Feeds

IBM launches iSeries backup and high uptime options

Usage fees

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

IBM has launched two new types of iSeries, both cut down versions of their Enterprise counterparts, one for backup and another for high availability and both have the "capacity on demand" concept that drives so many IBM offerings these days. To avoid confusion they are called iSeries for Capacity BackUp and the iSeries for High Availability.

The machines were announced in some detail in July but slated for availability as you read this and pricing options are just released.

The iSeries for Capacity BackUp is an iSeries Model 825, 870, or 890 server configured so that it has the minimum possible number of processors switched on.

That would be 3, 5, 8, 16, or 24 depending on which machine you have. The idea is to store it offsite, and in the event of a natural disaster, switch on redundant processors that were asleep on the box and run live off that machine while you restore your production machine or buy a new one and set it up.

The BackUp iSeries doesn't have the full OS/400 Enterprise Edition but a specialized stripped down version and it cannot be used for anything other than backup, disaster recovery and restore. So it is cheaper than the usual hardware or software. The daily usage fees of the processors once they are switch on is based on the list price cost of the CPU divided by 45. So use them for one day, and it is one forty-fifth of the price, use them for 45 days and you might as well have bought it.

The iSeries for High Availability are much the same, in that there is a parallel for each machine model, but they are not truncated in the number of processors and are really about outages related to planned downtime or for failures caused by crashes or screw-ups. So these machines can be used for other production work in a cluster formation ready for failover. But they are still discounted against the full Enterprise Server versions by varying amounts around 30% plus, and as a result have fewer software options available and WebSphere Portal Server are not included in the price.

© Rethink Research

News IS is published weekly by Rethink Research and edited by Caroline Gabriel.

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.