Modified by TonyPearson
Continuing my coverage of the ITSO Cloud Social Media Residency, day 3 was filled with strategic and technical sessions on private, hybrid and public cloud solutions from IBM.
This blog post is part of a five-part series:
But first, a quick story.
A few years go, I was at the [Venetian hotel in Las Vegas], and took their famous [gondola ride] in a flat-bottom boat along a canal, partly in the hotel, and partly outside.
The gondolier propels the boat with an oar, and stopped rowing a few times to belt out beautiful Italian songs.
Truly impressed, I asked the gondolier how long was the training for this job. "Six weeks!" he answered. Wow! Where can I learn to sing like that in six weeks?
He clarified. No, the Venetian hotel hires competent singers, and then spends six weeks to teach them to row the gondola. Duh!
I asked Vasfi Gucer, our ITSO project leader for this residency, why there were so many Cloud topics on the agenda for this social media training. He explained it was just as important to emphasize "why" people need to be passionate about Cloud, in addition to the "what" and "how" of blogging.
This reminded me of this quote from fellow author Hugh MacLeod. I highly recommend his series of books.
"Blogging requires passion and authority. Which leaves out most people."
--- Hugh MacLeod.
Vasfi had invited Cloud experts who already have the authority to blog, and the point of this residency is for the residents to become passionate in sharing their expertise.
Here are some of the people that spoke on Cloud:
Ric Telford, IBM VP of Cloud Services
Ric Telford shared with us IBM's point of view of where the Cloud industry is going. He has been in this job position since 2009, and shared with us the history of how the IBM Cloud business has evolved in the past four years.
Jane Munn, IBM VP Business Line Executive for Cloud hardware
As the Center of Competency on Cloud for all 12 IBM Executive Briefing Centers in my group, I had to report to Jane Munn on a frequent basis. I was pretty candid on those calls on what we should change, and I am glad to see that many of my suggestions have been implemented, or being considered for 2014.
Michael Fork, IBM Lead Architect for Hosted Private Cloud
Michael Fork gave two great presentations, one on [IBM SoftLayer] Cloud services, and the second on IBM's support of open standards, such as [OpenStack] and Cloud Foundry.
To learn more about Cloud Foundry, Michael recommends a great post by James Watters titled [Essential Elements of an Enterprise PaaS].
Hans Zai, IBM Cloud Service Line Leader; and Odilon Magroski Goulart Junior, IBM Technical Solution Architect
All the residents had to present in front of the class on their expertise. Hans and Odilon presented their work on [IBM SmartCloud for SAP Applications]. Hans is from Sweden, and Odilon from Brazil, so their perspectives on this was quite interesting.
When IBM renamed LotusLive to [SmartCloud for Social Business], I thought this would be the naming convention for all of our Software-as-a-Service (SaaS) offerings.
But SmartCloud for SAP Applications is a Platform-as-a-Service, providing the SAP environment as a platform, which allows clients to then deploy their customized SAP applications on this platform.
What did I present on for my "Share your expertise" session? IBM System Storage, of course! Storage is a critical part of Cloud!
So, my gentle readers, what topics do you want me to write about that combines Storage and Cloud? Enter your suggestions in the comments below.
technorati tags: IBM, Las Vegas, Venetian Hotel, gondola, Vasfi Gucer, Hugh MacLeod, Ric Telford, Jane Munn, Michael Fork, Hans Zai, Odilon Junior, SoftLayer, OpenStack, Cloud Foundry, SmartCloud, SAP, Social Business, System Storage, LotusLive
The "corporate bloggers" from the various storage vendors often mention their opinions about IBM products. Sometimes, they say something nice, and other times they poke fun. It's good to read the various opinions. Most are well-thought and well-written.
EMC blogger Chuck Hollis has a post about the various categories that industry analyst IDC used for external controller-based disk in their most recentQ4 Storage Scorecard.I agree with Chuck that it is good to have independent analysts that take an objective look across all storage vendors to provide the facts on various makes and models. Both IBM and EMC took marketshare in 4Q, so we cancongratulate ourselves and each other for the efforts needed to make this happen.
Chuck mentions that while EMC and HDS high-end boxes are similar, perhaps IBM's "DS" series is different enough to question putting it in the same "high-end" category. It's not clear if Chuck is poking fun at the fact that theIBM DS family spans multiple categories; or an admission thatthe IBM DS8300 Turbo is faster than the EMC DMX-3 and HDS USP offerings. Perhaps we need a new categorycalled "super high-end"?
IDC doesn't publish their data by price band, but we can infer from the products in each how they decidedwhich products were grouped into which categories. Let's examine the entire IBM DS family in the various categories.
