News

ITIC 2024 Sexual Harassment, Gender Bias & Equal Pay Survey

This survey polls professional women (including students and interns) in Science, Technology, Engineering, and Math (STEM) disciplines on their real-world experiences dealing with the very serious issues of Sexual Harassment, Gender Bias, and Equal Pay in the workplace and how they deal with them.

 

Take the survey here: https://www.surveymonkey.com/r/VWXRC97

 

Leave a comment along with your email address for a chance to win one of three (3) $100 Amazon gift cards.

All responses are confidential.

 

 

ITIC 2024 Sexual Harassment, Gender Bias & Equal Pay Survey Read More »

ITIC 2023 Reliability Survey IBM Z Results

The IBM z16 mainframe lives up to its reputation for delivering “zero downtime.”

 

The latest z16 server, introduced in April 2022, delivers nine nines—99.9999999%—of uptime and reliability. This is just over 30 milliseconds – 31.56 milliseconds to be precise – of per server annual downtime, according to the results of the ITIC 2023 Global Server Hardware, Server OS Reliability Survey.

ITIC’s 2023 Global Server Hardware, Server OS Reliability independent web-based survey polled nearly 1,900 corporations worldwide across over 30 vertical market segments on the reliability, performance and security of the leading mainstream on-premises and cloud-based servers from January through July 2023. To maintain objectivity, ITIC accepted no vendor sponsorship.

ITIC’s 2023 Global Server Hardware, Server OS Reliability survey also found that an 88% majority of the newest IBM Power10 server (shipping since September 2021) users say their organizations achieved eight nines—99.999999%—of uptime. This is 315 milliseconds of unplanned, per server, per annum outage time due to underlying system flaws or component failures. So, Power10 corporate enterprises spend just $7.18 per server/per year performing remediation due to unplanned server outages that occurred due to inherent flaws in the server hardware or component parts.

The IBM z16 and Power 10 server-specific uptime statistics were obtained by breaking out the results of more than 200 respondent organizations that deployed the z16 since it began shipping in April/May 2022. A 96% majority of these z16 enterprises say their businesses achieved nine
nines—99.9999999%—of server uptime. This is the equivalent of a near-imperceptible 31.56 milliseconds of per server annual downtime due to any inherent flaws in the server hardware and its various components (See Table 1).

An IBM spokesperson says that currently the IBM Z mainframe achieves an average of “eight nines” or 99.999999% reliability overall and that statistic includes the various versions (the z13, z14, z15 and z16) of its mainframe enterprise system. IBM has not yet reviewed ITIC’s independent survey data on the z16 results.

To put these statistics into perspective: The latest z16 corporate enterprises and their IT managers spend mere pennies per server/per year performing remediation activities due to unplanned per server outages that occurred due to inherent system failures.

This is the 15th consecutive year that the IBM Z and IBM Power Systems have dominated with the best across-the-board uptime reliability ratings among 18 mainstream distributions.

Additionally, the z16 customers say their firms experienced a 20% to 30% improvement in overall reliability, performance, response times and critical security metrics versus older iterations of the zSystems platforms.

Previous versions of the IBM Z mainframe—the z13, z14 and z15—always delivered best-in-class reliability. ITIC’s 2023 Global Reliability study found that the aggregate average results from all z13, z14 and z15 customers ranged between seven and eight nines of uptime depending on the version, age, server configurations and specific use cases.

There is an order of magnitude of that distinguishes the “nines” of uptime and reliability. For example, four nines of uptime—which is the current acceptable level of uptime for many mainstream businesses—equals 52.56 minutes of unplanned annual per server downtime. In contrast, five nines of uptime is the equivalent of just 5.26 minutes of unplanned annual per server downtime.

Meanwhile, the fault-tolerant levels of reliability – seven and eight nines, 99.99999% and 99.999999% represent 3.15 seconds and 315 milliseconds, respectively of unplanned per server annual outages due to server or component failures.

 

The z16: A Quantum Leap Forward in Reliability, Performance and Cloud Functionality

 

The IBM Z mainframes have always delivered best-in-class reliability, performance and security. However, the z16 quite literally takes a quantum leap forward by providing advanced capabilities like on-chip AI inferencing and quantum-safe computing.

The IBM z16 and Power10 servers also delivered the strongest server security, experiencing the fewest number of successful data breaches, the least amount of downtime due to security-related incidents and the fastest mean time to detection (MTTD). ITIC’s latest 2023 Global Server Hardware Security Survey found that 97% of IBM z16 enterprises were able to detect, isolate and shut down attempted data breaches immediately to within the first 10 minutes. Additionally, 92% of IBM Power10 customers detected and repelled attempted hacks immediately to within the first 10 minutes. An organization’s ability to identify and thwart security breaches, minimizes downtime, saves money and mitigates risk.

ITIC’s 2023 survey data found that 84% of respondent enterprises cited security issues as the top cause of unplanned downtime. And 67% of respondents cite human error as the cause of unplanned server and application outages. Human error encompasses everything from accidentally disconnecting a server, to misconfiguration issues and incompatibilities among disparate hardware and application and server OS software to failure to properly right size the server to adequately accommodate mission critical workloads.

