Comments (5) Visits (19610)
Wrapping up this week's theme on the XO laptop, I decided to take on thechallenge of printing. I managed to print from my XO laptop to my laserjet printer.I checked the One Laptop Per Child [OLPC] website,and found there is no built-in support for printers, but there have been several peopleasking how to print from the XO, so here are the steps I did to make it happen.
(Note: I did all of these steps successfully on my Qemu-emulated system first, and then performed them on my XO laptop)
Now the problem is that there is no way to print stuff from any of the Sugar activities. The best place toput in print support would be the Journal activity. Along the bottom where the mounted USB keys arelocated could be an icon for a printer, and dragging a file down to the printer ojbect could cause it tobe send to the printer.
The alternative is to write some scripts invocable from the Terminal activity to determine what isin the journal, and send them to LPR with the appropriate parameters.
I did not have time to do either of these, but perhaps someone out there can take on that as a project.
Next week, I will be in Las Vegas attending the [IBM Edge2014 conference], IBM's premiere conference for System Storage and related products!
With thousands of people attending, you may have a hard time finding me in person. Here is my speaking schedule:
To prepare for the big event, consider [watching some of the sessions recorded] from last year, or review my blog posts from Edge2013:
For those on Twitter, my handle is @az990tony and the hashtag for this event is #IBMEdge.
(Guest Post: This is a guest post written by Tony Sater, IBM.)
Cyber resiliency is an organization’s ability to continue delivering the intended outcomes despite adverse cyber incidents. Cyber resiliency, Business Continuity and Disaster Recover share a common goal of protecting your data. Where cyber resiliency stands out is the confidence that the copy of revenue producing data, that would be used to restore a business from a cyber incident, has not been modified since it was ingested and can be reliably used to reduce the impact of a business outage due to a compromising attack.
Organizations are beginning to understand that traditional device-centric and technology-centric security measures, such as firewalls, fail to provide security in a Hybrid Multicloud cyber ecosystem. Moving forward, one must take a holistic approach across their data, applications, and the entire infrastructure to defend against and recover from a cyber-attack.
In order to more effectively deal with cyber events, the National Institution of Standards and Technology (NIST) provides a policy framework of computer security guidance for how organizations can assess and improve their ability to prevent, detect, and respond to cyber-attacks. This framework is an industry accepted methodology for building a plan to develop and implement safeguards to ensure delivery of critical business services.
Storage has for a long time played the role of “data custodian” in enterprise operations. In addition to providing containers where data goes when not in main memory, the system storage layer has traditionally provided protection solutions to recover from unusual events such as natural disasters, deliberate cyber-attacks, or accidental data loss or corruption. Over time, the range and sophistication of storage-based cyber resilience solutions has grown:
Let’s take a look at some of the IBM Storage for Cyber Resiliency capabilities and solutions.
IBM DS8880 Safeguarded Copy prevents sensitive point in time copies of data from being modified or deleted due to user errors, malicious destruction or ransomware attacks. Here’s how it works. Safeguarded Copy provides functionality to create up to 500 recovery points for a production volume. These recovery points are called Safeguarded Backups. The Safeguarded Backups are immutable, hidden and non-addressable by a host. The data within these backups can only be used after a Safeguarded Backup is recovered to a separate recovery volume providing a "logical air gap" functionality. Finally, these recovery volumes can be accessed using a recovery system and used to restore production data, providing a rapid and operational recovery capability.
IBM Tape Storage offers a cost effective, long term backup and archive WORM storage, with a true physical air gap and total separation from ransomware and cyber-attacks. Tape is used to optimize data protection costs and mitigates the risk of ransomware for data-centric organizations. At a cost of less than a half a cent per GB (Gigabyte), it is also an extremely cost-effective solution.
IBM Spectrum Protect and IBM Spectrum Protect Plus can store backup data in all storage pools such as disk, tape, object and more. IBM Spectrum Protect Operations Center using backup data analysis can alert admins for any suspicious activity. Our Spectrum Protect portfolio delivers pervasive, end to end encryption capabilities. Customers utilize Spectrum Protect Node replication to replicate the spectrum protect data to the isolated location such as WORM Tape media. Furthermore, these backup copies can be sent to a physically secure off-site location. IBM Spectrum CDM also supports snapshots as well, which is the traditional backup and recovery method that delivers the lowest RTO (Recovery Time Objective).
