Featured Carousel

When AI server infrastructure performance hits the wall

Gaining new insight to grow the business is a strong driver for adding artificial intelligence (AI) and deep learning to an organization’s IT capabilities. Organizations that don’t adopt these cognitive technologies to gain an advantage risk losing out to the competition. Many take the first step by experimenting with AI software on their existing infrastructure. […]

Continue reading

Realizing the dream: Encrypting all mainframe data

The ability to encrypt all of the data for an entire application or database has been an unfulfilled dream of IT for quite some time. After all, nobody wants to be the next big name splashed across news headlines when a data breach takes place, or stiff regulatory penalties are assessed. These possibilities drive many […]

Continue reading

Tweets by IBM Systems


Trust is the new currency in the digital economy

Learn how digital trust can help you outperform your competition by 300%


IBM Z mainframes

The foundation of trusted digital experiences


Register today for Think 2019, where the issues of tomorrow meet the greatest IT minds of today.


People: The secret sauce in IBM Z

The secret to the IBM Z mainframe’s success might not be immediately apparent. But look behind its groundbreaking features and you’ll find a global network of collaboration, from system developers in Poughkeepsie, New York, to board designers in Böeblingen, Germany. They are working directly with our clients to ensure that critical requirements are being captured. […]

Continue reading

Expansive all-flash and software innovations from IBM

IBM maintains one of the world’s largest and most influential corporate research capabilities, and the IBM Systems Storage and IBM Storage software portfolios benefit directly from this extraordinary commitment to research and innovation. This week, IBM is announcing wide-ranging technology advances, new system capabilities and enhanced software solutions designed to accelerate the value IBM Storage […]

Continue reading

The three C’s of enterprise security for bolstering defenses

If you’ve picked up a newspaper or visited a news site in the past few weeks, it will come as no surprise: the number, variety and complexity of enterprise security threats all continue to increase in the modern digital age. In addition to a constant stream of malicious outside threats, enterprises also need to contend […]

Continue reading

Power Systems: the open innovation platform

CEOs know that business technology is in a state of perpetual motion, and trendsetting innovation is often a collaborative effort that will engage multiple business partners. Achieving digital transformation success in today’s hypercompetitive environment also requires an open ecosystem — one that includes flexible capabilities that adapt to specific IT needs. CIOs and CTOs crave […]

Continue reading

A powerful cognitive and deep learning tool

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the In The Making blog. The opinions in these blogs are their own, and do not necessarily reflect the views of IBM. Getting the right tool for the job is essential for anything from home […]

Continue reading

The right IT infrastructure for fast data and analytics

A manufacturer improves the ability to match output with demand that enables earlier logistics planning and rising profitability. A natural gas company’s engineers get a clearer picture of its pipeline operations to greatly enhance decision-making capabilities. And with a more holistic view of its customers, a bank’s executives are able to offer products that appeal […]

Continue reading

Who’s tops in server reliability? Ask 750 enterprise users

Imagine what would happen if one of your critical, revenue-generating applications suddenly became unavailable. What if the systems running your core transaction processing services went down or suffered a security breach? Each hour of downtime typically costs between $150,000 and $400,000, and each “average breach” lasting from one to 60 minutes could cost upwards of […]

Continue reading