<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=IBM_Cloud</id>
	<title>IBM Cloud - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=IBM_Cloud"/>
	<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;action=history"/>
	<updated>2026-04-05T17:21:54Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=62067&amp;oldid=prev</id>
		<title>Shawndouglas: Text replacement - &quot;\[\[L7 Informatics, Inc.(.*)&quot; to &quot;[[Vendor:L7 Informatics, Inc.$1&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=62067&amp;oldid=prev"/>
		<updated>2024-04-03T20:26:09Z</updated>

		<summary type="html">&lt;p&gt;Text replacement - &amp;quot;\[\[L7 Informatics, Inc.(.*)&amp;quot; to &amp;quot;[[Vendor:L7 Informatics, Inc.$1&amp;quot;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:26, 3 April 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l45&quot;&gt;Line 45:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 45:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;1. '''What experience do you have working with laboratory customers in our specific industry?'''&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;1. '''What experience do you have working with laboratory customers in our specific industry?'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Few publicly described examples of non-technology [[Laboratory|laboratories]] working with IBM Cloud could be found, with only Allegany Ballistics Laboratory&amp;lt;ref name=&amp;quot;IBMAchieves16&amp;quot;&amp;gt;{{cite web |url=https://www-03.ibm.com/press/us/en/pressrelease/49018.wss |archiveurl=https://web.archive.org/web/20210124035001/https://www-03.ibm.com/press/us/en/pressrelease/49018.wss |title=IBM Achieves Highest U.S. Defense Information Systems Agency Authorization for Cloud Services |publisher=IBM |date=11 February 2016 |archivedate=24 January 2021 |accessdate=02 August 2023}}&amp;lt;/ref&amp;gt;, a manufacturing and research center for the Department of Defense, being mentioned. One [[laboratory informatics]] vendor, [[L7 Informatics, Inc.]]&amp;lt;ref name=&amp;quot;BSLab717&amp;quot;&amp;gt;{{cite web |url=https://www.biospace.com/article/releases/lab7-systems-announces-high-performance-cloud-for-genomic-scale-data-management-built-on-ibm-cloud-/ |title=Lab7 Systems Announces High-Performance Cloud For Genomic-Scale Data Management Built On IBM Cloud |work=BioSpace |author=Lab7 Systems, Inc |date=23 May 2017 |accessdate=02 August 2023}}&amp;lt;/ref&amp;gt;, could be verified to be using or have used IBM Cloud for its SaaS offerings. An IBM Cloud representative is more likely to be able to supply other examples of laboratories and laboratory informatics developers that use or have used IBM Cloud.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Few publicly described examples of non-technology [[Laboratory|laboratories]] working with IBM Cloud could be found, with only Allegany Ballistics Laboratory&amp;lt;ref name=&amp;quot;IBMAchieves16&amp;quot;&amp;gt;{{cite web |url=https://www-03.ibm.com/press/us/en/pressrelease/49018.wss |archiveurl=https://web.archive.org/web/20210124035001/https://www-03.ibm.com/press/us/en/pressrelease/49018.wss |title=IBM Achieves Highest U.S. Defense Information Systems Agency Authorization for Cloud Services |publisher=IBM |date=11 February 2016 |archivedate=24 January 2021 |accessdate=02 August 2023}}&amp;lt;/ref&amp;gt;, a manufacturing and research center for the Department of Defense, being mentioned. One [[laboratory informatics]] vendor, [[&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Vendor:&lt;/ins&gt;L7 Informatics, Inc.]]&amp;lt;ref name=&amp;quot;BSLab717&amp;quot;&amp;gt;{{cite web |url=https://www.biospace.com/article/releases/lab7-systems-announces-high-performance-cloud-for-genomic-scale-data-management-built-on-ibm-cloud-/ |title=Lab7 Systems Announces High-Performance Cloud For Genomic-Scale Data Management Built On IBM Cloud |work=BioSpace |author=Lab7 Systems, Inc |date=23 May 2017 |accessdate=02 August 2023}}&amp;lt;/ref&amp;gt;, could be verified to be using or have used IBM Cloud for its SaaS offerings. An IBM Cloud representative is more likely to be able to supply other examples of laboratories and laboratory informatics developers that use or have used IBM Cloud.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-58597:rev-62067 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=58597&amp;oldid=prev</id>
		<title>Shawndouglas: Cats</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=58597&amp;oldid=prev"/>
		<updated>2024-02-28T22:55:21Z</updated>

		<summary type="html">&lt;p&gt;Cats&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:55, 28 February 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l184&quot;&gt;Line 184:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 184:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;!---Place all category tags here--&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Cloud computing services]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Managed security services]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-52740:rev-58597 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=52740&amp;oldid=prev</id>
		<title>Shawndouglas: Updated for 2023.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=52740&amp;oldid=prev"/>
		<updated>2023-08-02T19:45:22Z</updated>

		<summary type="html">&lt;p&gt;Updated for 2023.&lt;/p&gt;
&lt;a href=&quot;https://www.limswiki.org/index.php?title=IBM_Cloud&amp;amp;diff=52740&amp;amp;oldid=43714&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=43714&amp;oldid=prev</id>
