Escolar Documentos
Profissional Documentos
Cultura Documentos
z Systems
by Barry Schoenborn
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Publishers Acknowledgments
Some of the people who helped bring this book to market include the following:
Project Editor: Carrie A. Burchfield
Editorial Manager: Rev Mengle
Acquisitions Editor: Steve Hayes
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
About This Book......................................................................... 2
Foolish Assumptions.................................................................. 3
Icons Used in This Book............................................................. 3
Beyond the Book......................................................................... 4
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
iv
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
vi
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
Foolish Assumptions
I assume youve heard about the power of mainframe computers (as we have all grown up with them). Its also possible that
you are full up on hearing about smaller (but more complex
and less efficient) alternatives to mainframes.
The modern mainframe is very much with us today, as you
will see in various lists and comparisons throughout this
book. I assume you want to consider the power and speed
that these boxes unleash for some of the most innovative
business customers in the world. If so, then this book is where
you want to be. In a few pages, organized into a small number
of short chapters, you get the big picture of Big Blues important z Systems family.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter1
Embracing the
CognitiveEra
In This Chapter
Naming a new era and defining it
Looking at the new era in business and its details
Placing z Systems in the picture
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Cognitive business
Welcome to the Cognitive Era, where the power of data progresses. Industry convergence spawns new forms of competition. Also, new digital invaders with novel business models
are entering the arena, and the most disruptive entrants are
reshaping entire economies, seemingly overnight. This is both
exciting and challenging!
To compete and outcompete in this new battleground
fighting both traditional competitors and new market entrants
you must rethink and distinguish every interaction with every
client at every opportunity.
Every business is facing these pressures. This is a new mobile
centric, everythingconnected economy, and its driving a
dramatic shift in power from your business. Yes, the power
has moved from you to your clients, who expect and demand
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10
Table 1-1
Event
Thanksgiving
14.3 percent
25.4 percent
Black Friday
9.5 percent
28.2 percent
Cyber Monday
8.5 percent
27.6 percent
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
11
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
13
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
16
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
17
Expensive
First the mainframe was seen as too expensive. Originally,
they were costly (and they proved their worth), but thats not
exactly true anymore. IBM has invested in new technologies
that bring down the cost of the mainframe and has introduced
new pricing and packaging (a flexible acquisition approach)
that deliver lower cost.
But this is only part of the story. The economics of the IT
industry have changed dramatically. Thirty years ago, hardware was the big budget item, and hardware acquisition costs
were a major drain on IT budgets. Today its the cost of people
to run the system, manage it, or deliver new services. Its now
labor and software development that dominate IT costs.
These are areas where savings can be generated with the
right technologies.
Total Cost of Acquisition (TCA) is important, but whats more
important is Total Cost of Operation (TCO). Thats where you
can find big savings. Solitaire Interglobal released a report
that said mainframes run 68 percent of the worlds production
workloads at only 6 percent of total IT costs. Hows that for
value?
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18
Proprietary
Its true that (way back then) the mainframe was a proprietary, closed environment. But IBM has since invested in
adopting many open and industry standards. It now supports all the latest compilers and languages, runs common
middleware, and for the last 15 years has been running Linux.
(Today, more than a quarter of installed mainframe capacity
is running Linux.)
Thirty years ago the majority of mainframe applications were
home grown (or more delicately, developed inhouse).
Today, mainframes support over 8,000 applications. That may
not seem a lot when hundreds of new apps are created every
day, but these 8,000 include all of the leading business applications that form the foundation of industry activity.
In the past, the mainframe required a specialized skill
set thatwas in short supply. Today, IBM has invested in
standardization in common technologies and easeofuse
technologies to dramatically reduce the need for specialized skills. At the same time, IBM works with academia to get
the mainframe on the syllabi. Today more than 1,000 colleges
feature mainframerelated courses to train new generations
ofcomputer professionals.
Oldfashioned
Mainframes were sometimes thought to be oldfashioned,
although thats a perception, not reality. They were thought
to be legacy systems, a remnant of an earlier era of computing. Interesting if true, but not true these days.