- Entry Level
Our newest offering is the IBM System Storage DS3000 series. Some analysts call this category "low end", but IBM prefers using "entry level". These have an attractivelow acquisition price, very easy to set up, and are intended for the Intel and AMD servers, such as IBMBladeCenter, System x, as well as servers from HP and Dell. Disk arrays in this category typically have listprices below $50,000 USD.
Our midrange offering is the IBM System Storage DS4000 series. These are designed for Linux, UNIX and Windows based workloads.Some call these server platforms "open systems", or sometimes "distributed systems". The DS4000 systems are rack-optimized modularunits, providing plenty of options and trade-offs between price and performance for price-sensitive customers.The "high end" model of the DS4000 series is the DS4800, and has very impressive performance characteristics.Disk arrays in this category typically have list prices in the $50,000 to $299,000 USD range.
- Enterprise Class
IBM System Storage DS6000 seriesis one of our enterprise class offerings. DS6000 offers mainframe attachment comparable to what EMC DMX or HDS USP offer for their "enterprise class" or "high end" models, but uses substantially less power and in a much more compact modular rack-optimized packaging. Disk arrays in this category typically have list prices at $300,000 USD and above.
- Super High End
Perhaps IBM and EMC can work together to petition IDC to adopt this as a new category, based on performance,rather than list price. Is the storage marketplace ready for a fourth category?As Chuck mentioned on his blog, IBM is #1 for mainframe disk storage, and perhaps it is because the IBM System Storage DS8000 Turbo series does so well on most mainframe workloads. No offering from EMC or HDS meet or beat the SPC benchmarks for the DS8000 Turbo. You can see the results in the Executive Summary or read the Full Report.
Thanks to IBM's innovative Adaptive ReplacementCache algorithm, IBM DS8000 performance shines best handling read-intensive random-access workloads that mainframes do most often. These types of workload are modeled by the SPC-1 benchmark. In cases of write-intensive, sequential processing, the differences are less substantial, as disk arrays from all manufacturers drop down to the native performance capabilities of the 10K and 15K RPM drives.
I'll give you a real example. Not long ago, I waspart of a team to help resolve a performance bottleneck on-site at the customer location. The customer had an interesting "composite application" where data was processed on AIX platform (IBM System p), which passed the data to a Linux partition running on the IBM System z mainframe,which in turn used Java SQL to post updates to a DB2 database on z/OS partition, which then wrote out through FICON adapters to an HDS USP device. IBM and HDS worked together to help the customer figure out why they weregetting disappointing throughput and response times. IBM brought in experts on AIX, TCP/IP, Java, Linux, z/OS and FICON. HDS had their experts too, and tried to improve performance by quadrupling the storage capacity, and spreading the data out across more spindles. That didn't work. As it turns out, HDS disk just couldn't deliver the performance required. The software and mainframe were all well tuned. They replaced the HDS withan IBM DS8000 array, and it met all the service level requirements. Problem solved.
The problem with having this new "super high end" category, of course, is that only IBM plays in it, so it wouldn'toffer the marketplace much of a comparison. For now, we'll just have to settle for being the fastest in the samecategory as EMC DMX and HDS USP.
Storage is a competitive marketplace.Both EMC and HDS are reputable companies that make quality products that attach to IBM System z mainframe servers. Not all workloads are mission-critical or performance-sensitive. For less critical workloads, perhaps you may find EMC or HDS performance is "good enough".
But if performance is important to you, you should consider IBM on your list of vendors for your next purchase decision. Let IBM help you prove it to yourself, running your specific workloads side by side with your existing equipment.
technorati tags: IBM, EMC, Chuck Hollis, IDC, Q4, storage, disk,scorecard, z/OS, AIX, Linux, Java, DB2, HDS, USP, DMX, SPC, benchmarks, mainframe, System Storage, DS3000, DS4000, DS6000, DS8000, DS8300, Turbo
This Thursday is U.S. Thanksgiving, so I the blogosphere is probably going to be quiet this week.
I found some interesting posts and articles on Second Life that might be of interest.
- [Harvard Offers Classes in Second Life]
Benjamin Duranske of Virtually Blind writes:
The Harvard Extension School is running a course focused on virtual law with a Second Life component. Rebecca Nesson (’Rebecca Berkman’ in Second Life) is teaching the class. The lectures, which look fascinating, are available to at-large participants on Berkman Island [SLURL: http://slurl.com/secondlife/Berkman/113/70/24].
You can attend the lectures in Second Life on Monday evenings from 8:00-10:00pm EST (5:00-7:00pm SL time). Videos of past lectures are linked on the course’s web site, where you can also find the syllabus, a wiki, and more.
- [Oh, It has losers...]