		<title>Shawndouglas: /* Provider research */ Tweak</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=43714&amp;oldid=prev"/>
		<updated>2021-08-21T17:45:28Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Provider research: &lt;/span&gt; Tweak&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:45, 21 August 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l40&quot;&gt;Line 40:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 40:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Provider research==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Provider research==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This section uses public information to provide some answers to the 18 questions posed in Chapter 6 of the wiki-based guide ''[[LII:Choosing and Implementing a Cloud-based Service for &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;your &lt;/del&gt;Laboratory|Choosing and Implementing a Cloud-based Service for &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;your &lt;/del&gt;Laboratory]]''. In some cases, public information could not be found, and a recommendation to further discuss the question with the cloud service provider (CSP) is made.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This section uses public information to provide some answers to the 18 questions posed in Chapter 6 of the wiki-based guide ''[[LII:Choosing and Implementing a Cloud-based Service for &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Your &lt;/ins&gt;Laboratory|Choosing and Implementing a Cloud-based Service for &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Your &lt;/ins&gt;Laboratory]]''. In some cases, public information could not be found, and a recommendation to further discuss the question with the cloud service provider (CSP) is made.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42964:rev-43714 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42964&amp;oldid=prev</id>
		<title>Shawndouglas: /* Provider research */ Chapter number</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42964&amp;oldid=prev"/>
		<updated>2021-06-04T15:56:48Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Provider research: &lt;/span&gt; Chapter number&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:56, 4 June 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l40&quot;&gt;Line 40:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 40:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Provider research==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Provider research==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This section uses public information to provide some answers to the 18 questions posed in Chapter &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;5 &lt;/del&gt;of the wiki-based guide ''[[LII:Choosing and Implementing a Cloud-based Service for your Laboratory|Choosing and Implementing a Cloud-based Service for your Laboratory]]''. In some cases, public information could not be found, and a recommendation to further discuss the question with the cloud service provider (CSP) is made.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This section uses public information to provide some answers to the 18 questions posed in Chapter &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;6 &lt;/ins&gt;of the wiki-based guide ''[[LII:Choosing and Implementing a Cloud-based Service for your Laboratory|Choosing and Implementing a Cloud-based Service for your Laboratory]]''. In some cases, public information could not be found, and a recommendation to further discuss the question with the cloud service provider (CSP) is made.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l157&quot;&gt;Line 157:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 157:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is unclear if support personnel are local to the customer or if support is outsourced to another business and country. Discuss this with an IBM Cloud representative.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is unclear if support personnel are local to the customer or if support is outsourced to another business and country. Discuss this with an IBM Cloud representative.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42954:rev-42964 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42954&amp;oldid=prev</id>
		<title>Shawndouglas: Typo</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42954&amp;oldid=prev"/>
		<updated>2021-06-03T23:49:58Z</updated>

		<summary type="html">&lt;p&gt;Typo&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:49, 3 June 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l165&quot;&gt;Line 165:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 165:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Managed network security''': managed firewall, as well as intrusion detection and prevention management&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Managed network security''': managed firewall, as well as intrusion detection and prevention management&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IBM Managed Security Services is listed in the top 10 of managed security service provider lists for multiple &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;entitites&lt;/del&gt;.