IBM DS8910F Model 993 Rack-Mounted Storage System Release 9.1


Book Description

This IBM Redpaper publication presents and positions the DS8910F Model 993 storage system. This modular system can be integrated into a 16U contiguous space of an IBM z15TM model T02 or IBM z14® Model ZR1 with Feature Code 0937 and IBM LinuxONE III model LT2 or LinuxONE Rockhopper II model LR1 with Feature Code 0938. The DS8910F Model 993 allows you to take advantage of the performance boost of all-flash systems and advanced features while limiting data center footprint and power infrastructure requirements.




IBM DS8900F Architecture and Implementation


Book Description

This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM DS8900F family. This book provides reference information to assist readers who need to plan for, install, and configure the DS8900F systems. This edition applies to DS8900F systems running microcode Release 9.0 (Bundle 89.0 / Licensed Machine Code (LMC) 7.9.0.xxx). The DS8900F family offers two new classes: IBM DS8910F: Flexibility Class all-flash: The Flexibility Class is designed to reduce complexity while addressing various workloads at the lowest DS8900F family entry cost. IBM DS8950F: Agility Class all-flash: The Agility Class is designed to consolidate all your mission-critical workloads for IBM Z®, IBM LinuxONE, IBM Power Systems, and distributed environments under a single all-flash storage solution. The DS8900F architecture relies on powerful IBM POWER9TM processor-based servers that manage the cache to streamline disk input/output (I/O), which maximizes performance and throughput. These capabilities are further enhanced by High-Performance Flash Enclosures (HPFE) Gen2. Like its predecessors, the DS8900F supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. The IBM DS8910F Rack-Mounted model 993 is described in a separate publication, IIBM DS8910F Model 993 Rack-Mounted Storage System, REDP-5566.




IBM Storage DS8900F Product Guide Release 9.3.2


Book Description

This IBM® Redbooks Product Guide provides an overview of the features and functions that are available with the IBM Storage DS8900F models that run microcode Release 9.3.2 (Bundle 89.32/Licensed Machine Code 7.9.32). As of February 2023, the DS8900F with DS8000 Release 9.3.2 is the latest addition. The DS8900F is an all-flash system exclusively, and it offers three classes: IBM DS8980F: Analytic Class: The DS8980F Analytic Class offers best performance for organizations that want to expand their workload possibilities to artificial intelligence (AI), Business Intelligence, and Machine Learning. IBM DS8950F: Agility Class: The agility class is efficiently designed to consolidate all your mission-critical workloads for IBM zSystems, IBM LinuxONE, IBM Power Systems, and distributed environments under a single all-flash storage solution. IBM DS8910F: Flexibility Class: The flexibility class delivers significant performance for midrange organizations that are looking to meet storage challenges with advanced functionality delivered as a single rack solution.




IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z


Book Description

This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.




IBM DS8900F Performance Best Practices and Monitoring


Book Description

This IBM® Redbooks® publication is intended for individuals who want to maximize the performance of their DS8900 storage systems and investigate the planning and monitoring tools that are available.




LDAP Authentication for IBM DS8000 Systems: Updated for DS8000 Release 9.1


Book Description

The IBM® DS8000® series includes the option to replace the locally based user ID and password authentication with a centralized directory-based approach. This IBM Redpaper publication helps DS8000 storage administrators understand the concepts and benefits of a centralized directory. It provides the information that is required for implementing a DS8000 authentication mechanism that is based on the Lightweight Directory Access Protocol (LDAP). Starting with DS8000 Release 9.1 code, a simpler, native LDAP authentication method is supported along with the former implementation that relies on IBM Copy Services Manager (CSM) acting as a proxy between the DS8000 and external LDAP servers. Note that examples and operations shown in this Redpaper refer to the DS8000 R9.1 SP1, code release bundle 89.11.33.0.




IBM DS8000 Copy Services: Updated for IBM DS8000 Release 9.1


Book Description

This IBM® Redbooks® publication helps you plan, install, configure, and manage Copy Services on the IBM DS8000® operating in an IBM Z® or Open Systems environment. This book helps you design and implement a new Copy Services installation or migrate from an existing installation. It includes hints and tips to maximize the effectiveness of your installation, and information about tools and products to automate Copy Services functions. It is intended for anyone who needs a detailed and practical understanding of the DS8000 Copy Services. This edition is an update for the DS8900 Release 9.1. Note that the Safeguarded Copy feature is covered in IBM DS8000 Safeguarded Copy, REDP-5506.




Getting Started: Journey to Modernization with IBM Z


Book Description

Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.




IBM TS7700 Series DS8000 Object Store User's Guide Version 2.0


Book Description

The IBM® TS7700 features a functional enhancement that allows for the TS7700 to act as an object store for transparent cloud tiering with IBM DS8000® (DS8K), DFSMShsm (HSM), and native DFSMSdss (DSS). This function can be used to move data sets directly from DS8000 to TS7700. This IBM Redpaper publication describes the client value, and how DFSMS, DS8000, and TS7700 are set up to enable and use the function.




Getting Started with z/OS Data Set Encryption


Book Description

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.