Tony Pearson is a Master Inventor and Senior IT Architect for the IBM Storage product line at the
IBM Systems Client Experience Center in Tucson Arizona, and featured contributor
to IBM's developerWorks. In 2018, Tony celebrates his 32th year anniversary with IBM Storage. He is
author of the Inside System Storage series of books. This blog is for the open exchange of ideas relating to storage and storage networking hardware, software and services.
(Short URL for this blog: ibm.co/Pearson )
My books are available on Lulu.com! Order your copies today!
Safe Harbor Statement: The information on IBM products is intended to outline IBM's general product direction and it should not be relied on in making a purchasing decision. The information on the new products is for informational purposes only and may not be incorporated into any contract. The information on IBM products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. The development, release, and timing of any features or functionality described for IBM products remains at IBM's sole discretion.
Tony Pearson is a an active participant in local, regional, and industry-specific interests, and does not receive any special payments to mention them on this blog.
Tony Pearson receives part of the revenue proceeds from sales of books he has authored listed in the side panel.
Tony Pearson is not a medical doctor, and this blog does not reference any IBM product or service that is intended for use in the diagnosis, treatment, cure, prevention or monitoring of a disease or medical condition, unless otherwise specified on individual posts.
I returned safely from my trip to Tulsa, Oklahoma.
(A special shout-out to Shannon at [In The Raw] sushi restaurant, and my new friends I met at the rooftop of [the Mayo]!)
Last week I was in Auckland, New Zealand teaching Top Gun class. Top Gun teaches IBM Business Partners and sales reps how to sell our products, services, and solutions. I have been teaching Top Gun classes around the world since 1998.
(Why didn't I post sooner? Because IBM's developerWorks was getting an exciting upgrade to IBM Connections 4.0, and bloggers like me have to wait for the conversion to complete!)
While many of my trips in the USA involve traveling alone, that is not the case for Top Gun classes. Our class manager, Joe Ebidia, brought his wife Karen. Our class administrator is Hyein (Hyein is a Korean name that rhymes with rain). In addition to some local instructors, I am joined by my IBM USA colleagues Scott McPeek (Tivoli Storage) and Vic Peltz (Disk/Replication/Competitive Sales).
The rest of the teach team arrived a day or two early to adjust to jet lag. I, on the other hand, got off the plane Monday at 6am, and had a business meeting that same morning with GTS architects from Wellington.
Clockwise from left: Karen is vegetarian, and had some pasta with tomato sauce. Hyein had a lamb burger. Joe had flounder. I had salmon risotto. Yum!
(To those asking why I have only the bellies of Karen and Joe in the picture, I was focused on taking picture of the food.)
After setting up the classroom, we took a ferry over to [Devonport], a charming seaside village just minutes across the bay from Auckland. The ferry boats were close the the Central Business District our [Stamford Plaza hotel] was in, and they run every 30 minutes.
The four of us walked up to the top of Mt. Victoria to see the views of the city. I highly recommend this! Once you get to Devonport, you can walk along the streets to see all the cute shops, or enjoy the parks and natural beauty. I had [done this before], but it is always worth doing again!
The class is four days long. I had six presentations. Here were the first three:
Selling IBM Storwize V7000 and V7000 Unified. Scott McPeek had already covered SAN Volume Controller (SVC), so it was easy to explain the Storwize V7000. For the V7000 Unified, I went into more detail of the file-based protocols and features, paving the way for Vic's "Selling SONAS" later in the week.
Selling IBM Storwize V3700. Having covered the SVC and Storwize V7000, my presentation on the Storwize V3700 focuses more on the positioning of when to sell which product for particular workloads.
Understanding IBM's Big Four Initiatives. This was an interesting request. I was asked to cover Social, Mobile, Analytics and Cloud (what we internally call SMAC) from a storage perspective. Social included Social Media, Social Networking and Social Business. Mobile focused on IBM's Mobile First campaign. Analytics included big data, Hadoop, and our various solutions for performing analytics. Cloud included IBM's Cloud Computing Reference Architecture (CCRA), IBM SmartCloud Enterprise storage, our Backup and Archive clouds, and the new SmartCloud Storage portfolio.
I will save the rest of the week for the next post!
The [IBM Edge2015 conference] is premiere conference covering Infrastructure Innovations for IBM System Storage, as well as sessions about z Systems and POWER Systems from our IBM Enterprise conference.
Here is a quick recap of my sessions I presented on the third day, Wednesday, May 13, 2015.
New Generation of Storage Tiering: Less Management, Lower Costs and Increased Performance
I organized this into three sections. In the first section, I talked about single-system optimization by moving extents within single volumes on a single system. For IBM, I focused on Easy Tier on DS8000 as an example of this methodology, and all the enhancements IBM introduced since its introduction, including Easy Tier Server, Easy Tear Application API, and Easy Tear Heat Map Transfer utility.