IBM delivers four key capabilities of cyber resiliency that delivers across block, file, object, tape, software-defined storage, and cloud.
The pain points that organizations face are evolving as cyber-attacks increase. There is a need for a more precise, immediate response to cyber events. This response, to be effective, needs to be planned, prepared and tested well before experiencing a live attack, where the stress and pressure of the attack overwhelms the organization as it tries to recover. Data storage systems and technologies lie at the heart of efforts to build IT environments that are resilient to logical data corruption in all its forms. IBM Storage offers a broad spectrum of market-leading cyber resilience solutions that help 21st century business survive and thrive.
For more information about IBM’s Storage for Cyber Resiliency, please read [Mainframe Storage for IBM Z].
This week's theme is Earth Day and the importance IBM has placed on energy and environmental conservation. I am traveling through Costa Rica, ranked by Forbes as the fifth greenest and [cleanest countries in the world]. Europe was home to the top four in the survey of 149 countries, ledby Switzerland, and home to 14 of the top 20. Colombia came in ninth. United States was a pathetic 39th.
In yesterday's post, [Green Water for Green Energy], I covered geo-thermal energy with a visit to the hot springs.My next activity was a rafting trip down the Peñas Blancas and San Carlos rivers, heading towards Nicaragua, to discuss hydro-electric power. Half of the hydro-electric power in this country is driven directly by river flow, and the rest relies on stored water in lakes. Back in 2007, Costa Rica had a drought, and this affected the hydro-electric capacity, resulting in brown-outs and power outages. When more than 80 percent of your energy comes from this source, droughts can be devastating. Rain patterns for Costa Rica have a dry season from mid-December to April, lots of Rain in May and June, a "short summer" (called affectionately El Veranito) with little or no rain in July, and then more rain the rest of the year, averaging over 150 inches of rainfall per year.
This was billed as a "Safari Float" ride.The water level was low, "Class I", the slowest possible rating, giving our raft guide Pedro a chance to point out a variety of birds, monkeys, iguanas and crocodiles. Iguanas and Crocodiles are protected endangered species in Costa Rica, and are notsupposed to be killed for food or sport.
(Hint: don't bother, both taste like chicken)Joining us in our raft is Pamela, the 9-year-old daughter of one of the employees of the rafting company, [Canoa Adventura]. This wastheir version of take
Along the way, we saw a bulldozer knocking down trees and scooping up the rich soil.Costa Ricans consider trees and soil as renewable resources, reducing the need to purchase foreign fossil-based oil for cooking and chemical fertilizers.The name of the country, Costa Rica, literally means "rich coast" in the Spanish language, and with a string of 112 volcanos, the silt has plenty of mineral content that is good for agriculture, from coffee and bananas, to sugar cane, oranges and African palm.
Midway down the river, we had an "energy stop" to rest from all the paddling. This involved a visit to Don Pedro's farm, he is 98 years old, has four daughters, five grandchildren, and three grea On the ride back, we stopped at the famous "Iguana bridge" where we could see up close and personal a dozen or so of these huge lizards. Our guide Marcos fed them some papaya. Agreat way to appreciate bio-diversity in action!
On the ride back, we stopped at the famous "Iguana bridge" where we could see up close and personal a dozen or so of these huge lizards. Our guide Marcos fed them some papaya. Agreat way to appreciate bio-diversity in action!
Comment (1) Visits (8086)
Today we watched Barack Obama get inaugurated as the 44th President of the United States, and he reminded all Americans that the power and strength of this country comes through its diversity.To some extent, this is also what gives IBM its power and strength as well. While not quite the orator of President Obama, IBM's own CFO, Mark Loughridge, gave a rousing speech about IBM's 4Q08 and year-end financial results.
In 2008, IBM was not just successful because it had a wide diversity of servers and storage hardware products, but also a diversity of software, and a diversity of service offerings.And lastly, IBM sells to a diversity of clients in different industries, throughout a diversity of markets. While the current economic meltdown might have affected businesses focused on the US and other major markets, IBM did particularly well last year in growth markets, including the so-called BRIC countries (Brazil, Russia, India and China).
