Time is running out to register for IBM’s Edge2014 – the premier event for infrastructure innovation, taking place May 19-23 at the Venetian in Las Vegas. Edge 2014 will deliver unparalleled technical education on the latest technologies and trends that are defining this new era such as cloud , big data , software defined environments , mobility , security and more. The event brings an exclusive opportunity for you to network and participate in forward-thinking discussions with IBM product developers, executives, industry experts and more than 5,500 of your peers.
At Edge2014, we will showcase latest IBM enterprise-level technologies via hands-on labs, demos and workshops. Leading technology experts from across the globe will share knowledge, best practices through more than 550 sessions in 14 exclusive technical tracks.
Download the Technical Edge guide to get the full session descriptions and track information.
As an IT leader, you’re invited to attend Edge 2014 infrastructure innovation event. (The early bird registration ends April 20th) . Register today and be a part of this incredible opportunity. We look forward to your participation. For more updates, visit ibm.com/edge or follow @IBMEdge on Twitter .
IBM Systems & Technology Group... [Continue Reading]
IBM received Frost & Sullivan’s 2014 Global Visionary Innovation Leadership Award as Best-in-Class Smart City Integrator . An independent analysis from the Visionary Innovation Research Group at Frost & Sullivan has named IBM the leading Smart City integrator, recognizing IBM’s deep expertise in working with thousands of cities of all sizes globally on Smart City initiatives. The award cites IBM for its ground-breaking solutions aimed to help cities transform their systems and better manage resources through the use of big data & analytics and cloud computing .
IBM provides end-to-end cloud-based solutions to help cities transform all aspects of city operations, manage traffic, improve public safety and improve sustainability.
As per Michael J Dixon, Ph.D., General Manager, IBM Smarter Cities , "This Frost & Sullivan award acknowledges IBM's accomplishments in helping cities around the world become smarter." "IBM's proven experiences in helping cities adopt cloud-based connectivity and industry solutions specific to water, public safety, transportation, sustainability and healthcare is helping cities reinvent themselves and change the way they work."
The Visionary Innovation Leadership Award recognizes the leaders who have... [Continue Reading]
I believe the enterprise IT application delivery model as it exists today in many organizations is broken. With the advent of cloud , social and mobile , it requires new thinking.
Users seem to agree as shadow IT has grown exponentially in recent years. The advisory firm CEB estimates that 40 percent of all IT spending at a company now occurs outside the IT department, a great deal of which is spent on infrastructure-as-a-service (IaaS) and software-as-a-service (SaaS) cloud services.
IT departments challenged to adapt
I spend much of my time assisting IT departments who are being challenged by their business users to deliver mobile, social and cloud based applications to generate new business value.
Users are demanding agility, greater flexibility and expect lower costs.
To adapt, they are looking for guidance across multiple domains (technical, cultural and organizational) as to how to meet changing user expectations of IT service delivery. All too frequently, if IT is not delivering, the users look to external cloud service providers who can offer agile, pay as you go (PAYG) services.
I do not believe public cloud service provision is the only future. Custom infrastructure, private cloud and hybrid combinations offer value propositions that cannot be met with public cloud alone. However it requires major change on the part of IT.
To remain relevant, enterprise IT needs to be reinvented.
... [Continue Reading]
IBM Edge2014 will be held on May 19-23, 2014 at The Venetian in Las Vegas. The premier event for infrastructure innovation will be focused on simplifying IT infrastructure and accelerating performance to deliver business value by using IBM's cloud , big data , mobility and security solutions . Edge2014 will bring together more than 5500 technology leaders and practitioners from all industries to sharpen their expertise, discover the latest technologies, and share best practices in infrastructure innovation.
Let’s take a look how IBM Edge2014 is going to deliver a unique experience for us:
Executive Edge (May 19-20) - An exclusive 2-day event for IT executives and leaders featuring breakthrough innovations and technology announcements, client success stories, provocative presentations from IBM executives and industry thought leaders, top tier executive one-on-one meetings and exclusive networking opportunities.
Technical Edge (May 19-23) - A 4.5-day technical event for IT professionals and practitioners featuring world-class education geared for all levels and covering a comprehensive range of solution areas, client case studies and best practices, hands-on labs and on-site certifications.
Business Partner Forum (May 19) - A half-day event where IBM Systems and Technology Group (STG) and channel leadership will reinforce the increasingly important role of Business Partners in the IBM infrastructure strategy. Topics... [Continue Reading]
While cloud has been clearly identified as the next step to IT optimization, essential for increased performance and cost reduction, many of us are in a haze when it comes to the fundamental security measures required.
Our fears related to cloud security , for instance, the fear of the unknown ( where is my data stored?) and the fear of the unseen (how does my data flow from one Virtual Machine to another) and the fear of how ‘secure’ the cloud really is lead us to be wary of cloud adoption. Also the new layers of infrastructure create new grey areas, requiring new security solutions that could provide virtual layer specific protection. However this blog post will focus at the fundamental hardware security.
Let’s take a look at the basic components of cloud and ways to optimize their security
Even though the cloud uses a different mechanism to serve IT infrastructure, be it computing power, memory or storage, the elements that create a cloud still include traditional datacenter components – servers, network, nodes and endpoints. The risks that exist in traditional data centers are also relevant in a cloud environment. Hence, traditional protection solutions such as Firewalls, Network Protection, Host security, etc. are... [Continue Reading]
After the successful accomplishment of Pulse2014, we’re ready to host yet another grand event – Edge2014 . Starting from May 19-23 at Venetian Las Vegas, IBM Edge2014 brings together IT professionals and practitioners from all industries to sharpen their expertise, discover the latest technologies, and share best practices in infrastructure innovation. The premier global event for infrastructure innovation will be focused on simplifying IT infrastructure and accelerating performance to deliver business value by using IBM’s cloud , big data , mobility and security solutions.
