Verified Document

Information Technology Building Blocks For IBM Essay

The IT building blocks that IBM has been using are compute, storage, and network. These building blocks have been the underlying force that IBM has relied upon over the years in order to build its business and meet the needs of its customers. Since its inception, IBM has been a technology company and it used to focus on hardware, software, and service agreements. These fall under the computer building block. Heavily investing in computer technology has ensured that the employees are able to work with the best hardware and they can meet their daily requirements or targets with ease (De Haes, Van Grembergen, & Debreceny, 2013). With the advancement of technology, the company was forced to adapt to the changing times and they are now focused on storage especially in the cloud. Cloud computing has been the best solution that most businesses have been opting for due the advantages they can reap. IBM has managed to build its own cloud-based storage and systems that have ensured that the company is able to meet the needs of its customers. Networking within the company is highly encouraged and the company needs to ensure that all its employees can interact with each other and they can share vital information securely, fast, and easily. With offices located across the globe, the company had to invest heavily in networking so that teams could interact with each other irrespective of their current location. Telecommunications have also played a crucial...

The compute building block is the most used building block within the company and this is the backbone of IBM. Hardware and software are essential for the performance of the employees’ roles. The employees have to ensure that they are able to interact with the systems being used within the company in order for them to either develop or create better systems that can be deployed to clients. All the company data has to be stored securely and in an easily accessible place by the authorized individuals. For this reason, IBM has heavily invested in storage solutions that are both used by the company and by the clients. Having solutions that leverage upon the cloud storage that is used within the company allows the company to continuously innovate and improve upon their storage facilities, which in turn results in better access by the employees and clients. Data storage is essential and the company has the most secure systems in place to ensure that the data is stored securely. Intrusion detection systems have been deployed to safeguard the data and there are teams that monitor access to the data.
Compute building block is essential to…

Sources used in this document:

References

Cash, S., Jain, V., Jiang, L., Karve, A., Kidambi, J., Lyons, M., . . . Patel, N. (2016). Managed infrastructure with ibm cloud openstack services. IBM Journal of Research and Development, 60(2-3), 6: 1-6: 12.

De Haes, S., Van Grembergen, W., & Debreceny, R. S. (2013). COBIT 5 and enterprise governance of information technology: Building blocks and research opportunities. Journal of Information Systems, 27(1), 307-324.

Goutas, L., Sutanto, J., & Aldarbesti, H. (2015). The building blocks of a cloud strategy: evidence from three SaaS providers. Communications of the ACM, 59(1), 90-97.

Kim, M., Mohindra, A., Muthusamy, V., Ranchal, R., Salapura, V., Slominski, A., & Khalaf, R. (2016). Building scalable, secure, multi-tenant cloud services on IBM Bluemix. IBM Journal of Research and Development, 60(2-3), 8: 1-8: 12.

Piotrowicz, W., & Cuthbertson, R. (2014). Introduction to the special issue information technology in retail: Toward omnichannel retailing. International Journal of Electronic Commerce, 18(4), 5-16.


Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology and Its Uses
Words: 5994 Length: 22 Document Type: Thesis

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

Information Technologies Describe the Three
Words: 1450 Length: 5 Document Type: Term Paper

Further, midrange systems can support a few thousands users, and often have operating systems more focused on distributing resources throughout a network vs. being a computing-intensive system. While there is increasingly a focus in midrange systems to provide both distributive support for networks and computing power, the predominant use of these systems is in synchronizing the many databases a small to mid-size organization up to a few thousand users

Businesses and Information Technology
Words: 12773 Length: 40 Document Type: Term Paper

Strategic Planning in IT IT Impact on Service Industry Performance Cooperative Competitive Competitive Advantage Implementation of IT Innovations 1992 U.S. VALUE-ADDED AND EMPLOYMENT BY INDUSTRY AVERAGE ANNUAL GROWTH IN GDP PER HOUR, MAJOR SECTORS OF THE U.S. ECONOMY Management TASKS IN BUREAUCRACY VS ADHOCRACY ORGANIZATIONS This paper addresses the following problem statement: "Without information technology (IT), a business will not be able to compete globally in any industry, nor in any market it wants to enter. It will

Impact of Information Technology on Disaster Recovery and Contingency...
Words: 2616 Length: 9 Document Type: Term Paper

New York State firefighting history is a microcosm of early and modern disaster preparedness. Definition of disaster in the historic era and modern era. Early historical facts. The need for uninterrupted communication. Response to needs. Advent of the Internet. New needs, new responses. Worthiness of Disaster Recovery and Contingency Plans for keeping communications flowing smoothly. The overall importance of communication. The firefighting department of New York City, generally considered to be the first of organized efforts to combat community

IBM New UNIX Computer P690
Words: 915 Length: 3 Document Type: Term Paper

IBM New UNIX Computer Over the past years, Sun has managed to take the lion's share of the market for servers running the UNIX operating system. By putting mainframe-style features such as partitioning into its servers, and building hardware for its own Solaris operating system, Sun managed to take the lead with their UNIX systems (Vance). With the release of its p690 server, however, IBM is giving Sun some heavy competition and

Information Technology IT Security and Design
Words: 901 Length: 2 Document Type: Research Paper

Non-discretionary controls means than there is mandatory access control. In this type of system, security is enforced by a strict set of rules that creates a hierarchy of permissions that users cannot override. Essentially, this type of system is meant to hinder insider users from actually working against the system. Users cannot access crucial internal information as to become spies, thus they cannot see the internal designs of the system

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now