Download presentation
Presentation is loading. Please wait.
1
IBM ProtecTIER Deduplication Solutions
Stanislav Dzúrik IBM FTSS Storage stanislav_ Note to Presenter: Present to customers and prospects to provide them with an overview of IBM’s ProtecTIER Deduplication Solutions
2
Protect More. Store Less.®
too much got data? Disk is not always the best answer for data protection issues and requirements. IBM has a broad portfolio of data protection solutions giving us the freedom to solve customer issues with the most effective technology Other vendor’s, like EMC Data Domain, answer to any problem is “Use more disk” because disk is the only thing they have to sell! And not enough ( blank ) to store it all? Time Money People Floor Space Electricity Air Conditioning Protect More. Store Less.®
3
The tidal wave of data continues …
The amount of digital information continues to grow exponentially And we need to keep more of it, longer And the costs of losing data are increasingly unacceptable Lost revenues Lost customer confidence Embarrassment in the market Fines from contracts, government agencies CEO and CFO could go to jail But budgets are not increasing Disk is not always the best answer for data protection issues and requirements. IBM has a broad portfolio of data protection solutions giving us the freedom to solve customer issues with the most effective technology Other vendor’s, like EMC Data Domain, answer to any problem is “Use more disk” because disk is the only thing they have to sell! 2005 2006 2007 2008 2009 2010 Data created and copied is expected to grow at 48% CAGR through 2010 We Need to do More with Less, and we need to do it smarter Source: Various external consultant reports Protect More. Store Less.®
4
Protect More. Store Less.®
Survey - what are your two biggest storage pain points? Disk is not always the best answer for data protection issues and requirements. IBM has a broad portfolio of data protection solutions giving us the freedom to solve customer issues with the most effective technology Other vendor’s, like EMC Data Domain, answer to any problem is “Use more disk” because disk is the only thing they have to sell! * TheInfoPro Storage Study: F1000 Sample. n=149. Other n=14. *Multiple responses recorded Protect More. Store Less.®
5
Storage efficiency strategies and best practices
Stop storing so much Move data to the right place We see clients working hard at solving the Storage Efficiency challenge, in an attempt to managing Storage Growth, Cost, and Complexity. Top strategies include: Shrinking the data you have to store, so you can stop storing so much Moving the right data to the right storage technology to balance costs and performance Getting more utilization from the equipment you already have on the floor All these are good efforts that can help improve Storage Efficiency …. Store more with what’s on the floor Protect More. Store Less.®
6
A set of essential technologies enables storage efficiency
Stop storing so much Data Compression Data Deduplication Move data to the right place Automated Tiering Automated Data Migration 9/21 A set of Essential Technologies have emerged that are known to Enable Storage Efficiency Notice that Each Technology Addresses a Different Aspect of the Problem, so there is no single product that addresses every storage efficiency opportunity. Not surprisingly, IBM has found, working with clients, that a balanced approach yields the best overall results. In the next few slides, I want to show you how these essential technologies can work together to deliver the type of storage environment that can thrive during a time of rapid growth. Store more with what’s on the floor Storage Virtualization Thin Provisioning Protect More. Store Less.®
7
Protect More. Store Less.®
The pressures on backup administrators are growing More new data coming Backup takes longer Growth Backup Disk is not always the best answer for data protection issues and requirements. IBM has a broad portfolio of data protection solutions giving us the freedom to solve customer issues with the most effective technology Other vendor’s, like EMC Data Domain, answer to any problem is “Use more disk” because disk is the only thing they have to sell! Manage Recover Can’t buy more storage Recovery takes longer Protect More. Store Less.®
8
Protect More. Store Less.®
Using the right balance of high density tape and high performance disk will help . . . Disk is not always the best answer for data protection issues and requirements. IBM has a broad portfolio of data protection solutions giving us the freedom to solve customer issues with the most effective technology Other vendor’s, like EMC Data Domain, answer to any problem is “Use more disk” because disk is the only thing they have to sell! Long Term Retention Cost effective capacity Removable & transportable Compliance Meet financial & regulatory requirements Data encryption, WORM Short Term Retention Use disk for daily backup & restore operations Performance Fast backups Even faster restores Meet “backup windows” Protect More. Store Less.®
