Continuing this week in Los Angeles, I went to some interesting sessions today at theSystems Technical Conference (STC08).
- System Storage Productivity Center (SSPC) - Install and Configuration
Dominic Pruitt, an IBM IT specialist in our Advanced Technical Support team, presented SSPC and howto install and configure it. For those confused between the difference of TotalStorage ProductivityCenter and System Storage Productivity Center, the former is pure software that you install on aWindows or Linux server, and the latter is an IBM server, pre-installed with Windows 2003, TotalStorageProductivity Center software, TPCTOOL command line interface, DB2 Universal Database, the DS8000 Element Manager, SVC GUI and CIMOM, and [PuTTY] rLogin/SSH/Telnet terminal application software.
SSPC speeds up the deployment of TotalStorage Productivity Center. The[SSPC Planning Worksheet] captures all of the pieces of information you need to activate the machine. On March 8,IBM simplified the [procedure to change the SSPC host name].
Of course, the problem with having a server pre-installed with a lot of software is that there is alwayssomeone that wants to customize it further. For those who just want to manage their DS8000 disk systems,for example, it is possible to uninstall the SVC GUI, CIMOM and PuTTY, and re-install them later when youchange your mind. As a general rule, it is not wise to mix CIMOMs on the same machine, as it might causeconflicts with TCP ports or Java level requirements, so if you want a different CIMOM than SVC, uninstallthe SVC CIMOM first. For those who have SVC, the SSPC replaces the SVC Master Console, so you can safelyturn off the SVC CIMOM on your existing SVC Master Consoles.
The base level is TotalStorage Productivity Center "Basic Edition", but you can upgrade the Productivity Centerfor Disk, Data and Fabric components with license keys. You can also run Productivity Center for Replication,but IBM recommends adding processor and memory to do this (IBM offers this as an orderable option).Whether you have the TotalStorage software or SSPC hardware, Productivity Center has a cool role-to-groups mapping feature.You can create user groups, either on the Windows server, the Active Directory, or other LDAP, and then map which roles should be assigned to users in each group.
Since Productivity Center manages a variety of different disk systems, it has made anattempt to standardize some terminology. The term "storage pool" refers to an extentpool on the DS8000, or a managed disk group on the SAN Volume Controller. Since the DS8000 can support both mainframe CKD volumes and LUNs for distributed systems, theterm "volume" refers to a CKD volume or LUN, and "disk" refers to the hard disk drive (HDD).
To help people learn Productivity Center, IBM offers single-day "remote workshops"that use Windows Remote Desktop to allow participants to install, customize and usethe software with no travel required.
- IBM Integrated Approach to Archiving
Dan Marshall, IBM global program manager for storage and data services on our Global Technology Services team, presented IBM's corporate-wide integration to support archive across systems, software and services.One attendee asked me why I was there, given that "archive" is one of my areas of subject matter expertise that I present often at the Tucson Executive Briefing Center. I find it useful to watch others present the material, even material that I helped to develop, to see a different slant or spin on each talking point.
Archive is one area that brings all parts of IBM together: systems, software and services.Dan provided a look at archive from the services angle, providing an objective unbiasedview of the different software and systems available to solve specific challenges.
- Encryption Key Manager (EKM) Design and Implementation
Jeff Ziehm, IBM tape technical sales specialist, presented IBM's EKM software, how it works in a tape environment, and how to deploy it in various environments. Since IBM is allabout being open and non-proprietary, the EKM software runs on Java on a variety ofIBM and non-IBM operating systems. IBM offers "keytool" command line interface (CLI) for the LTO4 and TS1120 tape systems, and "iKeyMan" graphical user interface (GUI) for theTS1120. Since it runs on Java, IBM Business Partners and technical support personneloften just [download and install EKM]onto their own laptops to learn how to use it.
- Virtual Tape Update
We had three presenters at this one. First, Jeff Mulliken, formerly from Diligent and now a full IBM employee, presented the current ProtecTier softwarewith the HyperFactor technology, then Abbe Woodcock, IBM tape systems, compared Diligent with IBM's TS7520 and just-announced TS7530virtual tape libraries, and finally Randy Fleenor, IBM tape sales leader, presented IBM's strategy going forward in tape virtualization.