Todays generation of z Systems is designed for digital
business. Consider what they can do:
Transact at the scale and speed of mobile, being capable
of up to 30,000 transactions per second or 2.8 billion
transactions per day. Thats with fast response time
36percent faster than x86 and 45 times more consistent.
Bring righttime analytics to every transaction. IBM z
Systems can handle millions of transactions per second
while analyzing data on the fly. The integrated of transaction and analytics capability within z Systems delivers
insights up to 17 times faster than the competition.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
19
Mainframe Positives
Of course the mainframe didnt gain a resurgence in popularity purely by addressing negative perceptions. It came back
by extending its strengths, delivering new capabilities, and
providing unique abilities that drove its greater adoption.
You learn about z Systems technology in more detail throughout this book. But be assured that its the mainframes
strengths (security, availability, scalability, manageability,
and multiworkload virtualization) that are the foundation of
their differentiation in the market.
Mainframe capabilities have never been more in demand than
they are now. Why? Because market requirements shift, and
theyve shifted toward demanding the capabilities that mainframes provide. Installed mainframe capacity has in recent
times been doubling about every six years. Not a bad result
from a platform that was declared dead 30 years ago!
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
21
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24
z Systems rationale
There are simple reasons z Systems is an efficient vehicle for
implementing either a hybrid or a private cloud.
Whether youre using an offpremises public cloud, an
onpremises private cloud, or a combination (a hybrid), z
Systems provides good protection, low security risk, high
availability, and superior performance for the best possible
cloud solution. You should have no worries when you need
to connect your Systems of Engagement to your Systems of
Record and make them part of your cloud workload.
Implement a hybrid cloud on IBM z Systems for rapid development and deployment of next generation cloud workloads. Implement a private cloud on IBM z Systems for faster
response time. You also get near100 percent uptime (99.99
percent is the goal) and the best security developed by IBM.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
25
z Systems advantages
z Systems has specific advantages, and theyre discussed in
this section.
Performance
With z Systems, you can consolidate up to 8,000 virtual servers on one system. Thats significant, and that setups likely to
boost performance. As a bonus, it will probably reduce cost
and enhance efficiency.
z Systems can host more virtual machines in a single footprint
than any other platform. The resources are shared among
workloads, so you get the highest possible utilization.
Further, because z Systems has dedicated processors for I/O
operations, workloads with high I/O demand, such as transaction processing, can run more efficiently.
Cost savings
A z Systemsbased cloud competes well with other platforms.
A recent IBM study found that the threeyear total cost of
ownership (TCO) for a z Systems cloud can be 75 percent less
than a thirdparty providers public cloud and as much as 49
percent less than an x86based private cloud.
With z Systems, you can consolidate and virtualize a variety of
workloads on a smaller footprint, which results in lower overall software costs when compared to other solutions.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26
Flexibility
A z Systems cloud is flexible. Management tools let you adjust
resources automatically in real time. Also, the open platform
supports multiple independent software vendors.
Reliability
z Systems operates by design with the highest levels of reliability and availability. Each component is built to be resilient, with support for nondisruptive configuration changes
and dynamic replacement (hot swap) capabilities.
Many organizations using IBM machines report years of going
without any unplanned downtime. The system tends toward
nearzero downtime, and builtin redundancy tends to prevent
data loss.
Security
IBM systems have some of the highest marks in the industry for security. For example IBM has earned Evaluation
Assurance Level 4+ (EAL4+) certification for its systems.
You should expect a z Systems implementation to excel in
providing secure workload isolation, data protection, and
privacy. Theres also extensive security and audit reporting to
meet industry standards and regulations. The z Systems has
onthefly fast encryption to further ensure security.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
27
Analytics
You came for the transaction processing, but stay for the analytics. z Systems can gather massive quantities of information
economically. The box is fast, too.
Reviewing Clouds
Cloud computing might well be called ondemand computing,
shared computing, Internetbased computing, or highaccess
computing. Each of the terms suggests what it is, but no one
term defines it precisely. This is understandable, as the composition of a cloud system can be highly diverse. However,
the computing is still done at a data center; its the access that
is relatively new and different.
As you likely know, cloud computing has dramatic advantages
for a business, and its useful to exploit them. It also entails
new concerns, and its essential to address them.
