首页 > 最新文献

IBM Journal of Research and Development最新文献

英文 中文
Active disturbance rejection control of a permanent magnet synchronous generator for wind turbine applications 风力发电用永磁同步发电机的自抗扰控制
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2021-06-30 DOI: 10.35429/jrd.2021.19.7.9.21
M. A. Aguilar-Orduña, H. Sira-Ramírez
With sight on maximizing the amount of energy that can be extracted, by a wind turbine, from the wind, this article solves the maximum power point tracking problem for a permanent magnet synchronous generator-based horizontal wind turbine connected to the electrical grid. A three-phase back-to-back converter, which allows a decoupling between the electrical grid and the generator, is employed as an interphase between the wind turbine and the utility grid. Based on the mathematical model in the synchronous reference frame and taking advantage of the differential flatness property the system exhibits, controllers based on the active disturbance rejection methodology are designed, in this work, to track the curve of maximum extracted power from the wind and manage the generated electricity into the grid. At the same time, the phase angle of the electricity generated is synchronized with the phase angle of the electrical grid. Numerical simulations are performed to support the controllers presented in this work.
着眼于最大限度地从风力涡轮机中提取能量,本文解决了连接到电网的基于永磁同步发电机的水平风力涡轮机的最大功率点跟踪问题。一个三相背靠背转换器,允许电网和发电机之间的解耦,被用作风力涡轮机和公用事业电网之间的界面。基于同步参照系下的数学模型,利用系统的微分平整度特性,设计了基于自抗扰方法的控制器,跟踪风力发电的最大功率曲线,并对并网发电进行管理。同时,发电的相位角与电网的相位角同步。数值模拟进行了支持在这项工作中提出的控制器。
{"title":"Active disturbance rejection control of a permanent magnet synchronous generator for wind turbine applications","authors":"M. A. Aguilar-Orduña, H. Sira-Ramírez","doi":"10.35429/jrd.2021.19.7.9.21","DOIUrl":"https://doi.org/10.35429/jrd.2021.19.7.9.21","url":null,"abstract":"With sight on maximizing the amount of energy that can be extracted, by a wind turbine, from the wind, this article solves the maximum power point tracking problem for a permanent magnet synchronous generator-based horizontal wind turbine connected to the electrical grid. A three-phase back-to-back converter, which allows a decoupling between the electrical grid and the generator, is employed as an interphase between the wind turbine and the utility grid. Based on the mathematical model in the synchronous reference frame and taking advantage of the differential flatness property the system exhibits, controllers based on the active disturbance rejection methodology are designed, in this work, to track the curve of maximum extracted power from the wind and manage the generated electricity into the grid. At the same time, the phase angle of the electricity generated is synchronized with the phase angle of the electrical grid. Numerical simulations are performed to support the controllers presented in this work.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"32 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76482081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and simulation of Dynamic Voltage Restorer (DVR) supported by solar panels 太阳能电池板支撑的动态电压恢复器(DVR)的设计与仿真
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2021-06-30 DOI: 10.35429/jrd.2021.19.7.31.36
Omar Antonio-Lara, P. García-Vite, R. Castillo-Gutiérrez, H. Cisneros-Villegas
This work presents the design and simulation of a Dynamic Voltage Restorer (DVR) to mitigate power quality problems such as voltage sags and swells at sensitive loads to these types of disturbances, but with a compensation topology using one the most popular of the renewable energies, currently employed, which is photovoltaic solar energy. The DVR must operate with a control loop, monitoring the voltage at the load side and generating the voltage for compensation during the disturbances. The energy is obtained, from an array of solar panels for the injection of active power. The control algorithm discussed in this article is based on the Clark and Park transformations to generate the required signals for voltage compensation, these mathematical techniques allow fixing the variables and hence simplicity for the controller design. The results of the simulation in MATLAB/Simulink are used to show the performance of the proposed topology with symmetrical voltage sags in the distribution system.
