic natural disaster that wipes out an entire data center...
No worries with pervasive encryption
Where to put my diamond earrings? I stared intently at the safe in my hotel room. And once again I pondered what the right answer was. Do I take the few valuables I own and place them in the safe, figure out what code to use, hope I remember my code...
Dark data: Peering through the blanket of the dark
“Come, thick night, and pall thee in the dunnest smoke of hell, that my keen knife see not the wound it makes, nor heaven peep through the blanket of the dark.” —William Shakespeare, Macbeth, Act 1, Scene 5 There’s a little Shakespeare for ...
Three IBM Z security insights from Think 2018
The data breach threat is real. Recent high-profile breaches have focused boardroom attention on this issue. Data breaches are expensive, costing $3.6 million on average[1]. And they’re increasingly likely: an organization has a 28 percent chance ...