A Focus on High-End Storage the CLIPPER GROUP

Total Page:16

File Type:pdf, Size:1020Kb

A Focus on High-End Storage the CLIPPER GROUP When Infrastructure Really Matters - A Focus on High-End Storage THE CLIPPER GROUP TM SM Navigator Navigating Information Technology Horizons Published Since 1993 Report #TCG2012021 October 2, 2012 When Infrastructure Really Matters — A Focus on High-End Storage Analysts: David Reine and Jim Baker Management Summary Except for those who rely solely on public transportation or walking, most of us have a vehicle or two (or more) for our (family’s) personal use. We all have our strategies about the vehicles that we drive, whether economy, capacity, style, performance, etc. For the authors, and probably for most vehicle own- ers, a primary requirement for our vehicle is that it be reliable. Having an unreliable vehicle has known and unknown consequences. First, there is the inconvenience of it failing in some way, especially when it needs immediate servicing. The known consequences are those that can be predicted in advance, like not being able to get to work or pick up the kids on time. Time disruptions are a direct consequence of some- thing that is unreliable. Unfortunately, there are even more consequences, which tend to be more indirect yet possibly more consequential. If you were on your way to meet with a client about a critical deal and you are delayed or can’t get there, you and your business may lose that deal. Each vehicle owner has a strategy (or “Plan B”) for dealing with a suddenly ailing vehicle. Some may not drive a vehicle more than a couple of years old, because unreliability increases with age. Others may have another vehicle on which to rely in an emergency, like one belonging to a spouse or child, but relying on these also has downstream consequences. Some may drive a vehicle with the highest reputation for reliability or do business with a high-end dealer that offers a valet service, thus indicating that they often are quite willing to pay more for the improved quality of service and peace of mind. The old adage “You get what you pay for” hits this on dead center. The same is true for IT infrastructure. So, why would you be willing to pay more for IT infrastructure? Really, no one wants to pay more than is necessary, especially when IT budgets are tight, which is very common these days. So, how should you define what is necessary and what solutions are sufficient? How do you know when you are getting good value? First and foremost, you need infrastructure that can get the job done…under expected circum- stances. You might express this in terms of probability, like, “I want to get through the day without a failure most of the time.” You also might express this in terms of the “duration of consequence,” how long the infrastructure might be down. This presents the minimum situation that needs to be arranged. Second, and related to the first, you need infrastructure that can handle the unexpected, say when transaction volume is three times what is expected. Handling the unexpected, up to and including a complete, externally caused data center outage, might add significantly to the minimum infra- structure required. IN THIS ISSUE Third, you need infrastructure that minimizes the inherent risks that you face as a business Focus is on Mission Critical .................. 2 and as a provider of IT services. Since there are The Need to Focus Broadly on IT many risks, this can be complicated to assess and Infrastructure .......................................... 4 complicated to mitigate. You need infrastructure Focus on IBM DS8000 Storage Series, that helps to reduce these complexities, because especially the new DS8870 .................... 6 that makes everything easier and more doable. Conclusion.............................................. 