这项工作提出了一个动态电压恢复器(DVR)的设计和仿真,以减轻电能质量问题,如电压下降和膨胀在敏感负载对这些类型的干扰,但与补偿拓扑使用一个最流行的可再生能源,目前采用的,这是光伏太阳能。DVR必须与控制回路一起工作,监测负载侧的电压,并在干扰期间产生补偿电压。能量是从一组太阳能电池板中获得的,用于注入有功功率。本文中讨论的控制算法是基于Clark和Park变换来生成电压补偿所需的信号,这些数学技术允许固定变量,因此控制器设计简单。在MATLAB/Simulink中的仿真结果显示了该拓扑在配电系统中具有对称电压跌落的性能。
{"title":"Design and simulation of Dynamic Voltage Restorer (DVR) supported by solar panels","authors":"Omar Antonio-Lara, P. García-Vite, R. Castillo-Gutiérrez, H. Cisneros-Villegas","doi":"10.35429/jrd.2021.19.7.31.36","DOIUrl":"https://doi.org/10.35429/jrd.2021.19.7.31.36","url":null,"abstract":"This work presents the design and simulation of a Dynamic Voltage Restorer (DVR) to mitigate power quality problems such as voltage sags and swells at sensitive loads to these types of disturbances, but with a compensation topology using one the most popular of the renewable energies, currently employed, which is photovoltaic solar energy. The DVR must operate with a control loop, monitoring the voltage at the load side and generating the voltage for compensation during the disturbances. The energy is obtained, from an array of solar panels for the injection of active power. The control algorithm discussed in this article is based on the Clark and Park transformations to generate the required signals for voltage compensation, these mathematical techniques allow fixing the variables and hence simplicity for the controller design. The results of the simulation in MATLAB/Simulink are used to show the performance of the proposed topology with symmetrical voltage sags in the distribution system.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"3 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88304107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface: IBM z15 Design and Technology 前言:IBM z15设计与技术
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-08-25 DOI: 10.1147/JRD.2020.3009463
{"title":"Preface: IBM z15 Design and Technology","authors":"","doi":"10.1147/JRD.2020.3009463","DOIUrl":"10.1147/JRD.2020.3009463","url":null,"abstract":"","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"1-4"},"PeriodicalIF":1.3,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5288520/9177188/09177210.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46510186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message From the General Manager, IBM Z IBM Z总经理寄语
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-08-25 DOI: 10.1147/JRD.2020.3009462
Ross A. Mauri
{"title":"Message From the General Manager, IBM Z","authors":"Ross A. Mauri","doi":"10.1147/JRD.2020.3009462","DOIUrl":"https://doi.org/10.1147/JRD.2020.3009462","url":null,"abstract":"","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"1-2"},"PeriodicalIF":1.3,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5288520/9177188/09177208.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49986538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design innovations for IBM Z hardware management appliance IBM Z硬件管理设备的设计创新
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008095
B. D. Valentine;M. A. Clark;B. E. Myers;P. Callaghan;J. A. Wierbowski;P. J. Clas
The IBM z15 supports the new IBM Z Hardware Management Appliance optional feature, which provides redundant Hardware Management Consoles (HMCs) and Support Elements (SEs) that run on redundant physical servers inside the CPC (Central Processor Complex) frame. This eliminates the need for having to manage one or more separate physical servers for HMCs outside of the frame. This article describes the host HMC/KVM (kernel-based virtual machine) and Virtual SE environment, which is completely managed by IBM Z firmware as a true appliance. It also illustrates the firmware integrity monitoring environment for the host HMC/KVM extended to the Virtual SE to provide secure boot protection for firmware and continuous monitoring and the utilization of a shared trusted platform module. It describes how physical system errors are processed by problem analysis firmware running on the Virtual SE, thereby enabling online guided repair instructions running on the Virtual SE to be used for both HMC and SE detected errors. This article will shares the innovative design basics of the IBM Z Hardware Management Appliance feature, which has significant positive impact potential for both clients and IBM.
