Useful z15 Learning Tools
Here are five resources that are helpful in exploring the z15 from different business, technical and industry perspectives.
What’s Available?There are a lot of information resources available on the z15. Some are high level, supporting the main ideas behind the product for executives and planners whereas others are very detailed to meet the specific needs of system programmers, security specialists, and other IT professionals.
An example of a need or question is “what are the supported hypervisors in z15?” The hypervisors available include z/VM 7.1, z/VM 6.4 and KVM hypervisor for IBM Z, which is offered with Linux distributions from Canonical, Red Hat and SUSE.
Additional information from the IT press and from IBM partners can help the reader round out their view of the product. So what are some of the handiest resources to get the details that you need for your job?
Some Useful z15 Learning ToolsHere are five resources that are helpful in exploring the z15 from different business, technical and industry perspectives.
IBM Z Interactive Demo
This brief web-based dialogue is useful for executives who want to get the “big picture” of z15 with a focus on Z security, resiliency and hybrid multicloud. You might remember these business-value statements from my first post [[LINK: https://ibmsystemsmag.com/IBM-Z/09/2019/ibm-z15-what-it-protects-and-how ]] on z15. The Z Interactive Demo is structured to give you the option to dive deeper and exit the dialogue and jump into one of the three topics more deeply.
“IBM z15 – Designed for Security and Resiliency in a Hybrid Multicloud”
This two-page summary of technical specifications contains information on 13 in-depth sections: processor core types, channels, inter-LPAR communications, IBM zHyperLink, coupling links, cryptography, compression acceleration, RDMA over converged ethernet, processor memory, IBM virtual flash memory, upgradeability, OSes and supported hypervisors. For planners and general technical people, this is a very helpful summary document. You might see an item that you want more information about, which is understandable as these technical specifications lack any explaining narrative.
IBM z15 Technical Guide
This 513-page book explains how the z15 uses new innovations and traditional IBM Z strengths to satisfy growing demands for cloud, analytics and open-source technologies. The book does a really great job discussing items like central processor complex hardware components, for example, frames and configurations, single chip modules and memory. It also has the necessary focus on cryptographic features and OS support, including hypervisors. By the way, if you choose to print the PDF book, it includes spines of various sizes you can print to “package” your printed version. The size of the spine you choose (0.1 to 1.5 inches) depends on how many pages you choose to use to print the book.
Between the Lines
In “IBM Launches z15 Mainframe, Aims to Automate Compliance via Data Privacy Passports,” Larry Dignan writes about the z15 for ZDNet’s Between the Lines blog, which is at the “intersection of business and technology.” This blog is useful in a number of ways. Dignan writes about how IBM utilized design thinking, which revolves around encouraging client input, to help design the z14 and z15. IBM has always worked with clients, but design thinking is more intense and likely more impactful. He noted that the design of the z15 included collaboration with more than 100 companies and more than 3,000 patents issued or in process.
Brooke DiPalma of Yahoo Finance writes about z15 making use of her interview with Tom Rosamilia, IBM Systems senior vice president and IBM North America chairman. In “New IBM Mainframe can Process 1 Trillion Web Transactions a Day,” Rosamilia shares that the three big ideas that came out of working closely with clients on z15 were instant recovery, cloud-native application development and data privacy.
Rosamilia also spoke decidedly on z15 mainframe’s security features, characterizing them as unprecedented encryption, unprecedented security and privacy. He is quoted as saying, “The best thing you can do is encrypt 100% of your data, and if you encrypt 100% then when they get in, they can’t make any sense of it.” I never heard a more compelling argument for encryption. This feature of z15 is just what the industry needs as data breaches continue to hit the online world.
Next WeekNext week, I’ll finish the series on z15 with an exploration of several more z15 resources.
Sponsored ContentAchieve Compliance Without Impacting Productivity
Post a Comment
Note: Comments are moderated and will not appear until approvedcomments powered by Disqus