This session covers basic storage concepts for z/OS operating system with examples for Flash, Disk and Tape devices and how to use DFSMS policy-based management. Presented at IBM TechU in Johannesburg, South Africa September 2019
Maintec Technologies provides affordable access to latest Mainframe infrastructure for development, training, additional short term capacity increases and outsourcing needs. Leverage our Mainframe infrastructure, without investing the time, expense and manpower it would take to build your own!.
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
The need to perform a DB2 log-based recovery of multiple objects is a very rare event, but statistically, it is more frequent than a true disaster recovery event (flood, fire, etc). Taking regular backups is necessary but far from sufficient for anything beyond minor application recovery. If not prepared, practiced and optimised, it can lead to extended application service downtimes – possibly many hours to several days. This presentation will provide many hints and tips on how to plan, design intelligently, stress test and optimise DB2 log-based recovery.
DB2 for z/OS - Starter's guide to memory monitoring and controlFlorence Dubois
DB2 for z/OS makes more and more use of REAL memory to improve performance and reduce cost. But if you don't carefully budget and monitor the use of REAL memory on your system, you could be putting your applications at risk. This presentation will go back to the basics and answer the most common questions about REAL memory management including: how does DB2 uses virtual and REAL memory? how to build a budget based on system settings and buffer pool sizes? how to size the LFAREA? what are the key performance indicators and how do I know I am running 'safely'? what can be done to protect the system?
Maintec Technologies provides affordable access to latest Mainframe infrastructure for development, training, additional short term capacity increases and outsourcing needs. Leverage our Mainframe infrastructure, without investing the time, expense and manpower it would take to build your own!.
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
The need to perform a DB2 log-based recovery of multiple objects is a very rare event, but statistically, it is more frequent than a true disaster recovery event (flood, fire, etc). Taking regular backups is necessary but far from sufficient for anything beyond minor application recovery. If not prepared, practiced and optimised, it can lead to extended application service downtimes – possibly many hours to several days. This presentation will provide many hints and tips on how to plan, design intelligently, stress test and optimise DB2 log-based recovery.
DB2 for z/OS - Starter's guide to memory monitoring and controlFlorence Dubois
DB2 for z/OS makes more and more use of REAL memory to improve performance and reduce cost. But if you don't carefully budget and monitor the use of REAL memory on your system, you could be putting your applications at risk. This presentation will go back to the basics and answer the most common questions about REAL memory management including: how does DB2 uses virtual and REAL memory? how to build a budget based on system settings and buffer pool sizes? how to size the LFAREA? what are the key performance indicators and how do I know I am running 'safely'? what can be done to protect the system?
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfMarna Walle
This presentation shows how to position z/OS in preparing for the new IBM z16 server. This presentation contains the "must know" information to successfully IPL z/OS on IBM z16.
Learn about Networking on z/OS. This part of the z/OS basic skills information center is intended to provide information systems personnel with the background knowledge and skills necessary to begin using the basic communications facilities of a mainframe based system. It provides a broad understanding of networking principles and the hardware and software components necessary to allow the mainframe to participate in a high volume data communications network. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
How to Improve RACF Performance (v0.2 - 2016)Rui Miguel Feio
When hundreds and some times thousands of security validations occur every minute on the mainframe, performance and availability are paramount. In this session the presenter shows some different techniques that when implemented can help improve RACF performance, so that it does not become the source of your performance problems.
A Parallel Sysplex is a cluster of IBM mainframes acting together as a single system image with z/OS that cooperate, using certain hardware and software products, to process work. Used for disaster recovery, Parallel Sysplex combines data sharing and parallel computing to allow a cluster of up to 32 mainframes to share a workload for high performance and high availability.Parallel Sysplex is analogous in concept to a UNIX cluster – allow the customer to operate multiple copies of the operating system as a single system. This allows systems to be added or removed as needed, while applications continue to run.
Geographically Dispersed Parallel Sysplex (GDPS) is an end to end application availability solution. It is the ultimate disaster recovery and continuous availability solution for a multi-site enterprise. GDPS disk replication technology enhances the resiliency and provides continues availability of data by masking disk outages.
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Florence Dubois
With the explosion of data volumes today, businesses are looking for ways to copy huge volumes of data very quickly – from seconds to minutes – with minimal disruption to the running of applications. In this presentation, you will hear about practical use cases for IBM FlashCopy technology in a Db2 for z/OS environment including non-disruptive data integrity checks, FlashCopy image copies allowing for instant restore, SHRLEVEL(CHANGE) consistent image copy backups, system-level backup and recovery. We will provide many hints and tips on how to set up your environment, share lessons learned from customer experience and address common pitfalls.
This presentation covers the basic DB2 objects description. Covers the basic administration using IBM utilities. Their complete phase wise operation and termination recoveries. Also have talked about the most frequently used DB2 catalog tables, what's the need for them in DB2. And finally have shown some SPUFI panels and their usage.
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the mythsFlorence Dubois
Is your Disaster Recovery solution based on DASD replication functions? In most cases, all you will need to do is a normal restart of DB2 for z/OS. But this assumes the DASD copy is consistent. Otherwise, it is guaranteed data corruption that will have to be fixed up, possibly several weeks or months after the event. This presentation will tell you everything you need to know about the Copy Services for IBM System z and what is required to ensure data consistency. It will address the most common myths and misconceptions about these DASD replication solutions. It will also provide hints and tips on how to tune for fast DB2 restart and how to optimise GRECP/LPL recovery.
