IBM Cloud Object Storage System, presented Oct 16, 2017 at IBM Systems Technical University in New Orleans, LA. This covers the object storage from IBM from the acquisition of Cleversafe, formerly known as DSnet product.
IBM's Cloud Storage Options, presented Oct 16, 2017 at IBM Systems Technical University in New Orleans, LA. This covers all of the block, file and object storage from IBM that can be used in Cloud deployments
The Pendulum Swings Back - Understanding Converged and Hyperconverged Integrated Systems, presented Oct 17, 2017 at IBM Systems Technical University, New Orleans LA
An overview of Converged and Hyperconverged Systems, including VersaStack and IBM Hyperconverged Systems. Presented in Orlando, FL IBM Technical University.
S de0882 new-generation-tiering-edge2015-v3Tony Pearson
IBM offers a variety of storage optimization technologies that balance performance and cost. This session covers Easy Tier, Storage Analytics, and Spectrum Scale.
The IT industry has shifted from internal storage, external storage and finally networked storage. Now, some companies are exploring going backwards to new forms exploiting external storage and internal storage. This session covers IBM's foray into the world of converged and hyper-converged systems.
IBM's Cloud Storage Options, presented Oct 16, 2017 at IBM Systems Technical University in New Orleans, LA. This covers all of the block, file and object storage from IBM that can be used in Cloud deployments
The Pendulum Swings Back - Understanding Converged and Hyperconverged Integrated Systems, presented Oct 17, 2017 at IBM Systems Technical University, New Orleans LA
An overview of Converged and Hyperconverged Systems, including VersaStack and IBM Hyperconverged Systems. Presented in Orlando, FL IBM Technical University.
S de0882 new-generation-tiering-edge2015-v3Tony Pearson
IBM offers a variety of storage optimization technologies that balance performance and cost. This session covers Easy Tier, Storage Analytics, and Spectrum Scale.
The IT industry has shifted from internal storage, external storage and finally networked storage. Now, some companies are exploring going backwards to new forms exploiting external storage and internal storage. This session covers IBM's foray into the world of converged and hyper-converged systems.
S sy0883 smarter-storage-strategy-edge2015-v4Tony Pearson
IBM Smarter Storage Strategy explains IBM's direction for its IBM System Storage product line. This includes support for Big Data analytics, optimizing for traditional workloads, and helping clients transition to Cloud.
A review of IBM Virtual Storage Center and Spectrum Control Advanced Edition analytics for reporting on storage tiers, pool balancing, and volume transformation
IBM Spectrum NAS is our latest Software Defined Storage for SMB and NFS protocol-based storage. This session shows how it is designed and architected, and how to deploy it in less than one day.
S cv3179 spectrum-integration-openstack-edge2015-v5Tony Pearson
IBM is a platinum sponsor of OpenStack, and is the #1 ranked vendor of Software Defined Storage. This session explains how its Spectrum Storage family of products support Glance, Cinder, Manila, Swift and Keystone interfaces of OpenStack.
S ss0885 spectrum-scale-elastic-edge2015-v5Tony Pearson
IBM Spectrum Scale offerings include the Spectrum Scale software that you can deploy on your own choice of hardware, Elastic Storage Server and Storwize V7000 Unified pre-built systems.
An overview of IBM Business Continuity and Disaster Recovery solutions, including backups to tape, snapshots, object storage and remote mirroring. Presented in Orlando, FL IBM Technical University.
Inter connect2016 yss1841-cloud-storage-options-v4Tony Pearson
This session will cover private and public cloud storage options, including flash, disk and tape, to address the different types of cloud storage requirements. It will also explain the use of Active File Management for local space management and global access to files, and support for file-and-sync.
IBM introduces a new Cloud-based sizing and design tool called "File and Object Storage Design Engine" studio or FOS-DE. This tool can be used to size IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage opportunities
An overview of IBM Archive solutions, explaining why these are better than keeping monthly backup tapes for seven years to meet long-term retention requirements. Presented in Orlando, FL IBM Technical University.
