Conference Coverage

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

IBM roadmap of cloud, AI-enabled IT drives Think conference

Whether you run cloud, mainframe, client servers or all of the above, IT operations has evolved to be more data-driven, predictive and responsive. Think conference sessions cover the IBM roadmap for IT ops.


JPMorgan Chase feeds 24/7 IT monitoring data into a mainframe equipped with machine learning and data analytics to glean insights that improve app performance. HCL Technologies relies on DevOps and cutting-edge development and testing to collaborate effectively and maintain software quality. American Airlines refactored applications and provisioned Kubernetes clusters in production on platform as a service.

These enterprises, presenting at IBM Think in Las Vegas, March 19 to 22, are investing in IT automation, cloud computing and other technologies because the ROI is visible. But it isn't as simple as diving 100% into public cloud or scripting every step that admins take. IT organizations ready to modernize and improve operations should study the IBM roadmap for these trends to make informed strategy and tooling decisions that have the best payoff.

1On the IBM roadmap-

The full-stack future at IBM Think

IBM is launching the Think conference in 2018, combining topics as diverse as IT infrastructure and Watson-based chatbots. As IT operations teams grapple with the addition of container-based deployment, AI-based predictive analytics and incident response, and hybrid and multi-cloud, the IBM roadmap for products and services aims to address as many traditional and new -- and experimental -- IT trends as possible.


IBM pledges to protect data in era of Watson

IBM chairman and CEO Ginni Rometty discussed Watson's Law and the importance of data stewardship and security at the company's Think conference. Continue Reading


IBM researchers pump up blockchain, crypto

IBM Research unveiled several new projects, including security efforts around crypto anchors and lattice cryptography, at the IBM Think 2018 conference in Las Vegas. Continue Reading


IBM PartnerWorld 2018: A focus on new business models

IBM ecosystem: At IBM PartnerWorld 2018, IBM said it is pursuing a partner strategy that will accommodate a multitude of channel business models. Continue Reading


IBM Cloud Garage Method makes devs 'think' cloud

The IBM Cloud Garage Method helps developers 'think' and focus on building cloud projects that may start small, but can quickly move to enterprise scale. Continue Reading


IBM bolsters data security in its cloud services

The company will unveil a raft of improved IBM cloud services that will let large IT shops securely transfer data across both cloud and on-premises environments. Continue Reading


IBM Cloud needs to do more in these areas, analysts say

IBM Cloud services aren't often mentioned alongside the hyperscale providers, but here's what Big Blue shoulddo to get in that conversation. Continue Reading


SoftLayer, Bluemix anchor IBM's cloud strategy

With SoftLayer, IBM offers data center-bound users diverse cloud hosting options. With Bluemix, the company combines data services with cloud hosting for enterprises exploring next-gen workloads. Continue Reading


With Cloud Private, IBM appeases devs and infrastructure admins

IT organizations unable or unwilling to migrate to public cloud can use IBM Cloud Private for microservices, APIs and containers. The goal is cloud-native development firmly tied to the private data center. Continue Reading

Blog Post

A future built on cloud, AI and security

The IBM roadmap, as viewed through its patent filings, has shifted from chip-centric innovation to work on cloud architecture, AI technology and security offerings. Continue Reading


Big Blue clouds require big chip tech

To enhance its cognitive and AI-based cloud service offerings, IBM is rolling out a mix of processing and storage hardware that give its cloud systems sub-20-millisecond performance latencies. Continue Reading

2Turn ops data into answers-

Intelligent automation is a no-brainer

IT automation in and of itself can only improve speed, but with data analysis layered on top of automation, IT organizations can train systems to behave and react in certain ways. The data is there, but it isn't always easy to use.


Orchestrate automation to do less work

As automation replaces manual IT tasks, orchestration enables smarter and faster processes. Orchestrated IT prevents overlapping work and enforces corporate policies. Continue Reading


Smarter IT requires smarter IT admins

IT automation doesn't just eliminate repetitive tasks; nearly all platforms incorporate machine learning and AI technology to store and apply knowledge about the IT stack. That changes IT jobs in three areas. Continue Reading


Prevent an automated meltdown

Automation enables an IT organization to quickly propagate a mistake to all live systems, enhancing the disastrous consequences well beyond what manual updates can accomplish. If that sounds like a bad thing, use these techniques to avoid it. Continue Reading

3Private, public, multi, hybrid-

The many ways to approach cloud computing

Containerization and cloud computing enable scalable, portable applications and challenge IT operations organizations to apply consistent policies, ensure security and manage resources effectively.


Infinite resources + distributed applications = sprawl

Cloud-based container deployments can be the most efficient way to host an enterprise application: Low overhead combines with a model of pay only for what you use in infrastructure. Or they can be a money waste, with mismanaged container deployments racking up costs. Continue Reading


Master multi-cloud deployment

Multi-cloud deployments go against the grain of public cloud vendors, which favor differentiating service offerings over interoperability. Don't get caught up in vendor lock-in; instead, use tools and virtualization layers for flexibility. Continue Reading


Prepare to work for those cloud benefits

Cloud-native applications scale easily and change Capex to Opex, but they can't erase operations tasks and challenges. The ops team must license apps correctly for cloud bursts, shore up network capacity where needed and take on other responsibilities to manage cloud deployments. Continue Reading

4Less is more with DevOps tools-

When does DevOps become doable?

DevOps is supposed to make digital business better -- not necessarily easier. IT organizations face a mounting pile of DevOps tools, as well as communication sticking points and an information overload in the continuous improvement of continuous integration, delivery and deployment.


There's a DevOps tool for that

IT engineers love tools, and DevOps tools are easy to acquire. Exercise restraint, however, and you'll find a short list of DevOps tools can cover most, if not all, needs within the enterprise. Continue Reading


How tools influence culture

Developers and operations teams see the world in different ways. Your DevOps tool set can either foster this divide or bridge it. Continue Reading


How to source a toolchain

DevOps turns the way developers, testers and operations staff work upside down, and that includes a lot of the processes they used to get that work done. When selecting the right tools for DevOps processes, should you go cookie-cutter or custom? Continue Reading

5An eye on suspicious activity-

Watch and learn: The security approach aided by AI

IT organizations can track every move made by their users on applications, both internally and by external customers. All that data feeds smarter cybersecurity systems, which interpret threats and flag suspicious user activity.


I am not a robot

Authentication technology keeps malicious attackers -- and bumbling junior admins -- out of mission-critical systems. Do you trust identity and access management to an AI algorithm? Continue Reading


Fight threats with data sets

Security threats come on fast and mutate rapidly. To counteract them, IT organizations need anomaly detection, automated data analysis and the knowledge to wield the right tools against different kinds of threats. Continue Reading


Flag risky behavior before a breach

With the help of AI-enabled security tools, IT organizations can establish parameters for normal and abnormal user behavior, based on huge sets of data on user actions. Continue Reading

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.