DB2 for z/OS Real Storage Monitoring, Control and PlanningJohn Campbell
Just added another hot DB2 topic around DB2 for z/OS Real Storage Monitoring, Control and Planning - Check it out and make sure your system runs safely
Upgrade to zOS V2.5 - Planning and Tech Actions.pdfMarna Walle
This is a critical presentation for those that are upgrading from z/OS 3.1 from z/OS V2.4/V2.5. Using this presentation, you can see the planning activities and technical upgrade actions.
JCL
Job Control Language (JCL) is a name for scripting languages used On IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem.
JCL acts as an interface between application programming and MVS Operating system.
Jcl is used for compilation and execution of batch programs.
Apart from the above functionalities JCL can also be used for,
1. Controlling the jobs.
2. Create GDG’S.
3. Allocate PDS,PS file with IBM Utilities.
4. Create Procs.
5. Sort the files.
JCL Coding Sheet
1,2,3----------Column Numbers----------72,73------------80
//JOBNAME JOB PARAMETERS------COMMENTS
// EXEC
// DD
//* ------------ Comment (* in 3rd column indicates line in comment)
//------------ End of JCL
Where // ----- Identification Field
job name------- Naming field
JOB,EXEC,DD - Statement / Operation
NOTE
If we want to continue parameters in the next line end the last parameter with “,” and continue next parameter only in 4-16 columns.
There are three statements in JCL.
JOB
EXEC
DD
JOB Statement:
Job statement is used to identify job name and job related parameters
JOBCARD = job name + job related parameters.
Syntax
//JOBNAME JOB ACCOUNT INFORMATION,’USERNAME’,CLASS=A-Z/0-9,
// NOTIFY =&SYSUID/RACF ID,MSGCLASS,
// MSGLEVEL=(X,Y),PRTY=0-15,
// TIME=(M,S),REGION=MB/KB,TYPRUN=SCAN/
// HOLD/COPY,COND=(RC,OPERATOR,STEPNAME)
// COND=ONLY OR COND=EVEN,RESTART=STEPNAME
JOBNAME
It is required to identify this job from other jobs in the SPOOL
1 to 8 characters minimum 1 character and maximum is 8 character.
1st character must be alphabet.
Other characters can be alphabets or numeric or $,&,#.
Example
Job names for personal or lab sessions
Userid + 1 / 2 chars
KC03P83$ ------- Userid is KC03P83
KC03P84&--------Userid is KCO3P84
ACCOUNTING INFORMATION
It is a keyword parameter and codes it after JOB statement.
It is used for billing purpose, in real time when we submit any job it is going to take some CPU time. Based on the CPU time there will be some amount involved where this amount has to go will be decided by A/C information parameters.
Examples
(8012T)
(80121I)
(8012M)
USERNAME
It is used to identify the user who has written the JCL.
It can be maximum of 20 characters.
Note Both A/C information and user name are positional parameters and the remaining job
card parameters are keyword parameters.
EX1: //KC03P83A JOB (487A),’JANAKI RAM’
EX2: //KC03P84& JOB (488T),’SOMISETTY’
NOTIFY
To which user id the job has to be notification after successful or unsuccessful completion.
Successful completion means MAXCC = 0 (or) 04 unsuccessful completion means MAXCC > 04.
If it is not coded,then user has to check the status of the job from the spo
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfMarna Walle
This presentation shows how to position z/OS in preparing for the new IBM z16 server. This presentation contains the "must know" information to successfully IPL z/OS on IBM z16.
Learn about Networking on z/OS. This part of the z/OS basic skills information center is intended to provide information systems personnel with the background knowledge and skills necessary to begin using the basic communications facilities of a mainframe based system. It provides a broad understanding of networking principles and the hardware and software components necessary to allow the mainframe to participate in a high volume data communications network. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
How to Improve RACF Performance (v0.2 - 2016)Rui Miguel Feio
When hundreds and some times thousands of security validations occur every minute on the mainframe, performance and availability are paramount. In this session the presenter shows some different techniques that when implemented can help improve RACF performance, so that it does not become the source of your performance problems.
A Parallel Sysplex is a cluster of IBM mainframes acting together as a single system image with z/OS that cooperate, using certain hardware and software products, to process work. Used for disaster recovery, Parallel Sysplex combines data sharing and parallel computing to allow a cluster of up to 32 mainframes to share a workload for high performance and high availability.Parallel Sysplex is analogous in concept to a UNIX cluster – allow the customer to operate multiple copies of the operating system as a single system. This allows systems to be added or removed as needed, while applications continue to run.
Geographically Dispersed Parallel Sysplex (GDPS) is an end to end application availability solution. It is the ultimate disaster recovery and continuous availability solution for a multi-site enterprise. GDPS disk replication technology enhances the resiliency and provides continues availability of data by masking disk outages.
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Florence Dubois
With the explosion of data volumes today, businesses are looking for ways to copy huge volumes of data very quickly – from seconds to minutes – with minimal disruption to the running of applications. In this presentation, you will hear about practical use cases for IBM FlashCopy technology in a Db2 for z/OS environment including non-disruptive data integrity checks, FlashCopy image copies allowing for instant restore, SHRLEVEL(CHANGE) consistent image copy backups, system-level backup and recovery. We will provide many hints and tips on how to set up your environment, share lessons learned from customer experience and address common pitfalls.