IBM's approach to invest in R&D and its nearly 400,000 employees for long-term success continues to pay off. Where "Cash is King", IBM can also afford all those acquisitions and strategic initiatives, positioning the company for a brighter future.
Where there are challenges, IBM finds opportunity.Read More]
Well, I'm back from Mexico.
The flight back was uneventful, except for the leg from Houston to Tucson. The lady in the window seat had "overallocated storage" and required a "distance extension" on her safety belt. To accomodate her, her husband and I flipped up the "logical partitions" between the seats, and "compressed" to take up less space to accomodate. Luckily, it was only for two hours.
On the flight to Houston, I was asked what kind of drink I wanted, in Spanish, as the crew were all from Mexico. Here's a quick Spanish lesson:
Before IBM got into an OEM agreement with Network Appliance, I used to indicate that EMC and NetApp were the "Coke and Pepsi" of the NAS marketplace. IBM had a presence, but it was in the single digits, whereas these two major players had roughly equal marketshare, just as Coke and Pepsi dominate equally the US marketplace. That analogy doesn't work in other countries, as in some cases the country might be more heavily in favor of one or the other.
On my flight over from Houston to Tucson, however, I was asked what kind of "pop" I wanted. I always say "soda" to refer generically to soft drinks, but realize that others say "pop" instead. Not only can Americans be able to detect what part of the country people are from by accent, but also by the words they use.
Now I see a blog that explores in great detail the issue of Pop vs Soda vs Coke.
So, it looks like I'll need to "retire" my Coke vs. Pepsi analogy, not because their marketshare has changed, but because IBM's parntering with NetApp greatly skews the advantage over EMC.
Yesterday, most of the USA moved its clocks forward an hour. Arizona and Hawaii don't bother, as there is plenty of daylight in both states. While it may seem that Arizonans are not "affected" by Daylight Saving Time (DST), we are, because we have to deal with the time zone offsets with those we talk to in other states. (Note: it is SAVING not SAVINGS, many people mistakenly say "Daylight Savings Time", which is incorrect).
Year round, Arizona is on Mountain Standard Time (MST), which is GMT-7. Figuring out what time Arizona can be remembered by a simple mnemonic:
Those in Second Life may have noticed that "Second Life time" (SL time) shifted from PST to PDT. That is because their servers reside in San Francisco, California.
Comment (1) Visits (9220)
Ian Hughes talks about this Web 2.0 in his postExplaining Web 2.0 State of Mind.
Alan Lepofsky posts about The Value Of Social Networking which points to this same presentation about Web 2.0 concepts and ideas.He also points to this article in the Wall Street Journal titledPlaying Well With Others about IBM and their leadership in Web 2.0 technologies, such as those from our Lotus group.
Some quotes from the WSJ article I found interesting:
Some 26,000 IBM workers have registered blogs on the company's internal computer network where they opine on technology and their work.
Interesting in learning more about Web 2.0? The last page of the deck above has a good set of links and resources, for example, here are 23 Things to know about Web 2.0 to get you started.
Comment (1) Visits (8143)
Well, tomorrow is the Winter solstice, at least for those of us in the Northern hemisphere of the planet.As often happens, I have more vacation days left than I can physically take before they evaporateat the end of the year, so next week I will be off, going to see movies like the new["Golden Compass"]or perhaps read the latest book from [Richard Dawkins].
Next week, I suspect some of the kids on my block will be playing with radio-controlled cars orplanes. If you are not familiar with these, here's a [video on BoingBoing]that shows Carl Rankin's flying machines that he made out of household materials.
Which brings me to the thought of scalability. For the most part, the physics involvedwith cars, planes, trains or sailboats apply at the toy-size level as well as the real-world level. One human operator can drive/manage/sail one vehicle. While I have seen a chess master play seven opponents on seven chess boards concurrently, itwould be difficult for a single person to fly seven radio-controlled airplanes at the same time.
How can this concept be extended to IT administrators in the data center? They have to deal withhundreds of applications running on thousands of distributed servers.In a whitepaper titled [Single System Image (SSI)], the threeauthors write:
A single system image (SSI) is the property of a systemthat hides the heterogeneous and distributed nature of theavailable resources and presents them to users and applicationsas a single unified computing resource.IBM has some offerings that can help towards this goal.
