Flagship Blog

Enabling Hybrid Cloud Apps and Multi-Speed IT

Contributor: Kim Gajda, via Thoughts On Cloud With the evolution of the cloud, startups seem to have it easy. They come up with an idea, implement it on the cloud, and deploy continuously right away. For companies that have developed software for years, either for...

Boca’s Ballroom Battle Begins Tomorrow

Boca’s Ballroom Battle takes place tomorrow, Saturday, August 20, 2016 at the Boca Raton Resort & Club at 6 pm. All proceeds from this event benefit the George Snow Scholarship Fund. Amongst the eight brave souls from the Boca Raton community, who have...

AIX Sessions at IBM Edge, Lead by Flagship’s Jaqui Lynch

Are you going to IBM Edge 2016? If you are an IBM Power Systems user, or are considering becoming one, this is one event you can’t miss! Edge is an IBM conference featuring more than 750 sessions covering everything from becoming a cognitive business to deep...

Get What You Need With Managed Services

According to IDC research, the top 4 corporate imperatives of organizations today are as follows: Drive down operational costs Strengthen customer relationships Improve financial management Lead in product innovation and/or market position However, according to IDC...

Ten Common Mistakes in Computer Security Incident Response Plans

In a previous blog, we introduced the importance of a Computer Security Incident Response Plan (CSIRP). We reminded our readers that security breaches are virtually inevitable, and can involve thousands of data records while costing millions of dollars. A CSIRP can...

IT Empowers With Data-Centric Design

It is true. Knowledge empowers you and it empowers your business. As the information technology (IT) department, you are the holder of the key. IT has the ability to utilize technology to turn information into knowledge that empowers the business. In a previous...

How Cloud Can Make CIOs Into MVPs

Contributor: David Farrell, GM of IBM Cloud, North America As general manager of IBM’s North America cloud services and solutions team, I get to speak to a lot of clients. One CIO with whom I regularly talk compares his typical day to a hockey goalie’s, batting away...

Responding to a Cybersecurity Incident – Dos and Don’ts

Global enterprises with hundreds of thousands of employees, small companies doing business on the web and public sector organizations of any size all have one thing in common: your networks are under almost continual attack, and your enterprise systems are at risk as...

Analytics Acceleration – A Vision for Cognitive Business

If you could amplify the power of your brain, would you? How many people would turn down the ability to read a book in a few minutes and be able to comprehend, retain, and recall the information in an instant? What if you could compile all of the information in your...

Navigating Hardware Maintenance During Mergers and Acquisitions

Let’s face it: Mergers and acquisitions involving a larger IT provider can go one of two ways from a customer’s point of view. In the first option, things work out great; you never notice a thing. In the end, you will have better technical support options as a...

Angie – 1, Scammer – 0

A crazy thing happened to me this morning. As I started my day, I read and shared an article about a group of cybercriminals that were recently caught and charged by the Federal Trade Commission (FTC) for creating a program which freezes the victim’s computer...

With Opportunities Come Challenges

In recent years, advances in technology have given rise to many innovative, disruptive business models, enabling organizations to rethink their IT and business strategies. These business models and technologies, primarily cloud, analytics, mobility, and social are...

‘Pokemon Go’ and Five Security Requirements for Using Cloud Apps

Contributor: Mark Campbell, Cloud Security, IBM If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for...

Analytics in Action – Part 1: Establishing “Buy-in”

Gartner estimates that 90 percent of business decisions are based on a fraction of the available relevant data. How can this be true when we know that insights gained from this data could have a significant impact on an organizations’ ability to create successful...

Cognitive Computing: Turning IT Operators into IT Innovators

We are on the cusp of a new age of computing. One where smart businesses are starting to think differently about how they design, build, and deliver technology solutions. We believe that IT teams need rise up and help drive this innovation. That’s why we’re...

Are Managed Services the Best Financial Choice for Your Business?

Contributor: Lynda Stadtmueller, Vice President, Cloud Services, Stratecast via Thoughts On Cloud In the old days, many IT employees used a simple gauge to assess the financial viability of their technology decisions: is there enough money in the budget? Today, as...

Another Day, Another Fire

Many IT organizations simply (or sometimes not so simply) feel like they are in the business of putting out fires. Every day it’s something new, something urgent, something unexpected – but “it’s always something.” The thought of actually having enough time,...

Enabling Mobility While Protecting Corporate Data

Blog Series: IT Perspectives by Jaqui Lynch Mobile Devices For the past three days I have been in upgrade turmoil. There are two people in this house and between us we have three desktops, four laptops, two IPADs, two iPhones and2 iPods. All of these need upgrading at...

Addressing Risk Driven by Business, Events and Data

Business resilience can be divided into three categories: business-, event- and data-driven events. Organizations must address all potential challenges, however most business resilience strategies stop after addressing business-driven events, such as audits, new...

Business Continuity: The Unsung Hero

Contributor: Paige Poore, Director, Global Business Continuity Management, IBM Security breaches continue to climb in frequency and cost, encompassing all industries and raising important personal data privacy concerns. The growing awareness of identity theft and...

Endpoints: The Beginning of Your Defense

Contributor: Charles Kolodgy, Senior Security Strategist, IBM The term endpoint conveys a terminus — the end of the journey. However, for IT endpoints, be they computers, mobile devices, servers, point-of-sale terminals or a myriad of other devices belonging to the...

Infographic: Main Factors Driving End User Managed Services Decision

Today’s technology is more complex than ever. Due to this complexity, less than 10% of companies report that their current IT infrastructure is fully prepared to meet the demands of mobile, social, big data and cloud. This trend is expected to persist and will...

SoftLayer and AWS: What’s the Difference?

Contributor: Kevin Hazard, IBM Cloud, SoftLayer People often compare SoftLayer with Amazon Web Services (AWS). It’s easy to understand why. We’ve both built scalable infrastructure platforms to provide cloud resources to the same broad range of customers—from...

Partnering to Optimize

“IT services, in particular Cloud services, are a challenge to evaluate and then manage. And, the problem is growing. We would welcome any help that I could feel is competent and objective in helping with sourcing and in managing our sources.” – CIO, North...

4-Step Plan to Cloud-based Resiliency

As IT becomes ever more important and the cost of downtime increases, it is no wonder that improving resiliency has become a high priority. Organizations are willing to spend money to help make systems, data and applications virtually always available; to protect them...