This presentation covers the basic DB2 objects description. Covers the basic administration using IBM utilities. Their complete phase wise operation and termination recoveries. Also have talked about the most frequently used DB2 catalog tables, what's the need for them in DB2. And finally have shown some SPUFI panels and their usage.
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the mythsFlorence Dubois
Is your Disaster Recovery solution based on DASD replication functions? In most cases, all you will need to do is a normal restart of DB2 for z/OS. But this assumes the DASD copy is consistent. Otherwise, it is guaranteed data corruption that will have to be fixed up, possibly several weeks or months after the event. This presentation will tell you everything you need to know about the Copy Services for IBM System z and what is required to ensure data consistency. It will address the most common myths and misconceptions about these DASD replication solutions. It will also provide hints and tips on how to tune for fast DB2 restart and how to optimise GRECP/LPL recovery.
DB2 for z/OS Real Storage Monitoring, Control and PlanningJohn Campbell
Just added another hot DB2 topic around DB2 for z/OS Real Storage Monitoring, Control and Planning - Check it out and make sure your system runs safely
Upgrade to zOS V2.5 - Planning and Tech Actions.pdfMarna Walle
This is a critical presentation for those that are upgrading from z/OS 3.1 from z/OS V2.4/V2.5. Using this presentation, you can see the planning activities and technical upgrade actions.
JCL
Job Control Language (JCL) is a name for scripting languages used On IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem.
JCL acts as an interface between application programming and MVS Operating system.
Jcl is used for compilation and execution of batch programs.
Apart from the above functionalities JCL can also be used for,
1. Controlling the jobs.
2. Create GDG’S.
3. Allocate PDS,PS file with IBM Utilities.
4. Create Procs.
5. Sort the files.
JCL Coding Sheet
1,2,3----------Column Numbers----------72,73------------80
//JOBNAME JOB PARAMETERS------COMMENTS
// EXEC
// DD
//* ------------ Comment (* in 3rd column indicates line in comment)
//------------ End of JCL
Where // ----- Identification Field
job name------- Naming field
JOB,EXEC,DD - Statement / Operation
NOTE
If we want to continue parameters in the next line end the last parameter with “,” and continue next parameter only in 4-16 columns.
There are three statements in JCL.
JOB
EXEC
DD
JOB Statement:
Job statement is used to identify job name and job related parameters
JOBCARD = job name + job related parameters.
Syntax
//JOBNAME JOB ACCOUNT INFORMATION,’USERNAME’,CLASS=A-Z/0-9,
// NOTIFY =&SYSUID/RACF ID,MSGCLASS,
// MSGLEVEL=(X,Y),PRTY=0-15,
// TIME=(M,S),REGION=MB/KB,TYPRUN=SCAN/
// HOLD/COPY,COND=(RC,OPERATOR,STEPNAME)
// COND=ONLY OR COND=EVEN,RESTART=STEPNAME
JOBNAME
It is required to identify this job from other jobs in the SPOOL
1 to 8 characters minimum 1 character and maximum is 8 character.
1st character must be alphabet.
Other characters can be alphabets or numeric or $,&,#.
Example
Job names for personal or lab sessions
Userid + 1 / 2 chars
KC03P83$ ------- Userid is KC03P83
KC03P84&--------Userid is KCO3P84
ACCOUNTING INFORMATION
It is a keyword parameter and codes it after JOB statement.
It is used for billing purpose, in real time when we submit any job it is going to take some CPU time. Based on the CPU time there will be some amount involved where this amount has to go will be decided by A/C information parameters.
Examples
(8012T)
(80121I)
(8012M)
USERNAME
It is used to identify the user who has written the JCL.
It can be maximum of 20 characters.
Note Both A/C information and user name are positional parameters and the remaining job
card parameters are keyword parameters.
EX1: //KC03P83A JOB (487A),’JANAKI RAM’
EX2: //KC03P84& JOB (488T),’SOMISETTY’
NOTIFY
To which user id the job has to be notification after successful or unsuccessful completion.
Successful completion means MAXCC = 0 (or) 04 unsuccessful completion means MAXCC > 04.
If it is not coded,then user has to check the status of the job from the spo
IBM Cloud Object Storage: How it works and typical use casesTony Pearson
This session covers the general concepts of object storage and in particular the IBM Cloud Object Storage offerings. Presented at IBM TechU in Johannesburg, South Africa September 2019
NAND Flash is the nonvolatile memory used in virtually all mobile devices (smartphones, tablets, cameras, game controllers). High performance products (Tablets and smartphones) place increasing demands on NAND
Flash device capacity, cost and bandwidth. To meet these demands, component and application processor designers must utilize a complex combination of electronic hardware and software. As a result benchmarking NAND Flash at the component and system level is a key element in successful product design.
Are you ready for NVMe? IBM FlashSystem uses NVMe inside, and is NVMe-ready for use with FCP and Ethernet fabrics. This session explains FC-NVMe and NVMe-OF and how IBM FlashSystem uses NVMe inside.
Accelerate and Scale Big Data Analytics with Disaggregated Compute and StorageAlluxio, Inc.
Alluxio Tech Talk
Jul 17, 2019
Speakers:
Brien Porter, Intel
Alex Ma, Alluxio
The ever increasing challenge to process and extract value from exploding data with AI and analytics workloads makes a memory centric architecture with disaggregated storage and compute more attractive. This decoupled architecture enables users to innovate faster and scale on-demand. Enterprises are also increasingly looking towards object stores to power their big data & machine learning workloads in a cost-effective way. However, object stores don’t provide big data compatible APIs as well as the required performance.
