IBM Storage The online community where IBM Storage users meet, share, discuss, and learn. Join the Community
Hier sind die Präsentationen als Zip Datei zum praktischen Download
SVC20 Präsentationen.zip
In our examples below we define a tag key action with the value of migrate or recall...Another way to add tags to an object uses the put-object-tagging operation of the s3api
This was my first business trip for the year, and the first one out of the state of Arizona for the past two years...I presented "Rapid Recovery, hours vs. days" to focus on three key areas of Data Protection: 1
Yesterday morning, the entire country of Colombia suffered their worst black-out (power outage) in 22 years . 98% of the country was out for 4 1/2 hours.This is just 5 months after an outage that hit 25% of the country, December 7, 2006.Ironically, this one happened the week I am here explaining the need for Business Continuity plans to IBM Business Partners from Argentina, Peru, Velenzuela, Ecuador and Colombia. As is oftenthe case, people often need a real example to recognize the need for planning is important. It reminded me of the Northeast Black-out of 2003 that impacted USA and Canada. I was speaking to a crowd of 800 people at the SHARE conference in Washington D.C. when it happened, and hundreds of pagers and cell-phones went off all at the same time. Although we were outside the effected area and had plenty of lighting, we ended up canceling therest of my talk, and many people left immediately to help execute their business continuity plans.Of course, terrorism was immediately assumed, but a final report showed that it was initiated in Ohiodue to overgrown trees, and then propagated due to a software bug to hundreds of other plants
2 Comments - A system should be designed for no single points of failure and this should include single points of "operator" failure
The newest addition to our "IBM Express Portfolio"set of SMB-oriented offerings is the new TS3100 tape library. This has one LTO Gen 3 drive and up to 22 cartridges, which can be a mix of WORM and rewriteable cartridges,beautifully packaged in a small 2U high (3.5 inch) rack-mountable chassis
However, when new resources are added, the privileges assigned to principals may need to be modified, which can become challenging to manage at scale. An alternative way of authorizing access to resources is by assigning tags to both the principals and resources and then granting permissions based on the combination of these tags
Today, I am posting this from the Houston Airporton my way down to Cuernavaca, Mexico to participate in the Storage Symposium 2008 Mexico, April 24-25, 2008. We have a list of speakers presenting on various topics
There were a total of 511 files that have the collection tag set to archivecollection...The type of the tag is open . An open tag can have any string value with the length of up to 256 bytes
Originally posted by: TonyPearson This week, the [ Global Language Monitor ] announced that "Web 2.0" became the One Millionth word of the English language
1 Comment - From WebSphere 2001, an demo of ViaVoice, voice recognition software, which used a vocabulary of 160,000 words: http://www.youtube.com/watch?
Originally posted by: bobby g IBM Tivoli Storage Productivity Center V5.2, which is part of IBM SmartCloud Virtual Storage Center, is available worldwide (eGA) and improves the ability to visualize and control storage environments from end to end. These are just some of the features of Tivoli Storage Productivity Center V5.2: Offers comprehensive visibility and centralized management of heterogeneous storage infrastructures with improved device management, custom tags, and agent-less server management from a single interface that is web-based and integrated for an enhanced user experience
1 Comment - no search term matches found in comments.