Welcome to the IBM TechXchange Community, a place to collaborate, share knowledge, & support one another in everyday challenges. Connect with your fellow members through forums, blogs, files, & face-to-face networking.
Join / sign up
1. Introduction Stretched cluster with IBM Spectrum Scale ECE is using ECE to build a file system cluster which can replicate file system data blocks on two different sites. It provide the ability to protect data when disaster happens on one site. We can also describe this as: Using IBM...
In IBM Spectrum Scale 5.0.5, fileset auditing and skip fileset auditing are available. You can choose up to 20 filesets to apply fileset auditing to, which means that file system activity is only audited if it occurs in the specified filesets. Or, you can choose up to 20 filesets to skip fileset...
NOTE: This content was originally published under the IBM developerWorks site. Since the location where this content was published is being taken offline the content is being copied here so it can continue to be accessed. Introduction I receive many questions on how to configure GPFS for...
Threats from cyber attacks are at an all time high. These threat agents can be external, as well as internal, to an organization. Since 'data' is the new oil, most of these attacks are to directed to the data. It is either to illegitimately gain access to the data or to maliciously corrupt the...
“ Data is the new oil ” Like oil has developed the world into a better place data perhaps holds similar potential and is already responsible for most valuable brands in the IT industry. These companies are collecting tremendous data from billions of users and analyzing it to make gadgets and...
2 Comments - no search term matches found in comments.
1. Introduction IBM Spectrum Scale Erasure Code Edition (ECE) has the ability to use storage rich servers to provide a software network Erasure Code protected file system service using erasure code. It provides high performance and high data reliability by distributing data strips across all...
4 Comments - no search term matches found in comments.
Safeguarded Copy is now available for the DS888x Family of Enterprise Storage with the recommended Bundle 88.51.53.0. Safeguarded Copy provides Cyber Resilience and protection from logical corruption - both accidental and malicious. Safeguarded Copy allows a client to store up to 500...
Apache Ranger is a centralized security administration solution for Hadoop that enables administrators to create and enforce security policies for HDFS and other Hadoop platform components. Ranger configuration is based on the installation and configuration of HDFS Transparency. Therefore,...
This procedure documents how you can convert Spectrum Scale dependent filesets used for an AFM home cluster to independent filesets. One reason for doing this would be in preparation for implementing an AFM-DR solution which requires that the primary and secondary filesets be the independent...
In this article we discuss implementing pervasive encryption using zDMF, and how this effort enhances information security. We first provide a brief overview of information security and its objectives, the so-called CIA triad - Confidentiality, Integrity, Availability. We then look at how...