Tagged In:
Storage Power Systems Mainframes AI IBM Systems Lab Services
Related Tags
Newest by Date Newest by Title Oldest by Date Oldest by Title
An inside look at IBM Almaden’s Future of IT Executive Summit
Scaling the intimidating peaks of Mount Everest taught me resilience, determination and a commitment...
Protection against malware: IBM AIX has your back
“How can we protect our IBM AIX systems from malware attacks?” As a cyber security consultant, I come across this question more than any other when it comes to securing servers running IBM AIX. Most security breaches today are based on malware ...
Riding LinuxONE Systems in the hybrid cloud
Alf Thunberg often rides a motorcycle to the office. He repairs his two motorcycles himself, and rides the vintage bikes to work, wearing his helmet and a business suit. He’s taking an all-in-one approach to his daily travels, reducing unnecessary ...
Spartan Group helps accelerate demand for digital asset-based products
Digital assets, particularly in the form of cryptocurrencies and tokens, have been the subject of a ...
A brief history of airline security, hijackings and metal detectors
Between May 1961 and the end of 1972, there were 159 aircraft hijackings[1] in United States ...
Modern data protection innovations to fight cyber threats
In 2018, the average cost of a data security breach approached $3.9 million. But organizations that fully deployed security automation saved over $1.5 million per breach.[1] These metrics demonstrate the value of effective data protection and ...
Security considerations for critical environments
In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-...
A sneak peek of the Think 2019 Infrastructure campus
“It can be hard to keep up with all of the technology shifts and changes these days. IBM Think helps me because it addresses all of them including AI, cloud, analytics, infrastructure, security, and even nascent trends like quantum computing...
Is your smartphone data safer than your enterprise data?
More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, ...