Workload & resource optimization

IBM Storage innovation from data creation to archive

“Today, enterprises must innovate quickly and constantly–or risk losing competitive advantage,” states Senior Analyst Mark Peters of Enterprise Strategy Group (ESG). IBM lives this observation, constantly innovating at breakneck speed to deliver the best possible solutions to the market. To further our commitment to our customers, today IBM is announcing several new solutions in the […]

Continue reading

IBM and NVIDIA further collaboration to advance open source GPU acceleration

Plan to bring capabilities to data scientists everywhere By 2020, we anticipate that the world’s volume of digital data will exceed 44 zettabytes, an astounding number. As enterprises begin to realize the vast, untapped potential of data, they need to find a way to exploit it. Enter AI. IBM has worked to build the industry’s […]

Continue reading

Tweets by IBM Systems


Trust is the new currency in the digital economy

Learn how digital trust can help you outperform your competition by 300%


IBM Z mainframes

The foundation of trusted digital experiences


Join us at Think 2019, where the issues of tomorrow meet the greatest IT minds of today.

Storage data migration 101: The migration process

Every day, organizations of all kinds undergo storage data migration projects. Migrations can be challenging, and in IBM Systems Lab Services we get a lot of questions about the 101 of storage data migration, so in this blog series, I wanted to explain some basic concepts of storage data migration for you. In my previous […]

Continue reading

Storage data migration 101: Online versus offline migration

Storage data migration involves transferring data between storage subsystems or server systems, and it’s a common project for organizations across various industries. There can be several reasons to do a storage data migration: Doing a storage hardware refresh Resolving storage performance or capacity issues Moving to storage subsystems with new features Relocating your data center […]

Continue reading

Pushing new industry standards with SAP HANA on IBM Power Systems

At IBM, we believe that collaboration is everything, which is why we are thrilled to announce that we were named SAP’s Infrastructure Partner of the Year. Our collaboration runs deep – IBM and SAP have been driving innovation together for more than 45 years and, together, our two companies are innovating with the goal of […]

Continue reading

How to choose the best IT infrastructure for SAP HANA

As companies face the looming 2025 challenge to migrate to SAP HANA, many leaders are wrestling with the decision to deploy HANA appliances, move to SAP HANA Cloud or stay put on their current database stack that they have spent years investing in to their unique environments. IBM has worked with many clients who have […]

Continue reading

IBM DS8880F: The trusted foundation for digital innovation

A recent study from Forrester® reveals that digital transformation and customer experience are the current and future goals of process improvement initiatives.  Leaders need to change the way they think in order to match these goals[1] . In fact, the nature of core business is changing rapidly to meet customer expectations. Business transformation fosters efficiency […]

Continue reading

Easier availability, easier on your wallet with the IBM Spectrum Protect suite

2017 was a great year for IBM data protection. We added many new features to our award-winning enterprise data protection suite with 4 new releases to IBM Spectrum Protect in just the last year. We brought to market a copy management solution (IBM Spectrum Copy Data Management) that reduces copy sprawl and makes use of […]

Continue reading

Data security threats: Staying ahead of the curve

Data loss of some magnitude is almost a certainty in any enterprise. The loss can be due to anything from a minor mishap by a user, a stolen laptop or a system-wide cyberattack, to a catastrophic natural disaster that wipes out an entire data center. A lot of data security breaches tend to get the […]

Continue reading