LinuxONE solutions

Update Your skills at IBM Tech University 2019

Given the breadth and pace of business technology innovation, some IT teams are already experiencing a skills shortage, putting further pressure on their organizations. Why is this issue top-of-mind for CIOs and CTOs? Harnessing the most current IT skills are a strategic priority. Plus, there have been numerous reports of a growing IT skills gap […]

Continue reading

Mastering the Mainframe in the era of trust and security

More than ever, our clients are turning to IBM Z® and LinuxONE™ to take advantage of our highly secure technology to help protect their businesses. For young people in 2019, it’s this same explosion of focus on security that has them turning to the mainframe. This year, we’re proud to announce that over 18,000 students, […]

Continue reading

Tweets by IBM Systems


Trust is the new currency in the digital economy

Learn how digital trust can help you outperform your competition by 300%


IBM Z mainframes

The foundation of trusted digital experiences


Join us at Think 2019, where the issues of tomorrow meet the greatest IT minds of today.

What does GDPR mean for blockchain technologies?

By now, almost everyone has heard about General Data Protection Regulation (GDPR), which came into effect in the EU on May 25, 2018. As a result of GDPR, not only were EU organizations affected, but so were many international companies who have dealings with EU data subjects. Violation of these rules could potentially result in […]

Continue reading

The Best of IBM Z and LinuxONE in the public and private cloud

In our hybrid cloud world, IT leaders view choice and control as strategic assets when it comes to their infrastructure. But when deploying hybrid cloud strategies one of the biggest challenges for enterprise cloud adoption is security, often slowing down the digital transformation process. Concerns ranging from trust to data protection and compliance are top […]

Continue reading

Storage for blockchain and modern distributed database processing

IBM Blockchain is transforming enterprise capabilities across industries, fostering new insights and decisions: from trust and transparency in our food using IBM Food Trust™, to digitization and transparency of trade using TradeLens, to transforming digital identity into trusted identity using Identity, to redefining access to money for people and businesses everywhere using World Wire. The […]

Continue reading

Explore the IBM infrastructure portfolio at Think 2019

Whether you’re looking to explore cutting-edge technologies, connect with experts or add technical credentials to your resume, plan on experiencing many exciting offerings at Think 2019. This flagship technology conference—February 12 – 15, 2019, in San Francisco—features a Cloud and Infrastructure Campus hosting over 200 sessions, interactive demos and hands-on labs that span the full […]

Continue reading

Explore the future of enterprise Linux systems at Think 2019

Many organizations rely on Linux-based systems to support critical enterprise applications. Yet as their businesses grow, these organizations are increasingly looking for alternatives to commodity x86 servers. They need better ways to meet enterprise-grade security, reliability and scalability requirements while controlling costs and complexity. IBM LinuxONE enterprise systems offer an answer. From banks to cloud […]

Continue reading

The evolution of the IBM Blockchain Platform: Choice and control on IBM Z and LinuxONE

We’re living in a multicloud world. Today, 85 percent of businesses rely on multiple clouds to meet their IT needs, with 71 percent using more than three[1]. What this means in practice for enterprise clients is that they have multiple architectures in place. This may be fine for “tried and true” workloads–like credit card processing […]

Continue reading

Security considerations for critical environments

In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-authorized code as well as from denial of service attacks. The cost of data breaches […]

Continue reading