Customers are growing their storage capacity on average 60 percent per year. They could do this by havingmore and more things to deal with, and gripe about the complexity, or they can try to grow theirsingle system image bigger, with interfaces and technologies that allow the existing IT staff to manage.
technorati tags: Winter solstice, Golden Compass, Richard Dawkins, radio-controlled, cars, planes, trains, sailboats, automobiles, IBM, mainframe, system z, parallel sysplex, single system image, DFSMS, SAN Volume Controller, SVC, Virtual File Manager, VFM, System Storage, Productivity Center, SSPC, master console, SAN, fabric, gear, disk, tape, libraries, data center, topology, semantic zooming[Read More]
Comment (1) Visits (12052)
Lakota Industries made news with the introduction of its [Sarah-Cuda Hunting Bow], named after moose-huntingU.S. Vice President nominee and Governor of Alaska [Sarah Palin]. This has all the same features as their other high-end hunting bows, but is lighter, smaller and available in Pink Camo. This "pin
Not to be outdone, today, at the Storage Networking World Conference, IBM announced the new IBM System Storage SAN Volume Controller Entry Edition [SVC EE].
You might be thinking: "Wait! IBM SVC is already the leading storage virtualization product among SMB clients today,why introduce a less expensive model?" With the global economy in the tank, IBM thought it would be nice to help outour smaller SMB clients with this new option.
This new offering is actually a combination of new software (SVC 4.3.1) and new hardware (2145-8A4). Here are thekey differences:
The SVC EE is not a "dumbed-down" version of the SVC Classic. It has all the features and functions of theSVC Classic, including thin provisioning with "Space-efficient volumes", Quality of Service (QoS) performance prioritization for more important applications, point-in-time FlashCopy, and both synchronous and asynchronous disk mirroring (Metro and Global Mirror).
While IBM has not yet have SPC-1 benchmarks published, IBM is positioning the SVC EE as roughly 60 percent of the performance, at 60 percent of the list price, compared to a comparable SVC Classic 2145-8G4 configuration. The SVC Classic is already one of the fastest disk systems in the industry. By comparison, the SVC EE is twice as fast as the original SVC 2145-4F2 introduced five years ago.If you outgrow the SVC EE, no problem! The 2145-8A4 can be used in traditional SVC Classic mode, and the SVC EE software can be converted into the SVC Classic software license for upgrade purposes, protecting your originalinvestment!
For those considering an HP EVA 4400 or EMC CX-4 disk system, you might want to look at combining an SVC EE with [IBM System Storage DS3400] disk. The combination offers more features and capabilities, and helps reduce your IT costs at the same time.
And if you are worried you can't afford it right now, IBM Global Financing is offering a ["Why Wait?" world-wide deferral of interest and payments] for 90 days, so you don't have to make your first payment until 2009, applicable to all IBM System Storage products, including the SVC EE, SVC Classic and DS3400 disk systems.
You can read more details on fellow blogger Barry Whyte's[Storage Virtualization] blog.
technorati tags: IBM, SVC, SVC EE, SVC Classic, Lakota Industries, Sarah-Cuda, Sarah Palin, Flamingo Pink, Raven Black, RPQ, SPC-1, 2145-8A4, DS4300, IBM Global Financing, Why Wait, FlashCopy, Metro Mirror, Global Mirorr, Barry Whyte[Read More]
I am back from lovely Taipei. The IBM Top Gun class went well. Here are a few pictures of things I found interesting while I was there.
On the first day of class, I asked for some coffee. Our lovely class assistant, Ashley, brought me a cup with an interesting paper filter hanging on the edge. I have since learned that there are two drinks never to order in Taiwan: coffee and wine. If you enjoy either, you won't here. Instead, I drank the local "Taiwan Beer" and various types of tea.
Our class was on the 14th floor of the building, and there was this warning sign posted in the elevator. I have no idea what Chinese characters say, but we found the cartoon depictions of elevator dangers amusing. We interpreted the lower left corner to mean "Don't let your evil twin sister push you out of a moving elevator!"