Overall, the IBM z16 offers near perfect reliability and the most incredibly robust mainstream security available today.

ITIC 2023 Reliability Survey IBM Z Results Read More »

De-mystifying Cloud Computing: the Pros and Cons of Cloud Services

 

Cloud computing has been a part of the corporate and consumer lexicon for the past 15 years. Despite this, many organizations and their users are still fuzzy on the finer points of cloud usage and terminology.

De-mystifying the cloud

So what exactly is a cloud computing environment?

The simplest and most straightforward definition is that a cloud is a grid or utility style pay-as-you-go computing model that uses the web to deliver applications and services in real-time.

Organizations can opt to deploy a private cloud infrastructure where they host their services on-premise from behind the safety of the corporate firewall. The advantage here is that the IT department always knows what’s going on with all aspects of the corporate data from bandwidth and CPU utilization to all-important security issues.

Alternatively, organizations can choose a public cloud deployment in which a third party vendor like Amazon Web Services (AWS), Microsoft Azure, Google Cloud, IBM Cloud, Oracle Cloud and other third parties host the services at an off-premises remote location. This scenario saves businesses money and manpower hours by utilizing the host provider’s equipment and management. All that’s needed is a web browser and a high-speed internet connection to connect to the host to access applications, services and data.

However, the public cloud infrastructure is also a shared model in which corporate customers share bandwidth and space on the host’s servers. Enterprises that prioritize privacy and require near impenetrable security and those that require more data control and oversight, typically opt for a private cloud infrastructure in which the hosted services are delivered to the corporation’s end users from behind the safe confines of an internal corporate firewall. However, a private cloud is more than just a hosted services model that exists behind the confines of a firewall. Any discussion of private and/or public cloud infrastructure must also include virtualization. While most virtualized desktop, server, storage and network environments are not yet part of a cloud infrastructure, just about every private and public cloud will feature a virtualized environment.

Organizations contemplating a private cloud also need to ensure that they feature very high (near fault tolerant) availability with at least “five nines” or “six nines – 99.999% or 99.9999% and even true fault tolerant “seven nines” – 99.99999% uptime to ensure uninterrupted operations.

Private clouds should also be able to scale dynamically to accommodate the needs and demands of the users. And unlike most existing, traditional datacenters, the private cloud model should also incorporate a high degree of user-based resource provisioning. Ideally, the IT department should also be able to track resource usage in the private cloud by user, department or groups of users working on specific projects for chargeback purposes. Private clouds will also make extensive use of AI, analytics, business intelligence and business process automation to guarantee that resources are available to the users on demand.

All but the most cash-rich organizations (and there are very few of those) will almost certainly have to upgrade their network infrastructure in advance of migrating to a private cloud environment. Organizations considering outsourcing any of their datacenter needs to a public cloud will also have to perform due diligence to determine the bona fides of their potential cloud service providers.

In 2022 and beyond, a hybrid cloud environment is the most popular model, chosen by over 75% of corporate enterprises. The hybrid cloud theoretically gives businesses the best of both worlds: with some services and applications being hosted on a public cloud while other specific, crucial business applications and services in a private or on-premises cloud behind a firewall.

Types of Cloud Computing Services

There are several types of cloud computing models. They include:

  • Software as a Service (SaaS) which utilizes the Internet to deliver software applications to customers. Examples of this are Salesforce.com, which has one of the most popular, widely deployed, and the earliest cloud-based CRM application and Google Apps, which is among the market leaders. Google Apps comes in three editions—Standard, Education and Premier (the first two are free). It provides consumers and corporations with customizable versions of the company’s applications like Google Mail, Google Docs and Calendar.
  • Platform as a Service (PaaS) offerings; examples of this include the above-mentioned Amazon Web Services and Microsoft’s top tier Azure Platform. The Microsoft Azure offering contains all the elements of a traditional application stack from the operating system up to the applications and the development framework. It includes the Windows Azure Platform AppFabric (formerly .NET Services for Azure) as well as the SQL Azure Database service. Customers that build applications for Azure will host it in the cloud. However, it is not a multi-tenant architecture meant to host your entire infrastructure. With Azure, businesses rent resources that will reside in Microsoft datacenters. The costs are based on a per usage model. This gives customers the flexibility to rent fewer or more resources depending on their business needs.
  • Infrastructure as a Service (IaaS) is exactly what its name implies: the entire infrastructure becomes a multi-tiered hosted cloud model and delivery mechanism. Public, private and hybrid should all be flexible and agile. The resources should be available on demand and should be able to scale up or scale back as business needs dictate.
  • Serverless This is a more recent technology innovation. And it can be a bit confusing to the uninitiated. A Serverless cloud is a cloud-native development model that enables cloud   developers to build and run applications without having to manage servers. The developers do not manage, provision or maintain the servers when deploying code. The actual code execution is fully managed by the cloud provider, in contrast to the traditional method of writing and developing applications and then deploying them on a servers. To be clear, there are still servers in a serverless model, but they are abstracted away from application development.

