We get asked this question a lot, we know the information is out there and our friends at Google will find it for us, but if you wanted a 1 page shot of the comparisons between Storwize V3700, V5000, V7000 on one page, here it is (click on it to enlarge the image):
IBM System Storage RedBooks
JonTate 110000B0RP 56,396 Views
JonTate 110000B0RP 20,213 Views
No, this is not a pre-announcement of the death of Lotus Notes. Nope, what this is is something that came out of a discussion we were having on a residency that I am running about some whizzy new hardware that will be announced very shortly. While I was waiting for what seemed like an eternity for Lotus Notes to wake up and open itself, one of the residents said "have you upped the JVM memory setting?". What, says I in my best I haven't got a clue what you are talking about expression.
So, a few clicks later and a restart of Lotus Notes (in my case LN 8.5) and the thing is now like an express train ! Naturally your mileage may vary, but it don't half go a bit quicker for me now ! It's not going to fix network issues, but everything opens much quicker.
Here is a part of the solution described there.
Resolving the problem
Most likely, a set of default configurations for Notes/Designers' use of the JVM needs to be modified. The JVM is the runtime upon which Java programs execute. For Notes and Domino Designer, the JVM settings are stored in a file called jvm.properties that is located in the following path:
<Notes program dir>/framework/rcp/deploy/jvm.properties
By default, the properties file has the following values:
Back to me again. Now, do not get too greedy as I did and change the values to something other than those advised. I did, and Lotus Notes was not very happy about it and seemed to spend an inordinate time loading. Going back to the suggested values fixed that.
Hopefully you will notice an improvement !
JonTate 110000B0RP 17,524 Views
Just over a week or so ago we completed the ITSO Redbook residency to create a book based on the SAN Volume Controller and the IBM FlashSystem 820. Now, normally we like to get these things out very quickly and the team, Danny Bryant, Christian Burns, Joao Marcos Leite, and Denis Senin worked very long hours to make this happen. As is always the case they were helped by those awfully nice developers at IBM Hursley in the UK, the home of storage virtualization.
What they could not have predicted, and neither did I unfortunately, was that this would all be slowed down a little by a tree root. What? Well any mountain biker will tell you that tree roots can sometimes be your enemy, moderately friendly if you see them but positively hostile when you are going downhill, through grass, singletrack, and down a route that you hate anyway. One dislocated shoulder (100% AC dislocation whatever that is and I am not searching for it on the web) and a trip to A&E later, I was out of typing action for a week.
Anyway, what all this means is that had I been able to type with two hands we would have had the book out sooner. Normal service is somewhat resumed now.
So, the wait is over, the book, Implementing the IBM SAN Volume Controller and FlashSystem 820, is available now. It is still in draft status and gets tweaked regularly so be sure to keep checking the last update field.
Karen_Orlando 270004039T 17,183 Views
IBM Spectrum Control release 5.2.8 provides integrated data and storage management that delivers monitoring, automation, and analytics, that can significantly reduce storage costs. Read the newly published Redbooks publication IBM Spectrum Family - Spectrum Control Standard Edition to apply practical examples and insights for your business enterprises by using the latest features of IBM Spectrum Control Standard Edition.
This book also provides an overview of IBM Spectrum Control Advanced Edition, illustrating how IBM Spectrum Control fits into Software-Defined Storage (SDS) environments, and how Spectrum Control integrates into the landscape of the IBM Spectrum Control family of products.
Gain new Insights into your SDS environments
Advanced Alert management
You can easily implement many of the practical samples in this book. For example, the new extensive Advanced Alerting Management is now based on over 50 conditions to better monitor your enterprise resources, to troubleshoot any performance issues, and to generate notifications:
You can set thresholds for individual performance metrics to track these conditions:
From the Alerts definition screen:
Read the IBM Spectrum Family - Spectrum Control Standard Edition, SG24-8321, IBM Redbook publication for how-to guidance and examples to effectively integrate IBM Spectrum Control Standard Edition into your Software-Defined Storage business enterprise environments.