&amp;lt;ref name=&amp;quot;MSSPCyber20&amp;quot;&amp;gt;{{cite web |url=https://www.msspalert.com/top250/list-2020/25/ |title=Top 250 MSSPs for 2020: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September 2020 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;STHTop15_21&amp;quot;&amp;gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In 2021 |publisher=Software Testing Help |date=30 April 2021 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;CDMMSSPs21&amp;quot;&amp;gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IBM Managed Security Services is listed in the top 10 of managed security service provider lists for multiple &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;entities&lt;/ins&gt;.&amp;lt;ref name=&amp;quot;MSSPCyber20&amp;quot;&amp;gt;{{cite web |url=https://www.msspalert.com/top250/list-2020/25/ |title=Top 250 MSSPs for 2020: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September 2020 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;STHTop15_21&amp;quot;&amp;gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In 2021 |publisher=Software Testing Help |date=30 April 2021 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;CDMMSSPs21&amp;quot;&amp;gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42855:rev-42954 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42855&amp;oldid=prev</id>
		<title>Shawndouglas: MSS</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42855&amp;oldid=prev"/>
		<updated>2021-05-27T21:39:01Z</updated>

		<summary type="html">&lt;p&gt;MSS&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:39, 27 May 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l157&quot;&gt;Line 157:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 157:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is unclear if support personnel are local to the customer or if support is outsourced to another business and country. Discuss this with an IBM Cloud representative.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is unclear if support personnel are local to the customer or if support is outsourced to another business and country. Discuss this with an IBM Cloud representative.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;==Managed security services==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;IBM Managed Security Services is described by IBM as set of services that &quot;simplifies security and risk with continuous, value-driven monitoring, management, and intelligence backed by global expertise, local delivery, and an integrated security portfolio.&quot;&amp;lt;ref name=&quot;IBMManaged19&quot;&gt;{{cite web |url=https://www.ibm.com/downloads/cas/BVWMRDGY |format=PDF |title=IBM Managed Security Services |publisher=IBM |date=2019 |accessdate=27 May 2021}}&amp;lt;/ref&gt; The company touts both managed cybersecurity services and managed network security services. This includes&amp;lt;ref name=&quot;IBMMSS&quot;&gt;{{cite web |url=https://www.ibm.com/security/services/managed-security-services |title=Managed Security Services (MSS) |publisher=IBM |accessdate=27 May 2021}}&amp;lt;/ref&gt;:&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* '''Managed cybersecurity''': threat management, managed detection and response, managed cloud security, managed endpoint security, identity management, and command center security&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* '''Managed network security''': managed firewall, as well as intrusion detection and prevention management&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;IBM Managed Security Services is listed in the top 10 of managed security service provider lists for multiple entitites.&amp;lt;ref name=&quot;MSSPCyber20&quot;&gt;{{cite web |url=https://www.msspalert.com/top250/list-2020/25/ |title=Top 250 MSSPs for 2020: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September 2020 |accessdate=27 May 2021}}&amp;lt;/ref&gt;&amp;lt;ref name=&quot;STHTop15_21&quot;&gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In 2021 |publisher=Software Testing Help |date=30 April 2021 |accessdate=27 May 2021}}&amp;lt;/ref&gt;&amp;lt;ref name=&quot;CDMMSSPs21&quot;&gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 |accessdate=27 May 2021}}&amp;lt;/ref&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Additional information==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Additional information==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l164&quot;&gt;Line 164:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 174:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/downloads/cas/3NXVRXG9 HIPAA compliance guide]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/downloads/cas/3NXVRXG9 HIPAA compliance guide]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/cloud/architecture/files/ibm-cloud-security-white-paper.pdf Client security whitepaper]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/cloud/architecture/files/ibm-cloud-security-white-paper.pdf Client security whitepaper]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [https://www.ibm.com/downloads/cas/BVWMRDGY IBM Managed Security Services data sheet]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/support/customer/csol/terms/?cat=data-security#detail-document IBM security and privacy principles]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/support/customer/csol/terms/?cat=data-security#detail-document IBM security and privacy principles]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l170&quot;&gt;Line 170:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 181:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://cloud.ibm.com/docs/overview?topic=overview-shared-responsibilities IBM Cloud shared responsibility model]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://cloud.ibm.com/docs/overview?topic=overview-shared-responsibilities IBM Cloud shared responsibility model]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/trust IBM Cloud trust center]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://www.ibm.com/trust IBM Cloud trust center]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [https://www.ibm.com/security/services/managed-security-services IBM Managed Security Services]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42381:rev-42855 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42381&amp;oldid=prev</id>