Cloud computing—pros and cons

Cloud computing like any technology is not a panacea. It offers both potential benefits as well possible pratfalls. Before beginning any infrastructure upgrade or migration, organizations are well advised to gather all interested parties and stakeholders and construct a business plan that best suits their organization’s needs and budget. When it comes to the cloud, there are no absolutes. Many organizations will have hybrid clouds that include public and private cloud networks. Additionally, many businesses may have multiple cloud hosting providers present in their networks. Whatever your firm’s specific implementation it’s crucial to create a realistic set of goals, a budget and a deployment timetable.

Prior to beginning any technology migration organizations should first perform a thorough inventory and review of their existing legacy infrastructure and make the necessary upgrades, revisions and modifications. All stakeholders within the enterprise should identify the company’s current tactical business goals and map out a two-to-five year cloud infrastructure and services business plan. This should incorporate an annual operational and capital expenditure budget. The migration timetable should include server hardware, server OS and software application interoperability and security vulnerability testing; performance and capacity evaluation and final provisioning and deployment.

Public clouds—advantages and disadvantages

The biggest allure of a public cloud infrastructure over traditional premises-based network infrastructures is the ability to offload the tedious and time consuming management chores to a third party. This in turn can help businesses:

 Shave precious capital expenditure monies because they avoid the expensive investment in new equipment including hardware, software and applications as well as the attendant configuration planning and provisioning that accompanies any new technology rollout.

Accelerated deployment timetable. Having an experienced third party cloud services provider do all the work also accelerates the deployment timetable and most likely means less time spent on trial and error.

Construct a flexible, scalable cloud infrastructure that is tailored to their business needs. A company that has performed its due diligence and is working with an experienced cloud provider can architect a cloud infrastructure that will scale up or down according to the organization’s business and technical needs and budget.

 

Public Cloud Downsides

Shared Tenancy: The potential downside of a public cloud is that the business is essentially “renting” or sharing common virtualized servers and infrastructure tenancy with other customers. This is much like being a tenant in a large apartment building. Depending on the resources of the particular cloud model, there exists the potential for performance, latency and security issues as well as acceptable response, and service and support from the cloud provider.

Risk: Risk is another potential pitfall associated with outsourcing any of your firm’s resources and services to a third party. To mitigate risk and lower it to an acceptable level, it’s essential that organizations choose a reputable, experienced third party cloud services provider very carefully. Ask for customer references. Cloud services providers must work closely and transparently with the corporation to build a cloud infrastructure that best suits the business’ budget, technology and business goals. To ensure that the expectations of both parties are met, organizations should create a checklist of items and issues that are of crucial importance to their business and incorporate them into service level agreements (SLAs). Be as specific as possible. These should include but are not limited to:

  • What types of equipment do they use?
  • How old is the server hardware? Is the configuration powerful enough?
  • How often is the data center equipment/infrastructure upgraded?
  • How much bandwidth does the provider have?
  • Does the service provider use open standards or is it a proprietary datacenter?
  • How many customers will you be sharing data/resources with?
  • Where is the cloud services provider’s datacenter physically located?
  • What specific guarantees, if any, will it provide for securing sensitive data?
  • What level of guaranteed response time will it provide for service and support?
  • What is the minimum acceptable latency/response time for its cloud services?
  • Will it provide multiple access points to and from the cloud infrastructure?
  • What specific provisions will apply to Service Level Agreements (SLAs)?
  • How will financial remuneration for SLA violations be determined?
  • What are the capacity ceilings for the service infrastructure?
  • What provisions will there be for service failures and disruptions?
  • How are upgrade and maintenance provisions defined?
  • What are the costs over the term of the contract agreement?
  • How much will the costs rise over the term of the contract?
  • Does the cloud service provider use the Secure Sockets Layer (SSL) and state of the art AES encryption to transmit data?
  • Does the cloud services provider encrypt the resting data to prohibit and restrict access?
  • How often does the cloud services provider perform audits?
  • What mechanisms will it use to quickly shut down a hack, and can it track a hacker?
  • If your cloud services provider is located outside your country of origin, what are the privacy and security rules of that country and what impact will that have on your firm’s privacy and security issues?

Finally, the corporation should appoint a liaison who meets regularly with the designated counterpart at the cloud services provider. While a public cloud does provide managed hosting services,  that does not mean the company should forget about it as though their data assets really did reside in an amorphous cloud! Regular meetings between the company and its cloud services provider will ensure that the company attains its immediate goals and that it is always aware and working on future technology and business goals. It will also help the corporation to understand usage and capacity issues and ensure that its cloud services provider(s) meets SLAs. Outsourcing any part of your infrastructure to a public cloud does not mean forgetting and abandoning it.

Private clouds—advantages and disadvantages

The biggest advantage of a private cloud infrastructure is that your organization retains control of its corporate assets and can safeguard and preserve its privacy and security. Your organization is in command of its own destiny. That can be a double-edged sword.

