SlideShare a Scribd company logo
IBM FILE SYSTEM
Memory management
The memory management component is responsible for the
efficient use of system memory by a java application.
Java programs run in a managed execution environment.
When a java program requires storage, the memory
management component allocates the application a discrete
region of unused memory. After the application no longer
refers to the storage, the memory management component
must recognize that the storage is unused and reclaim the
memory for subsequent reuse by the application or return it
to the operating system.
• Memory management on IBM i is based on
  temporary, dynamic memory. Both single-level
  storage (SLS) and teraspace are used. In
  addition, for extended memory the so called
  undefined memory mapped files (including
  memory protection) are used. The memory
  type is implemented in the same way as for
  UNIX.
• In the single-level storage concept main
  memory and auxiliary storage (for
  example, disk storage) are considered as
  a single large address space, whose
  linearly addressable areas can grow to a
  maximum size of 16 MB.
• A teraspace is temporary dynamic storage, that
  provides an address space of 1 terabyte for
  each process (that is, IBM i job). A teraspace
  can consist of a number of separately allocated
  and deallocated storage areas. Between these
  areas, "addressability holes" can exist, that
  is, storage areas that are not allocated. Although
  teraspace is also based on single-level
  storage, it is completely transparent to the
  processes (IBM i jobs). This memory type is
  used for the so called roll area.
• For memory mapped files, the storage
  area with a given size is mapped to a
  undefined file of a given size in the file
  system. All commands that access the
  memory space are redirected to file
  access by the operating system. Memory
  protection is achieved by explicit attach
  and detach instructions to the extended
  memory when activating and deactivating
  a user context.
• IBM i means implementing proven
  solutions on a platform you can trust. By
  choosing the latest Power® platform, IBM i
  applications get world class performance
  plus dynamic infrastructure flexibility, with
  the opportunity to lower monthly
  operations costs.
• IBM i integrates a trusted combination of relational
  database, security, Web services, networking and
  storage management capabilities. It provides a broad
  and highly stable database and middleware
  foundation    for efficiently     deploying   business
  processing applications, with support for over 5,000
  solutions from over 2,500 ISVs. i solutions are offered
  through an extensive, highly skilled worldwide network
  of IBM Business Partners that is backed by IBM’s
  trusted services and support infrastructure.
• IBM develops, fully tests and preloads the core
  middleware components of i together upfront, whereas
  on other platforms, operating system, database and
  middleware integration is done in the data center. The
  preintegration and testing of i is a key factor in
  enabling companies to deploy applications faster and
  maintain them with fewer staff. Virtualization and
  workload management are also built into i to enable
  you to run multiple applications and components
  together on the same system, driving up system
  utilization and delivering a better return on IT
  investments.

More Related Content

Viewers also liked

Presentation1
Presentation1Presentation1
Presentation1
Charlotte Grogan
 
The 40 best foods
The 40 best foodsThe 40 best foods
The 40 best foods
Mata Pensel
 
Presentation1
Presentation1Presentation1
Presentation1
Charlotte Grogan
 
The nightmare before christmas
The nightmare before christmasThe nightmare before christmas
The nightmare before christmas
albertito136
 
2nd Year (Asian Figures)
2nd Year (Asian Figures)2nd Year (Asian Figures)
2nd Year (Asian Figures)
Christopher Panti
 

Viewers also liked (6)

Presentation1
Presentation1Presentation1
Presentation1
 
The 40 best foods
The 40 best foodsThe 40 best foods
The 40 best foods
 
Presentation1
Presentation1Presentation1
Presentation1
 
The nightmare before christmas
The nightmare before christmasThe nightmare before christmas
The nightmare before christmas
 
S12 bai 1
S12 bai 1S12 bai 1
S12 bai 1
 
2nd Year (Asian Figures)
2nd Year (Asian Figures)2nd Year (Asian Figures)
2nd Year (Asian Figures)
 

Similar to Ibm file system

TSS03135-USEN-00_HR
TSS03135-USEN-00_HRTSS03135-USEN-00_HR
TSS03135-USEN-00_HR
Ed Ahl
 
Storage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentationStorage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentation
Joe Krotz
 
Storage cloud and spectrum update February 2016
Storage cloud and spectrum update February 2016Storage cloud and spectrum update February 2016
Storage cloud and spectrum update February 2016
Joe Krotz
 
Ibm spectrum protect
Ibm spectrum protect Ibm spectrum protect
Ibm spectrum protect
Diego Rodriguez
 
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aS014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705a
Tony Pearson
 
4870 ibm-storage-solutions-final_nov26_18_34019934_usen
4870  ibm-storage-solutions-final_nov26_18_34019934_usen4870  ibm-storage-solutions-final_nov26_18_34019934_usen
4870 ibm-storage-solutions-final_nov26_18_34019934_usen
duc_spt
 
IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017
Paula Koziol
 
Memory Management
Memory ManagementMemory Management
Memory Management
lavanya marichamy
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved Economics
Patrick Berghaeger
 
IBM Spectrum Scale ECM - Winning Combination
IBM Spectrum Scale  ECM - Winning CombinationIBM Spectrum Scale  ECM - Winning Combination
IBM Spectrum Scale ECM - Winning Combination
Sasikanth Eda
 
Choosing IBM Flex System for Your Private Cloud Infrastructure
Choosing IBM Flex System for Your Private Cloud InfrastructureChoosing IBM Flex System for Your Private Cloud Infrastructure
Choosing IBM Flex System for Your Private Cloud Infrastructure
IBM India Smarter Computing
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804a
Tony Pearson
 
Edison IBM FlashSystem and Tributary White Paper Final
Edison IBM FlashSystem and Tributary White Paper FinalEdison IBM FlashSystem and Tributary White Paper Final
Edison IBM FlashSystem and Tributary White Paper Final
Ed Ahl
 
