This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
• Monday – 1:00pm Storing Archive Data for Compliance Challeng es– 4:15pm IBM Watson: What it Means for Society
• Tuesday – 4:15pm Using Social Media: Birds of a Feather (BOF)
• Wednesday – 9:00am Data Footprint Reduction: IBM Storage option s– 2:30pm IBM's Storage Strategy in the Smarter Comput ing era– 4:15pm IBM SONAS and the Cloud Storage Taxonomy
• Thursday – 9:00am IBM Watson: What it Means for Society– 10:30am Tivoli Storage Productivity Center Overview– 5:30pm IBM Edge “Free for All” hosted by Scott Drummo nd
� ProsJust-in-Time increased utilization percentageEliminates the pressure to make accurate space estimatesDynamically expand volume without impacting applications or rebooting serverReduces the data footprint and lowers costsShifts focus from volumes to storage pool capacity
• Cons�Not all file systems
cooperate or friendly� Deletion of files does not
free space for others� “sdelete” writes zeros over
deleted file space
�Some implementations may impact I/O performance�May not support same set
of features, copy services, or replication� “Writing checks you can’t
� ProsSupports both Fully-allocated and Thin-Provisioned SourcesReduces the data footprint and lowers costsAllows you to keep more copies onlineAllows you to take copies more frequently� Can be used as
checkpoint copies during batch processing
• Cons�Some implementations
may impact I/O performance�Requires that you
estimate the maximum percentage changed
• Typically 10-20 %
�Exceeding the reserved space invalidates destination copy
• Data deduplication reduces capacity requirements by only storing one unique instance of the data on dis k and creating pointers for duplicate data elements
Can be used together but don’t deduplicate the same data twice
� Both Solutions Offer the Benefits of Target side De duplication:– Greatly reduced storage capacity requirements – Lower operational costs, energy usage and TCO– Faster recoveries with more data on disk
� Use ProtecTIER When:– Highest performance and capacity scaling are required!– Up to 1400 MB/sec (2.5GB/s with 2 node) deduplication rates are needed– Deduplicated capacities up to 25 PB are required– You wish to avoid operational impact of post processing deduplication– A VTL appliance model is desired– Deduplicating across multiple TSM (or other backup) servers
� Use TSM 6 Built-in Deduplication When:– You desire deduplication operations be completely integrated within TSM– The benefits of deduplication are desired without separate hardware or
software dependencies or licenses (ships with TSM Extended Edition)– You desire end to end data lifecycle management with minimized data
• Lempel-Ziv lossless compression builds a dictionary of repeated phrases, sequences of two or more characters that can be represented with fewer number of bits
• In the above excerpt from “Lord of the Rings”, all of the red textrepresents repeated sequences eligible for compression!
Source: The Lempel Ziv Algorithm, Christian Zeeh, 200336
� ProsCan be used for data transmission, tape and disk dataCan offer up to 80% data footprint reductionAvailable as front-end appliance or integrated into storage systemCan be “Dedupe-Friendly”
• Cons�Some implementations are
post-process• Stores uncompressed
data first, compress later
�Some implementations impact performance and/or consume substantial CPU resources�Benefits vary by data type,
and whether applications do their own compression or encryption
• Your mileage may vary
45
#IBMEDGE
Intel, the Intel logo, Xeon and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and /or other countries.
Adobe, the Adobe logo, PostScript, and the PostScri pt logo are either registered trademarks or tradema rks of Adobe Systems Incorporated in the United Sta tes, and/or other countries. IT Infrastructure Library is a registe red trademark of the Central Computer and Telecommun ications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Ce leron, Intel Xeon, Intel SpeedStep, Itanium, and Pe ntium are trademarks or registered trademarks of Intel Corporation or its s ubsidiaries in the United States and other countrie s. Linux is a registered trademark of Linus Torva lds in the United States, other countries, or both. Microsoft, Windows, Wi ndows NT, and the Windows logo are trademarks of Mic rosoft Corporation in the United States, other count ries, or both. ITIL is a registered trademark, and a registered communi ty trademark of The Minister for the Cabinet Office , and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the Unite d States and other countries. Java and all Java- based trademarks and logos are trademarks or regist ered trademarks of Oracle and/or its affiliates. Cell Broadband Eng ine is a trademark of Sony Computer Entertainment, Inc. in the United States, other contries, or both a nd is used under license therefrom. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countri es.
Other product and service names might be trademarks of IBM or other companies. Trademarks of Internati onal Business Machines Corporation in the United St ates, other countries, or both can be found on the World Wide W eb at http://www.ibm.com/legal/copytrade.shtml .
Information is provided "AS IS" without warranty of any kind.
The customer examples described are presented as il lustrations of how those customers have used IBM pr oducts and the results they may have achieved. Actu al environmental costs and performance characteristics may vary by customer.
Information concerning non-IBM products was obtaine d from a supplier of these products, published anno uncement material, or other publicly available sour ces and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance num bers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM h as not tested these products and cannot confirm the accuracy of performance, capability, or any other c laims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the suppli er of those products.
All statements regarding IBM future direction and i ntent are subject to change or withdrawal without n otice, and represent goals and objectives only.
Some information addresses anticipated future capab ilities. Such information is not intended as a defin itive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presen ted here to communicate IBM's current investment and developmen t activities as a good faith effort to help with ou r customers' future planning.
Performance is based on measurements and projection s using standard IBM benchmarks in a controlled env ironment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user' s job stream, the I/O configuration, the storage co nfiguration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve thro ughput or performance improvements equivalent to th e ratios stated here.
Prices are suggested U.S. list prices and are subje ct to change without notice. Starting price may not include a hard drive, operating system or other fe atures. Contact your IBM representative or Business Partner for the most current pricing in your geography.
Photographs shown may be engineering prototypes. Ch anges may be incorporated in production models.
References in this document to IBM products or serv ices do not imply that IBM intends to make them ava ilable in every country.