Are you ready for NVMe? IBM FlashSystem uses NVMe inside, and is NVMe-ready for use with FCP and Ethernet fabrics. This session explains FC-NVMe and NVMe-OF and how IBM FlashSystem uses NVMe inside.
S sy0883 smarter-storage-strategy-edge2015-v4Tony Pearson
IBM Smarter Storage Strategy explains IBM's direction for its IBM System Storage product line. This includes support for Big Data analytics, optimizing for traditional workloads, and helping clients transition to Cloud.
A review of IBM Virtual Storage Center and Spectrum Control Advanced Edition analytics for reporting on storage tiers, pool balancing, and volume transformation
IBM Spectrum NAS is our latest Software Defined Storage for SMB and NFS protocol-based storage. This session shows how it is designed and architected, and how to deploy it in less than one day.
S cv3179 spectrum-integration-openstack-edge2015-v5Tony Pearson
IBM is a platinum sponsor of OpenStack, and is the #1 ranked vendor of Software Defined Storage. This session explains how its Spectrum Storage family of products support Glance, Cinder, Manila, Swift and Keystone interfaces of OpenStack.
S ss0885 spectrum-scale-elastic-edge2015-v5Tony Pearson
IBM Spectrum Scale offerings include the Spectrum Scale software that you can deploy on your own choice of hardware, Elastic Storage Server and Storwize V7000 Unified pre-built systems.
An overview of IBM Business Continuity and Disaster Recovery solutions, including backups to tape, snapshots, object storage and remote mirroring. Presented in Orlando, FL IBM Technical University.
Inter connect2016 yss1841-cloud-storage-options-v4Tony Pearson
This session will cover private and public cloud storage options, including flash, disk and tape, to address the different types of cloud storage requirements. It will also explain the use of Active File Management for local space management and global access to files, and support for file-and-sync.
IBM introduces a new Cloud-based sizing and design tool called "File and Object Storage Design Engine" studio or FOS-DE. This tool can be used to size IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage opportunities
An overview of IBM Archive solutions, explaining why these are better than keeping monthly backup tapes for seven years to meet long-term retention requirements. Presented in Orlando, FL IBM Technical University.
Are you ready for NVMe? IBM FlashSystem uses NVMe inside, and is NVMe-ready for use with FCP and Ethernet fabrics. This session explains FC-NVMe and NVMe-OF and how IBM FlashSystem uses NVMe inside.
IBM Cloud Object Storage: How it works and typical use casesTony Pearson
This session covers the general concepts of object storage and in particular the IBM Cloud Object Storage offerings. Presented at IBM TechU in Johannesburg, South Africa September 2019
Object Storage promises many things - unlimited scalability, both in terms of capacity and file count, low cost but highly redundant capacity and excellent connectivity to legacy NAS. But, despite these promises object storage has not caught on in the enterprise like it has in the cloud. It seems like, for the enterprise object storage just isn’t a good fit. The problem is that most object storage system’s starting capacity is too large. And while connectivity to legacy NAS systems is available, seamless integration is not. Can object storage be sized so that it is a better fit for the enterprise?
In the past few years, the term "data lake" has leaked into our lexicon. But what exactly IS a data lake? Some IT managers confuse data lakes with data warehouses. Some people think data lakes replace data warehouses. Both of these conclusions are false. Their is room in your data architecture for both data lakes and data warehouses. They both have different use cases and those use cases can be complementary.
Todd Reichmuth, Solutions Engineer with Snowflake Computing, has spent the past 18 years in the world of Data Warehousing and Big Data. He spent that time at Netezza and then later at IBM Data. Earlier in 2018 making the jump to the cloud at Snowflake Computing.
Mike Myer, Sales Director with Snowflake Computing, has spent the past 6 years in the world of Security and looking to drive awareness to better Data Warehousing and Big Data solutions available! Was previously at local tech companies FireMon and Lockpath and decided to join Snowflake due to the disruptive technology that's truly helping folks in the Big Data world on a day to day basis.