9
Compression and Deduplication use less physical storage
9/21 A good first step in a Storage Efficiency strategy is shrinking the data you have to store Compression and Deduplication are popular techniques Shrinking data is just as effective as increasing utilization – both are better than getting new disk for free, because you get more usable capacity without increasing Operating Expenses for power, cooling, and floor space. Store data more efficiently Lower Operating Expenses: Power, cooling, floor space Keep more data online for analytics and fast restores Protect More. Store Less.®
10
Protect More. Store Less.®
And data deduplication is the key to using more disk more cost effectively! Deduplication technologies have evolved considerably over the last few years and have delivered the promise of improving backup and recovery operations while consuming less storage and utilizing infrastructure, such as network bandwidth, more efficiently and improving SLAs. The benefits provided by deduplication deliver a very compelling ROI, reduce TCO and provide opportunities to save money and accomplish backup and recovery goals more efficiently. And unlike some other technologies, difficult economic times actually magnify the value propositions delivered by deduplication. Now is the time, when budgets and spending are tight, for deduplication, a technology that can actually save you money. Protect More. Store Less.®
11
Data Deduplication Overview
12
Deduplication Architectures
Storage Devices Server Client LAN SAN Block Storage Device Transparent to clients and servers Reduces load on server and client Adds load to storage device No file or format awareness Client side Reduce load on server Reduces bandwidth on LAN Adds load to client No cross correlation among multiple clients Server side Allows cross correlation of data among multiple clients Adds load to server Protect More. Store Less.®
13
Data Deduplication Process (simplified)
Assume a Data-Object or -Stream as Subject for deduplication Data Object / Stream Data Object is split in Chunks (fixed or variable size) For each Chunk an identity characteristic is determined Duplicate chunks are identified Identical Chunks are referenced with pointers, references. Non-identical chunks or single instances are effectively stored Compression may be performed in addition. A B C D A E F F D B A F A B C D E F Required Disk-Cache is reduced Identical Chunks Protect More. Store Less.®
14
Methods for Data Chunking
Data Object / Stream File based One chunk is one file, most appropriate for file systems E.g. TSM Incremental Backup forever helps eliminate redundant data Fixed block Data object is split into fixed blocks Used by block storage devices Format Aware Understands explicit data formats and chunk data object according to format Example: breaking a PowerPoint deck into separate slides Format agnostic Chunking is based on algorithm that looks for logical breaks or similar elements within a data object Chunking method influences deduplication ratio Protect More. Store Less.®
15
Method for Determining Duplicates
B C D A E F F D Hashing Computes a hash (MD-5, SHA-256) for each data chunk Compares hash with all hash of existing data Identical hash means most likely identical data Potential (small) Risk of Hash Collisions: identical hash and non identical data Must be prevented through secondary comparison (additional metadata, second hash method, binary comparison) Binary Comparison Compares all bits of similar chunks Delta Differencing Computes a “delta” between two “similar” chunks of data where one chunk is the baseline and the second is the delta Since each delta is unique there is no possibility of collision To reconstruct the original chunk the delta(s) have to be re-applied to the baseline chunk A B C D E F Protect More. Store Less.®
16
In-Line Deduplication
Data is deduplicated before it is actually stored Deduplication is performed as data flows into the secondary storage system Deduplication VTL Backup Secondary Storage Primary Storage Advantages Processes data once, eliminates additional post-processing tasks Disadvantages CPU intensive deduplication process can create performance bottleneck One process per I/O stream There are two main approaches to actually performing data deduplication. The first example here is inline In this architecture, we perform the data deduplication as the data is being stored to the secondary storage device. The intelligence to do the actual processing is in the data path. The advantage to this approach is the data is only touched once and no post processing is required to do the Data de duplication However, we have put this task into the mainline of the data path. In a backup scenario, this could impact the backup window. In addition, if compression is done, then this would impact the window even more. There is also the logical problem that we have to perform DDD on a single I/O stream at a time, effectively tying up a processor during this taks. Protect More. Store Less.®