Before committing to build a private cloud model the organization must do a thorough assessment of its current infrastructure, its budget, and the expertise and preparedness of its IT department. Is your firm ready to assume the responsibility for such a large burden from both a technical and ongoing operational standpoint? Only you can answer that. Remember that the private cloud should be highly reliable and highly available—at least 99.999% uptime with built-in redundancy and failover capabilities. Many organizations struggle to attain and maintain 99.99% uptime and reliability which is the equivalent of 8.76 hours of per server, per annum downtime. When your private cloud is down for any length of time, your employees, business partners, customers and suppliers will be unable to access resources.

Private Cloud Downsides

The biggest potential upside of a private cloud is also potentially it’s biggest disadvantage. Namely: that the onus falls entirely on the corporation to achieve the company’s performance, reliability and security goals. To do so, the organization must ensure that its IT administrators and security professionals are up to date on training and certification. To ensure optimal performance, the company must regularly upgrade and rightsize its servers and stay current on all versions of mission critical applications – particularly with respect to licensing, compliance and installing the latest patches and fixes. Security must be a priority! Hackers are professionals. And hacking is big business. The hacks themselves — ransomware, Email phishing scams, CEO fraud etc. are more pervasive and more pernicious. And the cost of hourly downtime is more expensive than ever. ITIC’s latest survey data shows that 91% of midsize and large enterprises estimate that the average cost of a single hour of downtime is $300,000 or more. These statistics are just industry averages. They do not include any additional costs a company may incur due to penalties associated with civil or criminal litigation or compliance penalties. In other words: in a private cloud, the buck stops with the corporation.

Realistically, in order for an organization to successfully implement and maintain a private  cloud, it needs the following:

  • Robust equipment that can handle the workloads efficiently during peak usage times.
  • An experienced, trained IT staff that is familiar with all aspects of virtualization, virtualization management, grid, utility and chargeback computing models.
  • An adequate capital expenditure and operational expenditure budget.
  • The right set of private cloud product offerings and service agreements.
  • Appropriate third party virtualization and management tools to support the private cloud.
  • Specific SLA agreements with vendors, suppliers and business partners.
  • Operational level agreements (OLAs) to ensure that each person in the organization is responsible for specific routine tasks and in the event of an outage.
  • A disaster recovery and backup strategy.
  • Strong security products and policies.
  • Efficient chargeback utilities, policies and procedures.

Other potential private cloud pitfalls include; deciding which applications to virtualize, vendor lock-in and integration, and interoperability issues. Businesses grapple with these same issues today in their existing environments.

Conclusions

Hybrid, public and private cloud infrastructure deployments will continue to experience double digit growth for the foreseeable future. The benefits of cloud computing will vary according to individual organization’s implementation. Preparedness and prior to deployment are crucial. Cloud vendors are responsible for maintaining performance, reliability and security. However, corporate enterprises cannot simply cede total responsibility to their vendor partners because the data assets are housed off-premises. Businesses must continue to perform their due diligence. All appropriate corporate enterprise stakeholder must regularly review and monitor performance and capacity; security; compliance and SLA results – preferably on a quarterly or semi-annual basis. This will ensure your organization achieves the optimal business and technical benefits. Keeping a watchful eye on security is imperative. Cloud vendors and businesses must work in concert as true business partners to achieve optimal TCO and ROI and mitigate risk.

De-mystifying Cloud Computing: the Pros and Cons of Cloud Services Read More »

Security, Data Breaches Top Cause of Downtime in 2022

A 76% majority of corporations cite Security and Data Breaches as the top cause of server, operating system, application and network downtime, according to ITIC’s latest 2022 Global Server Hardware Security survey which polled 1,300 businesses worldwide.

Security is a technology and business issue that impacts all enterprises. Some 76% of respondents cited security and data breaches as the greatest threat to server, application, data center, network edge and cloud ecosystem stability and reliability (See Exhibit 1). This is a three-fold increase from the 22% of ITIC corporate survey respondents who said security negatively impacted server and network uptime reliability in 2012. The hacks are more targeted, pervasive and pernicious. They are also more expensive and designed to inflict maximum damage and losses on their enterprise and consumer victims.

 

 

Security has a major impact on businesses of all sizes and across all vertical markets. In 2022 nine-in-10 companies estimate that server hardware and server OS security have a significant impact on overall network reliability and daily transactions (See Exhibit 2).

Mean Time to Detection is a Critical Barometer

 

Security hacks and data breaches are a fact of doing business in the digital age.  It’s BIG business for hackers and cyber criminals. At some point, every organization and its critical main line of business servers, server operating systems and applications will be the victims of an attempted or successful data breach of some type.

Data Breaches and Downtime Costs Soar

In 2021 the average cost of a successful data breach increased to $4.24 million (USD); this is a 10% increase from $3.86 million in 2020, according to the 2021 Cost of a Data Breach Study, jointly conducted by IBM and the Ponemon Institute. The $4.24 million average cost of a single data breach is the highest number in the 17 years since IBM and Pokemon began conducting the survey. It represents an increase of 10% in the last 12 months and 20% over the last two years.

The FBI’s 2021 Internet Crime Report, released in March 2022, found that Internet cyber crimes cost Americans $6.9 billion last year. This is more than triple the $2 billion in losses reported in 2020. According to the FBI, it received 847,376 complaints of suspected internet crime; this is a seven percent (7%) compared to 2020.

The FBI 2021 Internet Crime Report said the top three cyber crimes reported by victims in 2021 were: “phishing scams, non-payment/non-delivery scams, and personal data breach. Victims lost the most money to business email compromise scams, investment fraud, and romance and confidence schemes.”

ITIC’s 2022 Global Server Hardware Security survey findings underscore the expensive nature of cyber crime. ITIC’s latest research shows the Hourly Cost of Downtime now exceeds $300,000 for 91% of SME and large enterprises. Overall, 44% of mid-sized and large enterprise survey respondents reported that a single hour of downtime, can potentially cost their businesses over one million ($1 million).

Organizations must rely on strong embedded server and infrastructure security that recognizes the danger, sends alerts and alarms and that possess the ability to isolate the threats. Strong preparedness on the part of the corporation and having a well trained staff of security professionals and IT administrators are of paramount importance.

The more quickly the company’s servers and software can detect a security issue and respond to it, the greater the chances of isolating and thwarting the attack before it can infiltrate the network ecosystem, interrupt data transactions and daily operations and access sensitive data and IP.

Robust security is comprised of two things: solid security products AND strong security policies and procedures administered and monitored by proactive and trained security professionals.

 

Security, Data Breaches Top Cause of Downtime in 2022 Read More »

IBM’s New z16 Aims for the Cloud; Delivers Quantum-safe Cryptography & AI on-Chip Inferencing

IBM has once again outdone itself with its latest z16 mainframe server.

This latest offering has it all: unbreakable security; fast low-latency performance; top notch, easy-to-use analytics and true fault tolerant reliability that provides the lowest total cost of ownership (TCO) and immediate return on investment (ROI) among 15 mainstream servers, industrywide.

The new IBM z16 delivers a cornucopia of embedded, and enhanced functions. This includes hardened security, leading edge AI and performance improvements. The result: the z16 delivers even greater cost efficiencies and a solid “seven nines” – 99.99999% – of uptime and reliability. The AI on-chip inferencing is icing on the cake. It makes readily accessible for all employees — not just data scientists.

The IBM z16 is indisputably the most powerful enterprise system from the zSystems family, to date. It incorporates 7nm technology with clock speeds of 5.2GHz, and it supports a maximum of 200 cores and up to 40TB of memory. According to IBM, this results in 25% more processor capacity per drawer and an 11% per core performance improvement. Overall, IBM said the z16 will deliver 40% better performance than the prior z15 models. And it’s engineered for hybrid cloud environments and provides interoperability with a wide range of environments including Linux and open source.

As impressive as those performance statistics are, the immediate and strategic impact of the IBM z16 is far more than a laundry list of “speeds and feeds.”

In a pre-briefing with analysts Ross Mauri, General Manager of IBM zSystems and LinuxONE, said IBM designed the IBM z16 to address enterprise customers’ need for top notch system performance, resiliency, security/data privacy and protection; dedicated workload accelerators and optimization across IBM’s entire product stack. Barry Baker, VP of Product Management for IBM zSystems said the openness of the IBM z16 enterprise system in supporting multiple operating system environments including Linux, z/OS and a variety of open source distributions like Ubuntu is a win for customers.
Mauri and Baker said the IBM z16 delivers automation, predictive and security capabilities across environments to help enterprise customers on their journey to hybrid cloud and AI. “We are focused on the entire ecosystem. IBM’s strategy has the zSystems platform integrated throughout our products and services offerings to build more value to our clients,” Mauri said.

IBM’s z16 addresses all of the hot button issues confronting organizations in the digital age: AI; performance and low latency; resiliency/security; hybrid cloud; workload optimization; cost efficiencies; interoperability and application modernization.

IBM z16 Quantum Cryptographic Security and AI on-chip Inferencing
The IBM z16 also includes several ground-breaking technology “firsts.” Two of the most noteworthy are the AI on-chip inferencing function and the quantum-safe cryptographic security capability.
The AI on-chip inferencing, which is available at no extra cost, is “a game changer”, IBM executives said. It can deliver up to 300 billion deep learning inference operations per day with 1ms response time. IBM executives also said that the IBM z16’s accelerated on-chip AI “effectively eliminates” latency in inferencing. The result: businesses can cut through the data deluge and predict and automate for “increased decision velocity.” It enables even “non data scientist” customers and users to analyze data and derive insights at heretofore unprecedented speeds. Additionally, leveraging AI in routine daily operational processes can proactively assist businesses to take preventive actions, like identifying and stopping outages before they occur.

AI on-chip inferencing can assist customers in preventing fraud before it happens by scoring up to 100% of transactions in real-time without impacting Service Level Agreements (SLAs) and helps companies keep up to date on fast-changing regulatory issues. The AI on-chip inferencing can also assist companies with compliance; automating the process to allow firms to cut audit preparation time from one month to one week to maintain compliance and avoid fines and penalties.