IBM z15支持新的IBM Z Hardware Management Appliance可选功能,该功能提供了在CPC(中央处理器复合体)框架内的冗余物理服务器上运行的冗余硬件管理控制台(HMC)和支持元件(SE)。这就不需要为机架外的HMC管理一个或多个单独的物理服务器。本文描述了主机HMC/KVM(基于内核的虚拟机)和virtual SE环境,它完全由IBMZ固件作为一个真正的设备进行管理。它还说明了扩展到虚拟SE的主机HMC/KVM的固件完整性监控环境,以提供对固件的安全引导保护以及对共享可信平台模块的持续监控和利用。它描述了虚拟SE上运行的问题分析固件如何处理物理系统错误,从而使虚拟SE上的在线指导修复说明能够用于HMC和SE检测到的错误。本文将分享IBM Z Hardware Management Appliance功能的创新设计基础,该功能对客户机和IBM都具有重大的积极影响潜力。
{"title":"Design innovations for IBM Z hardware management appliance","authors":"B. D. Valentine;M. A. Clark;B. E. Myers;P. Callaghan;J. A. Wierbowski;P. J. Clas","doi":"10.1147/JRD.2020.3008095","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008095","url":null,"abstract":"The IBM z15 supports the new IBM Z Hardware Management Appliance optional feature, which provides redundant Hardware Management Consoles (HMCs) and Support Elements (SEs) that run on redundant physical servers inside the CPC (Central Processor Complex) frame. This eliminates the need for having to manage one or more separate physical servers for HMCs outside of the frame. This article describes the host HMC/KVM (kernel-based virtual machine) and Virtual SE environment, which is completely managed by IBM Z firmware as a true appliance. It also illustrates the firmware integrity monitoring environment for the host HMC/KVM extended to the Virtual SE to provide secure boot protection for firmware and continuous monitoring and the utilization of a shared trusted platform module. It describes how physical system errors are processed by problem analysis firmware running on the Virtual SE, thereby enabling online guided repair instructions running on the Virtual SE to be used for both HMC and SE detected errors. This article will shares the innovative design basics of the IBM Z Hardware Management Appliance feature, which has significant positive impact potential for both clients and IBM.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"13:1-13:9"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBM Z development transformation IBM Z开发转型
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008122
E. C. McCain;P. Bastien;B. F. Belmar;B. Bhattacharya;K. K. Cheruiyot;M. Coq;R. Dartey;K. Deekaram;K. Ghadai;L. D. Lalima;J. Nettey;A. W. Owolabi;K. Phillips;T. M. Shiling;D. T. Schroeder;C. Slegel;B. Steen;D. A. Thorne;E. Venuto;J. D. Willoughby;D. Yaniv;N. Ziemis
This article discusses how the product development cycle is being transformed with “Artificial Intelligence” (AI) for the first time in zSeries history. This new era of AI, under the project name IBM Z Development Transformation (zDT), has allowed the team to grow and learn new skills in data science. This transformation forces change structurally in how data is prepared and stored. In z14, there were incremental productivity gains with enhancements to automation with eServer Automation Test Solution and a technology data analysis engine called zDataAssist. However, in z15, AI will significantly accelerate our efficiency. This article explains how Design Thinking and Agile principles were used to identify areas that are of high impact and feasible to implement: 1) what and how data is collected via System Test Event Logging and Analysis engine, Problem ticket management system (Jupitr), and Processor data analysis engine (Xrings); 2) problem identification, analysis, and management (AutoJup) along with Intelligent Recovery Verification Assistant; 3) product design documentation search engine (AskTheMachine); and 4) prototype microprocessor allocation processes Intelligent Commodity Fulfillment System using Machine Learning. This article details the approach of these areas for z15, the implementation of these solutions under the zDT project, as well as the results and future work.
本文讨论了zSeries历史上第一次如何用“人工智能”(AI)来改变产品开发周期。这个人工智能的新时代,以IBM Z Development Transformation(zDT)的项目名称,让团队得以成长和学习数据科学的新技能。这种转换迫使数据的准备和存储方式在结构上发生变化。在z14中,通过eServer automation Test Solution和一个名为zDataAssist的技术数据分析引擎对自动化的增强,生产力得到了提高。然而,在z15中,人工智能将显著提高我们的效率。本文解释了如何使用设计思维和敏捷原则来确定具有高影响和可行实施的领域:1)通过系统测试事件日志记录和分析引擎、问题单管理系统(Jupitr)和处理器数据分析引擎(Xrings)收集什么和如何收集数据;2) 问题识别、分析和管理(AutoJup)以及智能恢复验证助手;3) 产品设计文档搜索引擎(AskTheMachine);以及4)使用机器学习的原型微处理器分配处理智能商品履行系统。本文详细介绍了z15的这些领域的方法,zDT项目下这些解决方案的实现,以及结果和未来的工作。
{"title":"IBM Z development transformation","authors":"E. C. McCain;P. