Workload & resource optimization

Tackling technical risk in database migrations

Technical risk is one of the most common migration worries organizations face, and the potential technical risks vary depending on the type of migration. So far, this series has covered custom code application migrations as well as migrating ISV applications (see part 1 and part 2). Now I want to discuss technical risk for database […]

Continue reading

Easier availability, easier on your wallet with the IBM Spectrum Protect suite

2017 has been a great year for IBM data protection. We added many new features to our award-winning enterprise data protection suite with 4 new releases to IBM Spectrum Protect in just the last year. We brought to market a copy management solution (IBM Spectrum Copy Data Management) that reduces copy sprawl and makes use […]

Continue reading

Pt 3: Bringing data protection into the cognitive era

This is part three of a three-part blog post series on innovations in data protection. Read part one on the evolution of data protection here, and part two here, on the importance of snapshot management. Part three: The final piece of the puzzle The final piece of the data protection puzzle that IT professionals must […]

Continue reading

Tackling technical risk in ISV application migrations – Part 2

We’ve identified “technical risk” as one of the most common migration worries for many organizations. Of course, the potential technical challenges of a migration vary depending on the type of migration. In my previous post, I introduced some important considerations when migrating Independent Software Vendor (ISV) applications to a new platform. Let’s continue that discussion […]

Continue reading

With IBM POWER9, we’re all riding the AI wave

There’s a big connection between my love for water sports and hardware design — both involve observing waves and planning several moves ahead. Four years ago, when we started sketching the POWER9™ chip from scratch, we saw an upsurge of modern workloads driven by artificial intelligence and massive data sets. We are now ready to […]

Continue reading

Reaching the Summit: The next milestone for HPC

The high-performance computing landscape is evolving at a furious pace that some are describing as an important inflection point, as Moore’s Law delivers diminishing returns while performance demands increase. Leaders of organizations are grappling with how to embrace recent system-level innovations like acceleration, while simultaneously being challenged to incorporate analytics into their HPC workloads. On […]

Continue reading

Tackling technical risk in ISV application migrations – Part 1

Among the list of common migration worries that organizations face, technical risk is always near the top, and the potential technical challenges of a migration vary depending on the type of migration. In this post, I’ll cover the common concerns when migrating Independent Software Vendor (ISV) applications to a new platform. Migrating ISV applications Here […]

Continue reading

Pt 2: Bringing data protection into the cognitive era

This is part two of a three-part blog post series on innovations in data protection. Read part one on the evolution of data protection here. Part two: Snapshots, snapshot management and automation– the next step in data protection Snapshots are used as a means to recover a storage array to a point when the last […]

Continue reading

Bringing data protection into the cognitive era

This is part one of a three-part blog post series on innovations in data protection. Read part two here and part three here. Part one: The evolution of data protection Data protection has been a critical process for safeguarding information since the day these systems were developed. Just how data is protected has continually evolved […]

Continue reading