{"id":46037,"date":"2022-04-05T04:01:00","date_gmt":"2022-04-05T04:01:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/"},"modified":"2022-04-05T04:01:00","modified_gmt":"2022-04-05T04:01:00","slug":"ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/","title":{"rendered":"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2022\/04\/ibm-z16-100923574-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Today\u2019s announcement of IBM\u2019s new z16 mainframes promises a system that caters to enterprise needs that include support for AI, security, hybrid cloud, and open source efforts well into the future.<\/p>\n<p>The new, more powerful and feature-rich Big Iron boasts an AI accelerator built onto its core Telum processor that can do 300 billion deep-learning inferences per day with one millisecond latency and includes what IBM calls a quantum-safe system to protect organizations from anticipated quantum-based security threats.<\/p>\n<aside class=\"fakesidebar\">\n<p>[Get regularly scheduled insights by <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">signing up for Network World newsletters<\/a>.]<\/p>\n<\/aside>\n<p>The system&#8217;s IBM Telum dual-processor chip has 16 cores and runs at 5.2 GHz. IBM says that the z16 comes with up to 200 configurable cores in a single model\u2014the Model A01\u2014and includes 40TB of redundant array of independent memory (RAIM) per system.<\/p>\n<p>But while z16 family, available May 31, is more powerful, the system also promises to accelerate other core IBM strategies of growing hybrid computing and open-source based enterprise systems. And it is particularly suited to processing artificial intelligence apps, the company said.<\/p>\n<p>\u201cI think the world of AI just changed with the introduction of this system,\u201d said Ross Mauri, general manager of IBM Z. \u201cWhether it\u2019s for driving costs down, cutting down on the risk of fraud, or driving more revenue a whole new set of possibilities are going to be opened up with the AI on the z16 system that couldn\u2019t be considered before.\u201d<\/p>\n<p>The AI accelerator on the Tellum processor utilizes an AI inferencing model that analyzes details from the massive transaction processes that go on within the mainframe to spot trends and make intelligent predictions.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>\u201cAI has a broad applicability to a wide set of use cases across a variety of different industries, from banking and finance to insurance to healthcare, and many others,\u201d said IBM Distinguished Engineer and Z Architect Elipida Tzortzatos. \u201cBut if you look at what is happening in the world today, things such as instant payments, increasingly stricter regulations that require anti money laundering (AML), and a dramatic increase in online transactions has broadly increased the amount of fraud.\u201d<\/p>\n<p>That\u2019s where embedded AI comes into play because it can handle massive amounts of critical transactions and workloads in real time and at scale, Tzortzatos said.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>The AI accelerator is a game changer, according to Patrick Moorhead, founder, CEO and chief analyst at Moor Insights &amp; Strategy. \u201cAccording to IBM, the z16 with z\/OS has a 20x response time with 19x higher throughput when inferencing compared to a comparable x86 cloud server with 60ms average network latency.\u201d<\/p>\n<p>The AI capabilities enabled by the new Telum processors should measurably improve the way businesses detect and address fraudulent&nbsp;purchases will reduce the amount of &nbsp;network traffic produced by AI applications, too, said Charles King, founder and president of the Pund-IT consultancy.<\/p>\n<p>\u201cSince AI inference is performed&nbsp;on-chip, the z16 can perform those complex functions without moving data to\/from an AI or analytics appliance, as many other vendors\u2019 solutions do,\u201d King said. \u201cThat could be highly beneficial in situations like the large-scale transactional environments that the z16 is designed to support.\u201d&nbsp;<\/p>\n<p>While AI capabilities of the z16 will generate enterprise interest, experts say, the performance and scalability of the new systems will also enable more use of the Big Iron in hybrid-cloud environments.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>For example, the<a href=\"https:\/\/www.networkworld.com\/article\/3649713\/ibm-brings-cloud-app-services-to-zos-mainframes.html\"> IBM Z and Cloud Modernization Stack<\/a>, announced in February offers industry-standard tools to modernize z\/OS applications on a pay-per-use basis. The service includes support for&nbsp; z\/OS Connect, which utilizes a JavaScript Object Notation (JSON) interface to tie into and link with existing applications to make Z applications and data part of a hybrid cloud strategy. It also includes z\/OS Cloud Broker, which integrates z\/OS-based services and resources into Red Hat OpenShift to support&nbsp; creating, modernizing, deploying, and managing applications, data, and infrastructure.<\/p>\n<p>Future z\/OS container use cases are planned to promote application modernization, new application development, and API creation with tight integration to core z\/OS applications, IBM stated.<\/p>\n<p>The IBM Z and Cloud Modernization Stack is the first set of capabilities offered through the recently announced <a href=\"https:\/\/www.networkworld.com\/article\/3644149\/ibm-offers-one-stop-shop-for-mainframe-hybrid-cloud-initiatives.html\">IBM Z and Cloud Modernization Center<\/a>, which offers tools, training, resources, and ecosystem partners to help IBM Z clients accelerate the modernization of mainframe applications, data, and processes to work with hybrid-cloud architectures.<\/p>\n<p>\u201cWe\u2019re making it easier to get to the data on the mainframe and then with the advent of OpenShift on the platform, run containerized, microservice workloads on the mainframe,\u201d Mauri said. \u201cWe embrace open-source technology on the IBM z systems platform, and establishing a common developer experience across the hybrid cloud and the z16 with its increased capacity and power will better handle modern workloads.