In this webinar, the Intel and Alluxio teams will present a proposed reference architecture using Alluxio as the in-memory accelerator for object stores to enable modern analytical workloads such as Spark, Presto, Tensorflow, and Hive. We will also present a technical overview of Alluxio.
Introduction to MariaDB. Covers the history of Structured Query language, MySQL and MariaDB, shows how to install on Windows, Mac or Linux desktop, and practical examples.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Z4R: Intro to Storage and DFSMS for z/OS
1. Z4R: Intro to Storage and
DFSMS for z/OS
Tony Pearson
IBM Master Inventor,
Senior IT Management Consultant,
Former Chief Architect of DFSMS,
TechU Content Manager
2019 IBM Systems Technical University
10-12 Sep 2019 | Johannesburg, SA
2. Agenda
z/OS Storage Fundamentals
Storage Systems for the z/OS
platform
Data Facility Storage
Management Subsystem
(DFSMS)
IBM Systems Technical University (c) 2019 IBM Corporation 2
3. Why do Mainframes need storage?
— Computers in the early 1960s ran
programs one at a time, one after the
other.
— A researcher would write a program,
convert it into whatever form of input
the computer accepted (punch cards,
paper tape, or magnetic media for
really fancy machines), and drop it off
at the computer center.
— A computer operator would queue up
the program, run it, and then deliver
the printed results and the original
program to the researcher.
— Thus, there was widespread interest
in time sharing, which allowed
multiple researchers to run programs
on the mainframe at the same time,
getting results immediately on their
remote terminals.
— With time sharing, the programs
weren’t printed off on punch cards,
they were written and stored on the
mainframe.
— In theory, researchers could write,
edit, and run their programs on the fly
and without leaving their offices.
Source: Ars Technica
IBM Systems Technical University (c) 2019 IBM Corporation 3
4. Large Systems Storage Hierarchy
High Speed Bus and “Storage” is what other
servers might call Processor Cache and RAM
Coupling Facility acts as “shared memory”
between multiple mainframes
IBM coined the term DASD as a shorthand
describing hard disk drives, magnetic drums,
and data cells. Later, optical drives and flash
storage are also classified as DASD.
The opposite of “Direct Acess” is
“Sequential Acxces” which continues today
in the form of Tape.
IBM Systems Technical University (c) 2019 IBM Corporation 4
5. What is an I/O ?
Short for input/output (pronounced "eye-oh"). The term I/O refers to a single “read’ or “write”
communication between a computer (laptop, desktop or server) and storage device (flash, disk or
tape drive).
• Inputs are the data received by the computer
• outputs are the data sent from the computer
In computer storage, an initiator is the starting point device that initiates a session to perform I/O
operations, that is, sends a storage command like “read”, “write”, “format”.
A target is the endpoint that waits for initiators' commands and provides required input/output
data transfers. The target usually provides to the initiators one or more LUNs, because otherwise
no I/O could be possible. A “LUN” (Logical Unit Number), aka Volume, is an addressable logical
storage space where data is stored.
IBM Systems Technical University (c) 2019 IBM Corporation 5
6. Performance Metrics
I/O Operations per Second (IOPS)
• Random, small-block data transfers
o Typically 4K or 8K blocks
o OLTP, databases, Exchange
o Majority of enterprise applications
• Key random performance enablers
o Number of concurrent drives, RAID type, seek time,
latency, command queuing
Throughput (MB per second)
• Sequential, large-block transfers
o Typically 64K or larger blocks
o Video servers, rich media,
seismic processing, HPC
• Key sequential performance enablers
o Number of concurrent drives, RAID type, data
transfer rate, maximum block size, pre-fetch
algorithms, command queuing
Latency
• The time it takes to complete a single read or
write I/O
• Typically used for Flash, SSD and Disk
o Flash 100-250 microseconds (0.1 to 0.25 msec)
o SSD 1000 microseconds = 1 millisecond
o Disk 5-15 milliseconds
o Object Storage 10-100s of milliseconds
Mean Time to First Byte
• The time it takes to provide the first byte of
information, subsequent information may be
faster
• Typically used for Tape, Optical and Blue-Ray
DVD that require physically mounting the media
into the drive
• Measured in seconds or minutes
o Includes time for robot to fetch media, load into drive, and
position to first byte
IBM Systems Technical University (c) 2019 IBM Corporation 6
7. What is this?
IBM Systems Technical University (c) 2019 IBM Corporation 7
The first hard disk drive was the IBM
Model 350 Disk File that came with the
IBM 305 RAMAC computer in 1956. It
had 50 24-inch discs with a total storage
capacity of 5 million characters (just
under 5 MB).
8. Solid State Drives – Flash pretending to be Spinning Disk
Stepper Motor
Spindle Motor
Arm
Read/Write Head
SAS
SATA
FCP
SAS
SATA
FCP
Same
Controller
Protocols
Same Length
Same Width
Same Height
If the read/write head comes in
contact with the surface of the
platter at full speed, the result
can be loss of data, damage to
head, damage to surface, or all
three.
