Search

1 to 10 of 15
Sort by

Library Entry
The rise of industry clouds with IBM Cloud CTO Hillery Hunter

Listen now The name of the game in cloud today is flexibility and customization. Gone are the days when organizations had to wedge their requirements into a one-size-fits-all cloud implementation. In this episode, IBM Cloud VP and Chief Technology Officer Hillery Hunter joins host Dan...


Blog Entry
June IBM Champion Spotlight: Jason Juliano

For June, we’re shining the IBM Cloud Champion Spotlight on Jason Juliano, CEO of Aponia Data Solutions. Based in New York City, Jason has been an IBM Champion for three years. Bio: Jason Juliano is a results-driven technologist and leader in inventing “think big” strategies that shape...

Krista Summitt's profile image


Blog Entry
Migration of IBM Power & Storage On-prem IBM i or AIX systems to The IBM Cloud!

Migration of IBM Power & Storage On-prem IBM i or AIX systems to The IBM Cloud! The easiest way to get started in migrating from your on-prem environment to the IBM Power Virtual Server cloud service would be to work to define the following 3 topics: 1.) Take care of Advanced...

Travis Siegfried's profile image

Blog Entry
What is Multi-access Edge Computing?

Check out this new video from my friend and IBM Developer Advocate Dan Kehn as he explains multi-access edge computing. --Krista In this lightboard video, Dan Kehn with IBM Cloud, explains how multi-access edge computing is taking edge computing further to the outermost edge by placing...

Krista Summitt's profile image

Blog Entry
Open Source in the Cloud Era

This weekend has happened to be very entertaining. It was a very intense and useful experience exploring good articles about the Virtual Developer Week . And I also found a great report from O’Really and IBM done by Andy Oram called “ The value of Open Source in the Cloud Era ” . It...

Salomé Valero's profile image



Blog Entry
Zero-trust security model in IBM cloud

Zero-trust is assuming security breaches will happen on each layer of a deployment: Internet, identity and access management, network, and encryption, just to name a few. Existing cloud applications rely as well on containers and the infrastructure use multi and hybrid cloud. So how will cloud...

Michel Roukos's profile image