IBM - News, Features, and Slideshows
IBM in pictures
Michael Stonebraker, whose database software breakthroughs helped to tame information overload long before we referred to it as big data, is the recipient of the 2014 ACM A.M. Turing Award, a.k.a. the "Nobel Prize in Computing."
By Bob Brown | 26 March, 2015 01:35
Poachable, a Seattle startup that specialises in connecting passive job-seekers with companies looking to hire, says enterprise network and IT companies such as Microsoft, IBM and Cisco are among the most desirable places to work. But largely consumer-focused companies, like Google, Apple and Amazon, are even more attractive.
By Bob Brown | 23 March, 2015 21:42
The FCC's net neutrality decision last month that imposed stricter regulations on Internet Service Providers, under Title II of the Communications Act of 1934, has networking companies opposing each other even more fiercely than usual.
By Jon Gold | 20 March, 2015 02:08
First commerical OpenPower servers coming...Delphi sends self-driving Audi on coast-to-coast road trip...data breach bill draws fire... and more tech news.
By IDG News Service staff | 19 March, 2015 22:31
Several new Docker tools are out there: Docker Machine, Docker Swarm, and Docker Compose. They come from Docker Inc. itself, which has has the advantage of being designed by the same folks who developed the Docker container.
By David Linthicum | 03 March, 2015 22:07
IBM tries to keep its layoffs out of the public eye as much as possible, although it fails miserably at this. The company took the unusual step of denying that it was on the cusp of a gigantic layoff amid reports of a possible new round of job cuts that may begin this week.
By Patrick Thibodeau | 28 January, 2015 23:24
IT infrastructure is constantly riding the often-tumultuous waves of consolidation and separation. A typical example would be the eras of mainframe, open systems, and PC computing. No surprise there. For the past three to five years, server virtualization has been a catalyst for data center consolidation, (even though for the most part, IT has mapped server virtualization initiatives to existing IT infrastructure choices, or dare I say legacy infrastructure).
By Mark Bowker | 13 January, 2015 03:55
Network World's analysis of publicly listed sponsors of 36 prominent open-source non-profits and foundations reveals that the lion's share of financial support for open-source groups comes from a familiar set of names.
By Jon Gold | 10 January, 2015 02:05
It hasn't been lost on the IT vendor community and IT professionals that Cisco is absent from the VMware EVO:RAIL partner program. With all of the powerhouses participating in the program, you'd think that Cisco would jump right into the mix. Considering Cisco's growth in the server market and the fact that it doesn't currently have its own storage play, this opportunity appears to be ideal for Cisco.
By Mark Bowker | 13 December, 2014 07:21
Whitepapers about IBM
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realise by deploying IBM MQ (previously named IBM WebSphereMQ). Drawing its findings from in-depths interviews to create a composite organisation, this Forrester whitepaper from IBM outlines the benefits and costs of deploying IBM’s MQ solution across the enterprise.
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- CCMobile iOS DeveloperNSW
- CCDBA (Oracle/SQL)NSW
- FTSenior SQL DBANSW
- CCMobile Designer / Developer - IOSNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCFront End Web Developer (Drupal)NSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCMobile Designer / Developer - IOSNSW
- FT.Net Solution ArchitectNSW
- CC.Net Solution ArchitectNSW
- CCSenior Systems EngineerNSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
For the foreseeable future, a two-tier DDoS protection architecture should continue to provide the flexibility and manageability that today’s architects need to combat the modern DDoS threat. This recommended DDoS protection reference architecture leverages F5’s long experience combatting DDoS attacks with its customers. •Learn the four categories of DDoS threats and the recommended mitigation architectures •Answer why you should consider a cloud based scrubbing service and how to choose one •Understand the benefits to a multi-tier DDoS protection architecture
- Vodafone cuts complaints
- GitHub recovering from massive DDoS attacks
- In Pictures: How 20 (mostly) tech companies' logos have evolved over the years
- In Pictures: Worst data breaches of 2014
- In Pictures: 9 security gadgets for mobile devices
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects
- FCC will vote next month on plan to share valuable 3.5GHz spectrum
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao
- Facebook reveals the logic behind its forced Messenger split
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up