9 The Clipper Group, Inc. - Technology Acquisition Consultants Internet Publisher One Forest Green Road Rye, New Hampshire 03870 U.S.A. 781-235-0085 781-235-5454 FAX Visit Clipper at www.clipper.com Send comments to [email protected] October 2, 2012 The Clipper Group NavigatorTM Page 2 This list could be much longer but, for now, let’s Exhibit 1 — just say that you need to know your requirements, Sorting Out the Priorities the inherent risks, and your organization’s (and your) tolerance for pain. The bottom line to all of Level of Acceptable Need to this is that the infrastructure that you use for Business Level of Inter- Mitigate critical work really does matter. It is not all the Importance ruption Risk Risk same. Read on to learn more about risks and re- Mission Rarely High quirements and how and why your infrastructure Critical Acceptable really matters. Business Somewhat Medium Critical Acceptable Focus is on Mission Critical Less More Low At this point, we need to narrow the focus of Critical Acceptable this paper, which is to look at applications and in- Source: The Clipper Group frastructure that might be labeled as “mission criti- cal”. Why the narrowing? There are many rea- With respect to IT infrastructure, you want the sons, but three are worth mentioning. First, there is best solution, one that is the best fit to your busi- more at stake in doing mission-critical work and, ness requirements (and usually not much more, almost always, much greater risk when things go unless the only way to get what you need is to “buy wrong. Second, operating at the extreme (whether up” to something that unnecessarily surpasses your seen by the business side or the IT side of the equa- minimum requirements). This match of solution to tion) presents greater challenges than more mun- requirements often is measured by its “goodness of dane needs and solutions. The third is a little more fit”. You seek goodness of fit to your requirements selfish, but mission-critical applications and service at the most reasonable cost, often measured as To- delivery is just more interesting (for us, as analysts) tal Cost of Ownership (TCO). and challenging (for those that have the business To determine the goodness of fit, you need to need or have to deliver the service) than more start with your organization’s unique list of re- mundane business requirements and their often quirements. Most trace back to your business “good enough” solutions. needs but some may be focused on technology or the status quo2. Requirements and Risks As you can see from Exhibit 2 on the follow- You already may be classifying your business ing page, for each business requirement (in the left needs into business requirements categories like column), there often is a corresponding IT infra- “mission critical”, “business critical”, “less criti- structure requirement (in the right column). This cal”, your risks into categories of acceptable levels table represents a way of looking at the confluence of interruption like “rarely acceptable”, “somewhat of business (user) requirements and IT infrastruc- acceptable”, and “more acceptable”, and impacts ture requirements, sort of the yin and yang of these into need-to-mitigate risk categories like “high”, often-separated perspectives. That’s important, “medium”, and “low”. The labels are less impor- because now we have a basis to look at the chal- tant than the concepts. By categorizing require- lenges and risks associated with each. ments, interruption tolerance, and needs to reduce We’ll do this in three parts. First, we’ll discuss the effects of risk, you are thinking about the busi- what these requirements mean, at a summary level. ness side of the equation. This is necessary and Second, we will try to put this into a practical per- good, for it is the business that drives all IT re- 1 spective, starting where seemingly most of the IT quirements. However, the higher the impor- focus has been put recently (in the name of mission tance to the business, the lower you want the -critical requirements), that is, on high-end servers frequency of risk and the greater is your need to with server virtualization. Third, we will turn the mitigate that risk from occurring. (See Exhibit focus on the need for mission-critical storage, 1, at the top of this page.) You need to focus on which often becomes the stepchild in the race to the row in red and that is what we will do herein. deliver mission-critical solutions. We will explain why this frequently appears to be so, discuss the 1 What this implies is that while