In the second section, I covered data center optimization using Spectrum Control Storage Analytics Engine. This involves moving entire volumes/LUNs from one storage system to another. At IBM's Boulder Facility, this methodology saved $17 million dollars per year, roughly 50 percent reduction of its storage budget.
The third section covered the global optimization with Information Lifecycle Management (ILM), Hierarchical storage Management (HSM) and Active File Management (AFM) features in Spectrum Scale. This provides a seamless movement of data from flash to disk to tape media. Spectrum Scale has been around in one form or another since 1998, and over 200 of the TOP500 supercomputers are using it today.
At the IBM Edge conference last year,IBM announced "Codename: Elastic Storage." IBM had to rename its General Parallel File System (GPFS) because it is not just a file system for two very good reasons:
Spectrum Scale can support volumes, files and objects.
Spectrum Scale provides active data management, including Information Lifecycle Management (ILM), Hierarchical storage Management (HSM) and Active File Management (AFM) features.
This year, IBM now has several offerings: Spectrum Scale software, Elastic Storage Server pre-built system, Storwize V7000 Unified pre-built system, and Elastic Storage on IBM Managed Cloud services.
IBM Winning Edge - CASE Training
IBM Winning Edge is focused on Business Partner and IBM seller training. Part of this is CASE (Cloud and Analytics Sales Enablement). I co-presented "Systems Infrastructure Offerings for Cloud" with Elan Freedberg.
For Wednesday evening, I had dinner with Dr. Steve Hetzler, IBM Almaden Research, to discuss his paper on "touch rate" that Clod Barrera mentioned at the Monday kickoff.
Later that evening, I was invited to enjoy some champagne and cigars with Eric Herzog, Jamie Thomas and other IBM Executives. I brought along fellow blogger Elisabeth Stahl, who recently was promoted to Distinguished Engineer!
Continuing my week's theme on how bad things can get following the "Do-it-yourself" plan, I start with James Rogers' piece in Byte and Switch, titled[Washington Gets E-Discovery Wakeup Call]. Here's an excerpt:
"A court filing today reveals there may be gaps in the backup tapes the White House IT shop used to store email. It appears that messages from the crucial early stages of the Iraq War, between March 1 and May 22, 2003, can't be found on tape. So, far from exonerating the White House staffers, the latest turn of events casts an even harsher light on their email policies.
Things are not exactly perfect elsewhere in the federal government, either. A recent [report from the Government Accountability Office (GAO)] identified glaring holes in agencies’ antiquated email preservation techniques. Case in point: printing out emails and storing them in physical files."
You might think that laws requiring email archives are fairly recent. For corporations, they began with laws like Sarbanes-Oxley that the second President Bush signed into law back in 2002. However, it appears that laws for US Presidents to keep their emails were in force since 1993, back when the first President Clinton was in office. (we might as all get used to saying this in case we have a "second" President Clinton next January!)
"The Federal Record Act requires the head of each federal agency to ensure that documents related to that agency's official business be preserved for federal archives. The Watergate-era Presidential Records Act augmented the FRA framework by specifically requiring the president to preserve documents related to the performance of his official duties. A [1993 court decision] held that these laws applied to electronic records, including e-mails, which means that the president has an obligation to ensure that the e-mails of senior executive branch officials are preserved.
In 1994, the Clinton administration reacted to the previous year's court decision by rolling out an automated e-mail-archiving system to work with the Lotus-Notes-based e-mail software that was in use at the time. The system automatically categorized e-mails based on the requirements of the FRA and PRA, and it included safeguards to ensure that e-mails were not deliberately or unintentionally altered or deleted.
When the Bush administration took office, it decided to replace the Lotus Notes-based e-mail system used under the Clinton Administration with Microsoft Outlook and Exchange. The transition broke compatibility with the old archiving system, and the White House IT shop did not immediately have a new one to put in its place.
Instead, the White House has instituted a comically primitive system called "journaling," in which (to quote from a [recent Congressional report]) "a White House staffer or contractor would collect from a 'journal' e-mail folder in the Microsoft Exchange system copies of e-mails sent and received by White House employees." These would be manually named and saved as ".pst" files on White House servers.
One of the more vocal critics of the White House's e-mail-retention policies is Steven McDevitt, who was a senior official in the White House IT shop from September 2002 until he left in disgust in October 2006. He points out what would be obvious to anyone with IT experience: the system wasn't especially reliable or tamper-proof."
So we have White House staffers manually creating PST files, and other government agencies printing out their emails and storing them in file cabinets. When I first started at IBM in 1986, before Notes or Exchange existed, we used PROFS on VM on the mainframe, and some of my colleagues printed out their emails and filed them in cabinets. I can understand how government employees, who might have grown up using mainframe systems like PROFS, might have just continued the practice when they switched to Personal Computers.
