This document provides an overview of storage protection mechanisms on z/Architecture systems, including key-controlled protection, access-list-controlled protection, page protection, and low-address protection. It defines important concepts like virtual addresses, real addresses, and storage keys. It describes how access keys are determined and how violations of protection are handled for different types of storage access, including via the CPU, channels, and measurement blocks. Override controls for storage protection and fetch protection are also outlined.
This document provides an overview of storage prefixing on z/Architecture systems. It begins with a review of terminology like absolute, real, virtual and logical addresses. It then discusses how prefixing provides a solution to the problem of multiple CPUs needing to store low-order memory contents in different locations. Prefixing uses a one-to-one mapping between absolute storage and real storage, allowing each CPU to have its own private low-order memory space. The prefixing process replaces parts of a real address with the prefix register value to calculate the corresponding absolute address.
The document discusses SONARAY high bay LED lighting products for industrial use. It provides details on the 1000 Series and 2000 Series high bay lights, including their power output, luminous flux, efficacy, color temperature options, beam angle, materials, and lifetime. The lights are said to offer energy savings of 40-80% compared to traditional lighting through the use of high-quality CITILED LEDs from Citizen of Japan.
Myths and realities about designing high availability data centersMorrison Hershfield
This presentation offers definitions of tiers, a discussion on nines, diagrams of Tier III and IV issues, factors affecting performance, reliability and availability, causes of critical failures and key takeaways.
This document provides an introduction to digital photography, including the relationships between shutter speed, aperture, exposure, camera shake, motion freezing, depth of field, and f-stop. It explains that different combinations of shutter speed and aperture can produce the same exposure. Moving to the left on the charts allows more light in and more depth of field, while moving to the right allows less light in and less depth of field. The f-stop of a lens is calculated based on its focal length and internal diameter.
IBM Spectrum Protect (formerly IBM Tivoli Storage Manager) provides data protection and recovery for hybrid cloud environments. This document summarizes a presentation on IBM's strategic direction for Spectrum Protect, including plans to enhance the product to better support hybrid cloud, virtual environments, large-scale deduplication, simplified management, and protection for key workloads. The presentation outlines roadmap features for 2015 and potential future enhancements.
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
This document provides an overview of storage prefixing on z/Architecture systems. It begins with a review of terminology like absolute, real, virtual and logical addresses. It then discusses how prefixing provides a solution to the problem of multiple CPUs needing to store low-order memory contents in different locations. Prefixing uses a one-to-one mapping between absolute storage and real storage, allowing each CPU to have its own private low-order memory space. The prefixing process replaces parts of a real address with the prefix register value to calculate the corresponding absolute address.
The document discusses SONARAY high bay LED lighting products for industrial use. It provides details on the 1000 Series and 2000 Series high bay lights, including their power output, luminous flux, efficacy, color temperature options, beam angle, materials, and lifetime. The lights are said to offer energy savings of 40-80% compared to traditional lighting through the use of high-quality CITILED LEDs from Citizen of Japan.
Myths and realities about designing high availability data centersMorrison Hershfield
This presentation offers definitions of tiers, a discussion on nines, diagrams of Tier III and IV issues, factors affecting performance, reliability and availability, causes of critical failures and key takeaways.
This document provides an introduction to digital photography, including the relationships between shutter speed, aperture, exposure, camera shake, motion freezing, depth of field, and f-stop. It explains that different combinations of shutter speed and aperture can produce the same exposure. Moving to the left on the charts allows more light in and more depth of field, while moving to the right allows less light in and less depth of field. The f-stop of a lens is calculated based on its focal length and internal diameter.
IBM Spectrum Protect (formerly IBM Tivoli Storage Manager) provides data protection and recovery for hybrid cloud environments. This document summarizes a presentation on IBM's strategic direction for Spectrum Protect, including plans to enhance the product to better support hybrid cloud, virtual environments, large-scale deduplication, simplified management, and protection for key workloads. The presentation outlines roadmap features for 2015 and potential future enhancements.