		<title>Shawndouglas: Created as needed.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=IBM_Cloud&amp;diff=42381&amp;oldid=prev"/>
		<updated>2021-04-25T23:06:31Z</updated>

		<summary type="html">&lt;p&gt;Created as needed.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox company&lt;br /&gt;
| name             = IBM Cloud&lt;br /&gt;
| logo             = [[File:IBM Cloud logo.png|200px]]&lt;br /&gt;
| caption          = &lt;br /&gt;
| type             = &lt;br /&gt;
| traded_as        = &lt;br /&gt;
| genre            = &amp;lt;!-- Only used with media and publishing companies --&amp;gt;&lt;br /&gt;
| fate             = &lt;br /&gt;
| predecessor      = &lt;br /&gt;
| successor        = &lt;br /&gt;
| foundation       = &amp;lt;!-- {{Start date|YYYY|MM|DD}} --&amp;gt;&lt;br /&gt;
| founder          = Charles Ranlett Flint&lt;br /&gt;
| defunct          = &amp;lt;!-- {{End date|YYYY|MM|DD}} --&amp;gt;&lt;br /&gt;
| location_city    = Armonk, New York&lt;br /&gt;
| location_country = United States&lt;br /&gt;
| location         = &lt;br /&gt;
| locations        = &lt;br /&gt;
| area_served      = Worldwide&lt;br /&gt;
| key_people       = Arvind Krishna (CEO)&lt;br /&gt;
| industry         = Computing, Cloud computing, Web services&lt;br /&gt;
| products         = [[Infrastructure as a service|IaaS]], [[Platform as a service|PaaS]], [[Database as a service|DBaaS]], [[Desktop virtualization#Desktop as a service|DaaS]], [[Software as a service|SaaS]]&lt;br /&gt;
| services         = &lt;br /&gt;
| revenue          = $7.5 billion (2020, Q4)&amp;lt;ref name=&amp;quot;EvansIBM21&amp;quot;&amp;gt;{{cite web |url=https://cloudwars.co/ibm/ibm-shocker-q4-cloud-growth-plummets-to-8/ |title=IBM Shocker: Q4 Cloud Growth Plummets to 8% |author=Evans, B. |work=Cloud Wars |date=27 January 2021 |accessdate=25 April 2021}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
| operating_income = &lt;br /&gt;
| net_income       = &lt;br /&gt;
| aum              = &amp;lt;!-- Only used with financial services companies --&amp;gt;&lt;br /&gt;
| assets           = &lt;br /&gt;
| equity           = &lt;br /&gt;
| owner            = &lt;br /&gt;
| num_employees    = &lt;br /&gt;
| parent           = &lt;br /&gt;
| divisions        = &lt;br /&gt;
| subsid           = &lt;br /&gt;
| homepage         = {{URL|https://www.ibm.com/cloud}}&lt;br /&gt;
| footnotes        = &lt;br /&gt;
| intl             = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''IBM Cloud''' is a collection of public, private, hybrid, and multicloud [[cloud computing]] services offered by IBM, an American multinational information technology company. IBM Cloud deploys to over 60 data centers in various locations around the world, primarily in the U.S. and Europe but also with some representation in the Pacific region and South America.&amp;lt;ref name=&amp;quot;IBMGlobalLocs&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/cloud/data-centers/ |title=Global locations for your global business |publisher=IBM Cloud |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt; More than 170 different products and services are associated with IBM Cloud, representing elastic computing, networking, content delivery, data storage, database management, security management, enterprise management, [[data analysis]], scientific computing, container management, developer support, [[blockchain]] management, [[internet of things]], and [[artificial intelligence]].&amp;lt;ref name=&amp;quot;IBMCloudProds&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/cloud/products |title=IBM Cloud Products |publisher=IBM |accessdate=25 April 2021}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Provider research==&lt;br /&gt;
This section uses public information to provide some answers to the 18 questions posed in Chapter 5 of the wiki-based guide ''[[LII:Choosing and Implementing a Cloud-based Service for your Laboratory|Choosing and Implementing a Cloud-based Service for your Laboratory]]''. In some cases, public information could not be found, and a recommendation to further discuss the question with the cloud service provider (CSP) is made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. '''What experience do you have working with laboratory customers in our specific industry?'''&lt;br /&gt;
&lt;br /&gt;