Cloud computing is defined as the use of computing services and resources (hardware and software) that are delivered over a network, typically Ethernet. OpenStack is being developed as an industry standard Cloud computing project. OpenStack is a global collaboration of developers and cloud computing technologists producing the ubiquitous open source cloud computing platform for public and private clouds. To learn more about OpenStack, refer to the project website at:
With the availability of the IBM Storage Driver for OpenStack, the IBM XIV Storage System offers a range of capabilities that enable more effective storage automation deployments into private or public clouds. Enabling OpenStack with XIV allows for storage to be made available whenever needed without the traditional associated cost of highly skilled administrators and infrastructure .
After the driver is installed on the OpenStack Cinder (OpenStack Block Storage) nodes, XIV storage volumes can be allocated by the Cinder nodes to the Nova-compute nodes in the OpenStack cloud environment. Virtual machines on the Nova-compute nodes can then utilize these storage resources.
The driver controls the creation and deletion of volumes on the XIV Storage System Gen3, and manages mappings (attach or detach ) of volumes with Virtual Machines (VMs) running in OpenStack. Access to the XIV volumes is over an iSCSI connection protocol.
The IBM Redbooks publication Using the IBM XIV Storage System in OpenStack Cloud Environments, REDP-4971 will guide you in setting up an OpenStack Cloud environment for integration with your XIV Storage System. It is not an official support document.
Note also that illustrations in this paper are based on the Openstack Folsom release. This release offers two options in terms of block storage: Nova-Volumes and Cinder. Both are nearly identical in terms of functionality, APIs, and even the general theory of operation. Remember, however, that the Nova-Volumes option is deprecated and to be removed at the release of Grizzly.
For the latest information about the IBM Storage Driver for OpenStack, refer to the IBM XIV publications.
JonTate 110000B0RP Tags:  area vmware storage vsphere networks best practices esxi 16,236 Views
Due to the sterling efforts of:
Brocade Communications Systems:
we are very pleased to have published this IBM Redbook:
which covers recommendations based on the IBM b-type storage area network (SAN) environment utilizing VMware vSphere ESXi. We describe the hardware and software and the unique features that they bring to the marketplace. We then highlight those features and how they apply to the SAN environment, and the best practices for ensuring that you get the best out of your SAN.
JamesPistilli 270007TQS7 Tags:  watson storage redbooks cleversafe object ibm cloud bluemix 16,122 Views
We are very pleased to announce that the IBM Redbooks team has just published the following IBM Redbooks publication: “Cloud Object Storage as a Service: IBM Cloud Object Storage from Theory to Practice!"
The book is a practical guide for IBM Cloud Object Storage Public Cloud Services, the newest addition to the IBM Cloud Object Storage (IBM COS, previously known as Cleversafe) family. It was produced by a team of specialists from IBM around the world working at the IBM Almaden Center and also IBM Business Partner Mark III Systems Team working at their office in Austin, Texas.
The book explains these different deployment models with some details and then focuses on IBM Cloud Object Storage Public Cloud Services and hybrid solutions leveraging this offering.
If you are not familiar with the object storage concepts, start with “Ch1 Introduction to object storage. You will learn about what qualifies business problems for object storage and comparison and positioning to other storage models.
“Ch2 Introducing IBM Cloud Object Store Public Services” compares different COS deployment models and goes into details of the public service capabilities and resiliency options. We don’t discuss the IBM COS internals in this book, since the IBM COS architecture, and actual implementation is transparent to the users of the IBM COS Public Services. You can refer to the newly published IBM Redpaper ”IBM Cloud Object Storage Concepts and Architecture", REDP-5435 for a detailed discussion of the IBM COS architecture, technology and associated benefits.
Ready to start using the service? Follow the instructions in “Ch3 Getting started with IBM Cloud Object Storage” on how to sign up for the service and other details of using it.
“Ch4 Typical applications for IBM Cloud Object Storage” describes several example IBM COS deployments across various industry verticals, provides use cases for IBM COS, and outlines IBM COS integration with other IBM offerings. The aim of this chapter is to provide to system and application owners, architects, and administrators an outline of how IBM COS can fit into or enhance their business.
The rest of the chapters in the book are hands on scenarios and real life solutions with IBM COS, Watson, Bluemix, IoT, Cloudant, Node.js, etc. The chapters are targeted for cloud solution developers and integration architects. We describe step by step implementation and also provide the source code for most of these scenarios.
I hope you enjoy the book! If you have comments, please use the Comments section of this blog post below.