On the security front, the IBM z16 takes the pervasive encryption introduced in the z14 model and z15 System Recovery Boost and turbo charges it with quantum-safe cryptographic security. The z14 pervasive encryption model provided security at every layer of the stack. The z15 System Recovery Boost capability allowed businesses to drastically reduce the time it takes to shutdown, restart and process the backlog that occurred during a system outage.

Quantum-safe cryptography is as close to unbreakable or impenetrable encryption as a system can get. It uses quantum mechanics to secure and transmit data in a way that cannot be hacked (at least not yet).

The IBM z16 is the preeminent mainstream server platform for digital enterprises requiring nothing less than seven nines – 99.99999% — best-in-class fault tolerant reliability; quantum cryptographic security and AI on-chip acceleration across multi platforms from datacenters to hybrid clouds and the network edge while delivering the lowest TCO and immediate ROI.

IBM’s New z16 Aims for the Cloud; Delivers Quantum-safe Cryptography & AI on-Chip Inferencing Read More »

44% of enterprises say hourly downtime costs top $1 million—with COVID-19, security hacks and remote working as driving factors

https://techchannel.com/Enterprise/02/2019/cost-enterprise-downtime?microsite=HA-DR-For-Your-Business

44% of enterprises say hourly downtime costs top $1 million—with COVID-19, security hacks and remote working as driving factors

44% of enterprises say hourly downtime costs top $1 million—with COVID-19, security hacks and remote working as driving factors Read More »

IBM Bets Big on Cloud, Buys Red Hat for $34B

IBM will acquire open source software and cloud services company Red Hat in a $34B all-cash deal – approximately $190 per share – executives for both firms announced during a joint Monday morning Webcast.

Once the acquisition is complete sometime in the latter half of 2019,Red Hat will become a standalone business unit within IBM’s Hybrid Cloud Team, both companies said in a joint press release. This will preserve the “independence and neutrality” of Red Hat’s open source development heritage and commitment, current product portfolio and go-to-market strategy, and unique development culture. Red Hat will continue to be led by current CEO and president Jim Whitehurst and its current management team. Whitehurst will join IBM’s senior management team and report to IBM chairman, president and chief executive Virginia “Ginni”Rometty. IBM executives said during the Webcast that it intends to maintain Red Hat’s current Research Triangle Park, N.C. headquarters, facilities, brands and practices.

Rometty heralded the Red Hat acquisition as a “game changer” and said it’s all about “resetting the cloud landscape.” IBM’s $34B purchase of Red Hat will be the biggest acquisition in the company’s 107-year history and the price tag equals one-third of IBM’s $105.38B total market valuation.

Rometty clearly feels Red Hat is worth the investment. On Monday’s Webcast she stated that the deal will make “IBM and Red Hat the undisputed Number One leader in hybrid cloud. Our IBM cloud platform is growing like crazy,” Rometty said, adding that “Hybrid cloud is an emerging $1 trillion market.”

The acquisition has been approved by the boards of directors of both IBM and Red Hat. It is subject to Red Hat shareholder approval. It also is subject to regulatory approvals and other customary closing conditions. Meanwhile, IBM intends to suspend its share repurchase program in 2020 and 2021.At signing, IBM has ample cash, credit and bridge lines to secure the transaction financing. The company intends to close the transaction through a combination of cash and debt.

During the Webcast, Rometty made the case for growth in the hybrid cloud market segment claiming that “most companies today are only 20 percent along” their cloud journey, renting compute power to cut costs. The next 80 percent is about unlocking real business value and driving growth. “This is the next chapter of the cloud. It requires shifting business applications to hybrid cloud, extracting more data and optimizing every part of the business, from supply chains to sales,” Rometty said.

Red Hat’s Whitehurst was equally enthusiastic about the forthcoming IBM acquisition. “Joining forces with IBM will provide us with a greater level of scale, resources and capabilities to accelerate the impact of open source as the basis for digital transformation and bring Red Hat to an even wider audience – all while preserving our unique culture and unwavering commitment to open source innovation.”

Throughout the webcast, IBM Senior Vice President of Hybrid Cloud Arvind Krishna and Red Hat Executive Vice President and President of Products and Technologies Paul Cormier emphasized that it would be business as usual with both IBM and Red Hat continuing to honor existing business commitments and partnerships with other firms.

The executives said all of Red Hat’s existing partnerships with other cloud providers including those with major cloud providers such as Amazon Web Services, Microsoft Azure, Google Cloud, Alibaba and more, in addition to the IBM Cloud will remain in place. At the same time, Red Hat will benefit from IBM’s hybrid cloud and enterprise IT scale in helping expand its open source technology portfolio to businesses globally.Red Hat will also continue its open source development projects such as Red Hat Enterprise Linux (RHEL), the OpenShift implementation of Kubernetes-based containers, and the OpenStack cloud computing platform. Similarly, Krishna said, IBM would continue its partnerships with other Linux distributions.