Let’s take a look at some of the key highlights of Edge2014:
550 expert technical sessions across 14 tracks
Exciting technology innovations and announcements
Latest and greatest business partner education
A comprehensive and expanded showcase Solution Center giving you access to the latest storage, System x and PureSystems solutions from IBM and our sponsors
Top-notch entertainment for over 5500 attendees
Wait, we have more in store for you...
The top 5 reasons to attend Edge2014:
Be the first to learn about the latest IBM technology innovation and their business implications
Be the first to see newest IBM solutions and live demos at the Solution Center
Hear real-life customer case studies and best practices tailored to CxO and Line of Business (LoB) issues and... [Continue Reading]
Businesses large and small are turning to Hybrid Cloud because it unites the best of all worlds - Public Cloud, Private Cloud and dedicated servers working together in any combination. A Hybrid Cloud combines the use of on-premises cloud infrastructure with cloud service provider infrastructure to create a firm’s overall capacity from the combined capabilities. While a hybrid approach promises cost savings and significant gains in IT and business flexibility, some concerns remain around how to manage, secure and integrate on-premises infrastructure with cloud services in hybrid cloud architecture…
Identifying these imperatives, we bring you an exclusive Video Debate session where top IT experts will discuss on when the hybrid clouds are and are not the be-all and end-all and if the infrastructure supporting the hybrid clouds really matters. On Tuesday, March 11th from 11 am-12 pm EDT, the fifth installment of our What’s Next for IT Infrastructure Video Debate will also discuss about the developments in cloud , data , security and many other latest topics and trends that influence your IT infrastructure.
The debate session will be moderated by Kevin Jackson , founder of GovCloud and author of GovCloud: Cloud Computing for the Business of Government . Among the panelists, we will have Steve Strutt - CTO for Cloud Computing, IBM UK and Ireland, Laura DiDio - Principal of ITIC, and Michael A. Salsburg -... [Continue Reading]
The facts are startling …. The rise of mobile and
cloud computing and big data analytics is compounding the complexity of
security. Cyber attacks and those who perpetrate them—are becoming more
sophisticated every year
2010, an average company’s computer infrastructure was attacked nearly
60,000 times every day.
an average company infrastructure faces 2,641,350 security attacks each
At the same
time, IT resources are moving outside the firewall and enterprises are
distributing their applications and data across multiple devices and into
that 35% of all application spend will originate outside IT by 2015, and
that 50 percent of companies will have mission-critical data in the cloud
It is clear that clients need greater security capabilities
and protection to combat growing IT threats. Here at IBM, we have designed our systems with security in
mind. Take IBM Power Systems. IBM Power Systems architects, alongside IBM
researchers, have spent tireless hours building key security components within
the Power Systems architecture.
Today, to help enterprise Power Systems clients combat growing IT
security threats and vulnerabilities, IBM has extended the Emergency
Response Services (ERS) subscription package to Power Systems 780 and
795 clients as one of the service options within the IBM PowerCare program
included... [Continue Reading]
let's get real about security. We all
know that System z is a bell-weather system when it comes to having the most
needed, most innovative, and most secure built in security capabilities on the
planet. Dare we say... hack proof??? Well... during a one of a kind panel
discussion with three of IBM's leading experts on Enterprise Systems security,
we will have a chance to consider this and lots of other intriguing facets of
security in ours age of data exploitation, risks of devastating loss to our
hard fought brand names, and ever chaining threats to our data and IT
IBM Pulse 2013 , Barbara Sannerud, IBM STG
Business Transformation Consultant, System z, Glinda Cummings, zSecure Software
Product Manager and Greg Boyd, IBM
System z Security Technical Specialist will lead an interactive and in depth
dialogue about how IBM does incredible things with innovative and ground
breaking technologies that are integrated into systems like zEnterprise and
System z security software. .Security is designed into System z – it is not an
added on feature. System z’s rich set of built-in security capabilities can
help you simplify and improve a complex set of operational security processes.
System z is designed for the highest level of security for commercial grade
platforms. Businesses that embrace System z can take advantage of: Consistent
policy based user authentication, access control, audit and management,
Protecting critical... [Continue Reading]
Security shouldn’t be hard,. That’s why PureFlex has made secure
deployment faster than ever through automated provisioning and a
“secure-by-design” approach which includes default settings that ensure
PureFlex components and compute nodes are secure from day zero. No kidding ... right out of the box you
are Security-Ready for maximum protection of your data or cloud deployments!
So how can you achieve
increased security without increased administrative cost.. At IBM Pulse 2013 ,
Ajay Dholakia, Ph. D., IBM Master Inventor, and Jeb Linton, IBM STG Security
CTO, will discuss the wide array of unique and best of breed security
capabilities that are available on IBM Pure Systems. There is so much benefit
potential associated with leveraging the simplification, protection and trusted
computing associated with IBM's Pure Systems, that you'll be sure to learn
about some new aspect of security readiness for your big data and cloud
environments that you did not know about before.
Don't miss this opportunity to talk with these
security and systems experts. Delve into
the possibilities of taking control when
it comes to the security and integrity
of your data, clouds and infrastructure. We will explore everything from
Automated Security Provisioning, Centralized Security Policy Management,
Centralized User Account,Management, Centralized Certificate Authority, Trust
Management and so much more.
So join the discussion. Come visit us at IBM... [Continue Reading]