Ibm Whitepapers

Sort by: Date | Company | Title

2012 Mid-Year Trend and Risk Report
By IBM | 25/7/2013
Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents, continue their upward trajectory and have already hit new highs in 2011. Click to download!
Download this now

Achieve agility and profitable growth
By IBM | 28/2/2012
In today’s fast-moving global marketplace, businesses that optimise their performance gain a competitive advantage. By combining the power of process automation and integration with SOA, IBM helps organisations grow the business value of existing applications and solutions.
Download this now

A Foundation for Database Simplification, Consolidation and Cost Reduction
By IBM | 7/11/2011
Over the past decade the trend in infrastructure design has been towards scale-out architectures based on the x86 processor, where many machines are clustered together in order to create a virtual mainframe. In this paper we set out to challenge this approach and to demonstrate that modern mainframe technology represents a viable scale-up alternative to the current vogue for racks filled with blades, looking in parti cular at the way organisations can benefit in terms of improved agility, increased reliability and cost savings by consolidating Oracle databases onto IBM’s zEnterprise and Enterprise Linux Servers (ELS).
Download this now

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
By IBM | 26/7/2013
The tremendous growth of data has created unprecedented challenges for businesses security. Striking a balance between opportunity and reputational risk requires a comprehensive strategy that incorporates business resiliency with dependable backup and restore policies for systems and processes. Find out more!
Download this now

Avoiding Insider Threats to Enterprise Security
By IBM | 26/7/2013
Today’s organisations are highly vulnerable to security threats related to privileged identities — that is, the accounts of system administrators, database managers and others with elevated access to critical IT resources. Because of the overarching access of these users, their privileged identities have extraordinary abilities to control and exploit an organization’s data, applications and endpoints. Find out more on how to protect privileged user identities across complex IT environments, even in the cloud.
Download this now

Becoming a Social Business
By IBM | 21/2/2012
As global business accelerates ever faster and companies work to quickly respond to customer demands, competitive threats and rapidly evolving trends, the richness and efficiency of social collaboration plays a key role in enabling future success. The challenge then is finding the best approach. Read on.
Download this now

Businesses are ready for a new approach to IT - Simplify deployment and reduce complexity using systems integrated with expertise
By IBM | 23/5/2012
The last 100 years have brought dramatic change for information technology. IT has moved from a specialised tool to become a pervasive influence on nearly every aspect of life.The IT industry has moved from vacuum tubes to the first programmable computers and far beyond. Today, as the planet becomes smarter and as interactive data proliferates, IT has become a part of the very fabric of business—and of the way we live our lives. Read more.
Download this now

Business Process Management (BPM) for Dummies
By IBM | 28/2/2012
Business Process Management (BPM) can help improve an organisation’s efficiency, agility and profitability. BPM for Dummies provides straightforward information on how to get started on changing the way your organisation operates so it can better meets the needs of your clients.
Download this now

Case Study: A Strong Focus on Business Process Flow and Workload Optimisation
By IBM | 12/1/2011
This case study describes the challenges Swiss Re faced as it sought to drive down its heterogeneous systems computing costs. We show how Swiss Re plans to greatly reduce computing costs by uniting its infrastructure and management environment, and by focusing on assigning workloads to best-fit systems.
Download this now

Case Study: Bank of New Zealand Reduces Carbon Footprint with Red Hat on the Mainframe
By IBM | 7/11/2011
Like a large number of businesses in New Zealand and around the world, BNZ was close to reaching capacity in its datacenter and needed to determine how to maximise space while keeping costs down. “BNZ had defined two important goals for the future, both of which relied heavily on IT. The first was for the organisation to become carbon neutral by 2010 and the second was to explore open source opportunities though the adoption of Linux.” Another challenge BNZ faced was to create a disaster recovery solution. Its datacentres - one in Auckland, New Zealand and the other in East Melbourne, Australia are separated by the Tasman Sea.
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.


Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?