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<p>The z16 reflects the company\u2019s strategic focus on maximizing hybrid-cloud services and solutions, King said. z16 servers with z\/OS support 20 times lower response time and up to 19 times higher throughput than comparable x86 cloud servers, he said. The z16\u2019s capacity and encryption features also enable customers to securely run mission-critical applications and processes while also leveraging public cloud services, he said, &#8220;an important point for businesses impacted by data residency and data sovereignty regulations.\u201d<\/p>\n<p>Security is also a major part of the z16. Specifically, the z16 supports the Crypto Express8S adapter to deliver quantum-safe APIs that will let enterprises start developing quantum-safe cryptography along with classical cryptography and to modernize existing applications and build new applications, Mauri said.<\/p>\n<p>\u201cThe z16 is protected with quantum-safe technology through the multiple firmware layers during the boot process. It\u2019s the industry\u2019s first system to support a quantum-safe secure boot. When the system boots up, it must be confident that the firmware loaded in that system is authentic,\u201d Moorhead said.&nbsp;<\/p>\n<p>&#8220;In nefarious hands, quantum computers can break some of the cryptographic technologies we\u2019ve used for many years. That is the fear,\u201d Moorhead said. Preparation for quantum attacks might have already started with the \u201charvest now decrypt later\u201d attack scenario, where attackers steal encrypted data and wait until a quantum computer can decrypt it.<\/p>\n<p>Another IBM z16 capability called IBM Z Flexible Capacity for Cyber Resiliency enables shifting capacity and production workloads between IBM z16 systems at different sites on demand and for them to remain at those alternate sites for up to a year. This can help enterprises comply with regulations that require the ability to shift production to alternate sites for extended periods, IBM stated.<\/p>\n<p>This capability is also designed to help avoid disruptions from unplanned events. For example, it enables moving&nbsp; workloads to avoid disruptions from impending natural disasters as well as enabling&nbsp;facility maintenance, IBM stated.&nbsp;<\/p>\n<p>&nbsp;z16s also support network-based enhancements including:<\/p>\n<ul>\n<li><strong>FICON Express32S<\/strong> supports a link data rate of 32 Gbps and autonegotiation to 16Gbps and 8Gbps backwards compatibility with existing switches, directors, and storage devices. With support for native FICON, High Performance FICON for z Systems (zHPF), and Fibre Channel Protocol the IBM z16 server is designed to enable an end-to-end 32 Gbps infrastructure to provide lower latency and increased application bandwidth requirements. FICON adapters are used primarily to link mainframes with peripheral devices.<\/li>\n<li>IBM z16 will support a new long-range Open System Adapter called the <strong>OSA-Express7S 1.2 25 GbE LR <\/strong>that provides direct mainframe connectivity to LAN devices. OSA-Express7S adapters support a variety of Ethernet links including 1000BASE-T Ethernet for copper environments along with 25GbE SR, 10 Gigabit Ethernet and Gigabit Ethernet on single-mode and multimode fiber.<\/li>\n<\/ul>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3655975\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nToday\u2019s announcement of IBM\u2019s new z16 mainframes promises a system that caters to enterprise needs that include support for AI, security, hybrid cloud, and open source efforts well into the future.The new, more powerful and feature-rich Big Iron boasts an AI accelerator built onto its core Telum processor that can do 300 billion deep-learning inferences per day with one millisecond latency and includes what IBM calls a quantum-safe system to protect organizations from anticipated quantum-based security threats.<br \/>\n[Get regularly scheduled insights by signing up for Network World newsletters.]To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46038,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[536,1736,739,307],"class_list":["post-46037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cloud-security","tag-hybrid-cloud","tag-open-source","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM z16: A mainframe designed for AI, hybrid cloud, security and open source 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T04:01:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2022\/04\/ibm-z16-100923574-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source\",\"datePublished\":\"2022-04-05T04:01:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/\"},\"wordCount\":1287,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg\",\"keywords\":[\"Cloud Security\",\"Hybrid Cloud\",\"Open Source\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/\",\"name\":\"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg\",\"datePublished\":\"2022-04-05T04:01:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/","og_locale":"en_US","og_type":"article","og_title":"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-05T04:01:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2022\/04\/ibm-z16-100923574-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source","datePublished":"2022-04-05T04:01:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/"},"wordCount":1287,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg","keywords":["Cloud Security","Hybrid Cloud","Open Source","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/","url":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/","name":"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg","datePublished":"2022-04-05T04:01:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ibm-z16-a-mainframe-designed-for-ai-hybrid-cloud-security-and-open-source\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-security\/"},{"@type":"ListItem","position":3,"name":"IBM z16: A mainframe designed for AI, hybrid cloud, security and open source"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46037"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46037\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46038"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}