Roo over at Eightbar writes:
The US version of The Office (which does an excellent job of being almost as funny as the BBC version) is no stranger to life online. It’s fun to spot Kevin, Meredith, Creed, Roy, Pam all on MySpace, and Dwight has a blog. This week they dipped into Second Life. The very same week as CSI:NY; It’s all getting very mainstream.I watched this episode and loved how they were able to blend it in seamlessly without looking out of placeor awkward reference.
Of course, the Office’s treatment of SL was as tongue-in-cheek as you’d expect…
Dwight:“Second Life is not a game. It is a Multi User Virtual Environment. It doesn’t have points or scores or winners or losers.”
Jim:“Oh, it has losers.”
Steve Nelson at Clear Ink, the team behind bringing the office into SL for the episode, has [written about the project] and carefully lists the locations and clothing used.
- [A Press Conference in Second Life]
Matt Hamblen of ComputerWorld writes:
Cisco Systems Inc. has been staging virtual meetings between developers and channel partners in Second Life for more than a year, but this invitation was a first for me. So a presentation announcing the winners of a networking technology innovation contest -- inside a Second Life simulation -- seemed like the place to be.
I'm probably an SL noob (for newbie) by most standards, but I've spent enough time there to know most of the ways to move and how to search out islands and events.
In all, I would say the Cisco event sparked my interest in the SL virtual meeting format, but my attention was focused more on making things in SL work smoothly than on the material presented.
I've had some interesting conversations with event-coordinators looking for advice on setting up events in Second Life, so I suspect that is a good sign that this is still growing momentum.
technorati tags: Harvard, Eightbar, The+Office, Cisco, SecondLife, Second Life, SL, ComputerWorld, Matt Hamblen
Last week, Paul Weinberg of eChannelLine.com asks Is this the year of the SAN (again)?
So, I thought this week I would cover my thoughts and opinions on storage networking. We oftenfocus on servers or storage devices, and forget that the network in between is an entire worldon itself.
I believe Mr. Weinberg is basing this on the idea that in 2007, over 50 percent of disk will beattached over SAN, edging out the alternative: Direct Attached Storage (DAS). But perhaps 50 percentis the wrong number to focus on. In 2007, The United Nations estimates thatcities will surpass rural areas, with just over 50 percent of theworld's population. Does that make this the "Year of the City"? Of course not.
Instead, I prefer to use the methodology that Malcolm Gladwell uses in his book, The Tipping Point.(I have read this book and highly recommend it!)Gladwell indicates that the tipping point happens at the start of the epidemic, not when it is half over.Isn't it better to celebrate the sweet 16 debutante ball when young ladies have completed their years of training and preparation, and are ready to be introduced to the rest of the world, rather than after they are thirty-something, married with children.
Let's explore some of the history. Stuart Kendric has a nice 7-page summary on theHistory & Plumbing of SANs.
IBM announced the first SAN technology calledEnterprise Systems Connection (ESCON) way back in September 1990. This allowed multiplemainframe servers to connect to multiple storage systems over equipment called "ESCON Directors" that directedtraffic from point A to point B. Before this, mainframes sent "ChannelCommand Words" or CCWs, across parallel "bus and tag" copper cables. ESCON was serial overfiber optic wiring. SANs solved two problems: first, it reduced the "rat's nest" of cables between many serversand many storage systems, and second, it extended the distance between server and storage device.
For distributed systems running UNIX or Windows, the CCW-equivalent over parallel cables was called Small ComputerSystem Interface (SCSI). The SCSI command had over 1000 command words, so for its Advanced Technology (AT) personal computers (PC AT), IBM introduced a subset of SCSI commands called ATA (Advanced Technology Attachment). ATA drives supportedfewer commands, ran at slower speeds, and were manufactured with a less rigorous process. Today ATA drives are about 55 percent the cost per MB as comparable SCSI drives.
Anyone who has ever opened their PC and found flat ribbon cable with eight or sixteen wires in parallel, can understand that the same issues applied externally. Parallel technologies arelimited to distance and speed, as all the bits have to arrive at the end of the wire at approximately thesame time. Direct attach schemes with every server attaches directly to every storage device were also problematic.Imagine 100 servers connected to 100 storage devices, that would be 10,000 wires!
So, a new technology standard was developed, called Fibre Channel, ratified in 1994.The spelling of "Fibre" was intentionally made different than "Fiber" on purpose. "Fibre" is a protocol thatcan travel over copper or glass wires. "Fiber" represents the glass wiring itself.
Fibre Channel is amazingly versatile. For today's Linux, UNIX and Windows servers, it can carry SCSI commands, and the combination of SCSI over FC is called Fibre Channel Protocol (FCP). For the mainframe servers, it can carry CCW commands. Running CCW over Fibre Channel is called FICON. This convergence allows mainframes and distributed systems to share a common Fibre Channel network, using the same set of switches and directors.
We saw the use of SANs explode in the marketplace over the past 10 years, and then cool down with a series of mergers and acquisitions. Last year, Brocade announced it was acquiring rival McData, so we will be down to two major players, Cisco and Brocade.
So, IMHO, I think we are well past the "Year of the SAN".
technorati tags: IBM, SAN, storage, disk, United Nations, population, tipping point, Malcolm Gladwell, ESCON, SCSI, FCP, FICON, ATA, Brocade, McData, Cisco, Linux, UNIX, Windows
Last year in Beijing, China, one of my colleagues told me "When it rains here, cabs dry up". Normally, there are enough taxi cabs to handle normal conditions, but when it rains, people who normally walk now want to take a cab instead, and the demand goes up, resulting in being more difficult to find one when you need one.
I'm wrapping up my week here in Chicago, and it snowed yesterday. Cabs were scarce. I walked. Many others walked too, about half with umbrellas to protect themselves against the snowflakes.
Most systems are designed to handle typical average conditions. Taxi cabs in a city, for example, handle typicalamounts of traffic.
IT is different. In many cases, IT infrastructures are designed for the peaks, not the averages. Peaks can be where you need performance the most, and failure to design for peaks can be disastrous. As with any business decision, this represents a trade-off. Design for the average, and suffer through the peaks, or design for the peak, and be over-allocated and under-utilized most of the time otherwise.
The choice is yours.
technorati tags: IBM, Beijing, China, rain, taxi, cabs, Chicago, IT, average, peaks, over-allocated, under-utilized
This week, the [Global Language Monitor
] announced that "Web 2.0" became the One Millionth word of the English language. The average American only uses about 10,000 word vocabulary.
One way to improve your vocabulary is to read my blook (blog-based book), Inside System Storage: Volume I, which includes a 900-word glossary of storage-related terms. My blook is now available in hardcover or paperback at [Amazon] as well as direct from my publisher[Lulu]:
I have started working on a new book which I hope to have available for purchase later this year.
technorati tags: IBM, blook, Global Language Monitor
This week and next I am touring Asia, meeting with IBM Business Partners and sales repsabout our July 10 announcements
Clark Hodge might want to figure out where I am, given the nuclearreactor shutdowns from an earthquake in Japan. His theory is that you can follow my whereabouts just by following the news of major power outages throughout the world.
So I thought this would be a good week to cover the topic of Business Continuity, which includes disaster recovery planning. When making Business Continuity plans, I find it best to work backwards. Think of the scenarios that wouldrequire such recovery actions to take place, then figure out what you need to have at hand to perform the recovery, and then work out the tasks and processes to make sure those things are created and available when and where needed.
I will use my IBM Thinkpad T60 as an example of how this works. Last week, I was among several speakers making presentations to an audience in Denver, and this involved carrying my laptop from the back of the room, up to the front of the room, several times. When I got my new T60 laptop a year ago, it specifically stated NOT to carry the laptop while the disk drive was spinning, to avoid vibrations and gyroscopic effects. It suggested always putting the laptop in standby, hibernate or shutdown mode, prior to transportation, but I haven't gotten yet in the habit of doing this. After enough trips back and forth, I had somehow corrupted my C: drive. It wasn't a complete corruption, I could still use Microsoft PowerPoint to show my slides, but other things failed, sometimes the fatal BSOD and other times less drastically. Perhaps the biggest annoyance was that I lost a few critical DLL files needed for my VPN software to connect to IBM networks, so I was unable to download or access e-mail or files inside IBM's firewall.
Fortunately, I had planned for this scenario, and was able to recover my laptop myself, which is important when you are on the road and your help desk is thousands of miles away. (In theory, I am now thousands of miles closer to our help desk folks in India and China, but perhaps further away from those in Brazil.) Not being able to respond to e-mail for two days was one thing, but no access for two weeks would have been a disaster! The good news: My system was up and running before leaving for the trip I am on now to Asia.
Following my three-step process, here's how this looks:
- Step 1: Identify the scenario
In this case, my scenario is that the file system the runs my operating system is corrupted, but my drive does not have hardware problems. Running PC-Doctor confirmed the hardware was operating correctly. This can happen in a variety of ways, from errant application software upgrades, malicious viruses, or in my case, picking up your laptop and carrying it across the room while the disk drive is spinning.