Building a Resilient, Scalable, Storage System with OpenStackCloudian
Cloudian has been working closely with Red Hat on their OpenStack offerings and certified its integration into OpenStack Horizon, Nova, Glance and Keystone . We provide a scalable capacity storage layer for OpenStack and are the leader in Open Hybrid Cloud – acting as the storage fabric between on-premise data and cloud data. Cloudian is the preferred storage solution for large scale environments, multi datacenter storage, and hybrid cloud tiering.
Datalagring för AI
Vad bör man att tänka på, hur bygger man och vilken skillnad kan IBM's infrastruktur göra.
Talare: Christofer Jensen, Storage Technical Specialist, IBM
Presentationen hölls på Watson Kista Summit 2018
EMC Sponsored Session- Building Massive + Efficient Indexer Storage Environme...Splunk
We all know that Splunk software is designed to handle streaming work flows and scale out very linearly. Infrastructure needs to be able to grow with Splunk’s scalability while being smart enough to take care of itself. There are multiple ways to deploy storage to support your Splunk environment but there are a few recommended practices to keep in mind as you begin planning your Splunk deployment to avoid the pitfalls of traditional DAS infrastructure. From flashing your home path, to ice cold data lakes, + converged solutions, we will cover what you need to know to avoid the common challenges of traditional IT when it comes to big data workloads.
Modern data lakes are now built on cloud storage, helping organizations leverage the scale and economics of object storage while simplifying overall data storage and analysis flow
Introduction to MariaDB. Covers the history of Structured Query language, MySQL and MariaDB, shows how to install on Windows, Mac or Linux desktop, and practical examples.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
S016825 ibm-cos-nola-v1710d
1. IBM Power Systems
and IBM Storage
Technical University
Introduction to IBM®
Cloud Object Storage
System™
(powered by Cleversafe)
Tony Pearson
Master Inventor and Senior IT Architect,
IBM Corporation
2. Abstract
This session explains why object storage is becoming so
popular and how it differs from block or file-level storage.
The speaker will provide an overview of IBM Cloud Object
Storage System and its clever, highly scalable, highly reliable
use of Erasure Coding to reduce storage costs by up to 70
percent from traditional disk arrays
2
3. This week with Tony Pearson
Day Time Topic
Monday 10:15am
Business Continuity – The seven tiers of business
continuity and disaster recovery
1:45pm IBM’s Cloud Storage Options
4:30pm
Introduction to IBM Cloud Object Storage System
and its Applications (powered by Cleversafe)
Tuesday 10:15am
The Pendulum Swings Back – Understanding
Converged and Hyperconverged Environments
11:30am
New generation of storage tiering: Simpler
management, Lower costs and Increased
performance
3:15pm
Introduction to IBM Cloud Object Storage System
and its Applications (powered by Cleversafe)