I have to say that the variety of food was excellent. One night, we had dinner at a [Spanish Tapas] restaurant. The Spanish had a settlement on Taiwan island, known as Formosa back then, until driven out by the Dutch in 1642. We also had a traditional Chinese lunch, with dumplings, pickled cabbage, and "Lion's Head" soup.
From the classroom floor, we could see the Taipei 101 building, considered the third [tallest skyscraper in the world]. This wasn't here the last time I was in Taiwan.
On the last day, we were treated to some [Bubble tea], a specialty drink that originated in Taiwan in the 1980's. The straw was unusually thick, about twice as thick as a normal straw. We quickly figured out why. It was so that we could slurp up the brown floating things at the bottom. We didn't realize this until after the first sip. These floaties were actually Boba Tapioca pearls. The tea itself was delicious and sweet.
Special thanks to Joe Ebidia for managing the class, his assistant Ashley, and our local support team Justin and Stewart. I would also like to thank the staff at the Sherwood Hotel.
Last Thursday, on IBM's 100-year anniversary, we had a huge turn-out for the celebration here at the IBM Development Lab site in Tucson, AZ. Employees brought in memorabilia that reminded them of the past 100 years.
Everyone got a black tee-shirt with the original IBM logo. There was plenty of music, food and drink, as well as a few speeches by former and current IBM executives.
Now, the fun begins on the next century of IBM. What will be in store for the world in the 21st century? We live in interesting times!
Comments (2) Visits (9292)
Continuing our exploration this week into the performance of disk systems, today I will cover the metrics to measure performance. Why do people have metrics?
Several bloggers suggested that perhaps an analogy to vehicles would be reasonable, given that cars and trucks are expensive pieces of engineering equipment, and people make purchase decisions between different makes and models.
In the United States, the Environmental Protection Agency (EPA) government entity is responsible for measuringfuel economy of vehicles using the metric Miles Per Gallon (mpg).Specifically, these are U.S. miles (not nautical miles) and U.S. gallons, not imperial gallons. It is importantwhen defining metrics that you are precise on the units involved.
Since nearly all vehicles are driven by gallons of gasoline, and travel miles of distance, this is a great metric to use for comparing all kinds of vehicles, including motorcycles, cars, trucks and airplanes. The EPA has a fuel economy website to help people make these comp What about storage performance? What could we use as the "MPG"-like metric that would allow you to compare different makes and models of storage? The two most commonly used are I/O requests per second (IOPS) and Megabytes transferred per second (MB/s). To understand the difference in each one, let's go back to our analogy from yesterday's post. In this example, it might have only taken 1 second to actually provide the answer, but it might have taken 10-30 seconds to pick up the phone, hear the request, respond, and then hang up the phone. If one person is able to do this in 10 seconds, on average, then he can handle 360 questions per hour. If another person takes 30 seconds, then only 120 questions per hour. Many business applications read or write less than 4KB of information per I/O request, and as such the dominant factor is not the amount of time to transfer the data, but how quickly the disk system can respond to each request. IOPS is very much like counting "Questions handled per hour" at the public library. To be more specific on units, we may specify the specific block size of the request, say 512 bytes or 4096 bytes, to make comparisons consistent. Now suppose that instead of asking for something with a short answer, you ask the public library to read you the article from a magazine, identify all the movies and show times of a local theatre, or recite a work from Shakespeare. In this case, the time it took to pick up the phone and respond is very small compared to the time it takes to deliverthe information, and could be measured instead in words per minute. Some employees of the library may be faster talkers, having perhaps worked in auction houses in a prior job, and can deliver more words per minute than other employees. MB/s is very much like counting "Spoken words per minute" at the public library. To be more specific on units, we may request a specific amount of information, say the words contained in "Romeo and Juliet", to make comparisons consistent. Now that we understand the metrics involved, tomorrow we can discuss how to use these in the measurement process.
What about storage performance? What could we use as the "MPG"-like metric that would allow you to compare different makes and models of storage?
The two most commonly used are I/O requests per second (IOPS) and Megabytes transferred per second (MB/s). To understand the difference in each one, let's go back to our analogy from yesterday's post.