This is known as a “Head Crash”
Chip fails on SSD
This is treated
the same as a
“Head Crash”
Same
Failure
codes
IBM Systems Technical University (c) 2019 IBM Corporation 8
9. Redundant Array of Independent Disks (RAID)
Tolerate 1 drive failure Tolerate 2 drive failures
RAID-1 / RAID-10
K pieces 2 x K slices
RAID-5
K pieces K + 1 slices
2.0X
1.2X
3.0X
1.5X
Triplication
K pieces 3 x K slices
RAID-6
K pieces K + 2 slices
IBM Systems Technical University (c) 2019 IBM Corporation 9
10. CKD, ECKD and FBA recording formats
— Count key data (CKD) is a direct-access
storage device (DASD)[a] data recording
format introduced in 1964 by IBM with
its IBM System/360 and still being emulated
on IBM mainframes. It is a self-defining
format with each data record represented by
a Count Area that identifies the record and
provides the number of bytes in an optional
Key Area and an optional Data Area.
— Extended Cound Key Data (ECKD) introduce
nonsynchronous operation, the transfer of
data between the channel and the storage
control is not synchronized with the transfer
of data between the storage control and the
device. A major advantage of ECKDs is far
longer cables.
— Fixed-block architecture (FBA) is an IBM
term for the hard disk drive (HDD) layout in
which each addressable block (more
commonly, sector) on the disk has the same
size, utilizing 4 byte block numbers and a new
set of command codes.[1] FBA as a term was
created and used by IBM for
its 3310 and 3370 HDDs beginning in 1979 to
distinguish such drives as IBM transitioned
away from their variable record size format
used on IBM's mainframe hard disk drives
Souce: Wikipedia
IBM Systems Technical University (c) 2019 IBM Corporation 10
11. Agenda
z/OS Storage Fundamentals
Storage Devices for the z/OS
platform
Data Facility Storage
Management Subsystem
(DFSMS)
IBM Systems Technical University (c) 2019 IBM Corporation 11
12. The Shifting Roles of Storage Technology
Flash and
Solid-State
Drives (SSD)
Combined with
slower Nearline
(7200rpm) disk
to reduce
energy costs
over faster
drives
“Flash & Stash”
Disk replication
and Virtual Tape
Libraries
Improved by low
cost Nearline
disk,
compression,
deduplication,
Object protocols
Physical tape,
combined with
automation
Linear Tape File
System (LTFS)
Primary Data
Backup Data
Work Task
Project Folder
Long-term Data
Retention
IBM Systems Technical University (c) 2019 IBM Corporation 12
13. Why is Everyone Excited about Flash?
Performance
CostperGB
Disk
RAM
ROM
• Block-based Solid-State Storage
• Non-volatile, persistent across power loss
• No moving parts, uses less power & cooling
• Consistent random access, no “seek” penalty
• Driven by Consumer Market
• Smart phones, Tablets
• Digital cameras, MP3 players
• USB thumb drives
Disk-like
capacity
and cost
Memory-like
Performance
Flash
IBM Systems Technical University (c) 2019 IBM Corporation 13
14. IBM System Storage DS8000:
Enterprise storage for your critical information requirements
• Balanced performance
• Bullet-proof reliability
• Superior business continuity
• Outstanding scalability
• Tremendous flexibility
• Synergy for z/OS, IBM i and high-end AIX systems
• Full Disk Encryption (FDE)
• And we keep enhancing it with more
automated self-optimization!
IBM Smarter Storage for
IBM Smarter Computing
IBM Systems Technical University (c) 2019 IBM Corporation 14
15. DS8880/F – Eighth Generation of DS800 series
2015
POWER8
• DS8880
• HPFE G1
POWER8
• DS8880/F
• HPFE G2
2004
POWER5
• DS8100
• DS8300
POWER5+
• DS8300 Turbo
2009
POWER6
• DS8700
POWER6+
• DS8800
2012
POWER7
• DS8870
POWER7+
• DS8870
Replication and Microcode CompatibilityReplication and Microcode Compatibility
IBM Systems Technical University (c) 2019 IBM Corporation 15
16. IBM Systems Storage Portfolio – DS8000 Family
All-Flash and Hybrid for all primary storage workloads
DS8884
Business class
DS8886
Enterprise class
DS8884F
Business class
DS8886F
Enterprise class
DS8888F
Analytics class
All-Flash Arrays (AFA)
are based on the High
Performance Flash
Enclosure (HPFE)
Hybrid Arrays
support HPFE,
Solid-State
Drives, 15K,
10K and 7200
rpm spinning
disk
DeltaDelta
0
1
2
3
0
1
2
3
F2ab F3b
F2bF3b
DS8882F
Flex Frame
Rackless
IBM Systems Technical University (c) 2019 IBM Corporation 16
17. DS8000 Architecture Overview
CPU +
Cache
I/O
Bays
I/O
Bays
14
10
2020
A frame B frame C frame C frame
Volumes/LUNs
• Full or Thin provisioned
• Up to 16TB FBA
• Up to 1,182,006 CKD cylinders
Pools
• Same extent type (FBA or CKD)
• Mix RAID, drive speeds and sizes
•Extents (Large and Small)
• 1GB/16MB Fixed Block (FBA)
• 1,113/21 Count-Key-Data cylinders
RAID Array sites (8 drives each)
• RAID-5, RAID-6, RAID-10
• 2 spare drives shared per type