Wednesday
9:00am IBM Spectrum Scale for File and Object Storage
3
5. Clients are facing explosive growth in Unstructured Data,
which is exactly why Object Storage is so critical
*Exabytes
0
20
40
60
80
100
120
2009 2010 2011 2012 2013 2014 2015 2016 2017
Unstructured Data
Structured Data
Source: IDC
Unstructured
data growth of
60–80%
per year
creates
Web-scale
storage needs
*1 exabyte = 1,000 petabytes =1 million terabytes = 1 billion
gigabytes
Problem - Legacy Storage Designed for
Transactional Databases, Not Unstructured Data
5
6. How is Object Storage Different?
Block and File Storage
– Decide where to put it
• For block, which array/volume/LUN
• For file, which filer/subdirectory
– Remember where it is to get it back
– Don’t let anyone else move it
– Read/Write records, append data
– Limits on LUN size, number of files
Object Storage
– Provide data over to the Object
storage
• Get “claim stub” reference locator
– Use or share “claim stub” to access
data HTTP, Openstack Swift, S3
– Get/Put/Delete object in its entirety
– Effectively “unlimited” scalability
6
7. Object Store for Unstructured data
Hot Data
High-IOPS and Low-Latency
All-Flash and Hybrid Flash/Disk
Information Lifecycle Management
(ILM)
Structured data / Random-Access
Active logs and traces
Virtual Machines and VDI
Single-Tenancy
Static and Stable data
Backups, Files, Archives
Seismic, Research, Telemetry, HPC
Video, Animation, Body Cams
Photos, Images, CAD/CAM, GIS
Music, Audio
Genomic, Medical Images
Multi-tenancy
Object Store provides a
• Secure
• Reliable
• Scalable
• Cost Effective
Platform For Unstructured data
Object Store
is not designed for
• High IOPS workflows
• Transaction
Processing
• Inherent ILM
7
8. Object Storage is Simpler for Application Development
POSIX – over 60 commands NFS – over 30 commands
HEAD
• Read metadata
GET
• Read content and
metadata
PUT
• Write content and
metadata
DELETE
• Remove object or
empty container
POST
• Update metadata
Object – 5 commands
SMB – over 80 commands
8
9. Object storage is dominant in cloud
0
50
100
150
200
250
2012 2013 2014 2015 2016 2017 2018
File-based software, appliances, and gateways
Object-based software and appliances (includes self-built/SaaS/cloud NAS)
IDC: Worldwide file- and object-based storage
2014–2018 Forecast (EB)
9
10. Why Object Storage?
It enables my
business and reduces
costs!
• Handles 80% of my
data
• Scales easily, growth
does not impact my
business plan
• Less expensive than
traditional flash and
disk arrays
It is easy to deploy and
manage!
• Easily provision to users
and teams
• Location-independent,
Flat namespace
• Software-Defined or
Pre-built systems
• Ethernet-based and
Cloud friendly
• Online backup/archive
alternative to tape and
virtual tape libraries
It is great for
developing software!
• GET/PUT interface
reduces coding effort
• Robust metadata for
search of documents,
images, and videos
• Can be used for
Analytics, IoT,
Mobile, Web and
Cloud Applications
IT
Director
Software
Developer
Storage
Administrator
10
12. Storage Positioning – Filling a Gap
Unified file and
object storage.
Optimized for high
performance, across
flash and disk
Flash 15K
Unified file and object
storage on tape
Information Lifecycle
Management (ILM) across tiers
HighestPerformance
Lowest cost
Tape
IBM was looking to offer easy to
manage, scalable disk-based object
storage for unstructured data
• Moderate performance
• Moderate cost
10K 7200 rpm
12
13. Data Protection Schemes
Tolerate 1 drive failure Tolerate 2 drive failures Tolerate “M” failures
RAID-1 / RAID-10
K pieces 2 x K slices
RAID-5
K pieces K + 1 slices
2.0X
1.2X
3.0X
1.5X
1.7XTriplication
K pieces 3 x K slices
RAID-6
K pieces K + 2 slices
Erasure Coding
K pieces K+M = N
slices
13
14. Data Growth at Petabyte (PB) Scale
PB of data
3 to 5x
Data Protection
RAID, Mirrors,
Replication, Tape
Data Protection
High Availability & Disaster Recovery
Geo-Distribution & Erasure Coding
Infrastructure
Proprietary, specialized
hardware, multiple systems
Operations
More than 1 FTE per PB
Maintenance outages
Infrastructure
Software Defined,
Commodity Hardware,
Single System
Operations
Less than 1 FTE per 6 PB
Single system, Secure
Self-healing
1.7 x
60% Less
Hardware &
Rack space
Traditional
Approach
IBM Cloud
Object Storage
Approach
70%
Lower
TCO
14
15. IBM Cloud Object Storage System economics beat
legacy NAS storage and Amazon Web Services (AWS)
$8,400
$4,210
$1,613
$1,053
Legacy NAS DR protected
Legacy NAS single copy
IBM Cloud Object + NAS
gateway
dsNet object protectedIBM Cloud Object
IBM Cloud Object vs NAS
Cost: 80% lower
$0
$2,000,000
$4,000,000
$6,000,000
$8,000,000
$10,000,000
480 TB 960 TB 1920 TB 3840 TB
S3
dsNet
Cost: 10 to 60% lower
IBM Cloud Object vs AWS S3
IBM Cloud Object
Amazon S3
15
16. IBM Cloud Object Storage System – Terminology
HTTP
Application
Server
IBM COS
Manger
Accesser
Slicestor
Device
Set
Accesser PoolVault
Load
Balancer
Site A Site B Site C
End user
Global Namespace
IBM Cloud Object Storage
System organizes objects into
“Vaults” and “Containers”
Storage Pools can hold multiple
vaults
Vaults can have millions of
containers
OpenStack Swift
S3 Protocol
16
17. The Math Behind Reed-Solomon Erasure Coding
“K” variables of input data: a, b, c, d, e
Example: K=5 M=3
K+M= 8
Here we create “K+M”
equations, adding and
subtracting by different
co-factors
Results in “K+M” slices
that can be geographically
dispersed
We can tolerate losing up
to “M” slices of data, and
still solve for the original
“K” pieces of data.