focusing on the characteristics of shortcomings of this approach, and then go on to infrastructure components and linkages is good and necessary, often it is not done properly with correlation to business require- ments, etc. Thus, it is inappropriate to seek out the “best” solu- 2 It is very infrequent that one starts with a clean slate. Usually, tion or components without framing the determination of what we start with “where we are” and try to figure out how to get to business circumstances make it best (i.e., give it the right fit for “where we want to go”. That path and ease of that journey may the requirements). be a significant determinant to what is decided. Copyright © 2012 by The Clipper Group, Inc. Reproduction prohibited without advance written permission. All rights reserved. October 2, 2012 The Clipper Group NavigatorTM Page 3 Exhibit 2 — The Two Sides of Mission-Critical Requirements Business (Application) Requirements IT Infrastructure (Data Center) Requirements Sufficiently high quality of service Sturdy and proven infrastructure Application and customer focus Application awareness, for performance and Predictable performance and speedy response time troubleshooting Conformance to industry standards Able to adjust/recover from stress and failures
Recommended publications
  • IBM Software Defined Storage Guide
    Front cover IBM Software-Defined Storage Guide Larry Coyne Mathias Defiebre Phil Gilmer Shivaramakrishnan Gopalakrishna Mikael Lindström Brandon Mann Gianluca Perilli Mladen Portak Redpaper International Technical Support Organization IBM Software-Defined Storage Guide January 2016 REDP-5121-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (January 2016) This document was created or updated on January 20, 2016. © Copyright International Business Machines Corporation 201. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi IBM Redbooks promotions . vii Preface . ix Authors. ix Now you can become a published author, too! . xi Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Why software-defined storage? . 1 1.1 Introduction to the software-defined architecture . 2 1.2 Software-defined infrastructure (SDI) . 2 Chapter 2. Software-defined storage. 7 2.1 Introduction to SDS . 8 2.2 SDS overview . 8 2.2.1 SDS supports emerging as well as traditional IT consumption models . 9 2.2.2 Required SDS Capabilities . 11 2.2.3 SDS Functions . 12 2.3 SDS Data-access protocols . 13 2.4 SDS Reference Architecture . 14 Chapter 3. IBM SDS product offerings . 17 3.1 SDS architecture . 18 3.2 SDS Control Plane . 19 3.2.1 IBM Spectrum Control. 20 3.2.2 IBM Spectrum Protect. 26 3.3 SDS data plane . 32 3.3.1 IBM Spectrum Virtualize . 32 3.3.2 IBM Spectrum Accelerate .
    [Show full text]
  • IBM DS8870 Architecture and Implementation (Release 7.5)
    Front cover IBM DS8870 Architecture and Implementation (Release 7.5) Bertrand Dufrasne Werner Bauer Artur Borowicz Adrian Orben Robert Tondini Bob Xiao Redbooks International Technical Support Organization IBM DS8870 Architecture and Implementation (Release 7.5) July 2015 SG24-8085-05 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Sixth Edition (July 2015) This edition applies to Release 7.5 (DS8000 License Machine Code 7.7.50.xx.xx , bundle version 87.51.52.xx, or later) of the IBM DS8870 (MachineType 2421, 2422, 2423, and 2424). © Copyright International Business Machines Corporation 2013, 2015. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii IBM Redbooks promotions . xiii Preface . .xv Authors. xvi Now you can become a published author, too! . xvii Comments welcome. xviii Stay connected to IBM Redbooks . xviii Part 1. Concepts and architecture. 1 Chapter 1. Introduction to the IBM DS8870 . 3 1.1 Introduction to the IBM DS8870 . 4 1.1.1 Features of the DS8870 . 5 1.2 DS8870 controller options and frames . 9 1.3 DS8870 architecture and functions overview . 11 1.3.1 Overall architecture and components . 11 1.3.2 Storage capacity . 14 1.3.3 Supported environments. 15 1.3.4 Configuration flexibility . 15 1.3.5 Copy Services functions . 17 1.3.6 Service and setup . 18 1.3.7 IBM Certified Secure Data Overwrite . 18 1.4 Performance features . 19 1.4.1 16 Gbps host adapters .