Disk Drawers and HPFE
• Up to 1,536 drives / 768 flash cards
2 IBM POWER controllers CPU+Cache
• Up to 48 cores POWER8 CEC
• Up to 2TB of DRAM cache
I/O bays
• Up to 16 host adapters (128 ports)
RAID-5
RAID-10
RAID-6
Pool 1
RAID-5
RAID-6
Pool 2
1GB 1GB 1GB
1GB 1GB 1GB
CKD for
IBM Z
FB-520
IBM i
FB-512 Linux,
UNIX, Windows
21 cyl 21 cyl 21 cyl
21 cyl 21 cyl 21 cyl
IBM Systems Technical University (c) 2019 IBM Corporation 17
18. Drive media is rapidly increasing in capacity to 10TB and more. The greater density provides
real cost advantages but requires changes in the types of RAID protection used
Traditionally RAID 5 has been used over RAID 6
for Enterprise and Flash media because:
Performs better than RAID 6
Provides more usable capacity
However as the drive capacity increases , RAID 5 exposes enterprises to increased risks,
since higher capacity drives are more vulnerable to storage media errors during array
rebuild
Data will be lost, if a second drive fails while the first failed drive is being rebuilt
Media errors experienced on a drive during rebuild result in a portion of the data being non-
recoverable
1
2
3
4
5
6
P
S
RAID 5
1
2
3
4
5
Q
P
S
RAID 6
RAID 5 uses one parity drive whereas RAID 6 uses two
RAID 6 will be the default in the GUI/CLI for all drive types
RAID 6/RAID 10 options available for media
RAID 5 option available for media less than 1TB via RPQ
RAID 6 for mission-critical protection
IBM Systems Technical University (c) 2019 IBM Corporation 18
19. IBM Easy Tier®
IBM Systems Technical University (c) 2019 IBM Corporation 19
— Extent Pools can have mixed media
1. Solid-State Drives (SSD)
2. Enterprise HDD (15K and 10K RPM)
3. Nearline HDD (7200 RPM)
— Easy Tier measures and manages activity
• 24 hour learning period
• Every five minutes: up to 8 extents moved
o Hottest Extents moved up to Flash/SSD
o Coldest Extents moved down to slowest spinning
disk
• New allocations placed initially on fastest HDD
— A small amount of SSD (as little as 3%) can dramatically
reduce response times and increase IOPS throughput
— Storage Tier Advisory Tool can estimate benefits of
adding SSD before purchase!
Flash RAID Array(s)
Enterprise HDD
Nearline HDD
20. Workload skew from different client environments
0
10
20
30
40
50
60
70
80
90
100
0 10 20 30 40 50 60 70 80 90 100
Percentage of extents
ComulativePercentageofActivity
Mainframe1 - Small IOs Mainframe1 - MB Mainframe2 - Small IOs Mainframe2 - MB
Mainframe 3 - Small IOs Mainframe3 - MB Open1 - Small IOs Open1 - MB
Open2 - Small IOs Open2 - MB Open3 - Small IOs Open3 - MB
Nearline
Enterprise
Flash
IBM Systems Technical University (c) 2019 IBM Corporation 20
21. Is Tape storage still Relevant? Myth versus Reality
21
Myth:
Tape is often viewed as an
old-fashioned, outdated
technology of the past
Reality -- Tape is:
• Lowest cost, Highly reliable
• Fast throughput
• Removable – move data offsite
• Air Gapped – Protect against
Ransomware
• Energy Efficient
IBM Systems Technical University (c) 2019 IBM Corporation
22. 2010
TS7610
TS7680
2008
TS1130
(3592 G3)
1984
IBM 3480
1s cartridge drive
1964
IBM 2104
1959
IBM 729
1st read/write drive
1952
IBM 726
2003
3592 Gen1
1995
IBM 3590
1999
IBM 3590E
2005
TS1120
(3592 G2)
2004
LTO Gen3
2002
LTO Gen2LTO Gen1
2007
LTO Gen4
1962
IBM Tractor System
1992
IBM 3495
1997
VTS G1
2000
TS3500
1994
IBM 3494
1999
VTS G2
2001
VTS G3
2006
TS7740 (VTS Gen 4)
2005
TS7510 VTL
2007
TS7520
2007
TS3400
2005
TS3200
TS3300
2007
TS7530
2008
TS2900
TS3500
High Density
2008
TS7720
2008
TS7650G
2009
TS7650
Appliance
TS1130
(3592 G3)
2003
TS1120
(3592 G2)
2000
In tape automation and virtualization
1992
IBM 3495
2000
TS3500
1994
IBM 3494
TS7510 VTL TS7520
2007
TS3400
2005
TS3200
TS3300
TS7530
2008
TS2900
TS3500
High Density
2008
TS7650G
1974
3850 MSS
In tape drive technology
2010
LTO Gen5
2014TS1140
(3592 G4)
2011
TS3500
Connector
and Shuttle
2011
TS7740
TS7720
TS1150
(3592 G5)
2011
2012
LTO Gen61stread/back drive
2015
LTO Gen71stmagnetic tape drive
2014
TS4500
Connector and Shuttle
2016
TS7760 2016
TS7770
Over 65 years of tape innovation
IBM Systems Technical University (c) 2019 IBM Corporation 22
23. Clipper Group Study – long term storage costs
IBM Systems Technical University (c) 2019 IBM Corporation 23
How to store a zettabyte on a budget
•Aaron Ogus, Microsoft Azure
9x
15x
16x
17x
How Google Backs up the Internet
•Raymond Blum, Google Site Reliability
24. Why tape storage?
—Tape is intrinsically “on demand” storage media that provides
Total Cost Ownership (TCO) for data storing.
—Tape is removable and portable.
—Tape provides high volumetric efficiency.
—Tape is a fast storage solution.
—Tape media is reliable, longevity.
—Tape is green, consumes less power.
—Tape is ideally suited for:
• Backup/restore
• Information lifecycle management (ILM)
• Business continuance / disaster recovery (BC/DR)
• Archive / Long-term Retention
• Compliance with Government and Industry regulations
IBM Systems Technical University (c) 2019 IBM Corporation 24
25. • Deliver high-performance, high-
capacity storage
• Leverage IBM Spectrum Archive
featuring LTFS technology to
support for fast access to data
• Help lower cost of ownership
• Scales from midrange to
enterprise needs
BenefitsIBM TS1160
IBM TS1150
IBM TS1140
IBM Storage TS1100 tape drive family solutions
IBM Systems Technical University (c) 2019 IBM Corporation 25
26. IBM TS3500 Tape Library
IBM TS4500 Tape Library
Tape automation (library) systems
• Greater flexibility to meet
customers demand
• Reduce the complexity for
stock
• Reduce inventory costs
• Improve inventory
management
Benefits
IBM Systems Technical University (c) 2019 IBM Corporation 26
27. • Helps to reduce needed capacities
• Large scalability and performance
• Avoids downtimes due to
replication
• Deliver superior reliability
Benefits
IBM TS7720 / TS7740
Virtual Tape Solution
IBM TS7760
Virtual Tape Solution
Virtual Tape Systems
IBM Systems Technical University (c) 2019 IBM Corporation 27
28. IBM Virtualization Engine TS7700 at a glance
—Separates the functionality of the system into smaller
components with well defined, open interfaces
—Three different models: TS7740, TS7720/TS7720T and
TS7760/TS7760T
—Supports Grid interconnectivity for availability
—Up to 8 way Grid configuration supported
• fully integrated tiered storage hierarchy supports both disk and tape
technologies
—FC adapters for backend tape and cache support
—Support for up to 4 million logical volumes and
6 GB logical volume size
—z/OS support
IBM Systems Technical University (c) 2019 IBM Corporation 28
29. Hybrid Intelligent Tape Integration
29
Prefer Remove (LRU Order)
Drives/Library
TS7760T/C
LAN/WAN
• The TS7760 and CP0 of TS7760T/C is designed to run at full capacity
• Through policy management, data can be:
• Pinned – Reside in TS7760 disk cache indefinitely
• Retained – Pinned for a duration of time since last access, then Keep or Remove
• Prefer Kept or Removed – Two groups using LRU algorithm
• Data is removed from TS7760 cache after exists on a peer TS7700
• Automatic and nearly transparent integration of physical tape or Cloud
• Aged or archive data naturally replicates to TS7700s with tape or cloud
• Other workloads can be pinned or retained in cache for 100% cache hits on reads
TS7760 Cluster
TS7760T CP0
Drives/Library
TS7760T/C
Pinned
Volumes
Retained
Volumes
Prefer Keep (LRU Order)
Cloud
Cloud
IBM Systems Technical University (c) 2019 IBM Corporation
30. Agenda
z/OS Storage Fundamentals
Storage Systems for the z/OS
platform
Data Facility Storage
Management Subsystem
(DFSMS)
IBM Systems Technical University (c) 2019 IBM Corporation 30
31. DFSMS: Providing System Managed Storage on z/OS®
Storing, managing, protecting, and serving data on IBM Z
DFSMS is the standard methodology
worldwide for managing enterprise data
and storage on the z/OS platform
HSM ($)
Policy driven backup
disk space
manager, recovery
management
DSS ($)
Provides backup/
recovery and space
management
(local &
remote)
TVS ($)
Enables batch updates
concurrently with online
processing
SMS
Manages data availability
& performance policies,
assigns
policies to data
ICKDSF
Initializes disks
Advanced Copy Functions
SDM
Provides advanced
Function Copy Services
like XRC, PPRC, Global
Mirroring, CDP
DFSORT ($)
Sorts & merges
records within files
RMM ($)
Manages tapes & libraries
DFP
•Provides logical & physical I/O
to storage devices
•Manages & catalogs data sets
•Provides control & reporting
interfaces to end users & system
administrators
DFSMS provides an automated, centralized, policy-based solution
for storage management in the z/OS environment
NFS
Network files transfers
OAM
Manages object data
Provides SMStape support
EREP
Reports & fixes disk errors
$ = optional priced feature
Data is becoming the world’s new oil,
transforming industries and professions …
DFSMS drives value as the data hub for z/OS:
• Creates integrated solutions by exploiting new hardware features
•Enable better utilization and management of Storage HW
• Maintains leadership in policy based storage management
•Improved storage administrator productivity and simplified management of the
z/OS environment
• Strengthens business resiliency by exploiting new opportunities and
advancements in data protection solutions
•Point-in-time copy, fast replication, and continuous data mirroring functions while
preserving consistency
• Supports growing businesses and mission critical workloads by
providing continuous availability, scalability/performance and
flexibility of storage and data
•Increased data storage capacity and scalability to cope with explosive growth of
data volumes and database sizes
•High Availability with simpler, faster, and more reliable recovery operations
•Ability to cope with increased security and compliance requirements
• Enables cross platform data and storage
•Data availability at all levels of the storage hierarchy
IBM Systems Technical University (c) 2019 IBM Corporation 31
32. Lifecycle of a Data Set – Space Management
My Data
ABC
123
Read / Update
When?
When?
Directly to tape?