17
18. Information Dispersal Algorithm (IDA)
01 02 03 04 05 06 07 08 09 10 11 12
A B C D
E F G
IDA is represented as Width/Read/Write
This example is 12/7/9
Original data is received by
IBM COS Accesser and
chopped up into 7 pieces
(Read threshold)
Erasure Coding:
7 variables in,
12 equation results out
(Width)
12 slices written in parallel
to IBM COS Slicestor devices
A B C D
E F G
IBM SmartWrite™
At least 9 slices (Write Threshold) must be written
for the I/O to be considered complete, rest will be
written later. IBM COS periodically scans and
rebuilds slices as needed
IBM SmartRead™
To read the data back,
only 7 slices are used
to solve 7 equations
(Read threshold)
Original data is
re-assembled
18
19. Dedicated
(Private)
IBM Cloud Object Storage System –
Single-site, Two-site and Multi-Site
Single Site
Better performance,
when site-tolerance
not a factor, better
than traditional
RAID-5 / RAID-6
Two Site Vault Mirroring
Allows customers to leverage existing two-site
infrastructure. Provides concurrent reads and
writes despite communication disruption
between locations. Local data better than
traditional RAID-5 / RAID-6
Geographically Dispersed
Three to Nine Sites
Consider adding IBM Cloud or leverage existing
datacenter locations to provide a broader distribution
of data for higher availability, site-tolerance and
scalability
19
20. Two Dispersal Modes
Standard Dispersal
• One or more Accessers
• Each slice on its own
Slicestor
Concentrated Dispersal (CD Mode)
• Entry Level System (1-3 sites)
• Accessers can be embedded into
Slicestor (Optional)
• Each slice stored on separate
HDD within Slicestor for availability
01 02 03
04 05 06
07 08 09
10 11 12
01 02
03 04
05 06
07 08
09 10
11 12
20
21. Scalability
Site 1 Site 2 Site 3
S3 Compatible API Openstack Swift
Compatible API
Simple Object API
Slicestor
Software
Accesser
Software
Scalability – Scale performance and/or
capacity at any time with no downtime to
operations
Need more Performance?
Add more Accesser nodes
Need more Capacity?