- Step 2: Figure out what you need at hand
All I needed to do was repair or reload my file sytem. "Easier said than done!" you are probably thinking. Many people use IBM Tivoli Storage Manager (TSM) to back up their application settings and data. Corporate include/exclude lists avoid backing up the same Windows files from everyone's machines. This is great for those who sit at the same desk, in the same building, and would be given a new machine with Windows pre-installed as the start of their recovery process. If on the other hand you are traveling, and can't access your VPN to reach your TSM server, you have to do something else. This is often called "Bare Metal Restore" or "Bare Machine Recovery", BMR for short in both cases.
I carry with me on business trips bootable rescue compact discs, DVDs of full system backup of my Windows operating system, and my most critical files needed for each specific trip on a separate USB key. So, while I am on the road, I can re-install Windows, recover my applications, and copy over just the files I need to continue on my trip, and then I can do a more thorough recovery back in the office upon return.
- Step 3: Determine the tasks and processes
In addition to backing up with IBM TSM, I also use IBM Thinkvantage Rescue and Recovery to make local backups. IBM Rescue and Recovery is provided with IBM Thinkpad systems, and allows me to backup my entire system to an external 320GB USB drive that I can leave behind in Tucson, as well as create bootable recovery CD and DVDs that I can carry with me while traveling.
The problem most people have with a full system backup is that their data changes so frequently, they would have to take backups too often, or recover "very old" data. Most Windows systems are pre-formatted as one huge C: drive that mixes programs and data together. However, I follow best practice, separating programs from data. My C: drive contains the Windows operating system, along with key applications, and the essential settings needed to make them run. My D: drive contains all my data. This has the advantage that I only have to backup my C: drive, and this fits nicely on two DVDs. Since I don't change my operating system or programs that often, and monthly or quarterly backup is frequent enough.
In my situation in Denver, only my C: drive was corrupted, so all of my data on D: drive was safe and unaffected.
When it comes to Business Continuity, it is important to prioritize what will allow you to continue doing business, and what resources you need to make that happen. The above concepts apply from laptops to mainframes. If you need help creating or updating your Business Continuity plan, give IBM a call.
technorati tags: IBM, July, announcements, earthquake, Japan, nuclear reactor, power, outage, business, continuity, disaster, recovery, plan, plans, planning, IBM, Thinkpad, T60, laptop, Windows, Denver, BSOD, VPN, India, China, Brazil, help desk, Asia, Tivoli, Storage, Manager, TSM, BMR, external, USB, bootable, CD, DVD, separating, programs, data, Clark Hodge
It's official! IBM System Storage TS1120 tape drive takes home the gold award, the product of the year, announced by Storage magazine.
I spent 18 hours traveling from Australia to China yesterday, and we were partially delayed due to weather, but felt that it was necessary to discuss the innovative use of encryption on this drive.
While most consider the TS1120 an "Enterprise-class" tape technology for the mainframe, it is also attachable to the smallest distributed systems running Windows, Linux, or various flavors of UNIX. Rather than limit users with an Encryption Key Manager that only ran on z/OS, IBM instead chose to implement it in Java, that can be run on anything from z/OS to Linux, Unix and Windows platforms, giving clients choice and flexibility in their deployment.
The design is quite clever and elegant. In the encryption world, there are two ways to encrypt.
- Symmetric Key
This is very fast, because it uses a single key for both encryption and decryption, and can be incorporated on a chip. The problem is that anyone with the key can read the sensitive data.
- Asymmetric Key
This is slower, but more secure, using two separate keys. The public "encryption" key takes clear data and encrypts it. Anyone can be freely given this key, as they cannot use it to decrypt any other data. The private "decryption" key is able to decrypt the data, so that one is kept secret. If two business plan to exchange lots of tapes, they can exchange their "encryption" keys to each other.
So, let's say that Green, Inc. wants to send a tape to Blue, Co. Blue has already provided its public "encryption" key to Green, so Green does the following:
- Generate a unique data key, will call it the "red key", and there is one for each tape. It is a standard AES 256-bit symmetric key that can be processed with less than one percent overhead on the tape drive. All the data is encrypted with this key.
- Store the red key on the tape. How does Green give Blue the red key? Green encrypts it with Blue's RSA 2048-bit public "encryption" key. This is stored on three places on the tape cartridge, one in memory, and the other two on the media itself.
- Sends the tape over to Blue Co.
When it arrives on the dock at Blue Co., they do the following:
- Mount the tape and decrypt the "red key" using Blue's super-secret private decryption key.
- Pass the "red key" to the tape drive, and have it read, append or re-write the tape.
If the super-secret private key is ever compromised, all you have to do is mount the tape, unlock the red key with the old private key, and re-lock the red key with a new public key. Since the red key doesn't change, the rest of the data can be left in tact. The whole process takes less than 5 minutes, compared to Sun Microsystems method, which could take 1-2 hours per cartridge, having to decrypt and re-encrypt the entire data stream.
technorati tags: IBM, tape, TS1120, encryption, gold, award, storage, magazine, Sun, AES,RSA
If you're not planning to attend next week's [IBM Storage Symposium in Montpellier] because the "South of France" is too far away, next month IBM will have the [Information on Demand 2008 conference] at the Mandalay Bay Hotelin Las Vegas, Nevada. Featured speakers include [Tom Davenport], [Dr. Irving Wladawsky-Berger], storage management guru [John R Foley], and comedian [Martin Short].
This conference is being hosted by IBM's Software Group, including [IBM Service Management] solutions from our Tivoli brand for managing your server and storage environment.
To learn more about the Information on Demand 2008 conference, check out the [Home Page] or go straight to the [Registration form].
technorati tags: IBM, storage, symposium, Montpellier, Information on Demand, 2008, conference, Mandalay Bay, Las Vegas, Tom Davenport, Wladawsky-Berger, John Foley, Martin Short, Software Group, IT, service management, Tivoli, registration
Yesterday, most of the USA moved its clocks forward an hour. Arizona and Hawaii don't bother, as there is plenty of daylight in both states. While it may seem that Arizonans are not "affected" by Daylight Saving Time (DST)
, we are, because we have to deal with the time zone offsets with those we talk to in other states. (Note: it is SAVING not SAVINGS
, many people mistakenly say "Daylight Savings
Time", which is incorrect).
Year round, Arizona is on Mountain Standard Time (MST), which is GMT-7. Figuring out what time Arizona can be remembered by a simple mnemonic:
- In the winter time, Utah, Colorado, New Mexico, and Arizona are all on MST, so best American ski resorts are all on the same time zone. People who hop from one ski resort to another by helicopter don't have to reset their watches as they move into or out of Arizona.
- In the summer time, Arizonans head to San Diego, Los Angeles or other parts of California, where it is not so hot. California is on PDT, which is the same as MST. People who hop from Arizona wineries and vineyards to those in California and Oregon can easily cross the Arizona-California border without having to reset our watches.
Those in Second Life may have noticed that "Second Life time" (SL time) shifted from PST to PDT. That is because their servers reside in San Francisco, California.
technorati tags: IBM, Daylight Saving Time, DST, Second Life, Arizona, Hawaii, PDT, MST, GMT
I will wrap up this week's theme on travel, conferences and Japan discussingGroundhog day
, celebratedtoday (Feb. 2) in the US.
I thought of this because there was a 2003 movie called"Lost in Translation", the title of yesterday's post. This movie is about an American actor, played by Bill Murray, coming to Tokyoto film a whisky commercial. I first saw it with my sister and father, and we musthave been the only three who have actually been to Japan, as we were laughing hysterically,while the rest of the audience was utterly confused. If you have never been to Japan, see the movie before you go, then see it again after you get back home.
Ten years earlier, Bill Murray also played the lead role in another movie called"Groundhog day".In the movie, Bill Murray's character is TV newsman "Phil Connors" who travels to a small townwhere they bring out a small groundhog. If the groundhog can see his shadow, it predictsat least six more weeks of winter. If it does not, winter will end sooner. The nextday, Phil wakes up to realize that he is re-living the same day, over and over, like a modern-day Sisyphus or Promethius. Howhe handles himself in this situation, is what makes the movie so memorable.
When I explain what I do for IBM, to people I meet at home and abroad, I get asked the same set of questions.
- Don't you get bored presenting the same presentations?
The fact is, I never give the same presentation twice. Since I focus mostly on visual informationand what I say, versus the words of text on the page, I am able to customize my presentation toeach unique audience. In much the same way that Bill Murray's character managed to do somethingfun and different each day in the movie, despite his situation.
I do pity those presenters who focus entirely on text, turning their back to the audience, and then reading verbatim what is on each page.They should read Seth Godin's Really Bad PowerPointwith advice like "Bullets are for the NRA".
Another problem are presenters who apologize because they did not develop the materials they are presenting. Sorry, bub, you present it, you own it. The only person held accountable fora bad presentation at a conference is the speaker. When I make charts for others, I expect themthem to adjust it to their own speaking styles.
As a speaker, if you inherit materials fromsomeone else, have the courage to change it, or accept the parts you can't change, and have thewisdom to know the difference.
- Don't you get tired of traveling?
At first I thought this was odd. It's like asking "Don't you get tired of doing different things and eating different foodswith different people in a different country every week?" How can anyone grow tired of variety?
As with any question, you have to go inside the mind of the person asking the question.For most people, travel is an ordeal, outside their comfort zone. They are travelingto attend a funeral, family reunion, or a theme park with spouse and kids in tow.If that is the only kind of traveling a person knows, then it is understandablewhy they might ask this question.