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
The document provides an introduction to dynamic address translation (DAT) on IBM z/Architecture systems. It begins with concept definitions related to DAT. It then explains that DAT uses a hierarchical set of tables, called DAT tables, to translate virtual addresses to real addresses. The translation process walks through the virtual address fields to index into the DAT tables at each level, starting with the region tables pointed to by the address space control element, and ending with the page table to retrieve the real address.
This document discusses IBM's cloud storage options. It provides an overview of IBM's private and public cloud storage offerings, including flash, disk, and tape storage to address different cloud storage requirements. It also discusses active file management for local space management and global file access. The document outlines Tony Pearson's schedule for presentations on various storage topics at IBM's Technical University and provides information on IBM's contributions to OpenStack and other open source platforms.
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18Pawel Maczka
Subject: IBM Spectrum Protect, Plus - What's new! June '18
When: June 7th 10AM ET, 4PM CET
Speakers: Harley Puckett (IBM), Pawel Maczka (Storware)
Harley Puckett is the Program Director for IBM #SpectrumProtect development. He has over 30 years experience in Storage and Data Protection, regularly presenting at client briefings and user conferences. Harley spent 6 ½ years as an Executive Storage Software Consultant and manager of the Client Workshop Program in the Tucson Executive Briefing Center. He was the Solutions Architect for IBM’s Global Archive Solutions Center in Guadalajara Mexico. Prior to a temporary assignment as the technical assistant to the GM of System Storage he spent 9 ½ years as a senior development manager for IBM Tivoli Storage Manager (TSM). He led IBM’s efforts to implement Systems Managed Storage on its internal systems and outsourced accounts. Graduated University of Arizona with BS MIS
Pawel Maczka - CTO, VP at Storware Company. Addicted to Storage and Data Protection Solutions serve in every combination - cloud, hybrid, on premise.More than 10 years work with Enterpise Backup & Recovery platforms. Technology evangelist, always with strong cooperation among IBM Spectrum Storage team.
The document describes an open source SMB compliance test suite developed by EMC Isilon and Calsoft Inc. It aims to provide broad test coverage of the SMB protocol in a way that is extensible and portable. The test suite uses a thorough testing approach including negative test cases. It employs an XML-driven architecture and the Pike SMB client framework to generate and analyze SMB packets. The test suite covers common SMB commands like read, write, create and locking with hundreds of test cases.
This document provides an introduction to address spaces on z/Architecture systems. It defines key concepts like address space, address space control element (ASCE), and address space number (ASN). It explains that each process runs in its own address space, and that different address spaces are selected using the translation mode in the program status word. Primary, secondary, home, and access register modes allow accessing different types of address spaces. ASCEs and ASNs, along with associated tables, allow dynamically switching between address spaces.
The document summarizes a test of the EMC XtremIO storage array's ability to scale mixed database workloads in a VMware vSphere environment. Key findings:
- The array supported 3 production databases (Oracle, SQL Server, DB2) using only 664GB of physical storage while delivering over 116,000 IOPS with sub-millisecond latency.
- As additional copies of the databases were added, physical storage usage increased only slightly, while addressable capacity grew significantly due to data reduction technologies. This resulted in over 5,600GB of storage savings with 9 VMs.
- IOPS demands increased linearly as VMs were added, and latency remained under 1ms, showing the
The Future of Storage : EMC Software Defined Solution RSD
EMC provides intelligent software-defined storage solutions that help organizations drastically reduce management overhead through automation across traditional storage silos and pave the way for rapid deployment of fully integrated next generation scale-out storage architectures.
Presentation of Executive Briefing, April 2015
This document discusses the benefits of using EMC Symmetrix V-Max virtual provisioning with Veritas Storage Foundation. Virtual provisioning, also called thin provisioning, allows higher storage utilization by presenting more storage space to applications than is physically allocated. Veritas Storage Foundation helps optimize storage usage during migration from traditional thick storage to thin storage. The document provides details on implementing thin provisioning with Symmetrix V-Max arrays and using Storage Foundation features like SmartMove to improve thin storage utilization.
z/OS is IBM's mainframe operating system designed to serve thousands of users concurrently processing large workloads. It uses virtual storage to allow programs to access more memory than physically available. z/OS manages real, auxiliary, and virtual storage using pages, frames, and slots to move data between storage types. Workload management balances system resources and priorities tasks to meet business goals.