Few publicly described examples of non-technology [[Laboratory|laboratories]] working with IBM Cloud could be found, with only Allegany Ballistics Laboratory&amp;lt;ref name=&amp;quot;IBMAchieves16&amp;quot;&amp;gt;{{cite web |url=https://www-03.ibm.com/press/us/en/pressrelease/49018.wss |title=IBM Achieves Highest U.S. Defense Information Systems Agency Authorization for Cloud Services |publisher=IBM |date=11 February 2016 |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt;, a manufacturing and research center for the Department of Defense, being mentioned. One [[laboratory informatics]] vendor, [[L7 Informatics, Inc.]]&amp;lt;ref name=&amp;quot;BSLab717&amp;quot;&amp;gt;{{cite web |url=https://www.biospace.com/article/releases/lab7-systems-announces-high-performance-cloud-for-genomic-scale-data-management-built-on-ibm-cloud-/ |title=Lab7 Systems Announces High-Performance Cloud For Genomic-Scale Data Management Built On IBM Cloud |work=BioSpace |author=Lab7 Systems, Inc |date=23 May 2017 |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt;, could be verified to be using or have used IBM Cloud for its SaaS offerings. An IBM Cloud representative is more likely to be able to supply other examples of laboratories and laboratory informatics developers that use or have used IBM Cloud.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. '''Can your solution readily integrate with our other systems and business processes, making it easier for our end users to perform their tasks?'''&lt;br /&gt;
&lt;br /&gt;
It will ultimately be up to your organization to get an answer from IBM tailored to your systems and business processes. However, this much can be said about IBM Cloud integrations. The company provides a wide variety of tools for integration, as outlined on its [https://www.ibm.com/cloud/integration integration solutions page]. Its main tool, IBM Cloud Pak for Integration, &amp;quot;provides an automated and closed-loop lifecycle across multiple styles of enterprise integration.&amp;quot;&amp;lt;ref name=&amp;quot;IBMCloudPak&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/cloud/cloud-pak-for-integration |title=IBM Cloud Pak for Integration |publisher=IBM Cloud |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt; Related integration tools include IBM API Connect, IBM App Connect, and IBM Secure Gateway Service (useful for hybrid cloud deployments).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. '''What is the average total historical downtime for the service(s) we're interested in?'''&lt;br /&gt;
&lt;br /&gt;
Some public information is made available about historic outages and downtime. IBM Cloud has a [https://cloud.ibm.com/status/ systems status page] with status history (you have to click on the &amp;quot;History&amp;quot; link to the left). You should be able to read through the incident details for each issue, going back through a fair amount of history. This will give you a partial picture of the issues experienced in the past, as well as any scheduled maintenance and currently impacted services. A follow-up on this question with an IBM Cloud representative may reveal more historical downtime history for the services you are interested in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4. '''Do we receive comprehensive downtime support in the case of downtime?'''&lt;br /&gt;
&lt;br /&gt;
IBM Cloud does not make this answer clear. However, the answer is likely tied to what [https://cloud.ibm.com/docs/get-support?topic=get-support-support-plans after-sales support plan] you choose. Confirm with IBM Cloud what downtime support they provide based on the services your organization are interested in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. '''Where are your servers located, and how is data securely transferred to and from those servers?'''&lt;br /&gt;
&lt;br /&gt;
IBM Cloud has 60 data centers spread across six regions and 18 availability zones&amp;lt;ref name=&amp;quot;IBMGlobalLocs&amp;quot; /&amp;gt;, with three more regions planned (as of April 2021).&amp;lt;ref name=&amp;quot;IBMCloudMulti21&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/downloads/cas/2BWNGJM3 |format=PDF |title=IBM Cloud Multi-zone region |publisher=IBM Cloud |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt; These zones [https://www.ibm.com/cloud/data-centers/ are distributed] in various locations around the world, primarily in the U.S. and Europe but also with some representation in the Pacific region and South America. IBM Cloud uses its Content Delivery Network to deliver content, which &amp;quot;allows your users to receive the content with less delay, and delivers a better overall experience for your customers.&amp;quot;&amp;lt;ref name=&amp;quot;IBMAboutContent21&amp;quot;&amp;gt;{{cite web |url=https://cloud.ibm.com/docs/CDN?topic=CDN-about-content-delivery-networks-cdn- |title=About Content Delivery Network |work=IBM Cloud Docs - Content Delivery Network (CDN) |publisher=IBM Cloud |date=01 February 2021 |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt; Data in motion is protected through IBM Cloud's [https://www.ibm.com/cloud/architecture/architectures/securityArchitecture/security-for-data IBM Security Guardian Data Encryption] suite for applying &amp;quot;data-at-rest and data-in-transit security quickly and consistently.&amp;quot;&amp;lt;ref name=&amp;quot;IBMSecArchSecData&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/cloud/architecture/architectures/securityArchitecture/security-for-data |title=Security architecture for cloud applications - Security for Data |publisher=IBM Cloud |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt; As for data localization and residency requirements, IBM Cloud [https://cloud.ibm.com/docs/blockchain?topic=blockchain-console-icp-about-data-residency documentation] and [https://www.ibm.com/blogs/cloud-computing/2015/07/21/how-hybrid-cloud-solves-data-localization-and-regional-compliance-challenges/ blog articles] address some elements of this topic, partly in the scope of blockchain networks; discuss the topic further with an IBM Cloud representative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. '''Who will have access to our data (including subcontractors), and what credentials, certifications, and compliance training do they have?'''&lt;br /&gt;
