Expert IT Blog
Featured Article
IBM Announces DS8000 Enterprise Storage Generation 10
3:33 DS8000 Gen10 bolsters security, enhances connectivity, increases speed, adds compression with FCM4 technology. September 10, 2024 Laura Tuller Senior Systems Engineer Modern Data Center Practice
Recent Articles
BLOG: Modernize Your Network with SASE Offerings from HPE Aruba
Seth Tollefson Solutions Architect Secure Access Service Edge (SASE) is a framework for network architecture that, through the cloud, delivers a comprehensive range of security services to the edge, ensuring zero-trust network access. SASE services include...
BLOG: IBM LinuxONE Emperor 4 Announcement
Marianne Eggett IBM Z Solutions Consultant IBM LinuxONE Emperor 4 Announcement: Sustainability, Scalability, Security and Superior Performance Sustainability. In an IBM nationwide survey, 85% of the CEOs stated their companies have a...
BLOG: Simplify Your Block Storage Experience with IBM Storage as a Service (STaaS)
Jack Mason Systems Engineer Traditional storage purchasing can be a risky endeavor for many enterprises today. Designing a system to meet capacity demands for the next 3-5 years, while maintaining consistent performance, often results in costly, over-configured...
IBM LinuxONE Emperor 4 Announcement: Sustainability, Scalability, Security and Superior Performance
Marianne Eggett IBM Z Solutions Consultant IBM LinuxONE Emperor 4 Announcement: Sustainability, Scalability, Security and Superior Performance Sustainability. In an IBM nationwide survey, 85% of the CEOs stated their companies have a...
BLOG: All Things Red Hat: Enterprise Open Source Solutions
James Marcinek Red Hat Architect and Business Development Manager Red Hat was founded in March of 1993. In the early days, Red Hat was primarily known as a Linux operating system and it was not well accepted by many companies. Even now, I recall one of my former CIOs...
BLOG: IBM Gen 3 FlashCore Module Delivers High-Performance, Cost-Effective Flash Storage
Scott Buecker Storage Engineer Two weeks ago, a customer shared with me that his team experienced an encryption-related outage on their Tier 1 storage array. How could this happen? All we’re doing here is Data at Rest Encryption, right? And since when do we have...
Blog: Planning Considerations for IBM Power10 based Scale-Out and Midrange Systems
Ron Gordon Director, IBM Power Systems The IBM Power10 based Scale-Out and Midrange Systems were announced on July 12, 2022. Soon thereafter, I authored a blog, 10 Things to Know about IBM Power10 Scale Out & Mid-Range Systems, that provided an informational overview...
BLOG: 10 Things to Know about IBM Power10 Scale Out & Mid-Range Systems
Ron Gordon Director, IBM Power Systems IBM recently announced the much-anticipated Power10 based Scale Out and Mid-Range systems. With the Power Systems Enterprise 1080 being announced in September 2021, this announcement feels like the rest of the relatives have...
BLOG: IBM FlashSystem FS7300 and FS9500 Cyber Resilience for Hybrid Clouds
Keith Thuerk Storage Engineer Early in 2021, IBM started revitalizing their Open Systems Storage platform with the release of the FlashSystem 5200 (aka FS5200.) Recently, IBM further leapfrogged their competition by refreshing their mid-range and high end...
BLOG: Planning, Designing and Implementing a Cisco Catalyst Campus LAN Infrastructure
Omar Williams Sr. Network Engineer Cisco’s Catalyst switching family of switching solutions offers flexibility, speed, and scale for your network infrastructure. From fixed, stackable switches to modular switches, the Catalyst series switches securely connect...
BLOG – Cloud Landing Zones: 8 Considerations You Need to Make
Farhan HussainVP, Hybrid Cloud Practice Cloud adoption is on the rise, with 90 percent of companies using cloud computing in their operations. However, moving over to the cloud has its risks. So, how can organizations safely and securely get started with new...
BLOG – What it’s Like to Implement DevSecOps with Axcelinno
Farhan HussainVP, Hybrid Cloud Practice DevSecOps requires a shift in mindset. It’s an entire methodology that makes data protection a concern right through your development life cycle. As such, it demands a new approach from everyone in your organization. That...