    [Show full text]
  • IBM Storage BP Guidebook V17.0E#.Pdf
    December 2013 CLICK HERE to check for updates How to Optimize Building an A Seller’sYour Current Roadmap IBM to IBMInfrastructure Storage for IBMOn Demand Solutions StorageComputing Today and Tomorrow Business Partner Guidebook Environment eBook Edited by Jim Hoskins Jim Hoskins IBM Storage Business Partner Guidebook Titles of Interest More IBM Titles of Interest • IBM PureSystems Business Partner Guidebook • IBM System x & BladeCenter Business Partner Guidebook • IBM Power Systems Business Partner Guidebook For more information, visit us at maxpress.com or email us at [email protected]. IBM Storage Business Partner Guidebook Seventeenth Edition A Seller’s Roadmap to IBM Storage Solutions Edited by Jim Hoskins (version 17.0e) 605 Silverthorn Road Gulf Breeze, FL 32561 maxpress.com Notices Production Manager: Jacquie Wallace Cover Designer: Lauren Smith Proofreader: Jacquie Wallace This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering professional services. If legal, accounting, medical, psychological, or any other expert assistance is required, the services of a competent professional person should be sought. ADAPTED FROM A DECLARATION OF PRIN- CIPLES OF A JOINT COMMITTEE OF THE AMERICAN BAR ASSOCIATION AND PUBLISHERS. Copyright 2013 by Maximum Press. All rights reserved. Published simultaneously in Canada. Reproduction or translation of any part of this work beyond that permitted by Section 107 or 108 of the 1976 United States Copyright Act without the permission of the copyright owner is unlawful. Requests for permission or further information should be addressed to the Permissions Department, Maximum Press.
    [Show full text]
  • IBM Private, Public, and Hybrid Cloud Storage Solutions
    Front cover IBM Private, Public, and Hybrid Cloud Storage Solutions Larry Coyne Joe Dain Eric Forestier Patrizia Guaitani Robert Haas Christopher D. Maestas Antoine Maille Tony Pearson Brian Sherman Christopher Vollmar Redpaper International Technical Support Organization IBM Private, Public, and Hybrid Cloud Storage Solutions April 2018 REDP-4873-04 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Fifth Edition (April 2018) This document was created or updated on April 26, 2018. © Copyright International Business Machines Corporation 2012, 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Chapter 1. What is cloud computing. 1 1.1 Cloud computing definition . 2 1.2 What is driving IT and businesses to cloud. 4 1.3 Introduction to Cognitive computing . 4 1.4 Introduction to cloud service models. 5 1.4.1 Infrastructure as a service. 5 1.4.2 Platform as a service . 6 1.4.3 Software as a service . 6 1.4.4 Other service models . 6 1.4.5 Cloud service model layering . 7 1.5 Introduction to cloud delivery models . 8 1.5.1 Public clouds. 9 1.5.2 Private clouds . 9 1.5.3 Hybrid clouds . 10 1.5.4 Community clouds . 10 1.5.5 Cloud considerations . 10 1.6 IBM Cloud Computing Reference Architecture .
    [Show full text]
  • DS8882F Introduction and Planning Guide About This Book
    IBM DS8882F Rack Mounted storage system Version 8 Release 5 Introduction and Planning Guide IBM GC27-9259-00 Note Before using this information and the product it supports, read the information in “Safety and environmental notices” on page 135 and “Notices” on page 133. This edition applies to version 8, release 5 of the DS8882F Rack Mounted storage system. © Copyright IBM Corporation 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this book ........... v Dynamic volume expansion ......... 39 Who should use this book .......... v Count key data and fixed block volume deletion Conventions and terminology ........ v prevention............... 39 Publications and related information ...... v Thin provisioning ............ 39 IBM Publications Center .......... ix Extent Space Efficient (ESE) capacity controls for Sending comments ............ x thin provisioning ........... 40 IBM Easy Tier ............. 41 Chapter 1. Overview ......... 1 VMware vStorage API for Array Integration support 42 Performance for IBM Z .......... 43 Machine types overview .......... 2 Copy Services ............. 45 Hardware ............... 3 Disaster recovery through Copy Services ... 54 DS8882F (machine type 533x model 983) .... 4 Resource groups for Copy Services scope limiting 55 High Performance Flash Enclosures Gen2 pair .. 6 Comparison of Copy Services features ..... 57 I/O enclosure ............. 7 I/O Priority Manager ........... 58 Processor nodes ............ 7 Securing data.............. 59 Management enclosure .......... 7 Power ............... 8 Functional overview ............ 8 Chapter 4. Planning the physical Logical configuration ........... 11 configuration ............ 61 Logical configuration with DS8000 Storage Configuration controls........... 61 Management GUI ........... 11 Determining physical configuration features ... 61 Logical configuration with DS CLI...... 13 Management console features ........ 62 RAID implementation .........