In this example, it might have only taken 1 second to actually provide the answer, but it might have taken 10-30 seconds to pick up the phone, hear the request, respond, and then hang up the phone. If one person is able to do this in 10 seconds, on average, then he can handle 360 questions per hour. If another person takes 30 seconds, then only 120 questions per hour. Many business applications read or write less than 4KB of information per I/O request, and as such the dominant factor is not the amount of time to transfer the data, but how quickly the disk system can respond to each request. IOPS is very much like counting "Questions handled per hour" at the public library. To be more specific on units, we may specify the specific block size of the request, say 512 bytes or 4096 bytes, to make comparisons consistent.
Now suppose that instead of asking for something with a short answer, you ask the public library to read you the article from a magazine, identify all the movies and show times of a local theatre, or recite a work from Shakespeare. In this case, the time it took to pick up the phone and respond is very small compared to the time it takes to deliverthe information, and could be measured instead in words per minute. Some employees of the library may be faster talkers, having perhaps worked in auction houses in a prior job, and can deliver more words per minute than other employees. MB/s is very much like counting "Spoken words per minute" at the public library. To be more specific on units, we may request a specific amount of information, say the words contained in "Romeo and Juliet", to make comparisons consistent.
Now that we understand the metrics involved, tomorrow we can discuss how to use these in the measurement process.
Last week, fellow IBM blogger Barry Whyte Barry pointed out that my recent post on [Cognitive University for Watson Systems SmartSeller] was my 1,000th blog post. After 10 years of blogging, I have reached the 1,000 mark!
(As IBM is focused on its transformation from a "Systems, Software and Services" company to a "Cognitive Solutions and Cloud Platform" company, it seems appropriate to highlight my 1,000 blog post on the concept of cognitive solutions.)
A lot of people ask me to explain what exactly does IBM mean by "cognitive", which is a fair question. Let's start with the [Dictionary definition]:
What exactly does IBM mean by Cognitive? IBM has taken this definition, and focused on four key strategic areas:
IBM is exploring the use of Cognitive Solutions in a variety of different industries, from Healthcare to Retail, Financial Services to Manufacturing, and more.
Comment (1) Visits (10181)
This week (actually April 29 to May 2) is IBM'sPartnerWorld 2007 conference.Over the past 10 years, IBM's shift to rely more heavily on business partners has proven to be a smart decision. IBM Business Partners can often focus on a specific region or industry much better, with laser-like focus.
In case you missed it, IBM launches System Storage products in Second Life was a great success, and the Business Partner community is a-buzz about this new technology for their own usage. Here is a quick 2-minute highlight clip of the event:
One of the reporters we invited to the event, Heather Clancy from CRN, wrote an article about it: Second Life: Ready or Not.
IBM Business Partners are glad to see IBM lead the storage industry in new and innovative ways!
Comments (12) Visits (15521)
I'm glad to be back home in Tucson for a few weeks. All of these conferences kept mefrom reading up with what was going on in the blogosphere.
A few of us at IBM found it odd that EMC would announce their new Geographically Dispersed Disaster Restart (GDDR) the weekBEFORE their "EMC World" conference. Why not announce all of the stuff all at once instead at the conference?Were they worried that the admission that "Maui" software is still many months awaythat much of a negative stigma? The decision probably went something like this:
EMCer #1: GDDR is finally ready, should we announce now, or wait ONE week to make it part of the thingswe announce at EMC World?
My fellow blogger and intellectual sparring partner, Barry Burke, on his Storage Anarchist blog, posted [are you wasting money on your mainframe dr solution?"] to bringup the GDDR announcement. The key difference is that IBM GDPS works withIBM, EMC and HDS equipment, being the fair-and-balanced folks that IBM clientshave come to expect, but it appears EMC GDDR works only with EMC equipment.Because GDDR does less, it also costs less. I can accept that. You get whatyou pay for. Of course, IBM does have a variety of protection levels, one probably will meet your budget and your business continuity needs.
To correct Barry's misperception, companies that buy IBM mainframe servers do have a choice.They can purchase their operating system from IBM, get their Linux or OpenSolarisfrom someone else like Red Hat or Novell, or build their own OS distribution fromreadily available open source. And unlike other servers that might require at leastone OS partition from the vendor, IBM mainframes can run 100 percent Linux.GDPS supports a mix of OS data. z/OS and Linux data can all be managed by GDPS.Companies that own mainframes know this. I can forgive the misperception from Barry,as EMC is focused on distributed servers instead, and many in their company may not have muchexposure to mainframe technology, or have ever spoken to mainframe customers.