Perhaps the new incoming White House staff hired by George W. Bush were more familiar with Outlook and Exchange, and ratherthan learning to use IBM Lotus Notes and Domino, found it easier just to switch over. I am not going to debatethe pros and cons of "Lotus Notes/Domino" versus "Microsoft Outlook/Exchange" as IBM has automated email archiving systems that work great for both of these, as well as also for Novell Groupwise. So, taking the benefit of the doubt,when President Bush took over, he tossed out the previous administration's staff, and brought in his own people, andlet them choose the office productivity tools they were most comfortable with.Fair enough, happens every time a new President takes office. No big surprise there.
However, doing this without a clear plan on how to continue to comply with the email archive laws already on the books, and that it continues to be bad several years later, is appalling. I can understand why business are upset in deploying mandated archiving solutions when their own government doesn't have similar automation in place.
According to Gartner data (from 2005!), host-based storage accounts for 34 percent of the overall market for external storage, with the remaining 66 percent going to "fabric-attached" (network) storage, expect this share to grow from 66 percent to 77 percent by 2007.What is the current reality? SAN vs. NAS, FC vs iSCSI?
IBM subscribes to a lot of data from different analysts, they all have their methods for collecting this data, from taking surveys of customers to reviewing financial results of each vendor. While theymight not agree entirely, there are some common threads that lead one to believe they represent "reality". Hereare some numbers from an IDC December 2007 report:
Worldwide Disk Storage
While the 32/68 split is similar to the 34/66 split you mentioned before, you can see that external growth isgrowing faster, so internal host-based storage will drop to 25 percent by 2011, with external storage growing to 75 percent, very close to the 77 predicted. Looking at just the externaldisk storage, there are basically three kinds: DAS (direct cable attachment), NAS (file level protocols suchas NFS, CIFS, HTTP and FTP), and SAN (block-level protocols like FC, iSCSI, ESCON and FICON):
Worldwide External Disk Storage
At these rates, fabric-attached (SAN and NAS) will continue to dominate the storage landscape.Looking more closely now at the block-oriented protocols.
Worldwide External Disk Storage
Fibre Channel (FC)
At these rates, iSCSI will overtake FC by 2011. IBM System Storage N series, DS3300 and XIV Nextraall support iSCSI attachment.
Jon Toigo over at DrunkenData offers some additional data from ex-STKer:[Fred Moore Outlook on Storage 2008]. I met Fredat a conference. He had left STK back in 1998, and started his own company called Horison. NeitherJon nor Fred cite the sources of his statistics, but the following comment leads me to assume hehasn't been paying attention closely to the tape market:
With the demise of STK, who will be the leader in the tape industry?
Depending on how old you are, you might remember exactly where you were when a significant eventoccurred, for example the[Space Shuttle Challenger]explosion. For many IBMers, it was the day our friends at Sun Microsystems announced they were [puttingour lead tape competitor out of its misery]. I was in New York that day, but there was still someconfetti on the floor in the halls of the IBM Tucson lab when I got home a few days later. IBM hasbeen the number one market share leader in tape for over the past four years.
The IBM Storage and Storage Networking Symposium continues ...
DS8300 Benchmark for Global Mirror
Phil Allison of Fidelity National Information Services presented his success switching from competition over to IBM DS8300 disk systems for use with Global Mirror. They had usedPerformance Associates famous PAIO driver to help to the benchmarktesting. They ran the benchmars at 2x and 3x their current workloads to see how well the DS8000 performed,measuring IOPS, MB/sec, and millisecond response time (msec). They were very impressed with their results,staying below their target 0.8 msec for most of their runs.
For the Global Mirror, the did a performance "bake-off" between Ciena CN2000 versus Cisco 9216i. These areimplemented differently. Ciena uses a Layer-2 approach, encapsulating the Fibre Channel packets directlyto transport as SDH/SONET or Gigabit Ethernet (GigE), which required dedicated circuits between JacksonvilleFlorida and Little Rock, Arkansas. By contrast, Cisco uses a Layer-3 approach, encapsulating Fibre Channelpackets within an IP packet, which can leverage existing datacenter-to-datacenter backbone.
To add stress to the benchmarks, they used a "Network Impairment" emulator. These artificially inject errors,lose packets, and other signal loss conditions. Running both Cisco and Ciena under these tests help them decide which to purchase, but also enforced that idea that they made the right choice choosing IBM for theirremote distance mirroring solution.
Comparison of Bare Machine Recovery Techniques
"Bare machine recovery" is the phrase used to restore a machine that has no operating system installed (or thewrong operating system). Dave Canan from IBM Advanced Technical Support did a great job reviewing the variousproducts and techniques available, and the pros and cons of each approach. The ones he covered were:
Tivoli Storage Manager - install fresh Windows Operating System, TSM client, and then follow certain steps
Automated System Recovery(ASR) - a new feature of Windows XP and Windows 2003 works with TSM client
Symantec Ghost - formerly callled PowerQuest Drive Image, there are now two versions: Ghost Home Edition and Ghost Corporate Solution Suite
Cristie Bare Machine Recovery(CBMR) - This is an IBM partner that provides both Linux and Windows PE versions. Cristie includes a license for Windows PE, so no need to use the alternative Bart PE method.