&lt;br /&gt;
IBM Cloud addresses this topic partially in its architecture documentation&amp;lt;ref name=&amp;quot;IBMSecArchPhysical&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/cloud/architecture/architectures/securityArchitecture/physical-asset-security |title=Security architecture for cloud applications - Physical Security |publisher=IBM Cloud |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Each data center has at least one security entry point that is always staffed and can include one or more access controlled entry ways that are monitored by CCTV. Each controlled area requires at least badge reader based authentication. Sensitive areas such as server rooms, network closets, and utility closets require badge and biometric authentication. Access attempts are logged and logs retained for at least one calendar year. Repeated failed access attempts trigger an alert to the security guards ... Access to the data center does not in turn confer access to the secured rooms within the data center. Employee access is based on job role, for example, so that server technicians do not have access to the network closet, and only trained facility staff have access to power feed termination rooms.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As for certifications and training, little is said about certifications. IBM indicates that an &amp;quot;extensive security training program&amp;quot; is required of each employee, and they must recertify that training annually. They also receive additional security awareness training based on role.&amp;lt;ref name=&amp;quot;IBMSecArchPhysical&amp;quot; /&amp;gt; For additional information about roles, certifications, and training, discuss this with an IBM Cloud representative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7. '''Will our sensitive and regulated data be stored on a machine dedicated to complying with the necessary regulations?'''&lt;br /&gt;
&lt;br /&gt;
Not all [https://www.ibm.com/cloud/data-centers/ IBM Cloud machines] have the same controls on them; it will depend on the region, product, and compliance requirements of your lab. That said, verify with a representative that the machine your data will land on meets all the necessary regulations affecting your data.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. '''How segregated is our cloud data from another customer's, i.e., will lapses of security of another customer's cloud affect our cloud? (It typically won't, but asking the question will hopefully prompt the provider to better explain how your data is segregated.)'''&lt;br /&gt;
&lt;br /&gt;
It appears some IBM Cloud services may offer a premium &amp;quot;physical separation&amp;quot; plan. For example, the Text to Speech offering has a standard multi-tenant plan that provides &amp;quot;logical separation of data by using common encryption keys,&amp;quot; and a premium single-tenant plan that provides &amp;quot;dedicated data storage accounts that use unique [[encryption]] keys.&amp;quot;&amp;lt;ref name=&amp;quot;IBMDataSec21&amp;quot;&amp;gt;{{cite web |url=https://cloud.ibm.com/docs/text-to-speech?topic=text-to-speech-data-security |title=Data Security |work= IBM Cloud Docs - Text to Speech |publisher=IBM Cloud |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt; It's not clear how many other services IBM Cloud services have similar plans associated with them, but a [https://www.ibm.com/cloud/blog/single-tenant-cloud-vs-multi-tenant-cloud 2020 blog post] by IBM indicates they are able to accommodate both single- and multi-tenant environments in more than a few cases. Verify with a representative about physical vs. logical separation for your desired services.&lt;br /&gt;
&lt;br /&gt;
As for tenant isolation, the previously mentioned blog post, as well as a few other bits of documentation, talks about tenant isolation security measures. For example, those on multi-tenant environments can take advantage of IBM's Cloud Key Protect, which &amp;quot;provides a root of trust that is secured by FIPS 140-2 Level 3 certified cloud-based HSMs that protect against theft of information.&amp;quot;&amp;lt;ref name=&amp;quot;IBMSecArchSecData&amp;quot; /&amp;gt; For more details about security measures in tenant isolation, discuss this with an IBM Cloud representative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9. '''Do you have documented data security policies?'''&lt;br /&gt;
&lt;br /&gt;
IBM Cloud documents its security practices in several places:&lt;br /&gt;
&lt;br /&gt;
* [https://www.ibm.com/cloud/security IBM Cloud Security portal]&lt;br /&gt;
* [https://www.ibm.com/cloud/architecture/files/ibm-cloud-security-white-paper.pdf Cloud-native security practices in IBM Cloud]&lt;br /&gt;
* [https://www.ibm.com/cloud/architecture/architectures/securityArchitecture/ Security architecture for cloud applications]&lt;br /&gt;
&lt;br /&gt;
Some security-related documents, like the SOC 2 report, may not be publicly available, requiring direct discussion with an IBM Cloud representative to obtain them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. '''How do you test your platform's security?'''&lt;br /&gt;
&lt;br /&gt;