Add more disks to existing Slicestor nodes,
add more device sets to existing storage
pools, or add more storage pools
– All nodes in single device set must have
same amount of storage
• New device sets can have different size
drives than existing drives sets
– All device sets in a storage pool must
have the same IDA
• Standard and Concentrated IDA can be
intermixed in same storage pool
– Different storage pools can have
different IDA settings
Device
Set 1
Device
Set 2
Device
Set 3
21
22. Encryption Options for IBM Cloud Object Storage
A
A B C D
E F G
Data
A
A#
AONT
Data
SecureSlice™
System-generated key
Used to encrypt data
Data
A
#
Hash taken of
encrypted data
Key wrapped with hash makes
All-or-Nothing Transform (AONT)
Information
Dispersal
Algorithm (IDA)
User sends data
Data
B
Data
A
A
B
Server-Side Encryption with Customer key
System-generated key used to encrypt data
Key wrapped with customer-supplied key
User sends data and key
SSE-C
Data
CData
C UMK
Application-managed key
User sends encrypted data
Encryption disabled in IBM COS
22
23. Compliance-Enabled Vault
Standard
Vault
Compliance
Enabled
Vault
Government Regulations specify that
“electronic storage must preserve the
records exclusively in a non-erasable,
non-rewriteable, format” (SEC 17a-4)
Various Terms have been used:
• Write Once Read Many (WORM)
for tape and optical media
• Fixed-Content or Content-
Addressable for disk-based storage
• Immutable for file systems
• Non-erasable, Non-rewriteable
(NENR) to cover all of the above
Compliance-Enabled Vaults prevent
objects from being deleted or modified
for a specified retention period
Vaults can co-exist
in same
storage pool
23
24. IBM Cloud Object Storage System –
Software, Pre-Built Systems or Cloud Services
Software
• ClevOS – IBM Cloud
Object Storage System
software packaged with
Debian Linux OS
• Software-defined,
hardware-aware model for
flexibility of x86 platform
choice
• Can be deployed on
qualified vendor hardware
Pre-built Systems
• Fully integrated appliance
models for easy deployment
and support
• On-premises object storage
solution
Cloud Services
• IBM Cloud Object
Storage System as a
service for customers
that want security and
controlled performance
24
25. IBM Spectrum Storage Suite
Bundle license for
flash, disk, tape
and storage-rich
servers
Per TiB
IBM Spectrum
Storage Suite
Control Protect
Archive
Virtualize Accelerate
Scale
IBM Cloud Object Storage
I’ve deployed Spectrum Storage Suite. Now
what?
1. Well, since you already own entitlement to
all capabilities in the Spectrum Storage
suite, you are free to download any of the
software you like, including IBM Cloud
Object Storage!
2. To help facilitate quick adoption of
additional use cases, Spectrum Storage
Suite licensing offers the ability to
perform extended tests in an evaluation
sandbox proving ground without
additional charge. Tebibytes (TiB) in this
sandbox are not counted.
So go ahead, experiment with your next use
case. Prove it, become familiar with it, pay for
it only when it’s deployed for productive use.
25
26. IBM Cloud Object Storage System – Deployment
Options
Infrastructure
Dedicated
(Private)
Public
Local
(Private)
On-premises
Off-premises
Cloud
Infrastructure
Off-premises
(IBM Cloud)
Public
• Standard regional
• Nearline regional
• Nearline geo-
dispersed
Consumed
pricing
Dedicated
• IBM Managed
• Client managed
• Hybrid / Mixed
Allocated
pricing
Client
infrastructure
On-premises
Locally managed
• Software
• Pre-built systems
Entry Level
System as
small as 72 TB
26
27. Pre-Built Systems for IBM Cloud Object Storage
System
IBM COS Manager 2105 / 3105
Accesser 2100 / 3105 / 4105
Slicestor 2212
Slicestor 2448
Health and performance monitoring
GUI and API access
Configuration and security
Zero downtime upgrades
12 drives @ 4, 6, 8 or 10 TB
48 to 120 TB Nearline HDD
in 2U rack space
16, 32 or 48 drives @ 4, 6, 8 or 10 TB
64 to 480 TB Nearline HDD
in 4U rack space
Slices, Disperses and Retrieves data
27
28. VersaStack for IBM Cloud Object Storage System
Cisco UCS S3260 Storage Server
Dual nodes in 4U space
56 hot-swappable 3.5” LFF HDD
4, 6, 8, or 10 TB 7200-rpm NL-SAS
(28 drives per COS Slicestor)
Cisco UCS 6300 Fabric Interconnect
Low-latency, lossless 10 and 40 GbE
Cisco UCS 220 M4 servers
1U with 36 cores, 24 DDR4 memory DIMMs
For COS Manager and Accessers
Cisco Validated Design (CVD)
784 to 1960 TB
Usable Capacity
28
29. IBM Cloud Object Storage public cloud services
IBM Cloud Object Storage Flex
DataAccessPattern
IBM Cloud Object Storage
Standard
IBM Cloud Object
Storage
Vault
Variable data access
pattern / Mixed
workloads
Predictable
data access
pattern /
workload
Frequent
data access
Less frequent
data access
Minimal
data access
IBM Cloud Object
Storage
Cold Vault
• High Availability – Cross Regional USA
• Low Latency – Regional (Dallas)
29
31. A broad spectrum of strategies to build, buy, or assemble an end to end solution
Integrations, Connectors,
Gateways
Ready to RunCustom Applications
Off-PremHybridOn-Prem
and/or and/or
How to Consume IBM Cloud Object Storage
31
32. Large
multimedia files
Video, Audio,
Images
Store
telemetric,
instrumentation
and sensor
data
Web generated
and social
media data
Backup, Active
archive, DR,
inactive and
compliance
data
Security audits,
Log files and
Analytics
Collaboration
and content
distribution
Global file
services,
mobile access,
and StaaS
Genomics,
HPC, Geo-
spatiial
8
7
6
5
4
1
2
3
Object Storage Typical Use Cases Storage
Services
32
33. Market Industry Verticals
Secure
customer
trust and
business
compliance.