No matter what kind of cloud, its an ondemand approach
to computing. It has no quarrel with distance or time, and it
provides the different capabilities businesses require. Also,
a cloud doesnt (usually) care what sort of device is used to
access it.
There are obvious qualifications about devices, of course. For
example, a shipping companys private cloud will be interested only in package delivered transactions coming from a
handheld device in the delivery persons hand. A utility company is interested only in gas or electric consumption data
going from its smart meters to its processors.
Ignoring such specialized devices and transactions, many
enterprise clouds welcome interaction (inquiries and purchases) from PCs, laptops/notebooks, mobile phones, and
tablets. And, as a bonus, the enterprise has essentially no
application maintenance requirement on the client side.
Typically, users download, install, and update the apps they
need.
Clouds fall into three types: private, public, and a combination
known as hybrid. An IBM client will use one or more of these
types, with hybrid and private clouds being predominant.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
28
Public cloud
The most common cloud type is the public cloud. In general
terms, if the public can see and use data, the cloud is a public
cloud. Shared infrastructure is a defining component.
The nature of the cloud isnt always apparent. For example,
Amazons online presence is daunting, so it appears much like
a public cloud, but the data is processed at Amazon data centers. By contrast, Amazon Web Services is a public cloud offering, one that allows AWS developers to deploy a public cloud.
Of course, there are security considerations for data transmitted via public cloud, but its fair to say that security isnt
likely to be as intense as transactions done over a private
cloud.
The Internet of Things (IoT) implies the existence of a cloud,
most likely (but not always) a public cloud. Communications
from a device to a company are unlikely to be sensitive. In the
future, if your refrigerator senses that youre running low on
milk, the cloud will post a notice to your personal Messages
section on the manufacturers website part of a public
cloud. It will probably send a text message to your phone.
While your milk level is important to you personally, its not a
matter of national security.
Private cloud
A private cloud provides user access over a secure network. It
usually operates for (and is operated by) a single enterprise.
Two variations come to mind. First, a mortgage service
company provides webbased, interactive services for small
banks and credit unions. They are customers, but only paying
customers are part of the cloud. A supply chain software company offers webbased, interactive services for its retail chain
clients. Again, they are clients, and the information is available only to clients. In both cases, the relationship is private,
limited, and highly secure.
Private clouds are usually specialized and require elaborate
security. They tend to be capitalintensive. Having said that,
sometimes theyre very good investments.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
29
Hybrid cloud
A hybrid cloud is a combination of two types of cloud
public and private. Its an integration of one cloud service
with another. The combinations can be highly variable.
To generalize, one possible approach might be to keep sensitive information on an app in a private cloud, but to carefully
and selectively connect some of that information to an app
that services a public cloud.
For example, a bank puts a good deal of client information
out there for client consumption. Its reasonably secure, of
course. Just the same, there is other sensitive client information which that bank will keep internal and private.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
30
SoR
An SoR is simply the latest term for what IT has always called
the files, the database, or simply the data. It amounts to that
vast array of data elements the enterprise uses to conduct
business.
SoR was never passive, but its largely considered retrospective instead of prospective, and viewed as rather dull. (Thats
a bit unfair, and data scientists on your staff should take issue
with the view. Theres plenty of interesting data in your SoR.)
The reason SoR now gets such a label is that the world has
changed and there are two other active, dynamic systems to
deal with: SoE and SoI.
SoE
An SoE anticipates the continued growth of interaction
between people. More broadly, it strives to address social
technologies, the integration of currently unconnected systems, disparate decentralized technologies, and so forth.
More permutations are possible than ever before.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
31
SoI
SoI is a broad way of describing digital business analytics.
Some folks (Brian Hopkins in a Forrester article, for example)
opine that only delivering insight at the point of action matters. He asks: Did your customer get the right information, in
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4
Capitalizing on Analytics
In This Chapter
Getting a perspective on analytics
Seeing the business need for analytics
Introducing the elements of analytics
Analyzing Analytics
Analytics isnt new. The need for intelligence in planning goes
back a long way, probably millennia. What has always hampered civilizations enterprises was insufficient data and slow
speed in acquiring it.
That was then; this is now. The Cognitive Era uses the most
modern computer tools to quickly produce the analytic
information desired with the likelihood that valuable
insights are possible.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
34
Intransaction analytics
With z Systems, you can have embedded analytics. The transaction engine can process transactions fast. This permits each
transaction to be analyzed in real time to detect fraud (for
example) before a customer is impacted. Further, the system
instantly gets a realtime view of the customers purchasing habits. This presents an opportunity to boost sales the
moment a transaction is complete.
Doing this is a challenge. For example, during the Christmas
2013 shopping season, Amazon sold 426 items per second and
each transaction yielded a wealth of data and triggered further
actions. Since that holiday season, the number of transactions,
especially mobile transactions, has increased, and the trend is
that transaction numbers will continue to do so. Of course that
means that money spent will also increase dramatically.
To illustrate this, in 2015, Amazon reported attracting ten million
new Prime customers in December, with more than three million
joining in the third week of December. Furthermore, Internet
Retailer reports that for 2015 Amazons average order value was
up 6.2 percent versus Christmas Day 2013. Prime members shopping via mobile more than doubled in the 2015 holiday season.
z Systems meets the challenge. Intransaction analytics requires
that data be analyzed in place and in realtime. Analyzing data in
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
35
Looking at Analytics
Executives say, If only I had known this [substitute your own
item] and if only I had known it sooner, I would have made a
smarter decision. Thats the problem analytics addresses. Its
the mechanism that lets you know more, and know sooner,
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36
Volume
The first attribute of is volume. Analytics tends to imply terabytes to petabytes of information. However, some smaller
industries and organizations are likely to deal with mere
gigabytes or terabytes of data. z Systems handles transaction
volumes of all sizes.
Even smaller organizations may still require intense and complex information processing. For example, a manufacturer
may have only a few retail outlets, but getting and acting on
reliable sales data still is important. The same manufacturer
may have a simple supply chain, again requiring acquisition of
reliable data.
Terabytes and petabytes, frankly, arent a big deal anymore.
At the low end, a 1 terabyte external disk drive fits in a shirt
pocket. A 4terabyte external drive has dimensions of only 5.5
x 1.9 x 6.7 inches. And these are devices for the home use.
Velocity
The second attribute is velocity the speed at which information arrives, is analyzed, and is delivered. The intransaction
analytics provided by z Systems is designed to acquire and
process data fast.
Complex technologies employed by z Systems allow analysis
right now. Its a world apart from traditional data warehousing.
Modern analytics relies on complex event processing (CEP),
rules engines, text analytics, inferencing, and machine learning.
Variety
The third attribute of variety. In the past, enterprises had only
to deal with a finite and manageable number of data sources
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
37
Value
The fourth attribute of is value, the key measure of which is
improved profits. If you invest $1.00 in something and derive
$2.00 from it, youll likely consider the investment to have
provided value. In addition to increasing revenues, analytics
can decrease expenses. Intransaction analytics provided by z
Systems can (for example) encourage upsells and reduce the
chance of fraud.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
38
39
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5
Expediting Enterprise
Mobility
In This Chapter
Looking at two mobile phenomena
Measuring the mobile mind shift
Making z Systems the vehicle for mobile
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
43
Defining Mobile as an
Organizational Phenomenon
Independent of commerce, it should be mentioned that some
organizations have adopted the social business model.
Internally, they use social media tools and social networking
standards to communicate and collaborate. The concept is
known as enterprise social networks (ESNs). For example,
Socialcast is a company that promotes this, and you can be
sure the app works on mobile devices.
Externally, companies engage more and more with customers via social media. Its not surprising for companies to have
Facebook pages and Twitter accounts.
Social implies mobile and mobile implies social. Theres a
growing abundance of company interactions with customers,
and in commerce perhaps the most obvious is the growth of
customer reviews, customer feedback, and customer product
forums.
To see how facile a company is in handling social media,
visit a few Twitter or Facebook pages run by your competition. There are some great ones and some notsogreat ones.
Youcan use them as a yardstick for measuring your future
success.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
44
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
45
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
46
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter6
Blockchain: Ensuring
FutureProof IT
In This Chapter
Defining blockchain in simple terms
Examining the business need for blockchain
Looking at possible applications for blockchain
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
48
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
49
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
50
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter7
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
52
Lauding Linux
Linus Torvalds introduced Linux on October 5, 1991. In an
August 26, 2013, article for Simpler Media Group, Inc., Barry
Levine said that Linux has now been released for more hardware platforms than any other OS in history. If you anticipate
that innovation in software development will only increase
(and is showing no sign of leveling off or decreasing), you can
safely anticipate many more Linux implementations in the
future.
Linux is everywhere. It dominates smartphones, because the
Android OS dominates the market and its built on the Linux
kernel. Linux is wildly popular on embedded systems (like
DVRs, game consoles, and routers) and its reach extends even
to mainframes and supercomputers. In fact, its practically
impossible to cite the number of implementations, because
by the time you read this several million more devices will be
added to the count.
One great story of our time (assumed to be the truth and not
an urban legend) is that Torvalds wrote of his OS development as being just a hobby. He said it wouldnt be big and
professional like the GNU version of Unix.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
53
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
54
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
55
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
56
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter8
(and beyond)
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
58
Speed
IBM delivers speed to ensure customer success. IBM has
always been committed to speedy solutions, and z Systems
processors are no exception.
z Systems is the first computer able to process billions of
transactions a day, with the result being 2.5 billion transactions a day. Thats the traffic of about 100 Cyber Mondays,
every day. And referencing Cyber Monday is apt, given the
growth of all online commerce and the very rapid growth of
transactions originating from mobile devices.
In a way, this processors performance isnt unexpected.
To quote IBM, in reference to one of the newest z Systems
models, The z13 system culminates a $1 billion [investment],
five years of development, exploits the innovation of more
than 500 new patents and represents a collaboration with
more than 60 clients.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
59
When you consider the many factors that will promote your
enterprises success, its likely that processor power, as indicated by speed, ranks high.
How fast is fast? z Systems features the worlds fastest microprocessor, two times faster than the most common server
processors, with 300 percent more memory and 100 percent
more bandwidth. One hundred percent? Yes! The z Systems
press release from January 13, 2015, put those figures out in
front of the professional community and the general public.
You can see it here: ibm.co/1PXLi62.
Its done through IBMs use of a new vector processing facility for faster mathematical computation, thus speeding up
analytic transactions. (Vector processing is a feature of
modern CPU designs and a term you may be familiar with. Its
based on SIMD Single instruction, multiple data.)
z Systems has been fast ever since the product was introduced in 2010. Speed is influenced by the number of central
processors, the speed of chips, cache, the use of solid state
disks (SSDs) for I/O improvement, and so on.
Mobile Friendly
Because z Systems is capable of handling up to 2.5 billion
transactions per day, that makes it a perfect match with the
burgeoning mobile economy. There are security features as
well (see the section Security).
The mobile economy isnt yet generating billions of transactions per day, but it will soon. Consider some of the predictions and reporting on Cyber Monday, 2015.
On November 30, 2015, IBM predicted that Cyber Monday
online sales would grow by more than 18 percent compared to 2014.
Thats a prediction about online sales increasing, but
what about mobile? Reports vary, but in 2014 another
source predicted that 30 percent of Cyber Monday transactions would come from mobile devices.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
60
Blockchain Efficiency
IBMs big systems (as exemplified by z Systems) have such a
strong pedigree of leadership and innovation that it should be
no surprise that the company has reinvented blockchain as an
essential way to deliver customer success.
IBMs implementation of the blockchain distributed database protects transactions from tampering and revision. Yet,
because of distribution and security, its also quite flexible for
participants to use.
Blockchain has enormous potential in financial sector applications, including accounts payable, accounts receivable, trade
finance, international payments/cash management, and letters
of credit. But theres more. Look for blockchain to provide
efficiency and security in the worlds of supply chain, Internet
of Things, rights management, and legal contracts.
IBMs blockchain will futureproof IT operations. This is
essential, because the future is likely to have a vast number
of decentralized applications and collaborations (with a vast
amount of pressure on IT operations to deliver). Ultimately,
the world will have both written and unwritten laws of
Cyberspace; conduct will be regulated by innovative systems
like blockchain. Bad stuff will be minimized or eliminated.
The secret is to develop technologies that anticipate the
impact, and thats what IBM has done with blockchain. For
more detail, flip back to Chapter6.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
61
Encryption
z Systems can encrypt all transactions in real time. Thats a
factor that will grow in importance as the volume of mobile
transactions grows.
To elaborate, as the number of mobile devices increases,
there will be many more mobile transactions (exponentially
more is no exaggeration). A mobile transaction triggers a cascade of events across computing systems. The events include
comparisons to past purchases, data encryption and decryption, banktobank reconciliations, and customer loyalty discounts. This cascade of events causes a starburst effect, where
a single transaction can trigger from 4 to 100 (!) additional
system interactions.
The starburst effect can create security vulnerabilities at each
interaction point. In fact, 71 percent of CIOs and IT managers
surveyed by IBM indicated that security is their most significant mobile enterprise challenge.
With data and transactions under constant threat from multiple points of attack, consumers want to know that their
mobile transactions are as secure as the financial data held by
banks. Therefore, realtime encryption is a must have, not a
nice to have.
On October 7, 2014, The Independent (UK) reported The
world is home to 7.2 billion gadgets, and theyre multiplying
five times faster than we are? A more restrained prediction
came from Gartner on January 7, 2014, with a prediction of
2,621,678,000 units shipped.
Security/Fraud Detection
The best way to discover fraud is to detect it as its happening. With that detection, a financial institution (or a retailer,
for that matter) can stop a fraudulent transaction before it
proceeds. To do this, you need realtime fraud detection on
100 percent of the business transactions.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
62
Hybrid Cloud
Cloud computing (the cloud) is a concept, and its sometimes convenient to tell endusers it simply means that
computing and storage is out there somewhere. But IBM z
Systems is a very real home for cloud computing. IBM delivers
for corporate customers by providing an efficient and relatively affordable cloud.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
63
z Systems is a good choice for private or hybrid cloud architecture. There are two key points:
Scale: z Systems can run up to 8,000 virtual servers, with
more than 50 virtual servers per core.
Cost: z Systems lowers the cost of running a cloud. IBM
research shows (and this is a direct quote), For compared
environments, it is estimated that a z Systems cloud will
have a 32 percent lower total cost of ownership over three
years than an x86 cloud and a 60 percent lower total cost
of ownership over three years than a public cloud.
Analytics
The Cognitive Era demands fast and effective analytics. IBM
knew this and designed analytics into the system. Why?
Because you need to increase business from your customers
in order to expand your enterprise and to differentiate yourself from your competition.
The best approach is to know how each individual has been
interacting with you in realtime, right down to the split
second. Generating instantaneous business insights requires
building in analysis transforming your systems of record
into systems of insight. Both operations and analytics are
critical to the mission.
By all means, continue to hire data scientists to discover new
and intriguing relationships in seemingly disparate data, but
in the here and now, rely on realtime analytics.
Solutions
Customers rely on IBM (and justifiably so) to have abundant
experience with a vast range of computing situations. The
solutions harmonize completely with z Systems computers.
A short list of functionalities includes
Analytics
Cloud computing
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
64
Pricing
A Chief Financial Officer (CFO) will, of course, be responsive to technology that handles business well and produces
economies. The idea is to maximum income streams. But the
bottom line also takes into account whether IT costs can be
managed.
The good news is that IBM pricing is good for clients. In absolute terms, z Systems may provide a lower total cost of ownership (TCO) than other platforms. In relative terms, it can
usually be demonstrated that costs are well offset by gains.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
65
Backward Compatibility
IBM large systems maintain backward compatibility to the
greatest extent possible. The reason is simple: Many customers have a substantial investment in their applications.
In theory, applications written as long ago as 1964 could run
on a current IBM system. In fact, absolute compatibility over
decades isnt possible. However, IBMs designers give customers plenty of advance warning if software changes are needed.
This concept is reinforced by text at the IBM Knowledge
Center. Please visit http://ibm.co/1T1T55S.
Legendary Support
IBM supports its z Systems customers during presale, during
implementation, and after the golive date. This total support
builds on a long IBM history of sensitivity to customer needs.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
66
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
ZSM03020-USEN-00