IBM Cloud notes the following about testing platform security&amp;lt;ref name=&amp;quot;IBMHowDoI21&amp;quot;&amp;gt;{{cite web |url=https://cloud.ibm.com/docs/overview?topic=overview-security |title=How do I know that my data is safe? |work=IBM Cloud Docs - Getting Started with IBM Cloud |publisher=IBM Cloud |date=23 March 2021 |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;In addition to the regular penetration testing conducted by IBM and our partners, customers can conduct their own penetration testing of their resources on IBM Cloud. No permission is necessary from IBM Cloud for penetration testing of IP addresses allocated to your classic infrastructure account that is set up on classic virtual or bare metal servers. For penetration testing of IBM Cloud VPC or PaaS offerings, or any IBM-owned IP space that is not allocated to your classic infrastructure account, open a support case to get instructions on signing the Client Penetration Testing Authorization Agreement.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
IBM also has IBM X-Force Red, &amp;quot;an autonomous team of veteran hackers, within IBM Security, hired to break into organizations and uncover risky vulnerabilities that criminal attackers may use for personal gain.&amp;quot;&amp;lt;ref name=&amp;quot;IBMXForceRed&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/security/services/offensive-security-services |title=X-Force Red Offensive Security Services |publisher=IBM |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt; However, it's not clear if this same team also tests IBM Cloud's own infrastructure. Discuss this topic more thoroughly with a representative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. '''What are your policies for security audits, intrusion detection, and intrusion reporting?'''&lt;br /&gt;
&lt;br /&gt;
''Audits'': IBM Cloud discusses security audits and reviews in its security architecture documentation, under &amp;quot;[https://www.ibm.com/cloud/architecture/architectures/securityArchitecture/physical-asset-security/ Third-party security audits and reviews].&amp;quot; IBM Cloud's approach to security audits is also demonstrated by its compliance credentials (e.g., see its trust center). &lt;br /&gt;
&lt;br /&gt;
''Intrusion detection and reporting:'': IBM Cloud discusses intrusion detection and prevention in-depth in the &amp;quot;[https://www.ibm.com/cloud/architecture/architectures/securityArchitecture/security-for-network/#networkprotection Network Protection]&amp;quot; section of its security architecture documentation. They also note elsewhere&amp;lt;ref name=&amp;quot;IBMMonitor&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/cloud/architecture/architectures/securityArchitecture/security-monitoring-and-intelligence/ |title=Monitoring and intelligence |work=Security architecture for cloud applications |publisher=IBM Cloud |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The IBM Cloud platform comes with built-in intrusion detection. Intrusion detection is enabled through a combination of IBM Cloud infrastructure capabilities at the perimeter level within the firewall or IBM Security Access Manager for DataPower, and by monitoring IBM Cloud security logs that are consolidated within the QRadar SIEM tool.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. '''What data logging information is kept and acted upon in relation to our data?'''&lt;br /&gt;
&lt;br /&gt;
While IBM Cloud offers customers tools like [https://www.ibm.com/cloud/log-analysis IBM Cloud Log Analysis] to analyze their own logs, it's not clear what data logging information IBM collects and uses in relation to customer data. The Privacy Shield documentation notes, however&amp;lt;ref name=&amp;quot;IBMPrivacyShield&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/privacy/privacy-shield |title=IBM Privacy Shield Privacy Policy for Certified IBM Cloud Services |publisher=IBM |date=18 December 2020 |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The types of personal data that Privacy Shield-Certified Cloud Services collect will vary based on the type and nature of each offering, and is described in its offering documentation (searchable via [https://www-03.ibm.com/software/sla/sladb.nsf/sla/tou/ this link]) or as otherwise provided by IBM. IBM uses such personal data as needed to deliver the Cloud Service, along with additional purposes that may be described in the corresponding TD or Attachment.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It's possible the terms of use document for the service you're interested in may discuss data collection and use by IBM. However, you'll have to have this discussion with a representative to confirm.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. '''How thorough are those logs and can we audit them on-demand?'''&lt;br /&gt;
&lt;br /&gt;
Customers have the ability to audit the logs associated with their own activities. It also appears &amp;quot;interactions made by IBM Cloud infrastructure support staff&amp;quot; can also be captured and audited in those logs.&amp;lt;ref name=&amp;quot;IBMAuditing21&amp;quot;&amp;gt;{{cite web |url=https://cloud.ibm.com/docs/account?topic=account-audit-log |title=Auditing system events for classic infrastructure |work=IBM Cloud Docs - Managing your account, resources, and access |publisher=IBM Cloud |date=07 April 2021 |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt; However, it's not clear what logs, if any, are collected and maintained by IBM about your data, let alone whether or not you can access them. You'll have to have this discussion with a representative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. '''For HIPAA-eligible data (e-PHI) we may have, will you sign a business associate agreement?'''&lt;br /&gt;
&lt;br /&gt;
