IBM Restructures To Concentrate On The Cloud

International Business Machines (IBM) is splitting-up the 109 -year-old corporation into two public companies to help them focus on high-margin cloud computing. IBM will list its IT infrastructure services unit, which provides technical support for 4,600 clients in 115 countries and has a backlog of $60 billion, as a separate company with a new name by the end of 2021.

The expansion into cloud computing has accelerated following the $34billion acquisition of RedHat two tears ago. IBM said it expects to record nearly $5 billion in expenses related to the separation and operational changes and the new company will have 90,000 employees and its leadership structure still to will be decided. 

“Today is a landmark day for our company....We are redefining the future of IBM....We divested networking back in the ‘90s, we divested PCs back in the 2000s, we divested semiconductors about five years ago because all of them didn’t necessarily play into the integrated value proposition,” IBM CEO Arvind Krishna said.

IBM will now focus on open hybrid cloud and AI solutions that will account for more than half of its recurring revenues.

Cloud computing involves using the power of the Internet to outsource tasks you might traditionally perform on a personal computer, anything from handling simple storage to complex development and processing, to a vast and powerful remote network of inter-connected machines. Information and data is stored on physical or virtual servers, which are maintained and controlled by a cloud computing provider, including Amazon and their AWS product and Microsoft's Azure.

Krishna,said IBM’s software and solutions portfolio would account for the majority of company revenue after the separation. The company also said it expects third-quarter revenue of $17.6 billion and an adjusted profit per share of $2.58, roughly in line with Street estimates.

IBM has recently shifted focus to cloud growth aiming to make up for slowing software sales and is planning to position the business for the new era of hybrid cloud.

IBM:         Reuters:         LiveMint:       Times Now News:      Sydney Morning Herald:  

You Might Also Read:

The Risks &  Benefits Of Cloud Security:

 

 

« UN Maritime Shipping Agency Forced Offline
British Airways Breach »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Spambrella

Spambrella

Spambrella provides email security with real-time threat protection. 100% SaaS (nothing to install)

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.