• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback On Plotting Out A Power Systems Resurgence

    September 22, 2014 Tim

    The answer to the “i conundrum” comes from basic marketing rather than technology!

    For years, IBM followed a “generic server” strategy that pushed the IBM brand rather than the attributes of any one processor family. That might have been a good strategy for commodity servers, like the xSeries, but was death for highly differentiated computing platforms like the iSeries . . . that the public was not educated to understand the value proposition. The Linux push is, unfortunately, a continuation of that failed strategy!

    Now that IBM has exited the commodity computing business, it is time to reverse its marketing strategy! There is a basic concept from marketing called product differentiation. In it, you educate the public about what is rare and valuable about a product–and what that value means to potential users of the product. There is no server platform that cries out for the application of this concept more than the i. This is why the i always beats the pants off of the “aggregate cost of computing” studies–and trumps other platforms in the area of reliability as well.

    Sincerely,

    –John Myers, President and CEO, Strategic Business Systems, Inc.

    RELATED STORY

    Plotting Out A Power Systems Resurgence



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Restoring Passwords & Private Authorities When Using RSTUSRPRF Don’t FLRT with Disaster When it Comes to Applying PTFs

    Leave a Reply Cancel reply

Volume 24, Number 31 -- September 22, 2014
THIS ISSUE SPONSORED BY:

ProData Computer Services
LANSA
HiT Software
Manta Technologies
RJS Software Systems

Table of Contents

  • IBM i Modernization Gets A Fresche-look
  • Micro Focus Acquires Attachmate, Builds Software Powerhouse
  • Where Have All The IBM i ISVs Gone?
  • As I See It: Eight Years From Now
  • COBOL And RPG Take Similar Roads To Revival
  • Reader Feedback On Plotting Out A Power Systems Resurgence
  • IBM Worklight Gets The Magic Quadrant Treatment
  • Ellison Steps Down As Oracle CEO As Q1 Comes In A Bit Short
  • Watson Heading To Predictive Analytics
  • Searching For IBM i Answers

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle