IT Management

When assessing where to deploy your applications, there are many factors that go into your decision making. Some of them are financial, some are political and, hopefully, some are technical. Middleware that is supported across many platforms has generally evened the playing field for functional requirements. Many middleware products, including web servers, databases and application servers, provide a common set of APIs and functions so that you can host them on your platform of choice…

Read Full Article →

When it comes to Payment Card Industry Data Security Standard (PCI DSS) compliance, it seems like someone is always pointing the finger at someone else when a merchant gets breached. People blame the merchant, software makers, a vendor, the Qualified Security Assessor (QSA) and even the PCI requirements themselves. As things stand today, no matter whose fault it is, if your network becomes compromised, it will likely be your company alone that will end up paying the price in fines, loss of reputation and loss of business. That’s why when it comes to security and compliance, long before there’s been a compromise you need to adopt the adage president Harry Truman made famous: “The buck stops here.”…

Read Full Article →

It all began on Dec. 18, 1999, whenIBM released a collection of patches and additions to Linux kernel version 2.2.3. This event started the relationship between the Penguin (aka Linux) and the mainframe, and was essentially the beginning of the System/390 kernel for Linux on System z. Then there was the official public announcement of Linux on System z and Integrated Facilities for Linux (IFL) in 2000, along with a whole ecosphere of software and tools to support Linux on System z produced by IBM and IBM partners. Many large and small enterprises have saved millions of dollars by adopting Linux on System z in the past 15 years…

Read Full Article →

How a CIO Can Translate the Corporate Vision Into a Tool to Attract and Retain Critical Talent

Today’s business world is increasingly reliant on technology to help achieve goals and contribute to the bottom line, but it’s still the employees in a company who make the difference between success and failure. A key component of this success is mobilizing the company’s workforce around the corporate vision and mission…

Read Full Article →

Companies using analytics to gain additional business insight often outperform their peers, as is often seen in their financial results. The ability to analyze information at the speed of thought is being viewed as a core competency and a source of competitive differentiation because the organization with better and faster insight is in the best position for success. This is especially true in the financial and retail industries: Enter the IBM DB2 Analytics Accelerator for z/OS. The IBM DB2 Analytics Accelerator for z/OS allows you to bring analytics closer to your operational data sources. Organizations can obtain the results of analytic queries much more rapidly than previously. This opens up unprecedented opportunities to use the mission-critical data already residing on your zEnterprise platforms…

Read Full Article →

In the 2014 Magic Quadrant for Business Intelligence, the most recent, Gartner is drilling a familiar software term into the BI market space: “enterprise.” This new focus on enterprise derives from customer demand. Those customers, who in years past expressed preferences for data discovery, analytics and other business intelligence features, are now requesting more enterprise features in their business intelligence applications. This is a sign of widespread adoption and larger deployments, which is driving the need for better tools to manage the growing number of users and data sources—precisely what enterprise solutions are designed to do…

Read Full Article →

Every year, the IBM Institute for Business Value (IBV), in conjunction with Oxford Economics, surveys IT executives around the world about how the technology landscape is changing. This year’s survey, which canvassed 750 senior IT leaders in 18 countries, opens the conversation about IT infrastructure – and in particular, the content, participants and tone in which this discussion topic is changing…

Read Full Article →