Let's start with Diligent. The ProtecTier software runs on any x86-64 server withat least four cores and the correct Emulex host bus adapter (HBA) cards. Using Red HatEnterprise Linux (RHEL) as a base, the ProtecTier software performs its deduplication entirely in-lineat an "ingest rate" of 400-450 MB/sec. This is all possible using 4GB memory-resident "dictionary table" that can map up to 1 PB of back end physical storage, which could represent as much as 25PB of "nominal" storage. Theserver is then point-to-point or SAN-attached to Fibre Channel disk systems.
As we learned yesterday from Toby Marek's session, there are four ways to performdeduplication:
- full-file comparisons. Store only one copy of identical files.
- fixed-chunk comparisons. Files are carved up into fixed-size chunks, and each chunkis compared or hashed to existing chunks to eliminate duplicates.
- variable-chunk comparisons. Variable-length chunks are hashed or diffed to eliminate duplicate data.
- content-aware comparisons. If you knew data was in Powerpoint format, for example,you could compare text, photos or charts against other existing Powerpoint files toeliminate duplicates.
IBM System Storage N series Advanced Single Instance Storage (A-SIS) uses fixed-chunkmethod, and Diligent uses variable-chunk comparisons. Diligent does this using "dataprofiling". For example, let's say most of my photographs are pictures of people, buildings, landscapes, flowers and IT equipment. When I back these up, the Diligentserver "profiles" each, and determines if any existing data have a similar profilethat might have at least 50 percent similar content. Diligent than reads in the data that is mostly likely similar, does a byte-for-byte ["diff" comparison], and creates variable-lengthchunks that are either identical or unique to sections of the existing data. Theunique data is compressed with LZH and written to disk, and the sequential series of pointer segments representing the ingested file is written in a separate section on disk.
That Diligent can represent profiles for 1PB of data in as little as 4GB memory-residentdictionary is incredible. By comparison, 10TB data would require 10 million entries on a content-aware solution, and 1.25 billion entries for one based on hash-codes.
Abbe Woodcock presented the TS7530 tape system that IBM announced on Tuesday. It has some advantages over the current Diligent offering:
- Hardware-based compression (TS7520 and Diligent use software-based compression)
- 1200 MB/sec (faster ingest rate than Diligent)
- 1.7PB of SATA disk (more disk capacity than Diligent)
- Support for i5/OS (Diligent's emulation of ATL P3000 with DLT7000 tapes not supported on IBM's POWER systems running i5/OS)
- Ability to attach a real tape library
- NDMP backup to tape
- iSCSI attachment
- tape "shredding" (virtual equivalent of degaussing a physical tape to erase all previously stored data)
Randy Fleenor wrapped up the session telling us IBM's strategy going forward with all of thevirtual tape systems technologies. Until then, IBM is working on "recipes" or "bundles", puttingDiligent software with specific models of IBM System x servers and IBM System Storage DS4000 disk systemsto avoid the "do-it-yourself" problems of its current software-only packaging.
- Understanding Web 2.0 and Digital Archive Workloads
I got to present this in the last time slot of the day, just before everyone headed off to the [Westin Bonaventure hotel] for our big fancy barbecue dinner. Like my previous sessionon IBM Strategy, this session was more oriented toward a sales audience, but both garnereda huge turn-out and were well-received by the technical attendees.
This session was requested because these new applications and workloads are what is driving IBM to acquire small start-ups like XIV, deploy Scale-Out File Services (SOFS), and develop the innovative iDataPlex server rack.
The session was fun because it was a mix of explanation of the characteristics ofWeb 2.0 services; my own experience as a blogger and user of Google Docs, FlickR, Second Life andTivo; and an exploration in how database and digital archives will impact thegrowth in computing and storage requirements.