SAN Volume Controller - Customer Experience
Bill Giles of Catholic Medical Center, a hospital in New Hampshire, presented his experienceswith IBM System Storage SAN Volume Controller. They have a mix of IBM System x, System p, andSystem i servers, as well as machines from HP, Sun, and Dell. For applications, they havePicture Archiving and Communicatiion System (PACS) for cardiology and radiology, HL7 Interface engine, Clinical Information System, TSM for backup, and Microsoft Exchange fore-mail.
They deployed SVC on AIX, Solaris, Windows 2000 and 2003. They were very delightedwith the results:
Centralized Storage Provisioning
Consolidating disparate storage into a universal platform
Enables non-disruptive data migration
Increased utilization of existing disk resources
Improved disaster recovery with FlashCopy and Metro Mirror
Birds of a Feather (BOF) sessions
We had two BOFs, one for storage attached to System z operating systems, and another for storage attached to Linux, UNIX and Windows systems. This distinctionmade sense when mainframes could only attach to CKD disks and ESCON/FICON tape,and distributed systems could only do FCP/SCSI, but these days, there are all kindsof convergence going on.
Linux on System z can now attach via FCP to LTO tape and SAN Volume Controller, allowing now a wide range of storage options for that platform. z/OS, z/VM, z/VSEand Linux on System z can all access IBM System Storage N series via NFS.
The format was traditional Q&A panel, we had experts at the front of the room,handling the questions and discussion topics brought up by the audience. I'll spareyou the individual questions and answers.
Continuing my coverage of the ITSO Cloud Social Media Residency, the second day explained the ITSO Residency method of blogging, which was somewhat different than the method I presented on the first day.
Hillary explained how to find commercially-licensed stock photos, clip-art and graphics from various IBM repositories.
I generally use my own photos, drawings and charts, cropped and enhanced using the GNU Image Manipulation Program [GIMP] software tool. Sometimes I find graphics under a [Creative Commons] license.
These additional resources for photos will definitely come in handy!
Caroline Wall, IBM ITSO Copy Editor
While having blog posts with a [few misspelled words] and grammatical errors demonstrates [warts-and-all] authenticity, I make a point to double-check the spelling of proper names: people, companies, brands, locations, products, services and solutions.
Caroline explained the process of submitting blog proposals, and if approved, how to submit the blog post written in MS Word or Lotus Symphony. The ITSO team felt most residents already know how to use these word-processing tools, allowing the residents to focus on what to write. Think of them as training wheels until you learn HTML!
I also started out using [WYSIWYG editors], but have since switched over to writing direclty in native HTML using [Gedit] text editor software, which is available on Linux, Windows and Mac OS.
For half the residents, English is not their native language. When a blog post is submitted, Caroline will then edit for spelling, grammar and style. IBM's style is similar to the [Associated Press (AP) Style] used by many newspaper journalists. The revised posts are then returned to the author for approval or discussion.
While English is not my native language either, I generally act as my own editor. Occasionally, I do enlist the services of Jeff Antley from developerWorks to help with HTML formatting issues.
Kevin Allen, IBM Social Business Manager
Kevin takes the edited blog posts from Caroline, converts them to HTML, and posts them to the group blog [ThoughtsOnCloud.com].
(For those who want to learn HTML, I like Kevin Werbach's [Bare Bones Guide to HTML] for explaining the structure of ordered lists, unordered lists, definition lists, tables and embedded graphics or other rich-media objects. I also use VisiBone's [HTML Color Codes] reference charts when I need to change font or background colors.)
Blog posts need attract attention. Kevin explained how to draw traffic to your blog post by cross-posting links other social media sites like [Facebook], [Google+] and [Twitter]. I comb through the [Snowclones Database] for ideas to write a catchy title and opening paragraph.
Kevin also suggests using appropriate keywords that will enable Search Engine Optimization (SEO). For my SEO, I finalized each blog post with plenty of relevant [Technorati] tags.
There is more than one way to write a blog post! In either case, the end result is educational, entertaining and engaging content that people want to read.
Which "corporate blogs" do you follow regularly? Enter your comments below!
Here we are again at Top Gun class.In between class topics, we often show short video clips.
This week, we saw IBM Executive Bob Hoey's wisdom on selling mainframe computers. Bob is the VP of Sales for our System z server line, but the lessons might also apply to high-end disk or enterprise tape libraries.
There are a lot of exciting conferences and events coming up soon.
SHARE will be in San Diego, August 12-17. Held twice a year, I attended SHARE for 10 years back when I was lead architect for DFSMS,and then later the focal point for storage support on the Linux for System z platform.I won't be there this time around, but am glad to see that it is still thriving.
