Month: December 2020

IBM FlashSystem Data Reduction Pools: Hardware-Assisted vs. Software Based vs. FCM

In my previous article, “Understanding IBM External Storage Data Reduction Technology,” we looked at the options available for shrinking your data on disk.

We talked about the three main functions available in FlashSystem storage, which include:

  • Thin provisioning – allows you to over-provision storage for each LPAR.
  • Compression – data is compressed and decompressed as it is written and read to/from disk, which saves the system’s capacity.
  • Deduplication – Removes but tracks duplicate information sitting on disk to reduce size on physical storage.

December 2020 Newsletter

This has been a year like no other, and we hope this finds you and your family safe from the virus that has uprooted our daily lives. As 2020 comes to a close, we wish to thank you for allowing iTech Solutions to be part of your team. We hope that our IBM i newsletters, Blogs, Webinars, Sips & Tricks, iTip Videos, Two-Day iAdmin Conference, iBasics seminars, Slack Channel, and Podcasts have been educational and informative for you and that you have learned from them. We encourage your feedback on what other things we can add to make them more helpful to our customers, and others who read them. Look for even more to come this year in 2021.

We have continued our growth this year adding additional employees to improve our services as well as the breadth of our IBM i offerings. We hope that you have a happy holiday season, with good health, happiness, and prosperity in the New Year.  All of us at iTech thank you for your business, and for the confidence you have placed with us over the years.  We look forward to working together in the coming year, and we will continue to strive to exceed your expectations. Whenever we don’t, please reach out directly to me.…

4 Disaster Recovery Services That Can Improve your IBM i Recoverability

Being prepared is the first step in any Disaster Recovery (DR) plan. That means you need to make a plan and test it. Only then are you truly prepared for a disaster. You need to practice your DR plan if you want to ensure that it is successful when you really need it.

When I was a kid, my uncle came over and made sure that we knew what to do if there was a fire in our house. He taught us to touch the doorknobs to see if it was warm and had us practice climbing out the window and going to the designated meeting place. We practiced our fire drill to be sure we were prepared.…

Why Organizations Should Consider Encryption to Protect Their Data

IBM i has multiple layers of defense, starting with the hardware itself and going up to the operating system. The platform does have some vulnerabilities that if left configured improperly, can result in hackers or even insiders to your company gaining access to data that they should not have access to. It is extremely important to implement the most appropriate security level around passwords, encrypted sessions, and so on.

There is another important layer of security that needs to be considered – Encryption for protecting data, let’s look at the various ways encryption can be implemented on IBM i.