- Don't you get annoyed answering the same questions at conferences?
As if this only happens at conferences!
Seriously, it might be the 17th time I've heard the question asked, but might be onlythe first time the person is asking it, and my response may be the crucial "first impression"that sets the stage for later engagements.
In this case, I focus on continuous improvement. What is the best way to answer thisquestion? How could I have answered that better? How could I have phrased the answerso it will be well-remembered? Again, like Bill Murray's character in "Groundhog Day",have fun with it, take advantage of the opportunity for improvement.
Enjoy the weekend!
technorati tags: IBM, Japan, travel, conferences, really, bad, PowerPoint, Lost In Translation, Groundhog Day, Bill Murray, Seth Godin
Registration is still open for next week's Information On Demand 2007 conference, Oct 14-19, in Las Vegas, Nevada.
This will be a huge event, bigger than last year's, covering the storage of information, e-discovery and compliance, data management, and other related topics.
- 500 Technical Skill Building sessions
- 120 Business Leadership sessions
- Addition of IBM ECM UserNet Conference (formerly FileNet UserNet)
- Bigger EXPO: 200 Business Partners and 130 IBM Demos
- Twice the Hands On Labs
- Free Onsite Certifications
- Opportunities to Meet the Experts
- a "Mock Trial" highlighting Compliance Challenges
Weather should be nice next week, 80 degrees during the day, 60 degrees at night.
technorati tags: IBM, Information, On Demand, 2007, conference, Las+Vegas, ECM, UserNet, FileNet, mock trial, expo, sessions
The blogosphere has quieted down a bit over the two papers on MTBF estimates for Disk Drive Modules (DDM).One article on SearchStorage.com by Arun Taneja asksIs RAID passé?
Disk capacity is growing at a faster rate than DDM reliability. During the hours to rebuild a DDM, companies are at risk of additional failures that could require recovery from a copy, or result in data loss, depending on how well your Business Continuity (BC) plan is written and followed.
I'll discuss two comments in particular.
Joerg Hallbauer felt I did not address all the issues raised:
... The problem with that is that it's the DISK ARRAY that determines when a drive has failed an starts the rebuild process. That IS under the control of IBM, specifically the controller. But more importantly, it effects my risk of data loss.
As I see it, my risk of data loss with RAID-5 is influenced by two main factors. 1 - The drive replacement rate and 2 - The rebuild time (which to a great extent is a function of the drive size) both of which IBM has some control over.
So, I think that the question in my mind is, what's the tipping point? Where does the risk of using RAID-5 protection exceed what I'm willing to accept, and I need to move to some other protection mechanism like RAID-6? Is it when the rebuild times exceed 12 hours? 24 hours? 48 hours?
Also, I wonder why IBM isn't publishing some information to help me make these kinds of decisions?
Bill Todd felt I was not technical enough:
Oh, dear - while Tony doesn’t seem to be parrying vigorously (as Seagate, Hitachi, and Chunk were doing), his contribution sounds more like IBM marketing than the kind of detailed, technical response one might have hoped for
... well, he *is* a manager, and a marketing one at that, so perhaps we shouldn’t expect more).
Both are fair comments. Disk arrays do run microcode to assist or perform the RAID function, detect failures and start the rebuild process, and so clever designs to support spare disks, process the rebuild quickly, and so on, can differentiate one vendor's offering from another.
On the issue of what does IBM provide to help its clients make the right decisions for their environments, Jon William Toigo at DrunkenData points his readers to IBM's Business Continuity Self-Assessment tool. In normal data center conditions, DDMs will fail, and a Business Continuity plan shouldbe written and developed to handle this fact. Using 2-site and 3-site mirroring, complemented with versions of tape backups, can help address some of these concerns and mitigate some of the risks involved with using disk systems.
For those who want a more technical answer, IBM has just published a series of IBM Redbooks.
Each client's situation is different, so no simple answer is possible. However, IBM does have a lot of experience in this area, and would be glad to help you write or update your existing Business Continuity plan.
technorati tags: IBM, disk, MTBF, estimates, papers, Arun Taneja, Jon William Toigo, StorageMojo, Business Continuity, Redbooks
Modified by TonyPearson
Continuing my coverage of the ITSO Cloud Social Media Residency, the second day explained the ITSO Residency method of blogging, which was somewhat different than the method I presented on the first day.
This blog post is part of a five-part series:
My blogging approach is more akin to the iterative, incremental, bottom-up approach of [Agile software development], resulting in gritty, edgy, timely and, yes, sometimes controversial content.
Tony's "Agile Development" approach
ITSO Residency's "Waterfall" method
Research, gather facts, figures and links
Take photos and screenshots, draw diagrams and charts
Select the structure
Decide on a catchy title and opening paragraph
Write the entire post in native HTML
A single idea emerges!