IBM Storage and Storage Networking Symposium
IBM Storage and Storage Networking Symposium will be in Las Vegas, August 19-24.This is a great conference that is focused entirelyon the products and solutions I deal with the most. I attended nearly every one since they startedthis back in the 1990s, and am glad that I will be there this year, making several presentations.If you plan to attend this and want to meet up, drop me a note.
VMworld will be held in San Francisco, September 11-13.IBM is a top reseller of VMware software, and is proud to be a Platinum Sponsor for this event. Lookfor the panel discussion on "Storage Virtualization" which I am sure will include SAN Volume Controller.
Meet the Storage Experts
Based on our successful product launch in Second Life back in April, we are now holding meetingsevery quarter to discuss various IBM System Storage topics. The next one will be September 20 onone of the IBM islands in Second Life. For those without travel budgets to go anywhere, the advantageto our "Second Life" events is that no travel is required, it can be done from the comfort of workor home office location.
I will post updates on how to register for this event as soon as I know them.
Virtual Worlds Fall 2007 onOctober 10-11, 2007 at the San Jose Convention Center. Sandy Kearney, IBM GlobalDirector of IBM 3D Internet and Virtual Business, will be the keynote speaker.This will include discussion of Second Life.
I am sure there are others, but these are the ones that I am aware of IBM's involvement.I'll be in Chicago next week, meeting with Sales Reps and Business Partners.
Before dinner, I was able to catch up with my colleagues from across the pond. Here I am pictured with Ola Surowiec, a Power Systems sales specialist from Scotland.
The dinner was set up as self-service buffet style, with choices of European, Asian, and Middle Eastern cuisine. This is largely the heritage of the Ottoman empire to provide a fusion of flavors from its neighbors.
The city of Istanbul is considered the border between Europe and Asia, with one side of the city on the "European" side, and the other side of the Bosphorus strait being the "Asian" side.
With a population of over 14 million, Istanbul forms one of the largest urban agglomerations in Europe, second largest in the Middle East and the third-largest city in the world by population within its city limits.
The entertainment started with two [belly dancers], one male and one female. (IBM is an equal opportunity employer!) For those not familiar with this particular form of performance art, it is improvised folk dances based on torso articulation and abdominal movements.
I have seen dancers before in Egypt, the country that most people associate with the origin of belly dancing, but the Turkish version is considered more energetic and athletic. Certainly both of our dancers were quite flexible.
This was followed by a live cover band that played the latest English-language hits. Several Americans at the table asked "Wait? We come all the way to Turkey and the local band sings the songs in English?"
In the corner, attendees were invited to dress up as their favorite sultan to take photograph. Here for example, are some of the members of the STU event team. Mo McCullough, Don Meyer, Marlin Maddy, Glenn Anderson and Alex Abderrazag pose with two lovely local ladies in full costume.
The word "sultan" derives from the Arabic word meaning "strength", "authority" or "power". Sultans ruled the Turkish empire from 1299 to 1922.
The [Topkapi palace], where I visited earlier in the week, contains clothing on display of the sultans and princes from the second half of the 15th century to the early 20th century.
Continuing my coverage of the [IBM Edge2014 conference], IBM's premiere conference for System Storage and related products, I attended EdgeTalks: Innovation That Impacts Our World that offered a series of inspiring talks styled after the famous [TED] conferences.
Surjit Chana, IBM Chief Marketing Officer (CMO) and VP of Strategy for IBM Systems and Technology Group, served as emcee to introduce the speakers.
Ron Finley, Renegade Gardener
Back in 2003, "South Central" was [renamed to South Los Angeles]. But as everyone in IT knows, merely renaming something doesn't fix any of its problems. Ron was tired of seeing empty lots filled with old mattresses, used condoms and discarded tires, and wanted to beautify his immediate surroundings by planting vegetables in his front yard.
Ron's army of volunteers, the [L.A. Green Grounds], filed a petition. As of October 2013, it is now legal to grow food on your parkway in Los Angeles.
Ron explained that South Los Angeles is a [food desert], where it is nearly impossible to get healthy, organic food. He is concerned the "drive-thrus" of fast food restaurants kill more of his neighbors than [drive-by] shootings.
Ron has discovered this problem is not limited to Los Angeles. The American food system is designed to fill you with processed food and chemicals, made worse by a health care system happy to cut you open or prescribe you more chemicals and drugs. Everywhere processed food goes, chronic disease follows. The USA exports obesity to the rest of the world.
"To change a community, and you must first change the composition of the soil." -- Ron Finley
The rise in cancer, diabetes, and childhood cardiac arrests inspired Ron to start the [Ron Finley Project] consisting of community farms, a marketplace that accepts EBT, SNAP and other government food programs, and portable "container cafes" based on standard shipping containers that could be placed near a garden to help sell the food grown locally.