“IBM is committed to being an authentic multi-cloud provider, and we will prioritize the use of Red Hat technology across multiple clouds,” said Arvind Krishna, Senior Vice President, IBM Hybrid Cloud. “In doing so, IBM will support open source technology wherever it runs, allowing it to scale significantly within commercial settings around the world.”

Analysis

The synergies between IBM and Red Hat are obvious.

It’s very apparent the appeal that Red Hat holds for IBM and vice versa.

The two firms are starting from a strong, solid foundation. They’ve been doing business for over two decades. In recent years, Red Hat has expanded its Red Hat Enterprise Linux (RHEL) operating system distribution and services to run on IBM’s POWER servers and z System mainframes. It’s an alliance that has served both firms well.

“Red Hat is not an open source company. We’re an enterprise software company with an open source development model. Our secret sauce is putting those two things together,” Red Hat’s Cormier noted on Monday’s Webcast. “IBM,” he added, “also has a long history of enterprise-grade software and open source development. So, the two companies have a lot in common.”

IBM now wants to capitalize on that commonality in a very big way. It’s no secret that Big Blue’s cloud growth has lagged behind behemoths like Amazon, Google and Microsoft. A 2018 State of the Cloud Report by Rightscale, a cloud management firm, which surveyed 1,000 users, rated IBM as a number four cloud service provider behind Amazon, Microsoft and Google. The Rightscale study also showed that IBM cloud deployment was occurring at a slower pace than the other three market leaders. The Red Hat purchase could serve to accelerate IBM’s cloud deployments and close the gap between IBM, Amazon, Microsoft and Google.

Red Hat helps IBM to grow its cloud business on all fronts: private, public and hybrid clouds since Red Hat built its model on open source and open standards and a very active open source developer community. This stands in stark contrast to the proprietary offerings of Microsoft, Amazon, Google, Oracle and other players.Both IBM and Red Hat can leverage their core strengths in Linux, Kurbernetes, cloud management and service and support. Additionally, Red Hat will have access to IBM’s strong, deep ties to the channel which should enable it to close enterprise deals worldwide and give Red Hat’s product portfolio much greater exposure.

Another plus is IBM’s proven track record with open source. IBM has made numerous royalty-free patent contributions to the Open Invention Network to support development of the Linux platform as well as contributions to Java and the Eclipse development platform, so all of this should stand it in good stead as it moves to embrace and expand its hybrid cloud initiatives.

IBM and Red Hat By the Numbers: Betting Big on the Cloud

The biggest question from investors and analysts following the merger announcement: is whether Red Hat, a company with approximately one-fourth IBM’s valuation is worth the $34B purchase price?

Based on IBM’s perspective of gaining a competitive cloud advantage the answer is a resounding “Yes.”  

Consider that just 18 months ago, Red Hat CEO Whitehurst revealed in a quarterly analyst call that the firm’s biggest deal worth over $20M, came from Linux. But in the last year Red Hat’s top two dozen deals totaling $5M or more were attributable to its OpenShift offering. The OpenShift Container Platform (formerly known as OpenShift Enterprise) is Red Hat’s on-premises private platform as a service product, built around a core of application containers powered by Docker, with orchestration and management provided by Kubernetes, on a foundation of Red Hat Enterprise Linux.  IBM hopes that the combination of its own and Red Hat cloud open source offerings and services sold through its worldwide channel will enable it to expand its presence among enterprises seeking to move their datacenters to the cloud.

Ironically, in the immediate aftermath of the announcement IBM’s stock price declined by 3.54 percent and was trading at $115.40 at Tuesday’s market close, while Red Hat’s stock rose slightly to $170 at Tuesday’s market close. Now, a week later, IBM’s stock price rebounded to $120, but it is still trading well below its 52-week high of $171. Red Hat’s stock meanwhile, continues to climb and gained another three dollars closing at $173.31 after the bell on November 5.

As Exhibits 1 and 2 below illustrate, IBM and Red Hat’s financials each face challenges going forward – specifically in terms of jump starting quarterly revenue and income growth. IBM is also facing pressure to increase its stock price which is now trading at the lower end of its 52-week low of 114.

 

Exhibit 1. IBM by the Numbers

IBM Financials, R&D Spending and Patents 2017 – 2018
Current Stock Price as of 11/5/2018
$120.06 (US)
Market Capitalization $109.11 Billion
Profit Margin 7.12%
Operating Margin 15.14%
Return on Assets 6.24%
Return on Equity 28.82%
Revenue $80.37B
Quarterly Revenue Growth -2.10%
Net Income $5.72B
Quarterly Earnings Growth -1.20%
Total Cash $14.49B
Total Debt $46.92B
Total Global Workforce 380,300
Research & Development Spending $5.6B
 

Number of Patents

9,043 patents awarded in 2017 nearly half

in AI, cloud, blockchain, quantum & security.