Yes, IBM Cloud will sign a business associate agreement.&amp;lt;ref name=&amp;quot;IBMCompianceInd&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/cloud/compliance/industry |title=IBM Cloud compliance programs |publisher=IBM Cloud |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt; Consult their [https://www.ibm.com/cloud/compliance/industry cloud compliance page] for more details on their approach to HIPAA compliance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. '''What happens to our data should the contract expire or be terminated?'''&lt;br /&gt;
&lt;br /&gt;
Per the Cloud Services Agreement&amp;lt;ref name=&amp;quot;IBMCSA18&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/support/customer/pdf/terms/csa_th.pdf |format=PDF |title=Cloud Services Agreement |publisher=IBM |date=March 2018 |accessdate=17 April 2021}}&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;IBM will return or remove Content from IBM computing resources upon the expiration or cancellation of the Cloud Service, or earlier upon Client’s request. IBM may charge for certain activities performed at Client’s request (such as delivering Content in a specific format). IBM does not archive Content, however some Content may remain in Cloud Service backup files until expiration of such files as governed by IBM’s backup retention practices.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. '''What happens to our data should you go out of business or suffer a catastrophic event?'''&lt;br /&gt;
&lt;br /&gt;
It's not publicly clear how IBM Cloud would handle your data should they go out of business; consult with a representative about this topic. As for catastrophic events, like other cloud providers, IBM Cloud uses three zones per region (a multi-zone region or MZR) for redundancy: &amp;quot;The advantage of an MZR is that it provides consistent cloud services across different zones, better resiliency, availability, higher interconnect speed between data centers for your resources. These features can be critical to your applications. Deploying the application in an MZR rather than a [single-zone region] can increase the availability from 99.9% to 99.99% when deployed over three zones.&amp;quot;&amp;lt;ref name=&amp;quot;IBMLocationsRes21&amp;quot;&amp;gt;{{cite web |url=https://cloud.ibm.com/docs/overview?topic=overview-locations&amp;amp;locale=en |title=Locations for resource deployment |work=IBM Cloud Docs - Getting Started with IBM Cloud |publisher=IBM Cloud |date=15 April 2021 |accessdate=16 April 2021}}&amp;lt;/ref&amp;gt; It's highly unlikely that all three zones would be affected in an catastrophic event. However, if this is a concern, discuss further data redundancy with an IBM Cloud representative. (IBM provides some additional insight by discussing its [https://cloud.ibm.com/docs/overview?topic=overview-zero-downtime approach to availability and disaster recovery] in its documentation.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17. '''Can we use your interface to extract our data when we want, and in what format will it be?'''&lt;br /&gt;
&lt;br /&gt;
IBM does talk about [https://cloud.ibm.com/docs/cloud-object-storage?topic=cloud-object-storage-region-copy moving data between buckets], but documentation about extracting data from their cloud service and moving it to your own private cloud or transferring it to another cloud service can't be found. IBM does note in a blog post that it is &amp;quot;active in the EU’s Switching Cloud Providers and Porting Data (SWIPO) initiative which lays out requirements for transparency at both infrastructure and software levels.&amp;quot;&amp;lt;ref name=&amp;quot;NottCloud20&amp;quot;&amp;gt;{{cite web |url=https://www.ibm.com/blogs/think/fi-fi/2020/10/20/cloud-portability-and-interoperability/ |title=Cloud portability and interoperability |author=Nott, C. |work=IBM THINK Blog |publisher=IBM |date=20 October 2020 |accessdate=17 April 2020}}&amp;lt;/ref&amp;gt; However, it's not clear if IBM Cloud has mapped their cloud processes to the voluntary SWIPO codes of conduct. You'll have to discuss the details of data export and migration—including data formats—from IBM Cloud with a representative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18. '''Are your support services native or outsourced/offshored?'''&lt;br /&gt;
&lt;br /&gt;
It is unclear if support personnel are local to the customer or if support is outsourced to another business and country. Discuss this with an IBM Cloud representative.&lt;br /&gt;
&lt;br /&gt;
==Additional information==&lt;br /&gt;
&lt;br /&gt;
===Documentation and other media===&lt;br /&gt;
* [https://cloud.ibm.com/docs/overview?topic=overview-zero-downtime Disaster recovery documentation]&lt;br /&gt;
* [https://www.ibm.com/downloads/cas/3NXVRXG9 HIPAA compliance guide]&lt;br /&gt;
* [https://www.ibm.com/cloud/architecture/files/ibm-cloud-security-white-paper.pdf Client security whitepaper]&lt;br /&gt;
* [https://www.ibm.com/support/customer/csol/terms/?cat=data-security#detail-document IBM security and privacy principles]&lt;br /&gt;
&lt;br /&gt;
===External links===&lt;br /&gt;
* [https://www.ibm.com/cloud/architecture/architectures/ IBM Cloud architecture framework or description]&lt;br /&gt;
* [https://cloud.ibm.com/docs/overview?topic=overview-shared-responsibilities IBM Cloud shared responsibility model]&lt;br /&gt;
* [https://www.ibm.com/trust IBM Cloud trust center]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist|colwidth=30em}}&lt;/div&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
</feed>