JeffHebert 060001UEQ2 Tags:  storage disk saas ibm relicable virtual paas cloud efficient 2,212 Visits
JeffHebert 060001UEQ2 Tags:  saas vm storage iaas daas cloud optimization virtual hard disk 2,026 Visits
Cloud security: the grand challenge
In addition to the usual challenges of developing secure IT systems, cloud computing
presents an added level of risk because essential services are often outsourced to a third
party. The externalized aspect of outsourcing makes it harder to maintain data integrity and
privacy, support data and service availability, and demonstrate compliance.
In effect, cloud computing shifts much of the control over data and operations from the client
organization to their cloud providers, much in the same way organizations entrust part of their
IT operations to outsourcing companies. Even basic tasks, such as applying patches and
configuring firewalls, can become the responsibility of the cloud service provider, not the user.
This means that clients must establish trust relationships with their providers and understand
the risk in terms of how these providers implement, deploy, and manage security on their
behalf. This trust but verify relationship between cloud service providers and consumers is
critical because the cloud service consumer is still ultimately responsible for compliance and
protection of their critical data, even if that workload had moved to the cloud. In fact, some
organizations choose private or hybrid models over public clouds because of the risks
associated with outsourcing services.
Other aspects about cloud computing also require a major reassessment of security and risk.
Inside the cloud, it is difficult to physically locate where data is stored. Security processes that
were once visible are now hidden behind layers of abstraction. This lack of visibility can create
a number of security and compliance issues.
In addition, the massive sharing of infrastructure with cloud computing creates a significant
difference between cloud security and security in more traditional IT environments. Users
spanning different corporations and trust levels often interact with the same set of computing
resources. At the same time, workload balancing, changing service level agreements, and
other aspects of today's dynamic IT environments create even more opportunities for
misconfiguration, data compromise, and malicious conduct.
Infrastructure sharing calls for a high degree of standardized and process automation, which
can help improve security by eliminating the risk of operator error and oversight. However, the
risks inherent with a massively shared infrastructure mean that cloud computing models must
still place a strong emphasis on isolation, identity, and compliance.
Cloud computing is available in several service models (and hybrids of these models). Each
presents different levels of responsibility for security management. Figure 1 on page 3 depicts
the different cloud computing models. READ MORE>
OctobeIBM Storwize V7000 Unified Disk System The most powerful and easy-to-use innovative disk system in the storage marketplacer 14, 2011 5:54 PM
JeffHebert 060001UEQ2 Tags:  storage san enterprise disk fc nas ibm ssd midrange fibre 2,557 Visits
JeffHebert 060001UEQ2 Tags:  storage ibm disk virtualization reliable real time compression 1,452 Visits
History truly does repeat itself. We are talking about the history of data storage. Every once and a while a new technology comes along that requires a new way to think about infrastructure. Notice I said “infrastructure”. I’d like to paint two analogies:
JeffHebert 060001UEQ2 Tags:  storage iaas range enterprise avaiable disk reliable scalabe mid 1,454 Visits
JeffHebert 060001UEQ2 Tags:  ibm cloud available storage reliable disk scalable iaas 1,493 Visits
JeffHebert 060001UEQ2 Tags:  ssd disk range iaas mid storage enterprise ibm v7000 svc 2,923 Visits
“Procedures for replacing or adding nodes to an existing cluster”
Scope and Objectives
The scope of this document is two fold. The first section provides a procedure for replacing existing nodes in a SVC cluster non-disruptively. For example, the current cluster consists of two 2145-8F4 nodes and the desire is to replace them with two 2145-CF8 nodes maintaining the cluster size at two nodes. The second section provides a procedure to add nodes to an existing cluster to expand the cluster to support additional workload. For example, the current cluster consists of two 2145-8G4 nodes and the desire is to grow it to a four node cluster by adding two 2145-CF8 nodes.
The objective of this document is to provide greater detail on the steps required to perform the above procedures then is currently available in the SVC Software Installation and Configuration Guide, SC23-6628, located at www.ibm.com/storage/support/2145. In addition, it provides important information to assist the person performing the procedures to avoid problems while following the various steps.
Section 1: Procedure to replace existing SVC nodes non-disruptively
You can replace SAN Volume Controller 2145-8F2, 2145-8F4, 2145-8G4, and 2145-8A4 nodes with SAN Volume Controller 2145-CF8 nodes in an existing, active cluster without taking an outage on the SVC or on your host applications. In fact you can use this procedure to replace any model node with a different model node as long as the SVC software level supports that particular node model type. For example, you might want to replace a 2145-8F2 node in a test environment with a 2145-8G4 node previously in production that just got replaced by a new 2145-CF8 node.
Note: If you are attempting to replace existing 2145-4F2 nodes with new 2145-CF8 nodes do not use this procedure as you must use the procedure specifically for this sort of upgrade located at the following URL:
This procedure does not require changes to your SAN environment because the new node being installed uses the same worldwide node name (WWNN) as the node you are replacing. Since SVC uses this to generate the unique worldwide port name (WWPN), no SAN zoning or disk controller LUN masking changes are required. READ MORE>
JeffHebert 060001UEQ2 Tags:  consolidate san nas ibm available compression virtualize sstorage reliable scalable disk 1,558 Visits
New SONAS release offers enhanced performance
Businesses continue to search for storage solutions that save money without sacrificing performance. Last year, IBM introduced Scale Out Network Attached Storage (SONAS), the industry’s first such network-attached storage (NAS) offering to address this business need. SONAS is an enterprise class, NAS system that provides extreme scalability, availability and security—and does so with record-breaking performance. It’s designed as a single global repository to manage multiple petabytes of storage and billions of files all under one file system.
In April, IBM announced significant performance enhancements to SONAS: improved information lifecycle management (ILM), hierarchical storage management (HSM) as well as ease of deployment and antivirus integration.
Todd Neville, SONAS program leader at IBM, says SONAS is unique in that it can very near-linearly scale to almost any performance level. With SONAS, he says, “You can build a system that’s as fast as you want it to be; but it’s not just about absolute size, it’s also about bang for your buck. We’ve significantly increased the software performance in our upcoming release 1.2, so customers see a significant performance increase on their current platform with no additional costs.”
Funda Eceral, SONAS market segment manager at IBM, says SONAS is the only true scale-out NAS system available in the marketplace. “While you can nondisruptively add capacity with storage building blocks,” Eceral says, “you can also still continue to independently scale out your I/O performance with interface nodes. It brings operational efficiency and extraordinary utilization rates for each customer.”
Three Key Features
This version of SONAS offers three key features, according to Neville:
“Everyone says, ‘We do tiering, HSM and ILM,’ but design matters—IBM does it differently.” —Todd Neville, SONAS program leader, IBM“Everyone says, ‘We do tiering, HSM and ILM,’ but design matters—IBM does it differently.” —Todd Neville, SONAS program leader, IBM
Next Page >>
JeffHebert 060001UEQ2 Tags:  paas iaas ibm disk saas cloud scalable compression available reliable storage dedupe 1,485 Visits
A quick summary of the latest announcements
April 2011 | by Nick Harris
In the cover story this month, Lee Cleveland, Distinguished Engineer, Power Systems direct attach storage, and Andy Walls, Distinguished Engineer, chief hardware architect for DS8000 and solid-state drives (SSDs), sat down to talk about all of the new storage technologies IBM has been releasing lately. What I didn’t have room for in the article was a nice summary of the technologies that can help you improve access, manage growth, protect data, reduce costs or reduce complexity. Whatever your goals, IBM has an integrated storage option for every organization.
Here are the quick highlights of the latest storage announcements:
IBM Storwize V7000
New advanced software functions
New easy-to-use, Web-based GUI
Proven IBM software functionalities
IBM Storwize Rapid Application Storage Solution
Runs on: AIX 7.1-5.3, IBM i 7.1-6.1 (with VIOS), Red Hat and SUSE Linux, z/VSE, Microsoft Windows, Mac OS X
JeffHebert 060001UEQ2 Tags:  iaas storage compression range ibm enterprise scalable reliable available dedupe paas saas disk mid 1,489 Visits
ProtecTier deduplication offers 25-to-1 reduction and online backup
In June, IBM debuted ProtecTIER* deduplication solutions for AIX* and IBM i. ProtecTIER offers solutions to those who can’t complete backup operations in a given window, have difficulty protecting rapidly growing amounts of data or find their current backup infrastructure unreliable.
With data amounts growing, deduplication is becoming a vital part of data management, backup and recovery. “One of the reasons ProtecTIER is so crucial is because of the crazy growth the world is experiencing as it moves to an all-digital environment,” says Victor Nemechek, ProtecTIER deduplication offering manager at IBM. “Customers are finding their data often doubles or more every year and their current backup systems make it difficult to capture that data, protect it and restore it when they need to.”
For backups many companies use tapes that load data quickly, but present retrieval problems. These challenges—along with reliability problems—sent customers to disk where data was more accessible, but also expensive. Companies used disk for small portions of their most critical data, and kept their other data on tape. “Even with disk for critical data, backup is still an issue because you have a primary disk that you store your data on and you have to have that much disk to back up to, basically doubling your disk needs, and that can be very expensive,” Nemechek says.
“Deduplication can squeeze 25 terabytes of data down to only 1 terabyte of physical disk, so customers can have the speed and reliability of disk but without that one-to-one cost.” —Victor Nemechek, ProtecTIER deduplication offering manager, IBM
JeffHebert 060001UEQ2 Tags:  range saas virtualize paas mid iaas reliable enterprise available scalable disk torage ibm cloud 1,490 Visits