Nearly 780,000 total Patents

Source: ITIC

Exhibit 2. Red Hat by the Numbers

Red Hat Financials, R&D Spending and Patents 2017 – 2018
Current Stock Price as of 11/5/2018
$173.31 (US)
Market Capitalization $30.6 Billion
Profit Margin 9.08%
Operating Margin 15.73%
Return on Assets 6.57%
Return on Equity 21.30%
Revenue $3.16B
Quarterly Revenue Growth 13.70%
Net Income $286.44M
Quarterly Earnings Growth -10.50%
Total Cash $1.77B
Total Debt $516.53M
Total Global Workforce 12,600
Research & Development Spending $578.33M
Number of Patents >2,000 since 2002 but does not enforce if used in properly licensed open sourced software

Source: ITIC 

Skepticism: Will Other Suitors Emerge?

As with any merger or acquisition, there’s always the potential that a deal will get called off or that other suitors will emerge.

Several Wall Street analysts suggested that high technology rivals might decide to play the role of spoiler and top IBM’s bid of $190 per share for Red Hat. Some of the names being mentioned as possible suitors were: Cisco Systems, Inc., Google and Oracle Corp.

On Monday, Cowen analyst Gregg Moskowitz, was one of those Wall Street analysts who opined that other bidders may crop up. “The substantial premium that IBM is paying for Red Hat might on the surface seem to make it highly unlikely that a superior bid could occur,” Moskowitz said. “However, we believe there is a reasonable possibility that another suitor could emerge.” Moskowitz said if a breakup fee was not overly onerous, Cisco might be a likely contender to lure Red Hat away.

Brad Reback, a Senior Equity Research Analyst at Stifel Nicolaus & Company, Inc. said in a research note that he would “not be surprised if hyperscale cloud vendorslike Google, Amazon, Microsoft, or Oracle make a competing bid given Red Hat’s strategic position within on-premises datacenters (over 100K customers).”

Microsoft, however, might be a longshot since it recently announced its own open source initiative with its $7.5B acquisition of GitHub.

Michael Turits, Managing Director Equity Research Infrastructure at Raymond James & Associates, says a bidding war may occur in the near future and says IBM’s bid for Red Hat could set off a buying frenzy for software firms.

Turits said a stronger IBM cloud portfolio poses a threat to several of its rivals, including Microsoft and Oracle.

Conclusion

IBM has made a bold move to strengthen its position in hybrid clouds and close the gap between itself and Amazon, Google and Microsoft. Purchasing Red Hat also brings IBM more closely back to its core strengths in software, open source and services. The Red Hat Linux distribution should also serve to further solidify IBM’s already strong POWER and z Systems server hardware offerings.

What is not clear is how the merged entity will treat or de-emphasize its relationships/partnerships with other cloud vendors once the Red Hat acquisition is complete. Regardless of what IBM and Red Hat say now, changes are bound to occur in those relationships.

The more immediate issue is whether or not any other firms will decide to up the ante and start a bidding war for Red Hat. That could make things very interesting. For right now though, IBM has served notice that it will put its money and its marketing muscle behind its cloud ambitions.

IBM Bets Big on Cloud, Buys Red Hat for $34B Read More »

California State U/Monterey Bay, Hartnell College Launch Innovative CS Cohort Program

California State University at Monterey Bay (CSUMB) and nearby Hartnell College in Salinas, CA teamed up to initiate one of the country’s most innovative Computer Science Cohort programs. Since 2013 the two institutions, have promoted this program as a way to attract minorities, women and students who are the first in their families to attend college to Computer Science and STEM subjects. The Cohort program nurtures these students by having them take their CS classes as a group. It also helps them adjust more quickly to college life by providing them with group study and life skills classes to help them stick with CS as a major and graduate. So far, so good. A 75% majority of students enrolled in the CSUMB/Hartnell CS Cohort program graduate. This is well above the national average of about 30%. The program is the brainchild of Sathya Narayana a CS professor at CSUMB, who constructed it with Joe Welch and Sonia Arteaga, his counterparts at Hartnell, a two-year community college in Salinas, CA. Read my article on this important initiative at the Association for Computing Machinery (ACM)’s Website here: http://bit.ly/2yCrdTr

California State U/Monterey Bay, Hartnell College Launch Innovative CS Cohort Program Read More »

IBM Fortifies Security with Lighthouse Security, CrossIdeas Acquisitions

In a move that bolsters its already considerable portfolio of security offerings, IBM announced it acquired the business operations of Lighthouse Security Group, LLC, a Lincoln, Rhode Island-based maker of Identity and Access Management (IAM) solutions.

IBM’s purchase of Lighthouse, the security division of longtime IBM Business Partner, Lighthouse Computer Services, comes two weeks after its acquisition of CrossIdeas, a privately held Italian cyber security startup that specializes in Access Governance software to help firms manage user access to applications and data across on-premise and cloud environments. Eric Maass, Chief Technology Officer, Lighthouse Security Group, along with other Lighthouse Security employees will make the transition to IBM Lighthouse Security sells a cloud-hosted IAM gateway platform, which incorporates a full suite of functionalities based on IBM’s Security Identity and Access Management capabilities. This includes: single sign-on, user provisioning, identity lifecycle governance, enterprise user registry services, federation and user self service. …

IBM Fortifies Security with Lighthouse Security, CrossIdeas Acquisitions Read More »

Scroll to Top