I'll expand on some of these topics in later blog posts.
technorati tags: IBM, SSPC, System Storage, TotalStorage, Productivity Center, Windows 2003, Linux, TPCTOOL, DB2, DS8000, SVC, GUI, CLI, CIMOM, PuTTY, SSH, Java, LDAP, CKD, Volume, LUN, HDD, workshops, Dominic Pruitt, Dan Marshall, Global Technology Services, GTS, archive, Jeff Ziehm, EKM, keytool, iKeyMan, LTO4, TS1120, VTL, Diligent, ProtecTier, HyperFactor, Jeff Mulliken, Abbe Woodcock, Randy Fleenor, TS7520, TS7530, x86-64, RHEL, deduplication, A-SIS, diff, LZH, compression, i5/OS, DLT7000, P3000, NDMP, iSCSI, shredding, DS4000, Westin Bonaventure, Web2.0, digital archive, XIV, SOFS, iDataPlex, Google Docs, Second Life, FlickR, Tivo
My theme this week was to focus on "Do-it-Yourself" solutions, such as the "open storage" concept presentedby Sun Microsystems, but it has morphed into a discussion on vendor lock-in. Both deserve a bit of furtherexploration.
There were several reasons offered on why someone might pursue a "Do-it-Yourself" course of action.
- Building up skills
In my post [Simply Dinners and Open Storage], I suggested that building a server-as-storage solution based on Sun's OpenSolaris operating system could serve to learn more about [OpenSolaris], and by extension, the Solaris operating system.Like Linux, OpenSolaris is open source and has distributions that run on a variety of chipsets, from Sun's ownSPARC, to commodity x86 and x86-64 hardware. And as I mentioned in my post [Getting off the island], a version of OpenSolaris was even shown to run successfully on the IBM System z mainframe.
"Learning by Doing" is a strong part of the [Constructivism] movement in education. TheOne Laptop Per Child [OLPC] uses this approach. IBM volunteers in Tucson and 40other sites [help young students build robots]constructed from [Lego Mindstorms]building blocks.Edward De Bono uses the term [operacy] to refer to the"skills of doing", preferred over just "knowing" facts and figures.
However, I feel OpenSolaris is late to the game. Linux, Windows and MacOS are all well-established x86-based operating systems that most home office/small office users would be familiar with, and OpenSolaris is positioning itself as "the fourth choice".
In my post[WashingtonGets e-Discovery Wakeup Call], I suggested that the primary motivation for the White House to switch from Lotus Notes over to Microsoft Outlookwas familiarity with Microsoft's offerings. Unfortunately, that also meant abandoning a fully-operational automated email archive system, fora manual do-it-yourself approach copying PST files from journal folders.
Familiarity also explains why other government employees might print out their emails and archive them on paperin filing cabinets. They are familiar with this process, it allows them to treat email in the same manner as they have treated paper documents in the past.
- Cost, Control and Unique Requirements
The last category of reasons can often result if what you want is smaller or bigger than what is availablecommercially. There are minimum entry-points for many vendors. If you want something so small that it is notprofitable, you may end up doing it yourself. On the other end of the scale, both Yahoo and Google ended up building their data centers with a do-it-yourself approach, because no commercial solutions were available atthe time. (IBM now offers [iDataPlex], so that has changed!)
While you could hire a vendor to build a customized solution to meet your unique requirements, it might turn outto be less costly to do-it-yourself. This might also provide some added control over the technologies and components employed. However, as EMC blogger Chuck Hollis correctly pointed out for[Do-it-yourself storage],your solution may not be less costly than existingoff-the-shelf solutions from existing storage vendors, when you factor in scalability and support costs.
Of course, this all assumes that storage admins building the do-it-yourself storage have enough spare time to do so. When was the last time your storage admins had spare time of any kind?Will your storage admins provide the 24x7 support you could get from established storage vendors? Will theybe able to fix the problem fast enough to keep your business running?
From this, I would gather that if you have storage admins more familiar with Solaris than Linux, Windows or MacOS,and select commodity x86 servers from IBM, Sun, HP, or Dell, they could build a solution that has less vendor lock-in than something off-the-shelf from Sun. Let's explore the fears of vendor lock-in further.