This document provides an overview and summary of IBM's Security Key Lifecycle Manager (SKLM). It discusses SKLM's capabilities for encrypting and managing encryption keys for data at rest across different platforms and use cases. It highlights SKLM's key management features including its supported devices, keystores, master key and HSM integration. It also summarizes SKLM's deployment architectures including backup/restore, master-clone, and multi-master setups. The document concludes by outlining new enhancements in SKLM version 4 like REST APIs, improved performance and containerization.
This document discusses continuous availability and data mobility solutions from EMC, including VPLEX and RecoverPoint. It provides an overview of these solutions, describing how they enable active-active configurations across data centers for always-on application access, automated disaster recovery without downtime, and non-disruptive data migration. It also shares statistics on VPLEX and RecoverPoint deployments and discusses how these solutions provide benefits like zero RPO/RTO recovery and removing restrictions of data centers and storage arrays.
This document summarizes new features and enhancements in IBM XIV Storage System R3.4/11.4, which was generally available in November 2013. Key highlights include data-at-rest encryption with KMIP support, expanded scale and flash caching, integration with OpenStack and IBM SmartCloud Storage Access for private clouds, as well as performance optimizations for Microsoft Exchange 2013. Upcoming multi-tenancy support is also noted to help cloud providers accommodate customer security requirements.
Bloombase StoreSafe is a turnkey data security solution that provides encryption for EMC VNX storage systems. It allows automated encryption of data at rest to enable compliance with standards like HIPAA and PCI. The solution uses a hardware security module and offers simplified management through a web console. Benchmark tests showed it introduced minimal performance degradation compared to other encryption methods.
Emc vi pr controller customer presentationsolarisyougood
The document discusses EMC's ViPR software-defined storage platform. ViPR abstracts physical storage into virtual pools, automates provisioning, and provides self-service access. It can manage storage from EMC and third parties in a single platform. ViPR simplifies management and empowers users with a public cloud-like experience on-premises.
This document provides information about EMC's ViPR software-defined storage platform, including:
1. ViPR SRM and ViPR Controller help reduce storage costs and increase flexibility by automating storage management and providing a self-service portal.
2. ViPR abstracts physical storage arrays, pools resources, and provides REST APIs and storage services to simplify management of heterogeneous infrastructure.
3. Case studies show how ViPR SRM provides visibility into storage utilization and performance, enabling optimization of resources and ensuring service levels are met.
This document discusses security hardening, which is the process of reducing vulnerabilities on systems by locking down access and functionality. It recommends using standards like CIS benchmarks and NIST guidelines to implement hardening. Hardening is important to reduce risks from exploits. The document advocates automating hardening checks for continuous compliance monitoring. It provides examples of using the Security Content Automation Protocol (SCAP) and OpenSCAP tool to define hardening guides, perform automated checks, and generate reports and fixes.
The document discusses configuring and managing computer security through policy-based security management. It covers using Local Security Policy and templates to configure security settings on individual systems, and Domain Security Policy to configure security across a domain by overriding local policies. It also discusses establishing an audit policy to monitor security and detect breaches by auditing access and events on critical systems and objects.
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
In this slide, we introduce the TrustZone of information that has published at this time in relation to ARMv8-M.
It is possible to separate/isolate the security level by adding the security state.
ARMv8-M architecture has a different mechanism than TrustZone to provide traditional ARMv8-A architecture, which is optimized for embedded systems.
Speed Up Synchronization Locks: How and Why?psteinb
A brief introduction on synchronization primitives used for gaming consoles and Windows platforms and ways to identify potential problems with locks using Intel tools. The talk will discuss an alternate optimized implementation of the Windows Critical_Section with Scaleform as a case study highlighting the importance of using optimized locks.