Larry_Coyne 100000P1WB 15,958 Views
When I started to write this blog to share the highlights of the OpenStack Summit May 2015 presentation about Docker containers being a good platform for Big Data analytics I asked some of my peers if they new about the Thrilla in Manila eye catcher. 100% of my very small data sample said they had no idea. In 1975 Muhammad Ali and Joe Frazier fought their third boxing match for the world championship. This epic fight was held in Manila and Muhammad Ali used rhymes to make his opponents mad. The Thrilla in Manila was from one of his rhymes.
Also, in 1975 the IBM 3350 Direct Access Storage Facility with the advanced disk technology known as "Winchester." had a Head Disk Assembly (HDA) storage capacity of 317,498,850 bytes. Fast forward 40 years and now we are talking about OpenStack Manila: the new OpenStack file share service along with IBM Spectrum ScaleTM the high performance, scale-out, clustered file system that can span Yottabytes (1 Yottabyte = 1 000 000 000 000 000 000 000 000 bytes!) of storage.
The presentation describes the use case of 30+ universities using SuperVessel Cloud built on the IBM Power platform with advanced technologies like OpenStack Manila, Docker, Spark/Hadoop, Big data Analytics, Cognitive Computing and Spectrum Scale.
Docker containers are an ideal platform for the Big Data analytics use case because of their unique security and performance advantages. Big Data work loads typically use distributed file systems to provide shared access to both input and output data sets. OpenStack Manila is an excellent way to manage distributed file systems in
The presentation includes:
The two figures from the presentation highlight the Spectrum Scale architecture vision supported by Openstack components and the overall OpenPOWER SuperVessel Unified Management Platform with Spectrum Scale as a single scale-out data plane. Take a look at the presentation for the complete Thrilla in Manilla.
Figure 1 shows the IBM vision for the high performance, scale-out, clustered file system Spectrum Scale
The video presentation explains how Spectrum Scale and Manila are integrated with the Spectrum Scale Manila driver.
Figure 2 architecture describes how everything fits together. For this project the pieces are:
Figure 2 shows how Spectrum Scale fits in to the larger architecture of the OpenPOWER-SuperVessel Unified Management Platform solution with the OpenStack components.
In a recent posting , we introduced the upcoming support for VMware Virtual Volumes (VVOL) with the IBM XIV Storage System. With the announcement of vSphere 6.0, VMware also officially released support for the vSphere Virtual Volumes (VVOL) architecture
Since March 12 , 2015 , the VVOL and XIV integration is effectively supported through IBM Spectrum Control Base, and based on the VMware API for Storage Awareness (VASA). IBM Spectrum Control Base is a follow on to the IBM Storage Integration Server.
IBM Spectrum Control Base is a member of the recently announced IBM Spectrum Storage family.
You can see a practical illustration and a step by step description of the VVOL integration in this new IBM Redbooks publication:
In this publication, we review the VVOL concept and explain the architecture of the solution . implemented by IBM Spectrum Control :
Bert_Dufrasne 1200009T35 15,503 Views
Announced on April 27, 2016 IBM FlashSystem A9000 and IBM FlashSystem A9000R
deliver the microsecond latency and high availability of IBM FlashCore™ technology with grid architecture, simple scalability, and industry-leading IBM software, designed to drive your business into the cognitive era.
Comprehensive data reduction capabilities, including inline deduplication and compression, help lower total cost of ownership,
while a new, highly intuitive user interface simplifies management.
IBM FlashSystem A9000 and IBM FlashSystem A9000R transform technology infrastructure into business innovation.
From a functional standpoint IBM FlashSystem A9000 and IBM FlashSystem A9000R leverage most of the software-defined storage features offered by the IBM Spectrum™ Accelerate software, including multi-tenancy and business continuity functions.
For a quick tour of the systems, refer to the following IBM Redbooks Product guides:
For details about the systems architecture, hardware, functions and usage , see the IBM Redbooks publication:
Bert_Dufrasne 1200009T35 15,407 Views
Secure your data with industry-standard data-at-rest encryption with no performance impact.
Encrypting “data at rest” is a key element when addressing these concerns.