•Space Management
• Minimize the cost of
storing data
• Ensure adequate free
space to operate
DFSMShsm
DFSMSdfp
IBM Systems Technical University (c) 2019 IBM Corporation 32
33. Storage Hierarchy – Space Management
—The Classic DFSMS Storage Hierarchy (35 years old)
$$
Migration Level 1
(ML1)
High
Performance &
Function
Low Cost
Data in Primary
Level is Managed
by DFSMShsm
Data in Migration
Level is “Owned”
by DFSMShsm
$$$
Level 0
(L0)
$
Migration Level 2
(ML2)
IBM Systems Technical University (c) 2019 IBM Corporation 33
34. Final Thoughts
IBM Systems Technical University (c) 2019 IBM Corporation 34
• The roles of different storage
technology are shifting
• IBM DS8880 and TS7760 are
the market leading storage
products for IBM Z
• DFSMS for z/OS brings
policy-based automation to
manage large number of data
sets and volumes
35. Thank you!
IBM Systems Technical University (c) 2019 IBM Corporation 35
Tony Pearson
tpearson@us.ibm.com
+1-520-799-4309
Please complete the Session
Evaluation!
36. Special Thanks
I would like to thank the following colleagues
who contributed charts, insights, and review
comments for these presentation materials
— Maurice McCullough
— Glenn Wilcock
— Barbara McDonald
IBM Systems Technical University (c) 2019 IBM Corporation 36
37. About the Speaker
Tony Pearson is a Master Inventor, Senior IT Management Consultant, and Content Manager for the
IBM Systems Technical University events. Tony joined IBM Corporation in 1986 in Tucson, Arizona,
USA, and has lived there ever since. Tony presents briefings on storage topics covering the entire IBM
Storage product line, IBM Spectrum Storage software products, and topics related to Cloud Computing,
Analytics and Cognitive Solutions. He interacts with clients, speaks at conferences and events, and
leads client workshops to help clients with strategic planning for IBM’s integrated set of storage
management software, hardware, and virtualization solutions.
Tony writes the “Inside System Storage” blog, which is read by thousands of clients, IBM sales reps and
IBM Business Partners every week. This blog was rated one of the top 10 blogs for the IT storage
industry by “Networking World” magazine, and #1 most read IBM blog on IBM’s developerWorks. The
blog has been published in series of books, Inside System Storage: Volume I through V.
Over the past years, Tony has worked in development, marketing and consulting for various IBM
Systems hardware and software products. Tony has a Bachelor of Science degree in Software
Engineering, and a Master of Science degree in Electrical Engineering, both from the University of
Arizona. Tony is an inventor or co-inventor of 19 patents in the field of IBM Systems and electronic data
storage.
9000 S. Rita Road
Bldg 9032 Floor 1
Tucson, AZ 85744
+1 520-799-4309 (Office)
tpearson@us.ibm.com
Tony Pearson
Master Inventor
Senior Management
Consultant, IBM Systems
La Services
IBM Storage
IBM Systems Technical University (c) 2019 IBM Corporation 37
38. My Social Media Presence
Blog*:
ibm.co/Pearson
LinkedIn:
https://www.linkedin.com/in/az990tony
Books:
www.lulu.com/spotlight/990_tony
IBM Expert Network on Slideshare:
www.slideshare.net/az990tony
Twitter:
twitter.com/az990tony
Facebook:
www.facebook.com/tony.pearson.16121
Instagram:
www.instagram.com/az990tony/
Email:
tpearson@us.ibm.com
* Not a typo. This is short URL for https://www.ibm.com/developerworks/mydeveloperworks/blogs/InsideSystemStorage/
IBM Systems Technical University (c) 2019 IBM Corporation 38
40. Notices and disclaimers continued
— Information concerning non-IBM products was obtained from the suppliers
of those products, their published announcements or other publicly
available sources. IBM has not tested those products about this publication
and cannot confirm the accuracy of performance, compatibility or any other
claims related to non-IBM products. Questions on the capabilities of non-
IBM products should be addressed to the suppliers of those products.
IBM does not warrant the quality of any third-party products, or the ability of
any such third-party products to interoperate with IBM’s products. IBM
expressly disclaims all warranties, expressed or implied, including but
not limited to, the implied warranties of merchantability and fitness for a
purpose.
— The provision of the information contained herein is not intended to, and
does not, grant any right or license under any IBM patents, copyrights,
trademarks or other intellectual property right.
— IBM, the IBM logo, ibm.com and [names of other referenced
IBM products and services used in the presentation] are
trademarks of International Business Machines Corporation,
registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other
companies. A current list of IBM trademarks is available on
the Web at "Copyright and trademark information" at:
www.ibm.com/legal/copytrade.shtml
IBM Systems Technical University (c) 2019 IBM Corporation 40
41. This presentation uses the IBM Plex™ font
IBM Plex™ is our new typeface. It’s global, it’s versatile and it’s
distinctly IBM.
IBM Plex
Sans
The IBM company is freeing itself from the cold, modernist cliché
and replacing Helvetica with a new corporate typeface. Also
replaces Arial, Calibri, Lucida Grande, Trebuchet, etc.
IBM Plex
Mono
A little something for developers. Replaces
Courier New, Letter Gothic, Lucida Console, etc.
IBM Plex
Serif
A hybrid of the third kind (combining the best of Plex, Bodoni,
and Janson into a contemporary serif). Replaces Cambria,
Garamond, Lucida Bright, Times New Roman, etc.
IBM Plex is freely available as TrueType and OpenType at: https://github.com/IBM/plex/releases
and looks consistently good across Windows, Linux and Mac
IBM Systems Technical University (c) 2019 IBM Corporation 41