The document provides an introduction to dynamic address translation (DAT) on IBM z/Architecture systems. It begins with concept definitions related to DAT. It then explains that DAT uses a hierarchical set of tables, called DAT tables, to translate virtual addresses to real addresses. The translation process walks through the virtual address fields to index into the DAT tables at each level, starting with the region tables pointed to by the address space control element, and ending with the page table to retrieve the real address.
This document discusses IBM's cloud storage options. It provides an overview of IBM's private and public cloud storage offerings, including flash, disk, and tape storage to address different cloud storage requirements. It also discusses active file management for local space management and global file access. The document outlines Tony Pearson's schedule for presentations on various storage topics at IBM's Technical University and provides information on IBM's contributions to OpenStack and other open source platforms.
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18Pawel Maczka
Subject: IBM Spectrum Protect, Plus - What's new! June '18
When: June 7th 10AM ET, 4PM CET
Speakers: Harley Puckett (IBM), Pawel Maczka (Storware)
Harley Puckett is the Program Director for IBM #SpectrumProtect development. He has over 30 years experience in Storage and Data Protection, regularly presenting at client briefings and user conferences. Harley spent 6 ½ years as an Executive Storage Software Consultant and manager of the Client Workshop Program in the Tucson Executive Briefing Center. He was the Solutions Architect for IBM’s Global Archive Solutions Center in Guadalajara Mexico. Prior to a temporary assignment as the technical assistant to the GM of System Storage he spent 9 ½ years as a senior development manager for IBM Tivoli Storage Manager (TSM). He led IBM’s efforts to implement Systems Managed Storage on its internal systems and outsourced accounts. Graduated University of Arizona with BS MIS
Pawel Maczka - CTO, VP at Storware Company. Addicted to Storage and Data Protection Solutions serve in every combination - cloud, hybrid, on premise.More than 10 years work with Enterpise Backup & Recovery platforms. Technology evangelist, always with strong cooperation among IBM Spectrum Storage team.
The document describes an open source SMB compliance test suite developed by EMC Isilon and Calsoft Inc. It aims to provide broad test coverage of the SMB protocol in a way that is extensible and portable. The test suite uses a thorough testing approach including negative test cases. It employs an XML-driven architecture and the Pike SMB client framework to generate and analyze SMB packets. The test suite covers common SMB commands like read, write, create and locking with hundreds of test cases.
This document provides an introduction to address spaces on z/Architecture systems. It defines key concepts like address space, address space control element (ASCE), and address space number (ASN). It explains that each process runs in its own address space, and that different address spaces are selected using the translation mode in the program status word. Primary, secondary, home, and access register modes allow accessing different types of address spaces. ASCEs and ASNs, along with associated tables, allow dynamically switching between address spaces.
The document summarizes a test of the EMC XtremIO storage array's ability to scale mixed database workloads in a VMware vSphere environment. Key findings:
- The array supported 3 production databases (Oracle, SQL Server, DB2) using only 664GB of physical storage while delivering over 116,000 IOPS with sub-millisecond latency.
- As additional copies of the databases were added, physical storage usage increased only slightly, while addressable capacity grew significantly due to data reduction technologies. This resulted in over 5,600GB of storage savings with 9 VMs.
- IOPS demands increased linearly as VMs were added, and latency remained under 1ms, showing the
The Future of Storage : EMC Software Defined Solution RSD
EMC provides intelligent software-defined storage solutions that help organizations drastically reduce management overhead through automation across traditional storage silos and pave the way for rapid deployment of fully integrated next generation scale-out storage architectures.
Presentation of Executive Briefing, April 2015
This document discusses the benefits of using EMC Symmetrix V-Max virtual provisioning with Veritas Storage Foundation. Virtual provisioning, also called thin provisioning, allows higher storage utilization by presenting more storage space to applications than is physically allocated. Veritas Storage Foundation helps optimize storage usage during migration from traditional thick storage to thin storage. The document provides details on implementing thin provisioning with Symmetrix V-Max arrays and using Storage Foundation features like SmartMove to improve thin storage utilization.
z/OS is IBM's mainframe operating system designed to serve thousands of users concurrently processing large workloads. It uses virtual storage to allow programs to access more memory than physically available. z/OS manages real, auxiliary, and virtual storage using pages, frames, and slots to move data between storage types. Workload management balances system resources and priorities tasks to meet business goals.
This document provides an overview and summary of IBM's Security Key Lifecycle Manager (SKLM). It discusses SKLM's capabilities for encrypting and managing encryption keys for data at rest across different platforms and use cases. It highlights SKLM's key management features including its supported devices, keystores, master key and HSM integration. It also summarizes SKLM's deployment architectures including backup/restore, master-clone, and multi-master setups. The document concludes by outlining new enhancements in SKLM version 4 like REST APIs, improved performance and containerization.
This document discusses continuous availability and data mobility solutions from EMC, including VPLEX and RecoverPoint. It provides an overview of these solutions, describing how they enable active-active configurations across data centers for always-on application access, automated disaster recovery without downtime, and non-disruptive data migration. It also shares statistics on VPLEX and RecoverPoint deployments and discusses how these solutions provide benefits like zero RPO/RTO recovery and removing restrictions of data centers and storage arrays.
This document summarizes new features and enhancements in IBM XIV Storage System R3.4/11.4, which was generally available in November 2013. Key highlights include data-at-rest encryption with KMIP support, expanded scale and flash caching, integration with OpenStack and IBM SmartCloud Storage Access for private clouds, as well as performance optimizations for Microsoft Exchange 2013. Upcoming multi-tenancy support is also noted to help cloud providers accommodate customer security requirements.
Bloombase StoreSafe is a turnkey data security solution that provides encryption for EMC VNX storage systems. It allows automated encryption of data at rest to enable compliance with standards like HIPAA and PCI. The solution uses a hardware security module and offers simplified management through a web console. Benchmark tests showed it introduced minimal performance degradation compared to other encryption methods.
Emc vi pr controller customer presentationsolarisyougood
The document discusses EMC's ViPR software-defined storage platform. ViPR abstracts physical storage into virtual pools, automates provisioning, and provides self-service access. It can manage storage from EMC and third parties in a single platform. ViPR simplifies management and empowers users with a public cloud-like experience on-premises.
This document provides information about EMC's ViPR software-defined storage platform, including:
1. ViPR SRM and ViPR Controller help reduce storage costs and increase flexibility by automating storage management and providing a self-service portal.
2. ViPR abstracts physical storage arrays, pools resources, and provides REST APIs and storage services to simplify management of heterogeneous infrastructure.
3. Case studies show how ViPR SRM provides visibility into storage utilization and performance, enabling optimization of resources and ensuring service levels are met.
This document discusses security hardening, which is the process of reducing vulnerabilities on systems by locking down access and functionality. It recommends using standards like CIS benchmarks and NIST guidelines to implement hardening. Hardening is important to reduce risks from exploits. The document advocates automating hardening checks for continuous compliance monitoring. It provides examples of using the Security Content Automation Protocol (SCAP) and OpenSCAP tool to define hardening guides, perform automated checks, and generate reports and fixes.
The document discusses configuring and managing computer security through policy-based security management. It covers using Local Security Policy and templates to configure security settings on individual systems, and Domain Security Policy to configure security across a domain by overriding local policies. It also discusses establishing an audit policy to monitor security and detect breaches by auditing access and events on critical systems and objects.
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
In this slide, we introduce the TrustZone of information that has published at this time in relation to ARMv8-M.
It is possible to separate/isolate the security level by adding the security state.
ARMv8-M architecture has a different mechanism than TrustZone to provide traditional ARMv8-A architecture, which is optimized for embedded systems.
Speed Up Synchronization Locks: How and Why?psteinb
A brief introduction on synchronization primitives used for gaming consoles and Windows platforms and ways to identify potential problems with locks using Intel tools. The talk will discuss an alternate optimized implementation of the Windows Critical_Section with Scaleform as a case study highlighting the importance of using optimized locks.