- The storage vendor goes out of business
Sun has not been doing so well, so perhaps "open storage" was a way to warn existing Sun storage customers thatbuilding your own may be the next alternative.The New York Times title of their article says it all:["Sun Microsystems Posts Loss and Plans to Reduce Jobs"]. Sun is a big company, so I don't expect them to close their doors entirely this year,but certainly fear of being locked-in to any storage vendor's solution gets worse if you fear the vendor might go out of business.
- The storage vendor will get acquired by a vendor you don't like
We've seen this before. You don't like vendor A, so you buy kit from vendor B, only to have vendor A acquire vendorB after your purchase. Surprise!
- The storage vendor will not support new applications, operating systems, or other new equipment
Here the fear is that the decisions you make today might prevent you from choices you want to make in the future.You might want to upgrade to the latest level of your operating system, but your storage vendor doesn't supportit yet. Or maybe you want to upgrade your SAN to a faster bandwidth speed, like 8 Gbps, but your storage vendordoesn't support it yet. Or perhaps that change would require re-writing lots of scripts using the existingcommand line interfaces (CLI). Or perhaps your admins would require new training for the new configuration.
- The storage vendor will raise prices or charge you more than you expect on follow-on upgrades
For most monolithic storage arrays, adding additional disk capacity means buying it from the same vendor as the controller. I heard of one company recently who tried to order entry-level disk expansion drawer, at a lower price, solely to move the individual disk drives into a higher-end disk system. Guess what? It didn't work. Most storage vendors would not support such mixed configurations.
If you are going to purchase additional storage capacity to an existing disk system, it should cost no more thanthe capacity price rate of your original purchase. IBM offers upgrades at the going market rate, but not all competitors are this nice. Some take advantage of the vendor lock-in, charging more for upgrades and pocketing the difference as profit.
Vendor lock-in represents the obstacles in switching vendors in the event the vendor goes out of business, failsto support new software or hardware in the data center, or charges more than you are comfortable with. These obstacles can make it difficult to switch storage vendors, upgrade your applications, or meet otherbusiness obligations. IBM SANVolume Controller and TotalStorage Productivity Center can help reduce or eliminate many of these concerns. IBMGlobal Services can help you, as much or as little, as you want in this transformation. Here are the four levelsof the do-it-yourself continuum:
|Let me figure it out myself||Tell me what to do||Help me do it||Do it for me|
|This is the self-service approach. Go to our website, download an [IBM Redbook], figure out whatyou need, and order the parts to do-it-yourself.||IBM Global Business Services can help understand your business requirementsand tell you what you need to meet them.||IBM Global Technology Services can help design, assemble and deploy asolution, working with your staff to ensure skill and knowledge transfer.||IBM Managed Storage Services can manage your storage, on-site at your location, or at an IBM facility. IBM provides a varietyof cloud computing and managed hosting services.|
So, if you are currently a Sun server or storage customer concerned about these latest Sun announcements, give IBM a call, we'll help you switch over!
technorati tags: do-it-yourself, OpenSolaris, Solaris, Sun, Linux, SPARC, Yahoo, Google, iDataPlex, x86, x86-64, x64, mainframe, EMC, Chuck Hollis, HP, Dell, SAN, monolithic, disk, storage, system, arrays, open storage, NYT, New York Times, vendor lock-in, IBM, Global Services, GBS, GTS, SVC, TotalStorage, Productivity Center, Managed Storage Services, cloud computing
|We have successfully arrived to Mumbai, India. Since this is my first time in India, I decidedto check out the town by going to the local McDonald's® restaurant. As a former software engineer of McDonald's, I love the food, and try to visit a McDonald's in every country I visit. Wikipedia calls our transportation an [Auto Rickshaw], but the locals called it a "tuk-tuk". This is not my first time in one, they have them in Thailand and Mexico as well.|
We had the hotel identify the address of the closest McDonald's to our hotel. From past experienceI know that tuk-tuk drivers will suggest alternatives, in an effort to earn a larger fare, or to redirectto a preferred location where the driver might get special kick-backs. Our driver was no different.