    [Show full text]
  • Introduction and Planning Guide
    IBM DS8880 Version 8 Release 5.3 Introduction and Planning Guide IBM GC27-8525-18 Note Before using this information and the product it supports, read the information in “Safety and environmental notices ” on page 196 and “Notices” on page 195. This edition applies to version 8, release 5, modification 3 of IBM® DS8000® and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces GC27-8525-17. © Copyright International Business Machines Corporation 2004, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this book....................................................................................................vii Who should use this book.......................................................................................................................... vii Conventions and terminology.................................................................................................................... vii Publications and related information.........................................................................................................vii IBM Publications Center..............................................................................................................................xi Feedback.....................................................................................................................................................xii Summary of changes .........................................................................................
    [Show full text]
  • DS8880 Introduction and Planning Guide About This Book
    IBM DS8880 Version 8 Release 5 Introduction and Planning Guide IBM GC27-8525-16 Note Before using this information and the product it supports, read the information in “Safety and environmental notices” on page 213 and “Notices” on page 211. This edition applies to version 8, release 5 of IBM DS8000 and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces GC27-8525-15. © Copyright IBM Corporation 2004, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this book ........... v Chapter 3. Data management features 57 Who should use this book .......... v Transparent cloud tiering .......... 57 Conventions and terminology ........ v Dynamic volume expansion ......... 59 Publications and related information ...... v Count key data and fixed block volume deletion IBM Publications Center .......... ix prevention............... 59 Sending comments ............ x Thin provisioning ............ 59 Extent Space Efficient (ESE) capacity controls for Summary of changes......... xi thin provisioning ........... 60 IBM Easy Tier ............. 61 Chapter 1. Overview ......... 1 VMware vStorage API for Array Integration support 64 Performance for IBM Z .......... 66 Machine types overview .......... 4 Copy Services ............. 67 Hardware ............... 5 Disaster recovery through Copy Services ... 76 System types ............. 6 Resource groups for Copy Services scope limiting 77 Storage enclosures
    [Show full text]
  • IBM VM Recovery Manager DR for Power Systems Version 1.3.0: Deployment Guide Overview for IBM VM Recovery Manager DR for Power Systems
    IBM VM Recovery Manager DR for Power Systems Version 1.3.0 Deployment Guide IBM Note Before using this information and the product it supports, read the information in “Notices” on page 147. This edition applies to IBM® VM Recovery Manager DR for Power Systems Version 1.3.0 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2018, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document..............................................................................................v Highlighting...................................................................................................................................................v Case-sensitivity in VM Recovery Manager DR............................................................................................. v ISO 9000......................................................................................................................................................vi Overview...............................................................................................................1 Concepts...............................................................................................................5 KSYS............................................................................................................................................................. 5 HMC.............................................................................................................................................................
    [Show full text]
  • Introduction and Planning Guide
    IBM DS8900F Version 9 Introduction and Planning Guide IBM SC27-9560-00 Note Before using this information and the product it supports, read the information in “Safety and environmental notices ” on page 136 and “Notices” on page 135. This edition applies to version 9 of IBM® DS8000® and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this book....................................................................................................vii Who should use this book.......................................................................................................................... vii Conventions and terminology.................................................................................................................... vii Publications and related information.........................................................................................................vii IBM Publications Center............................................................................................................................. xi Feedback..................................................................................................................................................... xi Summary of changes .......................................................................................... xiii
    [Show full text]
  • IBM Redbook IBM Spectrum Scale (Formerly GPFS)
    Front cover IBM Spectrum Scale (formerly GPFS) Dino Quintero Luis Bolinches Puneet Chaudhary Willard Davis Steve Duersch Carlos Henrique Fachim Andrei Socoliuc Olaf Weiser Redbooks International Technical Support Organization IBM Spectrum Scale (formerly GPFS) May 2015 SG24-8254-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (May 2015) This edition applies to IBM Spectrum Scale (formerly GPFS) v4.1.0.4 (TL1), SLES 11 SP2, SLES11 SP3, RHEL ppc64 6.5, AIX 7.1 TL3, Tivoli Storage Manager 7.1 Server, Client and Storage Agent (LAN-free), Tivoli Storage Manager for Space Management 7.1.1, and TSM for Space Management (HSM) 7.1.1. © Copyright International Business Machines Corporation 2015. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x IBM Redbooks promotions . xi Preface . xiii Authors. xiii Now you can become a published author, too! . .xv Comments welcome. .xv Stay connected to IBM Redbooks . .xv Chapter 1. Introduction. 1 1.1 Overview . 2 1.2 IBM Spectrum Scale major components and terminology . 3 1.2.1 IBM Spectrum Scale cluster topologies . 5 1.3 IBM Spectrum Scale new features and enhancements . 5 1.3.1 Enhanced security . 6 1.3.2 Performance improvements . 6 1.3.3 New usability features. 7 1.3.4 Reliability, availability, and serviceability. 10 1.4 IBM Spectrum Scale competitive strategy . 10 1.5 IBM Spectrum Scale licensing . 12 1.6 IBM Spectrum Scale on cross-platform environments .
    [Show full text]
  • IBM Powerha Systemmirror for I: Using DS8000 (Volume 2 of 4)
    Front cover IBM PowerHA SystemMirror for i: Using DS8000 (Volume 2 of 4) David Granum Edward Grygierczyk Sabine Jordan Peter Mayhew David Painter Redbooks International Technical Support Organization IBM PowerHA SystemMirror for i: Using DS8000 June 2016 SG24-8403-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (June 2016) This edition applies to Version 7, Release 2 of PowerHA SystemMirror for IBM i (product number 5770-HAS). © Copyright International Business Machines Corporation 2016. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii IBM Redbooks promotions . ix Preface . xi Authors. xii Now you can become a published author, too! . xiii Comments welcome. xiv Stay connected to IBM Redbooks . xiv Chapter 1. Introduction to IBM PowerHA SystemMirror on i with the DS8000 . 1 1.1 Value proposition . 2 1.2 DS8000 terminology . 3 1.2.1 Volumes . 3 1.2.2 Volume groups . 4 1.2.3 Resource group . 4 1.2.4 Host connections . 4 1.2.5 Logical subsystems. 8 1.2.6 IBM PowerVM . 9 1.2.7 Virtual I/O Server considerations . 9 1.3 Metro Mirror. 11 1.3.1 Metro Mirror operations. 12 1.3.2 PPRC paths and links . 13 1.3.3 Metro Mirror and IBM PowerHA SystemMirror for i. 14 1.4 Global Mirror . 15 1.4.1 Global Mirror operations . 18 1.4.2 Global Mirror and IBM PowerHA SystemMirror for i .
    [Show full text]
  • Introduction and Planning Guide
    IBM DS8882F Rack Mounted storage system Version 8 Release 5.3 Introduction and Planning Guide IBM GC27-9259-02 Note Before using this information and the product it supports, read the information in “Safety and environmental notices ” on page 116 and “Notices” on page 115. This edition applies to version 8, release 5, modification 3 of the DS8882F Rack Mounted storage system. This edition replaces GC27-9259-01. © Copyright International Business Machines Corporation 2018, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this book....................................................................................................vii Who should use this book.......................................................................................................................... vii Conventions and terminology.................................................................................................................... vii Publications and related information.........................................................................................................vii IBM Publications Center..............................................................................................................................xi Feedback.....................................................................................................................................................xii Summary of changes .........................................................................................
    [Show full text]