Financial
Services &
Insurance
Incorporate
into IoT
processes,
analytics
Industrial,
Distribution
Manage the
data essential
to serving the
good of the
public.
Public Sector,
Government
Scale your
market
offering
without
worry.
Telco &
Service
Providers
Create and
Deliver
Content on
demand.
Media &
Entertainment
Heath Care &
Life Sciences
Put medical
progress
before
everything
else.
Every industry does backup, all have some
amount of static-and-stable unstructured data,
most need file or content archive…
33
34. Client Reference– Web Based Photo Sharing
Users upload photo
and video content via
web based application
Photo and video objects are sent to
Cleversafe via REST based protocols
Metadata is
captured and
stored
• Scale – 150 petabytes and growing: more than 50 Billion images stored
• Manageability – 3 Administrators manage entire environment
• Security – 50,000+ uploads per minute with zero touch security
• Always-on availability – SLA of 100% download on demand – even during
California to Nevada datacenter move
• Economics – Operating costs reduced by more than 70%
• Key decision makers – Technical team backed by financial cost cutting
mandates
34
35. IBM Spectrum Protect –
Cloud and Object Store Capabilities
35
Client nodes
Off-premises:
• IBM Bluemix Cloud
• Amazon Web Services
• Microsoft Azure
On-premises
IBM Spectrum
Protect Server
• IBM Cloud Object Storage System
(using S3-compatible API)
36. Cost and Performance Comparison
36
0
5
10
15
20
25
IBM Tape $5/TB IBM COS $76/TB IBM ESS $110/TB
Throughput Rates
Backup TB/hr Restore TB/hr
8 drives
1 drive 30 sessions
Backup and Restore rates vary depending on
network connection, workload, file size and
other environmental factors
Costs may vary, based on discounted street prices of LTO-8, IBM COS, and
ESS GLxS models as configured for “Large” IBM Spectrum Protect blueprint on AIX
8 file systems
37. IBM Spectrum Storage and IBM Cloud Object
Unified file and object
storage. Optimized for
high performance, across
flash, disk and object
store
Flash
Object
Store
15K
Object storage on disk
( File, backup and archive interfaces
available through variety of options )
IBM Cloud
Amazon Web Services
Microsoft Azure
Swift S3 emulation
OpenStack Swift
Unified file and object
storage on tape
Transparent Cloud Tiering
Information Lifecycle
Management (ILM) across tiers
HighestPerformance
Lowest cost
Tape10K 7200
37
38. Summary
Object Storage scales easily to
handle your unstructured data, easy to
manage, ideal for software
development
IBM is the #1 leading vendor of
Object Storage, with over 400 patents,
and several clients >100PB
IBM Cloud Object Storage can be
used on-premises, hybrid, or in the
Cloud
Integrates with the rest of the IBM
Spectrum Storage suite
38
42. IBM Tucson Executive Briefing Center
• Tucson, Arizona is
home for storage
hardware and
software design and
development
• IBM Tucson
Executive Briefing
Center offers:
– Technology
briefings
– Product
demonstrations
– Solution workshops
• Take a video tour!