John Wilbanks, Chief Commons Officer at Sage Bionetworks and Senior Fellow in Entrepreneurship for Faster Cures
We live in the age of cheap data. John prefers the term "cheap data" rather than "big data". Mapping the first human genome cost $3 Billion USD, now John can get his own genome mapped for about $1200.
John feels this cheap data changes the way we justify our opinions. From baseball scouts to the analytics demonstrated in the movie [Moneyball]. President Barack Obama used social media to help win elections. And cheap data is coming to health and medicine.
John gave an interesting example. A grad student wanted to study alcoholism among undergraduate students. The traditional method would have been to gather privacy permission slips from volunteers. Instead, he "friended" 4,000 undergraduates, and looked on social media containing the [distinctive color of red beer cups] for photos taken on Monday through Wednesday, indicative of a drinking problem. This innovative approach allowed the grad student to complete his research in less than six weeks.
Cheap data doesn't mean we have wisdom. John explained the wrong way of doing things. There are several machine-learning apps for smartphones to check for melanoma. Take a photo of your suspected mole, and the app will determine if it detects skin cancer, and recommend a biopsy. Incentives to sell apps, and to perform biopsies, result in 90 percent false positive rates. There is no financial incentive to improve accuracy.
Sharing is the innovation that converts cheap data into wisdom. Get the world's smartest people to compete to create wisdom. Collaborating with IBM on Dialogue for Reverse Engineering Assessments and Methods [DREAM] platform, a competition for modeling breast cancer was launched. Requiring all participants to share their code in real-time allowed the accuracy of the model to jump three orders of magnitude in just nine days. Over 60 teams participated. The winning team was awarded an article and cover of [Science Translational Medicine] magazine.
John feels that there are very few genius [data scientists] in the world, and they are isolated, hideously overpaid, managing hedge funds or search engines, but would probably rather be looking for cures for cancer.
Progress is not made if every company only has its own people looking at its own data. John wants data to shared amongst the world's scientists to create wisdom. However collaboration flies in the face of the competition that all the reward systems are based on in health care.
As an experiment, John wanted to make his own genome public. However, that requires "informed consent" for others to use his private health information, and it took him six months of legal and ethical rules to develop a system for him to provide this consent for public use.
In much the same way that gardens and fields were the first [commons] shared by farmers, John feels we need to cultivate the public domain, the "digital commons". This can truly transform medicine and health care.
Peter Singer, Technology Expert and Best-selling Author
The first web page appeared in 1991, and now there are over 30 trillion pages. Over 98 percent of military communications occur over civilian internet communications. The [Internet of Things] adds everything from smart cars to medical devices into the equation.
But along with all the benefits the web has brought society, there are also risks. Every second, nine new pieces of malware are discovered. An astounding 97 percent of Fortune 500 have admitted to being hacked. Over 100 governments have established a cybermilitary force.
(Instead of Powerpoint slides, Peter had a slideshow of his personal collection of the world's best and worst cybersecurity art. Studies show that audiences remember 60 percent more if they are looking at pictures when they hear a speaker.)
While IT folks are good at dealing with both hardware and software, they traditionally don't do well with "wetware", the human side of things. Essential cybersecurity terms and concepts are often misunderstood.
Business leaders over-react to some threats, but completely ignore others. Consider that 70 percent of cybersecurity decisions at companies are made by executives who have no training in cybersecurity. No single MBA program offers cybersecurity courses.
There is a shortage of talent to deal with cybersecurity. Hiring managers are only satisfied with 40 percent of the employees they hire in this Cybersecurity space.
Incentives help explain why some industries like financial services do security well, while others like health care do poorly.
In an effort to find which employees do not take cybersecurity seriously enough, Companies have resorted to sending [phishing] emails to their own employees. Those that click are caught, and must attend mandatory training, or are subject to dismissal. Unfortunately, senior executives are twice as likely to click on phishing emails than the general workforce.
Peter recommends companies focus on resilience. You can never build high enough walls to eliminate threats. Instead, focus on bouncing back after attacks, similar to the anti-bodies in the human body deal with illness.
Ben Franklin said that an ounce of prevention is worth a pound of cure. Peter cited a studied that found proper cyberhygiene would have prevented 94 percent of attacks. The most successful foreign military attack on the U.S. military happened when a soldier saw a memory stick in a parking lot, and was curious enough to connect it to the secure military network to see what it contained.
We need to build an ethic. We teach our kids to cover your mouth when you cough. This does not protect your child in any way, but is an ethic to avoid spreading disease. We need to teach the same ethics related to cybersecurity.
All three were excellent talks focused on innovation. Ron Finley used gardening in otherwise empty urban spaces to help grow people as well as food. John Wilbanks used innovation to help bring the smartest minds to determine models for identifying cancer from genomes. Peter Singer marveled at the innovation of the Internet, and how proper cyberhygiene is needed to keep it secure.
