Flagship Blog

The Answer to Endpoint Detection and Response

According to Gartner… “Organizations with security budgets of $10 million or more use an average of 13 security vendors (the average across all enterprises is about 9 vendors), too high a number for most organizations. Indeed, about 90% of surveyed enterprises...

The Solution for Geospatial Data

What is Geospatial Data? Geospatial data is data that has explicit geographic positioning information included within it, such as a road network from a geographic information system, or a geo-referenced satellite image. The Challenge More and more data is being...

Don’t Miss Innterconnect – March 19 – 23, 2017

Cloud. Internet of Things. Watson. How can you use the world’s biggest breakthroughs to unleash ingenuity? Join Flagship at InterConnect 2017, March 19 – 23 at the Mandalay Bay in Las Vegas . This is the one technology event dedicated to everything you need to...

What’s “Good Enough” for Linux Databases?

There is a big move afoot in the technology industry that is taking customers from reliable and secure server architectures to solutions that are ‘good enough’. This move is generally being motivated more by cost then the true desire to give up high reliability and...

Threat Intelligence – A Sight for Sore Eyes

They say, “hindsight is 20/20,” because it’s always easier to see the “would’ve”, “should’ve,” “could’ve’s” after the fact. Seeing the holes, the cracks and the mistakes in a security plan...

Visualizations Make Big Data Come Alive

Organizations are expected to be “data-driven.” They collect metrics, store user preferences, track customer behavior, and collect machine data by the terabyte. But as the amount of data a business collects increases, often its ability to act on the data decreases....

Are Storage Arrays Dead?

Blog Series:  About IT by Ed Turetzky We have all grown up with the notion that shared storage requires a dedicated, specialized controller to provide both the performance and functionality necessary. Today we are seeing the move to everything being software defined...

Best Practices for Going Hybrid

As we’ve seen, organizations that are able to take a hybrid approach that integrates their on-premise infrastructure with the public cloud gain a number of advantages. However, this move needs to be done correctly. It isn’t just a matter of having both on-premise and...

Counting On “Home Field Advantage” With Private Cloud?

In the world of sports, some teams dominate at home, making it nearly impossible for opponents to come into their house and beat them. And some teams are road warriors, able to travel into hostile stadiums and come away the victor. Either of these are a great trait...

Employees Don’t Want to Deal with Mobile Security

According to Forrester’s Global Business Technographics Devices And Security Workforce Survey, 2016, 44% of employees think their employer should handle mobile security on their device and 26% of employees said they prefer to choose a security solution on their...

The Future Is Pluto… and Flash Storage

Imagine hitting a golf ball in New York City… and making a hole in one in Los Angeles! This is how one observer portrayed the New Horizons deep space mission to Pluto, though perhaps he could have been describing the capabilities of IBM FlashSystem storage arrays. New...

Analytics: Driving the Top Line

Can success really be driven by analytics? As businesses transform digitally, it is essential that they be able to detect and respond quickly to (or even anticipate) market change. The insight required is multi-dimensional and can be expansive, based on a variety of...

Hybrid Cloud Extended

Hybrid cloud is the norm. Two-thirds of organizations that blend traditional and cloud infrastructures are already gaining advantage from their hybrid environments. However, leaders among them use hybrid cloud to power their digital transformation, going beyond cost...

The Four Leading Security Threats of 2017

Contributor: Rick M Robinson, via securityintelligence.com The security landscape is constantly evolving and will continue to evolve in 2017. Long-standing security threats will take on new dimensions. Social engineering, for example, will become an output as well as...

IBM Cloud and VMware: What’s in it for you?

Go from months to minutes when you use VMware Cloud Foundation to implement and deploy a VMware environment. Using the advanced automation developed through the partnership between IBM Cloud and VMware, you can consistently deploy the unified software-defined VMware...

5 cloud predictions for 2017

Contributor: John Easton, Distinguished Engineer – Senior Cloud Advisor, IBM Cloud via thoughtsoncloud.com 2016 has shown that expert cloud predictions don’t always play out in quite the ways people expect. If anything, the mantra of “expect the unexpected”...

Why a Managed Cloud?

Enterprises are turning to the cloud to deliver compelling customer experiences, power innovative business models and achieve business agility. They’re looking to move critical workloads to a secure, reliable cloud infrastructure, and integrate existing systems of...

The Role of Managed Services in Cybersecurity

Organizations have traditionally turned to managed services for assistance in making technology investments, and achieving greater operational efficiencies. Recently, managed service providers (MSPs) have been primarily focused on helping their clients navigate the IT...

The Great Hardware Maintenance Escape

Hardware maintenance solutions from original equipment manufacturers (OEMs) can feel like a prison. That’s because they aren’t typically based on a lifecycle approach. In addition to commonly charging more than third-party maintenance providers, OEM’s...

Call One Vendor for IBM and Non-IBM Maintenance Support

IT infrastructures are complex – typically a web of applications running on servers, storage, and network devices from a variety of vendors. This type of complexity can make it difficult for clients to deliver the performance and availability needed to meet...

Changing Business, Changing IT, Changing Sources

Where, how, why, and from whom IT capabilities are sourced has changed forever. Unfortunately, too many businesses still manage their providers, services, and sources as they did through previous generations. Smart companies are rethinking how they source and manage...

The Right Vendor Isn’t Always the Original Vendor

Optimize Uptime and Return on Investment (ROI) with Multivendor Maintenance Storage, server and networking hardware, like people, have life spans. Like human adolescents, they need to be nurtured when they’re younger—with updates and refinements to maintain a healthy,...

How a mobile development platform can help IT pros cut through clutter

Contributor: Carl Osipov, Executive Cloud Advisor, IBM Have you ever felt overwhelmed by the number of mobile gadgets you see every day? If so, you are not alone. In 2015, the total number of mobile devices worldwide (7.9 billion) eclipsed the world’s population (7.4...

Cloud Control in The Cognitive Business Era

In the Cognitive Business Era business leaders need to have a certain level of cloud control. They need to be able to quickly determine and request the development of new business capabilities. This means a little bit of experimentation and a lot of collaboration....

Simplifying Hybrid IT with Managed Services

“We don’t need help. We have plenty of people right here, who are more than capable of tackling these projects…” and you do. But until you can add more hours to each day, you are limited to the top three items on the daily to do list, not to mention the...