Here are a few key facts about XIV encryption:
For details about the encryption planning, process and implementation in XIV, refer to the IBM Redpaper, IBM XIV Security with Data-at-Rest Encryption, REDP-5047
Bert_Dufrasne 1200009T35 14,746 Views
The XIV Storage Software version 11.5.1 announced on January 27,
XIV and Virtual Volumes are an ideal combination .
XIV gets the best out of vSphere VVOL and VVOL gets the best out of XIV:
VMware vSphere Virtual Volumes automation is based on VMware vSphere APIs for Storage Awareness or VASA .
The IBM Storage Provider for VMware VASA is a feature of the IBM Storage Integration Server, and will support the orchestration of all Virtual Volumes operations with XIV.
Just watch this video for more information on VVOL and a demonstration of the efficiency of cloning VMs when using VVOL and XIV.
For a better experience, watch in full-screen mode by clicking the icon at the bottom right corner of the video pane.
(The demo was developed by Paul Braren, IBM Technical Advisor, working with the IBM Redbooks team)
JonTate 110000B0RP Tags:  heartbleed keys bug openssl ssl heartbeat passwords encryption hackers 14,587 Views
I think that this Heartbleed bug is going to be an observational comedian's dream. Well I guess one that is a bit of an IT geek anyway. Not quite sure what the Pub Landlord will make of it, but I am sure that he will have some kind of an opinion. Probably not fit to print.
Anyway, on to the serious stuff. I thought that as there is a lot of confusion as to what it is, what should you do, where should I go in IBM to find out more, that I would throw something together that gives a little bit of background to it (that may or may not be of interest to you) but more importantly a link to the official IBM route/statement/response for this little bugette.
First, IBM's official, publicly viewable response for Heartbleed is available here:
Secondly, for all security advisory bulletins and statements, go here:
I reckon the former should be your first point of call.
However, in our effort to serve you better, we recommend that you subscribe to the RSS feed for notification of future IBM Security Bulletins and advisories posted on the blog.The short URL for this blog is:
Right, what is Heartbleed anyway?
There is a piece of open source software called OpenSSL and the purpose of this is to encrypt communications between an end user's computer and a web server. A sort of masonic secret handshake at the beginning of what you hope is going to be a secure conversation. Heartbleed is a vulnerability in the form of a bug that exploits this weakness and allows information that is normally protected to be stolen.
Why is it called Heartbleed?
Once upon a time there was, well still is, an extension to SSL which was called Heartbeat. Heartbleed is so named because it affects the Heartbeat extension. You can't beat IT humour!
Well, OpenSSL is one of the most prevalent encryption tools on the internet, with estimates putting a figure of two-thirds of websites using it. Have you ever noticed the little padlock symbol in your browser? Then it is likely that you are using SSL. Half a million sites are thought to have been affected. That's "so what?".
How can hackers exploit this?
From Heartbleed.com: "The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users."
I think that "anyone on the internet" is probably a little bit of scaremongering, you have to have some pretty specialised knowledge to be able to do that.
Should I change my passwords?
Well, opinions differ on this for sure. There is a school of thought that says it is prudent to do so now. Some say do not do it now, but wait until the problem has been fixed, and then change them. I think, which means that this is my personal opinion and does not necessarily represent the views of my employer, that for credit cards and other sensitive websites, I would change them now, then change them again when the all clear is sounded. In fact I have changed the ones that deal with "money", and I am keeping an eagle eye on them at the moment just in case. Makes me feel better.
What sites are affected?
Well, the Google might be able to provide a list of the sites that are affected and is likely to be the first port of call for most users to see what he/she/it says. But there are some popular ones that people are turning to including:
Again, these are ones that represent my personal opinion as worth a look and not necessarily those of my employer.
Is the world going to stop spinning and can we blame the bankers for this too?
No, and no. Certainly it is inconvenient and one of the more irritating aspects of this is that no-one can really tell if something has/hasn't been hacked and cannot be traced. Rumours on all sorts of forums suggest that "state-sponsored hacking" started as soon as news of this bug surfaced, and that hacker groups are starting to target websites for financial gain. And in some well publicised cases for "amusement". Although I have never visited "Mumsnet", I am told that it was targeted. This is what they had to say about it (I haven't read it all but as it is Mumsnet I am assuming that it is safe for work so have not marked it NSFW, if in any doubt don't go there!).
