IBM TechXchange Community Together, we can connect via forums, blogs, files and face-to-face networking. Find your community
In March, as a response to Executive Order (EO) 14110, Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, the U.S. Department of Treasury released the Managing Artificial Intelligence-Specific Cybersecurity Risks in the Financial Services Sector report . The report...
IBM TechXchange Conference 2024 is all about learning about the latest technology innovations, growing your expertise and connecting with other users who share your passion for IBM products. Are you accelerating hybrid cloud and AI with IBM Storage products? We want to hear about your...
Today, enterprises are increasingly facing geographic requirements around sovereignty. With the rise of AI, navigating these requirements is becoming even more important. The influx of data associated with AI is certainly poised to fuel tremendous business innovations, but requires strategic...
The need for efficient and automated observability solutions is more critical than ever as technology adoption has surged, bringing forth new platforms such as microservices, Kubernetes, and cloud-native applications. Developers, Engineers, and IT operations face complex challenges in monitoring...
Recently IBM Redbooks team published the following IBM Redpaper: “IBM FlashCore Module (FCM) Product Guide: Features the newly available FCM4 with AI-powered ransomware detection” https://www.redbooks.ibm.com/abstracts/redp5725.html . This Product Guide describes the IBM...
The NIST Cybersecurity Framework (NIST CSF) provides comprehensive guidance and best practices that private sector organizations like financial institutions can follow to improve information security and cybersecurity risk management. IBM Distinguished Engineer, Jeff Crume, walks us through...
IBM recently announced its fourth generation of our FlashCore Module (FCM) technology. Those of you that have been around IBM storage will know that the FCM in their current format were first introduced in 2018 and were the first truly computation storage device that managed to be packed into...
IBM Storage Ceph Object Storage Attribute-based Access Control (ABAC) Authorization Introduction In the current era of technology, safeguarding confidential data is of utmost importance. With the advent of cloud technology, establishing efficient access control mechanisms to...
In case you missed NRF, we want to recap of the information and demo content that was shown at NRF, specifically focused on IBM Supply Chain Sustainability Brand. Please enjoy this prerecorded Informercial Video showcasing IBM Sterling Intelligent Promising and Integration with IBM...
In part2 of this series we explained how to deploy and use NooBaa in an IBM Storage Scale cluster. In this part 3 of the series, we elaborate on tiering objects from the file system to tape using IBM Storage Archive. The tiering capabilities rely on the IBM Storage Scale policy engine and...
2 Comments - no search term matches found in comments.