Expert IT Blog
Featured Article

The Dell AI Factory with NVIDIA: Creating an AI Environment that Turns Ideas into Practical Application
Bryan Samson Strategic Alliances Manager Technological Singularity “Technological Singularity,” or simply “the singularity” is a term I learned today. It is the advancement of artificial intelligence (AI) to where it can improve upon itself and therefore...
Recent Articles
BLOG: Fujitsu Enterprise Postgres on IBM Z and LinuxONE
Kurt Repholz VP zSystems Sales On November 18th, 2021, IBM announced Fujitsu Enterprise Postgres for IBM Linux on Z and LinuxONE. This unprecedented announcement between companies that just a few years ago were competitors demonstrates the new market with IBM’s...
BLOG: IBM Power Systems Software – New and Improved Functionality
Ron Gordon Director, IBM Power Systems IBM Power Systems development teams have been making some great changes over the past several months that you may not have heard of yet. While most of these product changes affect AIX, IBM i, and Linux with better system...
BLOG – Container Orchestration in DevSecOps
Farhan HussainVP, Hybrid Cloud Practice Containers use a fraction of the bytes that a Virtual Machine does. They take only seconds to deploy and need far fewer resources too. So, it’s no wonder that 70 percent of developers now use a container orchestration...
VLOG: IBM Storage Announcements 2022
IBM Storage Announcements 2022 Video Highlights Spectrum Virtualize v8.5 FS7300 - Up to 25% performance increase FS9500 – Up to 2x performance San Volume Controller – SV3 node – 2x the performance and connectivity Recover from Ransomware attacks in...
BLOG – DevSecOps: Putting Security in DevOps | Axcelinno
Farhan HussainVP, Hybrid Cloud Practice In today's digital age, security is more important than ever. The business forces driving the adoption of DevOps have everything to do with providing customers with superior experiences, providing the agility to adapt to...
BLOG: 3 Ways to Fight Ransomware With NetApp Solutions
Carlos L. Marques Enterprise Architect Companies that use NetApp need to know how to harden their NetApp ONTAP infrastructure against ransomware as it continues to hold its position as one of the most prevalent cyberthreats. Gartner predicted that by 2025, at...
BLOG: As a Service – At Your Service with HPE GreenLake
Cristina Perez Marketing Specialist As economical, supply chain, and labor challenges continue to pressure businesses, CIOs are challenged with providing solutions that drive significant modernization and decrease CAPEX spend. The obvious decision: Cloud or...
BLOG: IBM Power Systems – 2021 Year-end Announcement Review
Ron Gordon Director, IBM Power Systems It has been a busy year for IBM Power Systems (aka IBM Cognitive Systems) with announcements in hardware, software, cloud, and management capabilities. These announcements started early in 2021 and have continued right up through...
BLOG: COBOL v6 on IBM System Z – Are YOU There Yet?
Why You Should Migrate to COBOL v6 on IBM System Z COBOL continues to be an essential component of the infrastructure that runs today’s applications, especially on IBM System z. Critical transactional applications and systems rely on the efficiency,...
BLOG: Sunny with a chance of…IBM Netezza Cloud SaaS Distributions
Brad Miller Practice Director, Information & Analytics The Netezza platform and tooling has evolved since IBM purchased the Netezza organization and started broadening both the functionality and architecture. Over the last year IBM has brought cloud deployment...
BLOG: Cisco Collaboration: Is Hybrid Work Here to Stay?
Chris Minnis Enterprise Architect IT leaders are pressured to accommodate C-suite and the employees. These employees now expect flexibility: a high-quality work experience easily and readily accessible from anywhere and any device. C-level expect the same and...
VLOG: IBM Security QRadar SIEM
4:36 IBM Security QRadar SIEM An effective threat detection and response solution for today’s more complex networks. Video Highlights Deploy on premises, in the cloud, or as Software as a Service (SaaS) Managed threat detection and response Eliminates threats...