April 5, 2022 By Ross Mauri 4 min read

Today is a historic day for IBM and our clients. We are announcing IBM® z16™, the next-generation system that will bring real-time AI for transaction processing at scale.

IBM® z16™ will bring the industry’s first integrated on-chip AI accelerator, delivering latency-optimized inferencing designed to enable customers to analyze real-time transactions at scale [1] on critical applications. In an increasingly risky world full of cyber threats, IBM z16 is designed to help protect clients from “harvest now, decrypt later” attacks with the industry’s first quantum-safe system [2]. For more information, please visit the IBM Newsroom.

These incredible innovations would not be possible without the expertise of thousands of IBMers worldwide across IBM Systems and IBM Research, including hardware and software engineering teams, real-world tests and simulations teams and award-winning support and supply chain teams. With IBM z16, IBM used a highly collaborative, client-centered approach that deeply engaged hundreds of individuals from more than 70 clients, a practice that is already underway for future IBM mainframe systems.

Beyond these industry-first innovations, we are excited to introduce new capabilities for clients designed to secure, modernize, automate and transform with data-driven insights across their hybrid cloud estate.

Modernize for hybrid cloud

IBM z16 is a strategic platform for clients, supporting critical business operations and securing highly sensitive data. It is an open, agile platform that integrates into a hybrid cloud environment with industry-leading security, data privacy and latency.

From the unveiling of the IBM Z and Cloud Modernization Center to the announcement of the IBM Z and Cloud Modernization Stack and Wazi as-a-Service, IBM has been committed to helping clients modernize applications and optimize developer productivity, including the creation of an IBM Z Application Modernization practice by IBM Consulting .

Predict and automate with accelerated AI

Today’s economy requires fast and predictive decision-making across business and operations. That’s why we’ve made AI inferencing capabilities available in IBM z16 via the IBM Telum Processor, an industry-first integrated on-chip AI accelerator [3].

To help enterprises reap the benefits of these innovations, we’re also announcing updates to Watson Machine Learning for IBM z/OS, designed to help clients make faster predictive decisions using insights from operational data, including native z/OS applications. This is critical for use cases like fraud detection, where bringing AI inferencing to the transaction before it completes would help businesses analyze for fraud on a massive scale.

Additionally, we’re launching Db2 13 for z/OS, the latest release of IBM’s leading enterprise database. Db2 13 for z/OS includes a new feature — SQL Data Insights — that takes advantage of the IBM Telum Processor and is designed to more quickly and easily identify similarities and clusters in data, while also simplifying the data science process.

In addition to real-time insights for decision velocity, businesses want more intelligent infrastructure. IBM’s suite of AI-powered automation technologies can be used with IBM z16 at scale to help reduce the cost and risk of downtime by identifying potential anomalies across hybrid data sources, better understanding application performance and resolving incidents with mobile through mainframe observability.

A securely designed, cyber-resilient system

It’s clear from every client interaction that security and cyber resiliency are top of mind. That’s why IBM is doing everything possible to help clients protect their data today and prepare for tomorrow. Underpinned by the industry’s first quantum-safe system [4] using quantum-safe cryptography, two new features are being introduced to support our clients’ security and resiliency strategies. The IBM Z Security and Compliance Center, which is generally available on May 27, 2022, and built with IBM Security, provides system collected evidence to be used in an audit report. For certain standards, it compares this data to a known industry standard, such as PCI-DSS [5]. This can speed up audit preparation and help clients simplify their compliance management. Cyber resiliency requires flexibility in response to both business and operational requirements. IBM Z Flexible Capacity for Cyber Resiliency is designed to allow clients to fully automate the swap from participating IBM z16 production systems to backup systems at different sites [6].

Learn more about IBM z16

We are confident that this platform, and future generations, are fully aligned with our clients’ business strategies and will continue to be central to their futures. To learn more about IBM z16 and meet the team behind the platform, including clients, please attend IBM z16 Day, a free virtual conference live today with over 80 speakers within the IBM ecosystem.

For more information about this exciting new system, see the IBM z16 product page.

Statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice and represent goals and objectives only.

[1] Disclaimer: Cited by a third-party analyst.

[2] Disclaimer: IBM z16 with the Crypto Express 8S card provides quantum-safe APIs providing access to quantum-safe algorithms that have been selected as finalists during the PQC standardization process conducted by NIST. Quantum-safe cryptography refers to efforts to identify algorithms that are resistant to attacks by both classical and quantum computers, in order to keep information assets secure even after a large-scale quantum computer has been built. These algorithms are used to help ensure the integrity of a number of the firmware and boot processes. IBM z16 is the industry-first system protected by quantum-safe technology across multiple layers of firmware.

[3] Disclaimer: Cited by a third-party analyst.

[4] Disclaimer: IBM z16 with the Crypto Express 8S card provides quantum-safe APIs, providing access to quantum-safe algorithms that have been selected as finalists during the PQC standardization process conducted by NIST. Quantum-safe cryptography refers to efforts to identify algorithms that are resistant to attacks by both classical and quantum computers, in order to keep information assets secure even after a large-scale quantum computer has been built. These algorithms are used to help ensure the integrity of a number of the firmware and boot processes. IBM z16 is the industry-first system protected by quantum-safe technology across multiple layers of firmware.

[5] Disclaimer: IBM does not ensure regulatory compliance. The intent is to provide a point-in-time statement of your current posture for a specific group of resources. The responsibility of ensuring that systems are configured in accordance with regulatory controls is on the individual businesses who are using the IBM Z Security and Compliance Center, and IBM does not take responsibility for any compliance oversights or penalties associated with data breaches. Select Industry regulations views:

  • PCI DSS -Payment Card Industry Data Security Standard

  • NIST SP800-53 -National Institute of Standards and Technology

[6] Disclaimer: The z16 systems must be installed in different locations, using z/OS Version 2.2 or above. GDPS Version 4.4 is needed for IBM provided automation. Necessary resiliency technology must be enabled, such as System Managed CF Structure Duplexing, Sysplex failure management and Capacity Provisioning Manager. Other configurations may provide different availability characteristics. Clients may optionally use other third-party tools for automation purposes.

Was this article helpful?
YesNo

More from Cloud

IBM Cloud Virtual Servers and Intel launch new custom cloud sandbox

4 min read - A new sandbox that use IBM Cloud Virtual Servers for VPC invites customers into a nonproduction environment to test the performance of 2nd Gen and 4th Gen Intel® Xeon® processors across various applications. Addressing performance concerns in a test environment Performance testing is crucial to understanding the efficiency of complex applications inside your cloud hosting environment. Yes, even in managed enterprise environments like IBM Cloud®. Although we can deliver the latest hardware and software across global data centers designed for…

10 industries that use distributed computing

6 min read - Distributed computing is a process that uses numerous computing resources in different operating locations to mimic the processes of a single computer. Distributed computing assembles different computers, servers and computer networks to accomplish computing tasks of widely varying sizes and purposes. Distributed computing even works in the cloud. And while it’s true that distributed cloud computing and cloud computing are essentially the same in theory, in practice, they differ in their global reach, with distributed cloud computing able to extend…

How a US bank modernized its mainframe applications with IBM Consulting and Microsoft Azure

9 min read - As organizations strive to stay ahead of the curve in today's fast-paced digital landscape, mainframe application modernization has emerged as a critical component of any digital transformation strategy. In this blog, we'll discuss the example of a US bank which embarked on a journey to modernize its mainframe applications. This strategic project has helped it to transform into a more modern, flexible and agile business. In looking at the ways in which it approached the problem, you’ll gain insights into…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters