JeffHebert 060001UEQ2 Tags:  ibm tier consolidate storage easy storwiz v7000 disk virtualize 3,637 Visits
SSD storage are clear, the cost is often prohibitive. But what if you can target the data that really needs the performance edge at the SSD drives? You could balance the cost against IT performance gains that truly help your business perform. Read this... Full Article at BNET
While the performance advantages of SSD storage are clear, the cost is often prohibitive. But what if you can target the data that really needs the performance edge at the SSD drives? You could balance the cost against IT performance gains that truly help your business perform. Read this brief from Mesabi Group to see how IBM Storwize� V7000 "users now have the tools � with the combination of Storage Tier Advisor and Easy Tier � to be able to plan for and use SSDs appropriately in their distinctive workload environments."
JeffHebert 060001UEQ2 Tags:  ssd range disk iaas mid enterprise storage v7000 ibm svc 2,451 Visits
“Procedures for replacing or adding nodes to an existing cluster”
Scope and Objectives
The scope of this document is two fold. The first section provides a procedure for replacing existing nodes in a SVC cluster non-disruptively. For example, the current cluster consists of two 2145-8F4 nodes and the desire is to replace them with two 2145-CF8 nodes maintaining the cluster size at two nodes. The second section provides a procedure to add nodes to an existing cluster to expand the cluster to support additional workload. For example, the current cluster consists of two 2145-8G4 nodes and the desire is to grow it to a four node cluster by adding two 2145-CF8 nodes.
The objective of this document is to provide greater detail on the steps required to perform the above procedures then is currently available in the SVC Software Installation and Configuration Guide, SC23-6628, located at www.ibm.com/storage/support/2145. In addition, it provides important information to assist the person performing the procedures to avoid problems while following the various steps.
Section 1: Procedure to replace existing SVC nodes non-disruptively
You can replace SAN Volume Controller 2145-8F2, 2145-8F4, 2145-8G4, and 2145-8A4 nodes with SAN Volume Controller 2145-CF8 nodes in an existing, active cluster without taking an outage on the SVC or on your host applications. In fact you can use this procedure to replace any model node with a different model node as long as the SVC software level supports that particular node model type. For example, you might want to replace a 2145-8F2 node in a test environment with a 2145-8G4 node previously in production that just got replaced by a new 2145-CF8 node.
Note: If you are attempting to replace existing 2145-4F2 nodes with new 2145-CF8 nodes do not use this procedure as you must use the procedure specifically for this sort of upgrade located at the following URL:
This procedure does not require changes to your SAN environment because the new node being installed uses the same worldwide node name (WWNN) as the node you are replacing. Since SVC uses this to generate the unique worldwide port name (WWPN), no SAN zoning or disk controller LUN masking changes are required. READ MORE>
JeffHebert 060001UEQ2 Tags:  xiv storage high ssd performance ibm disk availability emc 2,303 Visits
The IBM XIV® Storage System demonstrates how storage can simplify management and provisioning, yielding optimizing benefits especially for virtualized server environments. This means that growth in data does not mean growth in complexity. XIV has a virtualized, grid-based architecture that enables self-tuning and self-healing, as well as amazing management with simplicity and low total costs.
OctobeIBM Storwize V7000 Unified Disk System The most powerful and easy-to-use innovative disk system in the storage marketplacer 14, 2011 5:54 PM
JeffHebert 060001UEQ2 Tags:  storage san disk enterprise ibm nas fc midrange ssd fibre 2,263 Visits
JeffHebert 060001UEQ2 Tags:  storage disk saas ibm relicable virtual paas cloud efficient 1,992 Visits
JeffHebert 060001UEQ2 Tags:  saas vm storage iaas daas cloud optimization virtual hard disk 1,665 Visits
Cloud security: the grand challenge
In addition to the usual challenges of developing secure IT systems, cloud computing
presents an added level of risk because essential services are often outsourced to a third
party. The externalized aspect of outsourcing makes it harder to maintain data integrity and
privacy, support data and service availability, and demonstrate compliance.
In effect, cloud computing shifts much of the control over data and operations from the client
organization to their cloud providers, much in the same way organizations entrust part of their
IT operations to outsourcing companies. Even basic tasks, such as applying patches and
configuring firewalls, can become the responsibility of the cloud service provider, not the user.
This means that clients must establish trust relationships with their providers and understand
the risk in terms of how these providers implement, deploy, and manage security on their
behalf. This trust but verify relationship between cloud service providers and consumers is
critical because the cloud service consumer is still ultimately responsible for compliance and
protection of their critical data, even if that workload had moved to the cloud. In fact, some
organizations choose private or hybrid models over public clouds because of the risks
associated with outsourcing services.
Other aspects about cloud computing also require a major reassessment of security and risk.
Inside the cloud, it is difficult to physically locate where data is stored. Security processes that
were once visible are now hidden behind layers of abstraction. This lack of visibility can create
a number of security and compliance issues.
In addition, the massive sharing of infrastructure with cloud computing creates a significant
difference between cloud security and security in more traditional IT environments. Users
spanning different corporations and trust levels often interact with the same set of computing
resources. At the same time, workload balancing, changing service level agreements, and
other aspects of today's dynamic IT environments create even more opportunities for
misconfiguration, data compromise, and malicious conduct.
Infrastructure sharing calls for a high degree of standardized and process automation, which
can help improve security by eliminating the risk of operator error and oversight. However, the
risks inherent with a massively shared infrastructure mean that cloud computing models must
still place a strong emphasis on isolation, identity, and compliance.
Cloud computing is available in several service models (and hybrids of these models). Each
presents different levels of responsibility for security management. Figure 1 on page 3 depicts
the different cloud computing models. READ MORE>
More Storage Goodies
A quick summary of the latest announcements by Nick HarrisIn the cover story this month, Lee Cleveland, Distinguished Engineer, Power Systems direct attach storage, and Andy Walls, Distinguished Engineer, chief hardware architect for DS8000 and solid-state drives (SSDs), sat down to talk about all of the new storage technologies IBM has been releasing lately. What I didn’t have room for in the article was a nice summary of the technologies that can help you improve access, manage growth, protect data, reduce costs or reduce complexity. Whatever your goals, IBM has an integrated storage option for every organization.
Here are the quick highlights of the latest storage announcements:
IBM Storwize V7000
New advanced software functions
Proven IBM software functionalities
IBM Storwize Rapid Application Storage Solution
Runs on: AIX 7.1-5.3, IBM i 7.1-6.1 (with VIOS), Red Hat and SUSE Linux, z/VSE, Microsoft Windows, Mac OS X
Storage Efficiency through Real-time Data Compression for the Entire Data Lifecycle
Agnostic to Applications and Storage
IBM Real-time Compression appliances reduce storage capacity utilization by up to 80% without performance degradation. IBM Real-time Compression appliances increase the capacity of existing storage infrastructure helping organizations meet the demands of rapid data growth while also enhancing storage performance and utilization. The result is unprecedented cost savings, ROI, operational and environmental efficiencies.
The IBM Real-time Compression appliances address data optimization on primary storage so your capacity is optimized across all tiers of storage. The IBM Real-time Compression Appliance STN6500 and STN6800 align to your existing storage networking configuration for easy installation. The appliances install transparently in front of your existing NAS storage and thru patented real-time compression reduces the size of every file created. Read more>
JeffHebert 060001UEQ2 Tags:  ibm cloud available storage reliable disk scalable iaas 1,288 Visits
JeffHebert 060001UEQ2 Tags:  range saas virtualize paas mid iaas reliable enterprise available scalable disk torage ibm cloud 1,283 Visits
JeffHebert 060001UEQ2 Tags:  consolidate san nas ibm available compression virtualize sstorage reliable scalable disk 1,280 Visits
New SONAS release offers enhanced performance
Businesses continue to search for storage solutions that save money without sacrificing performance. Last year, IBM introduced Scale Out Network Attached Storage (SONAS), the industry’s first such network-attached storage (NAS) offering to address this business need. SONAS is an enterprise class, NAS system that provides extreme scalability, availability and security—and does so with record-breaking performance. It’s designed as a single global repository to manage multiple petabytes of storage and billions of files all under one file system.
In April, IBM announced significant performance enhancements to SONAS: improved information lifecycle management (ILM), hierarchical storage management (HSM) as well as ease of deployment and antivirus integration.
Todd Neville, SONAS program leader at IBM, says SONAS is unique in that it can very near-linearly scale to almost any performance level. With SONAS, he says, “You can build a system that’s as fast as you want it to be; but it’s not just about absolute size, it’s also about bang for your buck. We’ve significantly increased the software performance in our upcoming release 1.2, so customers see a significant performance increase on their current platform with no additional costs.”
Funda Eceral, SONAS market segment manager at IBM, says SONAS is the only true scale-out NAS system available in the marketplace. “While you can nondisruptively add capacity with storage building blocks,” Eceral says, “you can also still continue to independently scale out your I/O performance with interface nodes. It brings operational efficiency and extraordinary utilization rates for each customer.”
Three Key Features
This version of SONAS offers three key features, according to Neville:
“Everyone says, ‘We do tiering, HSM and ILM,’ but design matters—IBM does it differently.” —Todd Neville, SONAS program leader, IBM“Everyone says, ‘We do tiering, HSM and ILM,’ but design matters—IBM does it differently.” —Todd Neville, SONAS program leader, IBM
Next Page >>
JeffHebert 060001UEQ2 Tags:  ibm dedupe reliable storage available data hp disk scalable emc 1,266 Visits
IBM System Storage TS7610 ProtecTIER Deduplication Appliance Express
The TS7610 is a powerful new addition to the IBM ProtecTIER solution set, which brings the benefits of the reliability and performance of disk-based data protection to mid-sized businesses who need to ensure their backups are successfully completed in a timely manner. The TS7610 brings the added benefit of inline data deduplication which can squeeze up to 25TB or more into a single terabyte of storage. The TS7610 also reduces costs (such as reducing downtime and time spent managing and supporting systems) up to 45% over standard non-deduplicated virtual tape library systems.