JeffHebert 060001UEQ2 Tags:  storage disk saas relicable ibm virtual efficient cloud paas 1,988 Visits
JeffHebert 060001UEQ2 Tags:  storage vm saas iaas daas cloud optimization virtual hard disk 1,662 Visits
Cloud security: the grand challenge
In addition to the usual challenges of developing secure IT systems, cloud computing
presents an added level of risk because essential services are often outsourced to a third
party. The externalized aspect of outsourcing makes it harder to maintain data integrity and
privacy, support data and service availability, and demonstrate compliance.
In effect, cloud computing shifts much of the control over data and operations from the client
organization to their cloud providers, much in the same way organizations entrust part of their
IT operations to outsourcing companies. Even basic tasks, such as applying patches and
configuring firewalls, can become the responsibility of the cloud service provider, not the user.
This means that clients must establish trust relationships with their providers and understand
the risk in terms of how these providers implement, deploy, and manage security on their
behalf. This trust but verify relationship between cloud service providers and consumers is
critical because the cloud service consumer is still ultimately responsible for compliance and
protection of their critical data, even if that workload had moved to the cloud. In fact, some
organizations choose private or hybrid models over public clouds because of the risks
associated with outsourcing services.
Other aspects about cloud computing also require a major reassessment of security and risk.
Inside the cloud, it is difficult to physically locate where data is stored. Security processes that
were once visible are now hidden behind layers of abstraction. This lack of visibility can create
a number of security and compliance issues.
In addition, the massive sharing of infrastructure with cloud computing creates a significant
difference between cloud security and security in more traditional IT environments. Users
spanning different corporations and trust levels often interact with the same set of computing
resources. At the same time, workload balancing, changing service level agreements, and
other aspects of today's dynamic IT environments create even more opportunities for
misconfiguration, data compromise, and malicious conduct.
Infrastructure sharing calls for a high degree of standardized and process automation, which
can help improve security by eliminating the risk of operator error and oversight. However, the
risks inherent with a massively shared infrastructure mean that cloud computing models must
still place a strong emphasis on isolation, identity, and compliance.
Cloud computing is available in several service models (and hybrids of these models). Each
presents different levels of responsibility for security management. Figure 1 on page 3 depicts
the different cloud computing models. READ MORE>
OctobeIBM Storwize V7000 Unified Disk System The most powerful and easy-to-use innovative disk system in the storage marketplacer 14, 2011 5:54 PM
JeffHebert 060001UEQ2 Tags:  storage san disk enterprise ibm nas fc midrange ssd fibre 2,262 Visits
JeffHebert 060001UEQ2 Tags:  storage ibm disk virtualization reliable real time compression 1,214 Visits
History truly does repeat itself. We are talking about the history of data storage. Every once and a while a new technology comes along that requires a new way to think about infrastructure. Notice I said “infrastructure”. I’d like to paint two analogies:
JeffHebert 060001UEQ2 Tags:  storage iaas enterprise range disk avaiable reliable scalabe mid 1,247 Visits
JeffHebert 060001UEQ2 Tags:  ibm cloud available storage reliable disk scalable iaas 1,284 Visits
JeffHebert 060001UEQ2 Tags:  ssd range disk iaas mid enterprise storage v7000 ibm svc 2,445 Visits
“Procedures for replacing or adding nodes to an existing cluster”
Scope and Objectives
The scope of this document is two fold. The first section provides a procedure for replacing existing nodes in a SVC cluster non-disruptively. For example, the current cluster consists of two 2145-8F4 nodes and the desire is to replace them with two 2145-CF8 nodes maintaining the cluster size at two nodes. The second section provides a procedure to add nodes to an existing cluster to expand the cluster to support additional workload. For example, the current cluster consists of two 2145-8G4 nodes and the desire is to grow it to a four node cluster by adding two 2145-CF8 nodes.
The objective of this document is to provide greater detail on the steps required to perform the above procedures then is currently available in the SVC Software Installation and Configuration Guide, SC23-6628, located at www.ibm.com/storage/support/2145. In addition, it provides important information to assist the person performing the procedures to avoid problems while following the various steps.
Section 1: Procedure to replace existing SVC nodes non-disruptively
You can replace SAN Volume Controller 2145-8F2, 2145-8F4, 2145-8G4, and 2145-8A4 nodes with SAN Volume Controller 2145-CF8 nodes in an existing, active cluster without taking an outage on the SVC or on your host applications. In fact you can use this procedure to replace any model node with a different model node as long as the SVC software level supports that particular node model type. For example, you might want to replace a 2145-8F2 node in a test environment with a 2145-8G4 node previously in production that just got replaced by a new 2145-CF8 node.
Note: If you are attempting to replace existing 2145-4F2 nodes with new 2145-CF8 nodes do not use this procedure as you must use the procedure specifically for this sort of upgrade located at the following URL:
This procedure does not require changes to your SAN environment because the new node being installed uses the same worldwide node name (WWNN) as the node you are replacing. Since SVC uses this to generate the unique worldwide port name (WWPN), no SAN zoning or disk controller LUN masking changes are required. READ MORE>
JeffHebert 060001UEQ2 Tags:  consolidate san nas ibm available compression virtualize sstorage reliable scalable disk 1,278 Visits
New SONAS release offers enhanced performance
Businesses continue to search for storage solutions that save money without sacrificing performance. Last year, IBM introduced Scale Out Network Attached Storage (SONAS), the industry’s first such network-attached storage (NAS) offering to address this business need. SONAS is an enterprise class, NAS system that provides extreme scalability, availability and security—and does so with record-breaking performance. It’s designed as a single global repository to manage multiple petabytes of storage and billions of files all under one file system.
In April, IBM announced significant performance enhancements to SONAS: improved information lifecycle management (ILM), hierarchical storage management (HSM) as well as ease of deployment and antivirus integration.
Todd Neville, SONAS program leader at IBM, says SONAS is unique in that it can very near-linearly scale to almost any performance level. With SONAS, he says, “You can build a system that’s as fast as you want it to be; but it’s not just about absolute size, it’s also about bang for your buck. We’ve significantly increased the software performance in our upcoming release 1.2, so customers see a significant performance increase on their current platform with no additional costs.”
Funda Eceral, SONAS market segment manager at IBM, says SONAS is the only true scale-out NAS system available in the marketplace. “While you can nondisruptively add capacity with storage building blocks,” Eceral says, “you can also still continue to independently scale out your I/O performance with interface nodes. It brings operational efficiency and extraordinary utilization rates for each customer.”
Three Key Features
This version of SONAS offers three key features, according to Neville:
“Everyone says, ‘We do tiering, HSM and ILM,’ but design matters—IBM does it differently.” —Todd Neville, SONAS program leader, IBM“Everyone says, ‘We do tiering, HSM and ILM,’ but design matters—IBM does it differently.” —Todd Neville, SONAS program leader, IBM
Next Page >>