These talks were recorded and available on this [98-minute YouTube video]. For those on Twitter, my handle is @az990tony and the hashtag for this session was #ibmedgetalks.
And, it's not too late to sign up for IBM Tivoli's [Pulse 2008] conference that will be heldin Orlando, Florida, May 18-22, 2008. I'll be there Sunday and Monday only, in the Tivoli Storage track, so if you are planning to attend and wish to meet up with me while I am there, please send me a note!
In yesterday's post, [IBM Information Infrastructure launches today], I explained how this strategic initiative fit into IBM's New EnterpriseData Center vision. For those who prefer audio podcasts, here is Marissa Benekos interviewing Andy Monshaw, IBM General Manager of IBM System Storage.
This post will focus on Information Availability, the first of the four-part series this week.
Here's another short 2-minute video, on Information Availability
I am not in marketing department anymore, so have no idea how much IBM spentto get these videos made, but hate for the money to go wasted. I suspect theonly way they will get viewed is if I include them in my blog. I hope youlike them.
As with many IT terms, "availability" might conjure up different meanings for different people.
Some can focus on the pure mechanics of delivering information. An information infrastructure involves all of thesoftware, servers, networks and storage to bring information to the application or end user, so all of the chainsin the link must be highly available: software should not crash, servers should have "five nines" (99.999%) uptime, networks should be redundant, and storage should handle the I/O request with sufficient performance. For tape libraries, the tape cartridge must be available, robotics are needed to fetch the tape, and a drive must be available toread the cartridge. All of these factors represent the continuous operations and high availability features of business continuity.
In addition to the IT equipment, you need to make sure your facilities that support that equipment, such aspower and cooling, are also available.Independent IT analyst Mark Peters from Enterprise Strategy Group (ESG) summarizes his shock about the findings in a recent [survey commissioned by Emerson Network Power]on his post [Backing Up Your Back Up]. Here is an excerpt:
"The net take-away is that the majority of SMBs in the US do not have back-up power systems. As regional power supplies get more stretched in many areas, the possibility of power outages increases and obviously many SMBs would be vulnerable. Indeed, while the small business decision makers questioned for the survey ranked such power outages ahead of other threats (fires, government regulation, weather, theft and employee turnover) only 39% had a back-up power system. Yeah, you could say, but anything actually going wrong is unlikely; but apparently not, as 79% of those surveyed had experienced at least one power outage during 2007. Yeah, you might say, but maybe the effects were minor; again, apparently not, since 42% of those who'd had outages had to actually close their businesses during the longest outages. The DoE says power outages cost $80 billion a year and businesses bear 98% of those costs."
Others might be more concerned about outages resulting from planned and unplanned downtime. Storage virtualizationcan help reduce planned downtime, by allowing data to be migrated from one storage device to another withoutdisrupting the application's ability to read and write data. The latest "Virtual Disk Mirroring" (VDM) feature of the IBM System Storage SAN Volume Controller takes it one stepfurther, providing high-availability even for entry-level and midrange disk systems managed by the SVC.For unplanned downtime, IBM offers a complete range of support, from highly available clusters, two-site and three-site disaster recovery support, and application-aware data protection through IBM Tivoli Storage Manager.
Many outages are caused by human error, and in many cases it is the human factor that prevent quick resolution.Storage admins are unable to isolate the failing component, identify the configuration or provide the appropriateproblem determination data to the technical team ready to offer support and assistance. For this, IBM TotalStorageProductivity Center software, and its hardware-version the IBM System Storage Productivity Center, can helpreduce outage time and increase information availability. It can also provide automation to predict or provideearly warning of impending conditions that could get worse if not taken care of.
But perhaps yet another take on information availability is the ability to find and communicate the right informnationto the right people at the right time. Recently, Google announced a historic milestone, their search engine nowindexes over [One trillion Web pages]!Google and other search engines have changed the level of expectations for finding information. People ask whythey can find information on the internet so quickly, yet it takes weeks for companies to respond to a judge foran e-discovery request.
Lastly, the team at IBM's[Eightbar blog] pointedme to Mozilla Lab's Ubiquity project for their popular FireFox browser. This project aims to help people communicate the information in a more natural way, rather than unfriently URL links on an email. It is still beta, of course, but helps show what "information availability" might be possible in the near future.Here is a 7-minute demonstration:
For those who only read the first and last paragraphs of each post, here is my recap:Information Availability includes Business Continuity and Data Protection to facilitatequick recovery, storage virtualization to maximize performance and minimize planned downtime, infrastructure management and automation to reduce human error, and the ability to find and communicate information to others.
(Note: While Lenovo has officially taken over the System x on October 1st back in the United States, China, and several other countries in Asia and the Americas, it has not yet happened in Europe. This is expected to happen this December. This results in some awkwardness during this period of transition.)
Day 1 started off with some keynote sessions. Amy Purdy, IBM Director of Training Services, was the emcee.
