Market Roundup |
|
From zIIPs to zAPPs,
The System z9 Integrated Information Processor (zIIP) will
be a specialty engine that will run portions of eligible database workloads to
help free up general computing capacity on the mainframe. The mainframe
operating system, z/OS, will direct the work between the general processor and
the zIIP, which is designed to have all or a portion of an application’s
workload dispatched to the zIIP based upon the application’s interaction with
z/OS. The zIIP is latest in a series of mainframe specialty engines including
the IFL for Linux and the zAAP.
Acronyms – the world can’t seem to get enough of them, so Big Blue is always happy to oblige. While zIIP may seem be easy to say, slightly harder to spell, and probably next to impossible to remember what it stands for, what makes up this acronym is interesting indeed, with potentially notably impact for certain classes of mainframe customers. The specialty processors for the z are more than just additional hardware to bolt on to the venerable system, but represent a change in the cost of computing on the mainframe, and as such may act as a magnet to encourage the relocation of certain workloads onto the z platform. By not enforcing a software charge for the use of the zIIP, zAAP, or IFL, workloads brought to the mainframe need not incur license charge increases, and may in fact result in a net decrease as the general workload charge can reduce commensurate with the amount workload shifted to the specialty engines.
OK, so what does this really mean? It is actually pretty
simple, setting aside all of the technical brilliance and implementation. For a
customer with a sizable amount of BI,
Virtualization has been touted as the IT complexity panacea for the last few years, and in theory it could well be. Technical complexity is caused when there are multiple systems with multiple variables making it difficult for managers to control. If a company has tens of servers with several applications and the accompanying storage, then the ability to manage all those devices automatically—which is what virtualization does in essence—would greatly reduce IT complexity, not to mention improve IT effectiveness. This has been the argument that has driven adoption of virtualization technology so far. The problem with this is that as virtualization adoption has spread, it has not addressed the attendant business problems. With virtualization, IT managers can create one large infrastructure, but who pays for it? Who is using these resources, and how much? Are the parts of the business that pay for the infrastructure or service the ones who receive the benefit? And are the services offered priced appropriately? The decision to implement new services is far easier to make if the business metrics are available to answer these types of questions, regardless of the vintage and provenance of the technology deployed. With CIMS Labs, IT managers and business people are able to start putting the framework in place to collect the data needed to make these decisions. Simplification is an ongoing issue for complex IT departments, and business issues must be solved in tandem with technical ones to provide truly effective solutions.
Stop Badware Coalition… Third Coalition’s the Charm?
There is a new game in town: the Stop Badware Coalition. Top names in the Coalition include Google, Lenovo, Sun Microsystems, Consumer Reports’ WebWatch project, the Berkman Center for Internet & Society at Harvard Law School, and the Oxford Internet Institute in England. The coalition claims to be a complement to other existing anti-malware coalitions by publishing the names of companies that spread what they have termed “badware” and showing how those companies have made money off of their victims rather than focusing on tracking down the suspects. Stopbadware.org is envisioned as a clearinghouse of stories from Internet users detailing their experiences dealing with badware, plus a resource to check whether proposed downloads contain any known malicious software such as spyware and adware.
We think anything that could potentially drive people away from the Internet, such as malware, should be at least severely curtailed if not eliminated altogether. Previously, we wrote about the virtues of the Anti-Spyware Coalition and still believe that people who are profiting from the Internet should be the very ones to keep the environment as safe and hassle-free as possible. However, it does cause us to ponder why, in the era of great open-source collaboration, Internet should require two discrete anti malware/badware coalitions? With so much at risk, why aren’t these two coalitions seeking to work as one?
One city does not have two different police agencies, both claiming to be the only one to fight the same crime in the best possible manner: that picture is just silly. We have all seen how different agencies very seldom work well together, as the recent debacle of Hurricane Katrina has highlighted. Despite the best of intentions, interagency rivalries do develop and people get caught up in the Us v. Them game, forgetting that “Them” are supposed to be the criminals rather than other competitive good guys. It does not escape our attention that this could again be an example of a Sun-supported vs. Microsoft-supported initiative squabble. But malware is more than a fight over the “better” operating system or platform; it is a threat to the usability of the Internet itself. To us, the threat of malware is simply a much more important issue than traditional corporate rivalries and demands that all work together for the common good. The best way to stop rivalries is to prevent them in the first place: keep people on the same side to remind them that they do have a common enemy and a common goal. With a united front, the general populace of Internet users can be more effectively deputized in this fight as well. So while we applaud any and all efforts to rid the world of malware, we hope that the players in this space will have enough customer-focused fortitude to rise above rivalry and work together to help stamp out malware in our lifetimes.