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
Antonella Rubicco
 
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 TechnologyAdd Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
IBM India Smarter Computing
 
MEMORY MANAGEMENT FHES har ar mahaadev.pptx
MEMORY MANAGEMENT FHES har ar mahaadev.pptxMEMORY MANAGEMENT FHES har ar mahaadev.pptx
MEMORY MANAGEMENT FHES har ar mahaadev.pptx
22bec032
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
Johan Granados Montero
 
Hyperconvergence Facts and FAQs
Hyperconvergence Facts and FAQsHyperconvergence Facts and FAQs
Hyperconvergence Facts and FAQs
Springpath
 
IBM Flex System NAS Solutions
IBM Flex System NAS SolutionsIBM Flex System NAS Solutions
IBM Flex System NAS Solutions
IBM India Smarter Computing
 
Operating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdfOperating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdf
rishabjain5053
 

Similar to Ibm file system (20)

TSS03135-USEN-00_HR
TSS03135-USEN-00_HRTSS03135-USEN-00_HR
TSS03135-USEN-00_HR
 
Storage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentationStorage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentation
 
Storage cloud and spectrum update February 2016
Storage cloud and spectrum update February 2016Storage cloud and spectrum update February 2016
Storage cloud and spectrum update February 2016
 
Ibm spectrum protect
Ibm spectrum protect Ibm spectrum protect
Ibm spectrum protect
 
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aS014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705a
 
4870 ibm-storage-solutions-final_nov26_18_34019934_usen
4870  ibm-storage-solutions-final_nov26_18_34019934_usen4870  ibm-storage-solutions-final_nov26_18_34019934_usen
4870 ibm-storage-solutions-final_nov26_18_34019934_usen
 
IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved Economics
 
IBM Spectrum Scale ECM - Winning Combination
IBM Spectrum Scale  ECM - Winning CombinationIBM Spectrum Scale  ECM - Winning Combination
IBM Spectrum Scale ECM - Winning Combination
 
Choosing IBM Flex System for Your Private Cloud Infrastructure
Choosing IBM Flex System for Your Private Cloud InfrastructureChoosing IBM Flex System for Your Private Cloud Infrastructure
Choosing IBM Flex System for Your Private Cloud Infrastructure
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804a
 
Edison IBM FlashSystem and Tributary White Paper Final
Edison IBM FlashSystem and Tributary White Paper FinalEdison IBM FlashSystem and Tributary White Paper Final
Edison IBM FlashSystem and Tributary White Paper Final
 
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
 
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 TechnologyAdd Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
 
MEMORY MANAGEMENT FHES har ar mahaadev.pptx
MEMORY MANAGEMENT FHES har ar mahaadev.pptxMEMORY MANAGEMENT FHES har ar mahaadev.pptx
MEMORY MANAGEMENT FHES har ar mahaadev.pptx
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
 
Hyperconvergence Facts and FAQs
Hyperconvergence Facts and FAQsHyperconvergence Facts and FAQs
Hyperconvergence Facts and FAQs
 
IBM Flex System NAS Solutions
IBM Flex System NAS SolutionsIBM Flex System NAS Solutions
IBM Flex System NAS Solutions
 
Operating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdfOperating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdf
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Ibm file system

  • 2. Memory management The memory management component is responsible for the efficient use of system memory by a java application. Java programs run in a managed execution environment. When a java program requires storage, the memory management component allocates the application a discrete region of unused memory. After the application no longer refers to the storage, the memory management component must recognize that the storage is unused and reclaim the memory for subsequent reuse by the application or return it to the operating system.
  • 3. • Memory management on IBM i is based on temporary, dynamic memory. Both single-level storage (SLS) and teraspace are used. In addition, for extended memory the so called undefined memory mapped files (including memory protection) are used. The memory type is implemented in the same way as for UNIX.
  • 4. • In the single-level storage concept main memory and auxiliary storage (for example, disk storage) are considered as a single large address space, whose linearly addressable areas can grow to a maximum size of 16 MB.
  • 5. • A teraspace is temporary dynamic storage, that provides an address space of 1 terabyte for each process (that is, IBM i job). A teraspace can consist of a number of separately allocated and deallocated storage areas. Between these areas, "addressability holes" can exist, that is, storage areas that are not allocated. Although teraspace is also based on single-level storage, it is completely transparent to the processes (IBM i jobs). This memory type is used for the so called roll area.
  • 6. • For memory mapped files, the storage area with a given size is mapped to a undefined file of a given size in the file system. All commands that access the memory space are redirected to file access by the operating system. Memory protection is achieved by explicit attach and detach instructions to the extended memory when activating and deactivating a user context.
  • 7. • IBM i means implementing proven solutions on a platform you can trust. By choosing the latest Power® platform, IBM i applications get world class performance plus dynamic infrastructure flexibility, with the opportunity to lower monthly operations costs.
  • 8. • IBM i integrates a trusted combination of relational database, security, Web services, networking and storage management capabilities. It provides a broad and highly stable database and middleware foundation for efficiently deploying business processing applications, with support for over 5,000 solutions from over 2,500 ISVs. i solutions are offered through an extensive, highly skilled worldwide network of IBM Business Partners that is backed by IBM’s trusted services and support infrastructure.
  • 9. • IBM develops, fully tests and preloads the core middleware components of i together upfront, whereas on other platforms, operating system, database and middleware integration is done in the data center. The preintegration and testing of i is a key factor in enabling companies to deploy applications faster and maintain them with fewer staff. Virtualization and workload management are also built into i to enable you to run multiple applications and components together on the same system, driving up system utilization and delivering a better return on IT investments.