Linux systems

Is your scientific software complemented by the best hardware?

Did you know you could realize huge performance gains for your scientific applications by taking advantage of the unique capabilities of the IBM Power Systems platform? Are you apprehensive about making the leap to another architecture? Let’s look at the current state of the software ecosystem around IBM POWER, the resources available and how IBM […]

Continue reading

The evolution of the IBM Blockchain Platform: Choice and control on IBM Z and LinuxONE

We’re living in a multicloud world. Today, 85 percent of businesses rely on multiple clouds to meet their IT needs, with 71 percent using more than three[1]. What this means in practice for enterprise clients is that they have multiple architectures in place. This may be fine for “tried and true” workloads–like credit card processing […]

Continue reading

Tweets by IBM Systems


Trust is the new currency in the digital economy

Learn how digital trust can help you outperform your competition by 300%


IBM Z mainframes

The foundation of trusted digital experiences


Join us at Think 2019, where the issues of tomorrow meet the greatest IT minds of today.

Top IBM Power Systems myths: Linux on x/86 is different from Linux on Power

There are many misconceptions about IBM Power Systems in the marketplace today, and this blog series is all about dispelling some of the top myths. In the last post, I put aside the myth that IBM Power Systems has no cloud strategy. In this post, we’ll look at a myth that has been propagated by […]

Continue reading

Security considerations for critical environments

In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-authorized code as well as from denial of service attacks. The cost of data breaches […]

Continue reading

Address your data security challenges with pervasive encryption

As an IT manager, you likely face several critical challenges related to your enterprise data: Internal and external data breach threats necessitate protecting all potentially sensitive data. Yet identifying and classifying this data can be a challenge. Encrypting data at the field level often requires significant costs, resources and application changes – yet still leaves […]

Continue reading

A sneak peek of the Think 2019 Infrastructure campus

“It can be hard to keep up with all of the technology shifts and changes these days. IBM Think helps me because it addresses all of them including AI, cloud, analytics, infrastructure, security, and even nascent trends like quantum computing!” – Craig S. Mullins, President & Principal Consultant, Mullins Consulting Inc. Think 2019 is fast […]

Continue reading

What role do developers play in your organization’s AI journey?

Artificial intelligence (AI) is rapidly being adopted by organizations of all sizes and yielding impressive results, transforming businesses and industries globally. While senior executives, managers and senior IT architects are often catalysts for change, it is the developers who are deciding which specific products and technologies individual companies will use on their journey to AI […]

Continue reading

Is your smartphone data safer than your enterprise data?

More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, especially considering that encrypted data is rarely successfully attacked.[ii] Yet most organizations today are encrypting only […]

Continue reading

The new normal: A secure and agile business

If you’re like most of the IT leaders in this industry, you know that high stakes boardroom conversations are changing as fast as the pace of technology innovation. Today’s executives in a digitally empowered world, want IT to innovate and deliver outstanding user experiences, all built on a strong foundation of equity and trust in […]

Continue reading