The traffic was treacherous, the roadswere in roughshod condition, and sad looking stray dogs digging through piles of rubbish were everywhere. The local "Daily News and Analysis" newspaper this week estimates that there are over 70,000 stray dogs in Mumbai alone.What to do with all of these strays is a matter of controversy. In preparation for the Olympic games, China hasasked its restaurants to [take"dog" off their menus].Having lived in one of the poorest countries, and one of the richest, nothing surprises me anymore.
|My IBM colleague, Curtis Neal, decided to join me for this adventure. Finally, after about 20 minutes, our driver parks the tuk-tuk. He told us the restaurant is only aboutthree blocks away by foot, he would allow us to treat him to lunch, and then he will take us back to the hotel.While we appreciated his fantastic imagination, we told him we just wanted to be taken one-way to the restaurant, to drop us off at the front door, and we would find another tuk-tuk for the return.|
After a bit of argument, we settled on being left only one block away, and we would walk the rest.While we could not see exactly where the restaurant was when we got out, he at least pointed us in the right direction.
|The problem was that we approached the restaurant from behind, and came up to its equivalent of a "drive thru" window,ordered our food, and then went to the second window to pick up our order. We were eating on the street. It was not until I decided to take this photo of the restaurant, that we discovered there was an entire seating area upstairs, and around the cornerthe main entrance!|
There were plenty of tuk-tuks picking up and dropping people off, so we have no idea why ourprevious driver was unwilling to take us the entire distance.
|Cows are sacred here in India, so thereare no beef-based hamburgers to choose from. My choices for sandwiches were:|
Since my nutritionist asked me to avoid carbs and fried foods, I chose the McChicken with cheese combo meal with fries and a Coke.
- Fish Filet
- Veggie burger, made from brown rice
- Salad burger, basically a [BLT] without the bacon
Getting back was also a challenge. While we had no problem haling a tuk-tuk, we had no idea the address of ourhotel, and our driver had no idea where it was. We ended up driving around the city until we found a differenthotel, asked them if they knew where it was, and then eventually getting to our hotel. This is something I shouldhave planned for in advance, getting a card with the hotel details on it before leaving.
While it might seem like a simple trip, Curtis and I probably learned more about India this way than spending a week inside the comforts of our hotel.
technorati tags: IBM, Mumbai, India, McDonald's, China, stray dogs, restaurant, menu, Olympics, McChicken, Coke, tuk-tuk, auto rickshaw
Today, fellow IBMer Ken Hannigan celebrated his 25th year anniversary with IBM, which inducts him into the IBM Quarter Century Club[QCC
]. I was surprised to hear that there are over 900 QCC members currently residing in Arizona. In the past, QCC was shortly followed by retirement,but in these economic times, it marks a mid-point in one's career.
I met Ken back in 1988, I was working on DFHSM and he was part of theDFDSS team that moved from San Jose, California to Tucson, Arizona.Later, Ken and I would work in the same department as architects forthe DFSMS product that included DFSMShsm and DFSMSdss components.
Ken was then offered a chance to lead the effort to launch a new productfrom an internal project called Workstation Data Save Facility (WDSF) thatwas changed to Data Facility Distributed Storage Manager (DFDSM),then renamed to ADSTAR Distributed Storage Manager (ADSM), and finally tothe name it has today: [IBM Tivoli Storage Manager].
Over the years, Ken's had some interesting experiences. Two examples:
- Saving the Democracy of Peru
During a hotly contested election in the Latin American country of Peru, there were technical problems with the ballot records. Management needed someone from Tucson to go, and my namewas floated around, since I spoke Spanish fluently. My schedule did not permit,so they sent Ken instead. Ken was able to recover the lost ballot information and avoid a revolution.
- Assisted with the Technical team for a Major Motion Picture
Ken was part of the IBM technical team that helped [DreamWorks SKG] producethe movie [The Prince of Egypt],a major animated motion picture. IBM is heavily involved in the digital mediacommunity, and was instrumental in helping film-makers set up theirinformation infrastructure.