But what almost had me fall out of my chair was this little nugget from his post:
"If you're an IBM mainframe customer, you are - by definition - IBM's profit stream."
Honestly, is there anyone out there that does not realize that IBM is a for- (courtesy of [fin Of course, I for one would love to help Barry's dream of EMC non-profitability come true. If anyone has any suggestions how we can help EMC approach this goal, please post a comment below.
(courtesy of [fin Of course, I for one would love to help Barry's dream of EMC non-profitability come true. If anyone has any suggestions how we can help EMC approach this goal, please post a comment below.
Of course, I for one would love to help Barry's dream of EMC non-profitability come true. If anyone has any suggestions how we can help EMC approach this goal, please post a comment below.Read More]
Comments (2) Visits (10872)
We're moving! We often joke that I.B.M. stands for "I've Been Moved", and the Tucson Executive Briefing Center is no exception.
Today is the last day for us in Building 9070. Starting tomorrow, the Tucson EBC will operate out of Building 9032 instead. While moving is always painful, there are some distinct advantages to the new facility:
For myself, as the lead Subject Matter Expert on the Tucson EBC staff, I get a much larger office with brand new furniture!
Now is the time to book a briefing in Tucson to check out the new facility. Go to the [Tucson EBC landing page] for contact information.
Over 4,000 issues of your favorite magazine now sit, ready for you to search and savor, on an 80GB incredibly lightweight and travel-friendly drive. This high-performance, brushed-aluminum Hard Drive measures only 3x5-inch and can easily fit inside a purse or briefcase so show it off to your tech-savvy friends and co-workers. Plus, there is plenty of extra room on the drive for future updates. Simply install The Complete New Yorker Program (installation CD provided), then connect the drive to a USB port on your Computer and have instant access to every article, poem, short story, and cartoon including every advertisement that has appeared in the magazine since 1925.
The 750MB of disk space required on your system probably contains the indexing/metadata search system to find articles by subject, title or author. Linux is not listed, and if 750MB of disk space are required to run the program, then perhaps this system won't work with Linux at all.
The system claims that there is extra room on the disk to ingest future issues of the magazine. I wonder why they didn't put the indexing/metadata search software on the drive itself, so that it would be self-contained, rather than having a separate installation CD.
I think this is a sign of our times. The New Yorker magazine has taken the archives that they keep anyways, and made them available in bulk, in a handy disk drive delivery system. I know several people who keep boxes and boxes of back issues of all kinds of magazines, and this certainly is an improvement.
Comment (1) Visits (9274)
Hello Everyone! I am back from my safari vacation in Kenya.
One of the interesting parts of the journey was to visit a village of the Samburu tribe. Each village is a circle of huts surrounded by thorned branches to keep the wild lions out. In the center is another ring of thorned branches to keep all the cattle, sheep and goats.
One of the tribewomen invited us to show us her home. Each hut is made of sticks, stuck into the ground and then woven with other sticks, then covered in cow dung along the walls, and scraps of cardboard and newspaper as the roof.
Although the hut looks small from the outside, it was surprisingly roomy inside; it was divided into four rooms or partitions. The first was for the adults, the second for children, and the third for newborn animals and sometimes relatives visiting from other villages.
I asked what was the fourth room used for, and of course, her answer was: Storage.[Read More]
Next month, I will be presenting at the IBM Systems Technical University for Storage and POWER. This conference will be held in New Orleans, Louisiana, October 16-20, 2017.
Instead of a "Meet the Experts" Q&A panel, this event will feature a "Poster Session". I had the pleasure of doing one of these down in Melbourne, Australia last month. For those who missed it, here are my blog posts:
By now, you have already decided on a title and abstract of your poster. You will need to figure out a quick and easy way to explain your poster, and as always, shorter is better. It reminds me of a famous quote:
"Sorry this letter is too long...
The event team asked me to write some instructions on the mechanics of how to put together a poster for this, since it is new for many people. I use Microsoft PowerPoint 2013 and ImageMagick tools to accomplish this.
I am looking forward to going back to New Orleans to speak at this conference!