– http://youtu.be/CXr
poCZAazg
https://www.ibm.com/it-infrastructure/services/client-centers
ccenter@us.ibm.com
42
43. About the Speaker
43
Tony Pearson is a Master Inventor and Senior IT Architect for the IBM Storage product line. Tony joined IBM Corporation in
1986 in Tucson, Arizona, USA, and has lived there ever since. In his current role, Tony presents briefings on storage topics
covering the entire IBM Storage product line, IBM Spectrum Storage software products, and topics related to Cloud Computing,
Analytics and Cognitive Solutions. He interacts with clients, speaks at conferences and events, and leads client workshops to
help clients with strategic planning for IBM’s integrated set of storage management software, hardware, and virtualization
solutions.
Tony writes the “Inside System Storage” blog, which is read by thousands of clients, IBM sales reps and IBM Business Partners
every week. This blog was rated one of the top 10 blogs for the IT storage industry by “Networking World” magazine, and #1
most read IBM blog on IBM’s developerWorks. The blog has been published in series of books, Inside System Storage: Volume
I through V.
Over the past years, Tony has worked in development, marketing and consulting for various storage hardware and software
products. Tony has a Bachelor of Science degree in Software Engineering, and a Master of Science degree in Electrical
Engineering, both from the University of Arizona. . Tony is an inventor or co-inventor of 19 patents in the field of electronic data
storage.
9000 S. Rita Road
Bldg 9032 Floor 1
Tucson, AZ 85744
+1 520-799-4309 (Office)
tpearson@us.ibm.com
Tony Pearson
Master Inventor
Senior IT Architect
IBM Storage
46. Notice and disclaimers continued
Information concerning non-IBM products was obtained from the
suppliers of those products, their published announcements or
other publicly available sources. IBM has not tested those
products in connection with this publication and cannot confirm
the accuracy of performance, compatibility or any other claims
related to non-IBM products. Questions on the capabilities of
non-IBM products should be addressed to the suppliers of those
products. IBM does not warrant the quality of any third-party
products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM expressly disclaims all
warranties, expressed or implied, including but not limited
to, the implied warranties of merchantability and fitness for
a particular, purpose.
The provision of the information contained herein is not intended
to, and does not, grant any right or license under any IBM
patents, copyrights, trademarks or other intellectual
property right.
IBM, the IBM logo, ibm.com, AIX, BigInsights, Bluemix, CICS,
Easy Tier, FlashCopy, FlashSystem, GDPS, GPFS,
Guardium, HyperSwap, IBM Cloud Managed Services, IBM
Elastic Storage, IBM FlashCore, IBM FlashSystem, IBM
MobileFirst, IBM Power Systems, IBM PureSystems, IBM
Spectrum, IBM Spectrum Accelerate, IBM Spectrum Archive,
IBM Spectrum Control, IBM Spectrum Protect, IBM Spectrum
Scale, IBM Spectrum Storage, IBM Spectrum Virtualize, IBM
Watson, IBM z Systems, IBM z13, IMS, InfoSphere, Linear
Tape File System, OMEGAMON, OpenPower, Parallel
Sysplex, Power, POWER, POWER4, POWER7, POWER8,
Power Series, Power Systems, Power Systems Software,
PowerHA, PowerLinux, PowerVM, PureApplica- tion, RACF,
Real-time Compression, Redbooks, RMF, SPSS, Storwize,
Symphony, SystemMirror, System Storage, Tivoli,
WebSphere, XIV, z Systems, z/OS, z/VM, z/VSE, zEnterprise
and zSecure are trademarks of International Business
Machines Corporation, registered in many jurisdictions
worldwide. Other product and service names might
be trademarks of IBM or other companies. A current list of
IBM trademarks is available on the Web at "Copyright and
trademark information" at:
www.ibm.com/legal/copytrade.shtml.
Linux is a registered trademark of Linus Torvalds in the United
States, other countries, or both. Java and all Java-based
trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
46