Ken has been one of my best friends over the past twenty years. I introduced him to hiswife, and was the best man at his wedding. It is quality people like Ken that makeworking at IBM so special.
technorati tags: IBM, QCC, Ken Hannigan, DFHSM, DFDSS, TSM, Tivoli, Peru, election, DreamWorks, The Prince of Egypt, Information Infrastructure
Last week's post [I nearly fell out of my chair
] stirred up a lot of comments. Here is an excerpt from a reader who goes by "AO"
...Try to say more with less words. The rear view mirror is great for safety but does not help taking you forward. I would much rather read about your view of the future of IT infrastructure...
In just a few sentences, the comment stirs up two controversial issues:"How long should posts be? and "What is the future of IT?
The blogs I follow seem to fall into three categories:
- Several small posts per day
[Life Hacker] and [Boing Boing] are two that I have quit following because of the number of posts was overwhelming. Twitter limits its updates to 140 total characters per post. [Seth Godin] often posts just a few sentences. And lately, I haveseen this craze for six-word stories and memoirs that inspired this [contest for a six-word motto for the United States].
- one post per day, perhaps three to five per week
IBM Developerworks that host this blog suggest posting once per day. General blogging guidelines I have found suggest 300 to 500 words per post. Most magazine and newspaper articles range around 700 words.In my book, [Inside System Storage: Volume I], I had 165 posts covering twelve months, with an average of 636 words per post.
- longer posts, perhaps once a week or less
I've seen several executives adopt this approach. When they have something to say, out comes a long speech,in written form, when the occasion deems it necessary. Some of the more technical blogs adopt this approachalso, going into great detail on product specifications and supporting material to make their case.
Either way, it comes out to perhaps 2000 words per week, that can be 20 posts of 100 words each, four posts that are 500 words each, or one long post for the week. Currently, I post about 2-5 times per week, with posts 500-700 words long. I can try to mix short posts with long ones, to give you readers some variety. Post a comment below on whether you prefer that I do more/shorter or fewer/longer.
As for the future of IT...
In a recent post by fellow blogger (and author) Nick Carr titled [Alan Turing, cloud computing and IT's future], he mentions he has a free download of a 7-page PDF called "IT in 2018: from Turing's machine to the computing cloud." It's a quick read, covering many of thepoints in his most recent book, The Big Switch. Here's an excerpt:
As for computer professionals, the coming of the WorldWide Computer means a realignment of the IT workforce,with some jobs disappearing, some shifting fromusers to suppliers, and others becoming more prominent.On the supplier side, we’ll likely see booming demand for the skills required to design and run reliable,large-scale computing plants. Expertise in parallelprocessing, virtualization, artificial intelligence, energymanagement and cooling, encryption, high-speed networking,and related fields will be coveted and rewarded.Much software will also need to be written orrewritten to run efficiently on the new infrastructure. Ina clear sign of the new labor requirements, Google andIBM have teamed up to spearhead a major educationinitiative aimed at training university students to writeprograms for massively parallel systems.
Some interesting insights from Google can be read in New York Times'Freakonomics blog, where Steve Dubner interviews Google's chief economist: [Hal Varian Answers Your Questions]Hal comes up with some clever answers to some rather tough questions. It's worth a read.
It is good to have futurists like this. However, as we caution in IBM, those who seek a life througha crystal ball... must often settle for a diet of broken glass.I will close with one of my favorite quotes.
"As I've said many times, the future is already here. It's just not very evenly distributed."
--- William Gibson (science-fiction author)
So, yes, I may sometimes look at the rear-view mirror. However, there is a common theme from Nick Carr to Steve Dubnerto William Gibson. They also look back to the past to give insights on how things might unfold in the future.
My view is that for some the future is already here. IBM already offers the product, service or solutionthat might be just what you need, but you just haven't gotten it yet. Future for you, but past for us.For others, the future is repeating a pattern we have already seen in the past. Understanding what happened back then helps us be better prepared to understand what is happening now, in the directions and trends we forecast moving forward.
The future of IT is coming, are you prepared?
technorati tags: rear view mirror, LifeHacker, BoingBoing, Twitter, Seth Godin, IBM, blook, Developerworks, Nick Carr, Alan Turing, future of IT, The Big Switch, blook, computing cloud, Google, Hal Varin, Steve Dubner, Freakonomics, William Gibson