Clear my head. Take break, take a hike or take a nap.
Lather. Rinse. Edit. Repeat above steps.
Post to developerWorks
Identify a single idea
Submit a blog proposal with title and abstract for review and approval
Select the structure
Write a catchy opening and the rest of the post using MS Word or Lotus Symphony
Research, add links and mark SEO keywords in bold
Find one or two stock photos from various IBM repositories
Submit the post to a full-time IBM editor
Edited version sent over to the Social Business manager
Social Business manager converts to HTML and posts on group blog
The ITSO Residency resembles the more formal, top-down [Waterfall model], resulting in more corporate-looking work. Of course, IBM doesn't want its blogs to be the typical [Blah, blah, and double blah]. Fellow blogger Paul Boag has a great post on the [10 Harsh Truths About Corporate Blogging].
Fortunately, IBM is often recognized for having some of the best corporate blogs. For example, the [IBMblr] blog is highlighted in fellow bloggers Arik Hanson's post [5 inspiring corporate blogs to emulate].
Here were some of the speakers we had for Day 2:
Hillary Danz, IBM Social Content Graphics Editor
Hillary explained how to find commercially-licensed stock photos, clip-art and graphics from various IBM repositories.
I generally use my own photos, drawings and charts, cropped and enhanced using the GNU Image Manipulation Program [GIMP] software tool. Sometimes I find graphics under a [Creative Commons] license.
These additional resources for photos will definitely come in handy!
Caroline Wall, IBM ITSO Copy Editor
While having blog posts with a [few misspelled words] and grammatical errors demonstrates [warts-and-all] authenticity, I make a point to double-check the spelling of proper names: people, companies, brands, locations, products, services and solutions.
Caroline explained the process of submitting blog proposals, and if approved, how to submit the blog post written in MS Word or Lotus Symphony. The ITSO team felt most residents already know how to use these word-processing tools, allowing the residents to focus on what to write. Think of them as training wheels until you learn HTML!
I also started out using [WYSIWYG editors], but have since switched over to writing direclty in native HTML using [Gedit] text editor software, which is available on Linux, Windows and Mac OS.
For half the residents, English is not their native language. When a blog post is submitted, Caroline will then edit for spelling, grammar and style. IBM's style is similar to the [Associated Press (AP) Style] used by many newspaper journalists. The revised posts are then returned to the author for approval or discussion.
While English is not my native language either, I generally act as my own editor. Occasionally, I do enlist the services of Jeff Antley from developerWorks to help with HTML formatting issues.
Kevin Allen, IBM Social Business Manager
Kevin takes the edited blog posts from Caroline, converts them to HTML, and posts them to the group blog [ThoughtsOnCloud.com].
(For those who want to learn HTML, I like Kevin Werbach's [Bare Bones Guide to HTML] for explaining the structure of ordered lists, unordered lists, definition lists, tables and embedded graphics or other rich-media objects. I also use VisiBone's [HTML Color Codes] reference charts when I need to change font or background colors.)
Blog posts need attract attention. Kevin explained how to draw traffic to your blog post by cross-posting links other social media sites like [Facebook], [Google+] and [Twitter]. I comb through the [Snowclones Database] for ideas to write a catchy title and opening paragraph.
Kevin also suggests using appropriate keywords that will enable Search Engine Optimization (SEO). For my SEO, I finalized each blog post with plenty of relevant [Technorati] tags.
There is more than one way to write a blog post! In either case, the end result is educational, entertaining and engaging content that people want to read.
Which "corporate blogs" do you follow regularly? Enter your comments below!
technorati tags: Hillary Danz, Caroline Wall, Gedit, GIMP, WYSIWYG, Lotus Symphony, Paul Boag, Arik Hanson, Jeff Antley
The amount of information stored and available today is astounding. Consider the following:
...a weekday edition of The New York Times contains more information than the average person was likely to come across in a lifetime in seventeenth-century England.
Richard Wurman, Information Anxiety. 1989.
Shawn Callahan mentions this in his great presentation on how work really gets done.
Mark Nelson covers this in more detail inWe Have the Information You Want, But Getting It Will Cost You: Being Held Hostage by Information Overload.
To help address this challenge of organizing finding the right information at the right time, Web 2.0 technologies have emerged. You can read the 16-page paper What Is Web 2.0? -- Design Patterns and Business Models for the Next Generation by O'Reilly.
Or better yet, watch the quick 4-minute video Web 2.0 ... The Machine is Us/Ing Us.
technorati tags: Richard Wurman, Information Anxiety, Shawn Callahan, Mark Nelson, Web 2.0