17
Out-Band Deduplication (Post-Processing)
Data is first stored and deduplicated in the background Deduplication VTL Backup Secondary Storage Secondary Storage Primary Storage Advantages De-duplication CPU overhead no longer affects backup window Supports multiple I/O streams Potentially faster restore for first version (not deduplicated) Disadvantages Data is written, read and written – thus more I/O intensive Deduplication window must be coordinated with backup window as it take typically longer than in-line processing Requires larger secondary storage because first version is not deduplicated This second approach is the post-processing of the data to perform the data deduplication The advantage of this approach is that the ddd process is not in the data path, and so the backup window is not impacted, we can also have multppe streams doing the DDD The disadvantage is that we have to store the data in a working pool, pending the ddd processing. This buffer is an incremental cost. In addition, the total cycle time for migrating the data to the secondary storage is extended. As we have to have the time to do the post processing. Protect More. Store Less.®
18
3 × Deduplication in the IBM Portfolio
File LUN Tape TSM API ProtecTIER A-SIS TSM R6 N series Gateway TS7650G Protect More. Store Less.®
19
ProtecTIER Overview
20
Protect More. Store Less.® Protect More. Store Less.®
ProtecTIER reduces the required backup disk capacity by up to 25 times! Protect More. Store Less.®
21
IBM ProtecTIER Deduplication Innovation and Leadership
2003 2004 2005 2006 2007 2008 2009 2010 2011 6 PhDs begin researching massively scalable deduplication algorithms First Deduplication Virtual Tape Library deployed into production First single node system to store over 1PB of deduplicated data Fastest single node inline deduplication solution First to deliver Many-to-Many replication The only “true” enterprise-class deduplication solution on the market today IBM acquires Diligent First Deduplication solution for System z Fastest restore speed – up to 2800 MB/sec! First non-hash deduplication algorithm developed, designed for 100% data integrity First to deliver VTL solutions for both Open and Mainframe environments First true clustered system with Global Deduplication IBM’s first midrange solution released Installed in all major industries Over 1,400 ProtecTIER systems sold to date Production systems range in size from 5TB to over 700TB Over 90 PB of physical disk capacity behind ProtecTIER servers in production protecting thousands of PBs of backup data Protect More. Store Less.®
22
IBM’s Virtual Tape De-duplication SW Products
ProtecTIER ProtecTIER VT is a scalable and robust virtual tape solution that emulates tape libraries, enabling existing backup applications to send data to the ProtecTIER disk-based platform, rather than directly to tape. HyperFactor HyperFactor is a revolutionary de-duplication solution which eliminates redundant data, enabling customers to increase their effective capacity by up to 25 times. ProtecTIER is powered by HyperFactor and can radically reduce both physical disk capacity and total storage costs. Protect More. Store Less.®
23
How ProtecTIER works Backup with Inline deduplication
New Data Stream Repository HyperFactor™ Memory Resident Index The major difference between ProtecTIER and other standard VTLs is ProtecTIER’s unique patent pending factoring algorithm called HyperFactor. HyperFactor is the data de-duplication technology developed by Diligent Technologies that allows you to store a lot more backup data onto a smaller amount of disk. Here’s how HyperFactor works. As we build the slide, you’ll see that there are unique blocks of data in the repository. HyperFactor keeps track of this data with a memory resident index, like a table of contents, that can map the contents of a 1PB repository in only 4GB of memory. That 250,000:1 ratio between the repository and the index is a significant differentiator and has orders of magnitude greater granularity than anything in the market place. And as we build the slide, you’ll see a stream of data coming from one of the backup servers. This stream contains some data that already exists (as represented by the multi colored icons) and some data that’s new (as represented by the tan icons). HyperFactor is an inline data de-duplicator. As the data stream passes through the