Gareth Tucker, Director of EMEA for Intel
Gareth focused on the strong partnership between IBM, Lenovo and Intel. For example, a client query that took 4 hours with traditional DB2 database on Intel Xeon, but only 90 seconds on DB2 BLU with the new Xeon V2 chip.
10 years ago, some storage vendors warned clients not to use any Intel-based storage devices. Today, over 85 percent of storage is Intel-based, including most of the IBM System Storage portfolio. IBM SoftLayer also uses Intel to offer both bare metal and virtual x86 servers, and was the first cloud provider to use Intel's "Trusted Execution" mode.
Next year, Microsoft will drop support for Windows 2003 server on July 15, 2015. This represents an excellent selling opportunity to get clients to upgrade their x86 server hardware. Intel estimates there are 24 million instances of Windows 2003 worldwide. On average, it takes 150 days to migrate to Windows 2012, so get clients to start now!
Jeff Howard, Vice President of Lenovo Flex and BladeCenter
Jeff was a last-minute stand-in for Adalio Sanchez who is busy getting thousands of employees and hundreds of trailer trucks full of IT equipment from IBM's Raleigh location to Lenovo's new building in Morrisville.
Lenovo's goal is simple: to be the #1 vendor of x86 enterprise servers. Lenovo sees a $44 Billion USD opportunity in x86 servers, with an additional $14B opportunity selling IBM System Storage attached to these servers. Lenovo is already #1 for Personal Computers in the consumer space, and is #1 for customer satisfaction. IBM System x #1 in reliability and up-time for x86 servers. In a client survey of how many clients had an outage lasting four hours or more, less than 1 percent from IBM System x compared to 13 percent for HP servers. That's a big difference!
There is a 40 percent growth in "Converged Systems" such as the Flex System and PureFlex systems. Lenovo will take over the x86-only versions of these, while IBM will retain the POWER-based and Power-and-x86 hybrid models. IBM will also retain the PureApplication and PureData models of the PureSystems line.
Lenovo is also focused on security. Their "Trusted Platform" includes Self-encrypting Drives (SED) managed by IBM Security Key Lifecycle Manager software, and Crypto-assist co-processors.
Jeff also mentioned new reference architectures for VMware's VSAN, Microsoft's Fast-track Data warehouse for SQL Server, SmartCloud Desktop Infrastructure VDI with Atlantis ILIO, and Flex Systems for Hyper-V.
Greg Lotko, VP of IBM Storage Systems Development
Greg is the new VP of Storage Systems Development, about 11 months on the job, but I am glad to hear that he recognizes that IBM System Storage has a huge portfolio of products.
He focused on those areas where IBM is ranked #1:
IBM is #1 for All-Flash arrays.
IBM is #1 for Software Defined Storage (SDS).
IBM is #1 for Tape, including tape drives, tape libraries and virtual tape systems
The weather here in Dublin is great, although I have had not had much time to enjoy the outdoors with all the awesome and interesting sessions inside!
Before acquisition, Diligent offered only software. The task of putting this software on an appropriate x86 server with sufficientmemory and processor capability was left as an exercise for the storage admin. With the TS7650G, IBM installs theProtectTIER software on the fastest servers in the industry, the IBM System x3850 M2 and x3950 M2. This eliminateshaving the storage admins pretend that they have hardware engineering degrees.
Before acquisition, the software worked only on a single system. IBM was able to offer multiple configurations of the TS7650G, including a single-controller model as well as a clustered dual-controller model. The clustered dual-controller model can ingest data at an impressive 900 MB/sec, which is up to nine times faster than some of thecompetitive deduplication offerings.
Before acquisition, ProtecTIER emulated DLT tape technology. This limited its viability, as the market sharefor DLT has dropped dramatically, and continues to dwindle. Most of the major backup software support DLT as anoption, but going forward this may not be true much longer for new tape applications.IBM was able to extend support by adding LTO emulation on theTS7650G gateway, future-proofing this into the 21st Century.
At last week's launch, covering so many products with so few slides, this announcement was shrunken down to a single line "Store 25 TB of backups onto 1 TB of disk, in 8 hours" and perhaps a few people missed that this wasactually covering two key features.
With deduplication, the TS7650G might get up to 25 times reduction on disk. If you back up a 1 TB data basethat changes only slightly from one day to the next, once a day for 25 days, it might only take 1 TB, or so, of disk tohold all the unique versions, as most of the blocks would be identical, rather than 25 TB on traditional disk or tapestorage systems. The TS7650G can manage up to 1 PB of disk,which could represent in theory up to 25 PB of backup data.
With an ingest rate of 900 MB/sec, the TS7650G could ingest 25 TB of backups during a typical 8 hour backup window.
The 25 TB of the first may not necessarily be the 25 TB of the second, but the wording was convenient for marketingpurposes, and a comma was used to ensure no misunderstandings.Of course, depending on the type of application, the frequency of daily change, and the backup software employed, your mileage may vary.