When and how will it be fixed?
All sites that are affected are scrambling to fix their code and close any loopholes. They might force a reset of all passwords. Funnily enough, when I logged into my Chase account I was forced to change my password but there was no official statement that I saw at the time to say it was due to Heartbleed. So, what needs to happen is that the owners of the services need to patch the code to remove the vulnerability, revoke the compromised keys, and reissue new keys. This does not fix any traffic that has already been intercepted. Once the service owners have fixed the code and keys, then it is definitely time for a password change.
Larry_Coyne1 270004G57S 14,384 Views
This week I posted a new video for our IBM System Storage Tape Library Guide for Open Systems, SG24-5946. The video includes a segment showing a tape cartridge being transported across libraries in the TS3500 Shuttle Complex. The TS3500 Shuttle Complex can access over 300,000 tapes and is now supported by IBMs Tape System Library Manager (TSLM) and High Performance Storage System (HPSS). Here is a figure from the book of the TS3500 Shuttle Complex. Select the link above to the book abstract web page to watch the video.
Figure showing tape cartridge movement across the TS7700 Shuttle Complex
I was reviewing my tape related blog postings and noticed that I needed to add an update for IBM Virtualization Engine TS7700 with R3.0, SG24-8122. The TS7700 with R3.0 Draft was published several months ago and updated in July. There are extensive descriptions of setting up and using the TS3500 Tape Library in TS7700 configurations. Also, if you take the TS7700 3D tour there is a selection to see an animation showing TS3500 Tape Integration. Select the Show Tape integration button.
Lastly, LTFS EE is for the TS3500. We published the IBM Linear Tape File System Enterprise Edition V1.1 Installation and Configuration Guide, SG24-8143 draft for the product announce on June 10 and will be posting an installation video soon. The TS3500 is a great efficient green way to store all that data that needs to be kept around for years and years.
Karen_Orlando 270004039T 14,024 Views
IBM FlashSystem® V9000 is a comprehensive all-flash high-speed enterprise storage solution that delivers the full capabilities of IBM FlashCore™ technology (The secret sauce). It delivers microsecond response times plus a rich set of software-defined storage features including: IBM Real-time Compression™, dynamic tiering, thin provisioning, snapshots, cloning, replication, data copy services and high-availability configurations.
The IBM Redbooks publication Introducing and Implementing IBM FlashSystem V9000 provides examples and guidelines to help you enjoy that secret sauce.
It introduces you to IBM FlashSystem V9000 and provides in-depth knowledge of the product architecture, software and hardware, its implementation, and hints and tips. It provides use cases that demonstrate real-world solutions, as well as examples of the benefits gained by integrating FlashSystem storage into business environments.
Also part of the sauce is the integrated management in a FlashSystem V9000 scalable environment of components using Fibre Channel connections: All manageable from one central V9000 GUI.
A FlashSystem V9000 fixed or scalable building block consists of:
The FlashSystem V9000 scalable solution provides scalable performance. You can scale-up and scale-out independently, up to 2.5 million IOPS and 19.2 GB/s bandwidth, with deterministic IBM MicroLatency, and Quality of Service.
In Introducing and Implementing IBM FlashSystem V9000 we walk you through the process to set up a scaled-out and scaled-up system with 2 building blocks and 2 additional storage enclosures, as shown in the easy-to-use FlashSystem V9000 GUI.
In total, a FlashSystem V9000 Storage System can contain a maximum of 8 FlashSystem V9000 Storage Enclosures, offering a potential storage capacity of 456 TB, and up to 2.2 PB effective capacity is available at 80% compression. Real-time Compression is available as a software feature that allows users to elect to deploy Real-time Compression where it is desired.
The following image illustrates the scalable capacity of FlashSystem V9000 . It also shows that additional SEs can be added to a single Building Block, as well as to 2, 3, or 4 Building Blocks.
Read IBM Redbooks publication; Introducing and Implementing IBM FlashSystem V9000 for how-to guidance and examples to effectively deploy and integrate IBM FlashSystem V9000 into your enterprise environment. Topics include Encryption, Concurrent Code Load and Concurrent Maintenance, Performance guidelines and more.
Also read the IBM FlashSystem V9000 Product Guide for product features and licensing details.