HyperFactor data de-duplication engine, HyperFactor will be looking for data that is “similar” to data it has stored before. PAUSE I use the word “similar” because it’s not identical, and that’s because part of the algorithm’s power is that it uses similarities instead of identicals to achieve unmatched performance. The most similar pattern in the repository is found with no I/O operations and then that data into brought to the server to do a computational compare and then store the delta. This is performed without impacting the search time, regardless of the repository size. Because there is no I/O required, we’re actually performing a memory search on an index, the search time difference will not be noticeable whether it’s 10TB or a petabyte. The location and similarity of the data isn’t affected by naming conventions, shifts or offsets in position, because we are looking at the byte level of the data. Customers often ask “What happens if the index disappears?” Remember the index is used to locate similarity in the repository, and in fact it’s not used in the restore process at all. If the backup applications data stream needed to be restored, this data that exists in the repository is self describing which means that a restore can be done without the index since the data itself tells me what is required to restore the stream. As we said, the index is important in finding similarity, not only is it in the server memory, but it’s also duplicated in two places on RAID protected disk and synchronized. ProtecTIER™ Server Backup with Inline deduplication Up to 1400MB/sec per server or 2000MB/sec with 2 node cluster! Only 4GB needed to map 1PB of physical disk! Backup Servers “Filtered” data Protect More. Store Less.®
24
Protect More. Store Less.®
ProtecTIER Deduplication Operation and Results Example Backup application writes data to ProtecTIER as it would to tape Only unique data is stored, existing duplicate data is referenced When data objects expire, references are removed and free space is reclaimed and reused Backup Amount Amount Dedupe Event Received Stored Ratio First Full Backup 1 TB 250 GB 4:1 Incremental Backup 100 GB 10 GB 4.2:1 Incremental Backup 100 GB 10 GB 4.4:1 1 2 3 4 5 Backups, especially full backups, are notoriously inefficient processes that repetitively send large amounts of data, mostly redundant, over and over again. Deduplication can eliminate redundant data and dramatically reduce the amount of storage needed for backups An important point to note about this slide is that the effect of deduplication is not instant but grows over time. The more data that is stored and the longer it is retained, the greater the deduplication ratio (the difference between the received over the amount actually stored) becomes and the more capacity is saved. Second Full Backup 1 TB 10 GB 7.8:1 Incremental Backup 100 GB 10 GB 8:1 Third Full Backup 1 TB 10 GB 11:1 After two months TB 350 GB 22:1 A B C D E F G H I J Protect More. Store Less.®
25
Storage Impact from ProtecTIER Deduplication
Represented capacity Master Server Backup Server ProtecTIER Server Physical capacity Store up to 25 times backup data on given physical storage capacity Protect More. Store Less.®
26
Protect More. Store Less.®
Significantly Reduces Replication Bandwidth Backup Server Represented capacity Primary Site ProtecTIER Gateway Physical capacity Deduplication enables a large amounts of data to be replicated with significantly less bandwidth Backup Server IP-based WAN link By dramatically reducing the amount of storage needed to hold backup data, a number of powerful data protection strategies can then be leveraged. For example, replication can be used to automatically and electronically move the deduplicated data to a secondary site for disaster recovery purposes, eliminating the need to physically transport tapes. Secondary Site Virtual cartridges can be cloned to tape at DR site ProtecTIER Gateway Physical capacity Backup Server Tape library Protect More. Store Less.®
27
ProtecTIER Many-to-One Replication Overview
Up to 12 Branch Offices (spokes): Gateways and/or Appliances 1 target (hub): Appliance, Gateway, single or two-node cluster IP based NR links This slides shows the power of deduplication to protect data stored at a large number of smaller remote site and replicate that data back to a central location for additional protection and Disaster Recovery purposes. The amount of bandwidth needed is very small because only new unique data needs to be transmitted over the line since existing data is already stored at the hub. Backup Server Virtual cartridges can be cloned to tape by the Main-Site B/U server ProtecTIER Gateway Physical capacity Central / DR Site Tape library Protect More. Store Less.®
28
Protect More. Store Less.®
ProtecTIER Many-to-Many Native Replication Grid Site A Up to 4 hubs in a grid Site B Site C Site D Backup Server ProtecTIER Gateway Physical capacity Supports any combination of Gateways, Appliances, single or two-node clusters Protect More. Store Less.®
29
Protect More. Store Less.®
ProtecTIER Support for Symantec OpenStorage (OST) OST API separates the backup logic from the storage appliance logic and implementation NetBackup Policy and Control NetBackup Server OpenStorage API ProtecTIER OST Plugin IBM ProtecTIER: Backup storage appliance with Deduplication and Native Replication ProtecTIER Server Protect More. Store Less.®
30
IBM ProtecTIER® Deduplication Family
Scalable Capacity and Performance TS7650G & TS7680 ProtecTIER Gateways TS7650 ProtecTIER Appliances Highest Performance Largest Capacity High Availability TS7610 ProtecTIER Appliance Express Better Performance Larger Capacity Scalable The IBM ProtecTIER product family ranges from the midrange TS7610 ProtecTIER Appliance Express system to the enterprise-class TS7650 ProtecTIER Cluster. All of these solutions run the same unique and patented ProtecTIER deduplication software, and all of the features and differentiation discussed in these slides are available to all ProtecTIER solutions. This is different than a lot of our competitors that only offer certain features and capabilities for specific backup applications and whose performance claims are tied to specific (often unrealistic) configurations as well. Good Performance Entry Level Easy to Install Backup: Up to 2000 MB/sec Restore: Up to 2800 MB/sec Up to 1 PB Useable Capacity Up to 500 MB/sec 7 TB to 36 TB Useable Capacity Up to 100 MB/sec 4 TB and 5.4 TB Useable Capacity Protect More. Store Less.®
31
ProtecTIER Differentiation
32
ProtecTIER Advantage: Data Integrity
Unique and patented HyperFactor® deduplication technology The only production proven deduplication solution not based on a hash algorithm Designed for 100% data integrity Bit for bit comparison of data to ensure data is a duplicate Can NEVER lose data due to a hash collision A major differentiator for ProtecTIER versus other hash-based deduplication systems is IBM’s unique and patented HyperFactor deduplication algorithm. HyperFactor was designed to provide 100% data integrity by doing a bit for bit comparison of data before declaring it a duplicate and not relying on a hash algorithm. HyperFactor can never lose data due to a hash collision unlike most other products on the market. Vendors of hash-based deduplication products will claim the odds of losing data due to a hash collision is the same odds as winning the lottery. That analogy is true as long as you admit that with every backup job you get thousands and thousands of lottery tickets. IT organizations have hit “the data loss lottery” in the past and will hit it again in the future. A hash collision will not only result in the loss of some data, it could cause corruption that results in the loss of all your backup data. Are you willing to take that risk? Some vendors claim to have “data Invulnerability” mechanisms to avoid hash collisions. However, performing these optional extra checks significantly slow down system performance and are usually disabled by the vendor and/or the customer to maximize speed. ProtecTIER delivers both high performance and data integrity. You don’t have to choose one or the other. Although the chance of losing data from a hash collision is low, it is NOT ZERO as it is with a ProtecTIER solution Protect More. Store Less.®
33
ProtecTIER Advantage: Restore Performance
Restoring data from a ProtecTIER solution is even FASTER than backing up ProtecTIER can easily restore at 2800MB/sec! High restore performance not limited to certain backup applications or specific data sets like other vendors High restore performance achieved on real data with realistic 20% change rate in production environments Never requires agents on backup servers The performance stated by IBM for its ProtecTIER solutions is always realistic numbers that are achievable in real production environments. This is quite unlike our competitors who claim exaggerated performance numbers that can not be achieved in real production environments. Most even acknowledge this by hiding in the fine print a disclaimer like “these are maximum benchmark speeds that should not be used for configuration purposes” Other vendor’s “CPU-centric” architectures are optimized for processing hashes not moving data Protect More. Store Less.®
34
ProtecTIER Advantage: Scalability
A single ProtecTIER system can support up to 1 Petabyte of useable capacity ProtecTIER supports the use of any IBM storage system (DS8000, DS5000, XIV, etc.) and most third party storage systems for the repository IBM has hundreds of ProtecTIER systems with over 100TBs of useable capacity in production environments throughout the world IBM always states “Useable Capacity” and never uses the deceptive “RAW capacity” terms like other vendors The capacity stated by IBM for its ProtecTIER solutions is always “Useable Capacity”. This is the real capacity that can be used by the system to store data. For example, if you have 10TB or useable capacity and achieve a deduplication ration of 20:1, you can store 200TB of backup data. Most of our competitors use “RAW capacity” to make their systems seem bigger than they really are. RAW capacity is all of the disk drives summed up within a system in its maximum configuration. It does not take into consideration the effects of RAID, spares, and capacity needed for the application, metadata and other requirements that take away from the actual useable capacity of the system Some vendors use RAW capacity to deceive you and they should not be trusted. In addition, these vendors often make big claims about “Logical capacity” which is taking the usable capacity and multiplying it by a deduplication ratio 50 or more. While achieving a dedupe ratio of 50 is possible, it is not common. Vendors that use these cheap tricks to deceive you should not be trusted! The hidden costs associated with managing, maintaining, powering and cooling multiple appliances is significant and should not be ignored! Protect More. Store Less.®
35
ProtecTIER Advantage: Global Deduplication
ProtecTIER Cluster with true Global Deduplication has been Generally Available and in production since 2008 Supported with all major backup applications and available for all Open Systems, System z and System I platforms No agents or backup server upgrades required Other vendor’s Global Deduplication capabilities are immature and incomplete with very few if any systems in production Other vendor’s Global Dedupe restricted to certain models, only with NetBackup OST and require agents to be installed Many vendors claim to have Global Deduplication but create multiple separate repositories that may contain redundant data! Protect More. Store Less.®
36
ProtecTIER Advantage: Inline Deduplication
Example: Disk activity needed to ingest and deduplicate 10 TBs of backup data Post Process Approach: Deduplicate after Storing Requires: > storage > I/Os > Time > Effort > Admin Hash-based Post Process 10 TB Data Write 10 TB 2x Read 10 TB For every 10 Terabytes of data (for example) sent by the backup application server, a DeltaStor server must write 10 Terabytes of data to disk, read 10 Terabytes of data form disk, and then read another 10 Terabytes of data from disk. It must also read and write from its index database and write some amount of pointers. All this reading and writing will significantly hammer the SATA drives. ProtecTIER, on the other hand, will only read or write 10TBs of data for every 10 Terabytes of data sent by the backup application server. This is at least one third less disk activity on more reliable FC disks. ProtecTIER Inline Approach: Deduplicate before Storing Read or Write 10 TB Results: simple faster easier cheaper efficient 10 TB Data HyperFactor 1x Protect More. Store Less.®
37
Protect More. Store Less.®
ProtecTIER Advantage: Inline Deduplication Inline Processing Backup Server Truck ProtecTIER VT Tape Library SLA is Met Dedupe 8:00 PM 2:00 AM 8:00 AM 8:00 PM Post Processing Dedupe Overlap Truck Backup Server VTL Tape Library Dedupe 8:00 PM 2:00 AM 8:00 AM 8:00 PM Protect More. Store Less.®
38
Protect More. Store Less.®
With an IBM ProtecTIER Solution you can . . . Store up to 25 times more data on disk Up to 25:1 reduction with 100% data integrity Reduce backup and restore times Fast inline deduplication up to 2000 MB/sec Even faster restores up to 2800 MB/sec Improve the reliability of backup operations Eliminates mechanical & handling failures Drive the cost of disk based backup down Reduces energy, cooling, and space required Increase data retention Store more backup data on disk for a longer time with very little additional cost Protect More. Store Less.®
39
Protect More. Store Less.®
For More Information on IBM’s ProtecTIER IBM Customers The main ProtecTIER Web Page Protect More. Store Less.®
40
Trademarks and Disclaimers
8 IBM Corporation All rights reserved. References in this document to IBM products or services do not imply that IBM intends to make them available in every country. Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web at Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. Information is provided "AS IS" without warranty of any kind. The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here. Photographs shown may be engineering prototypes. Changes may be incorporated in production models. Protect More. Store Less.®
41
Protect More. Store Less.®
Ďakujem za pozornosť Protect More. Store Less.®
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.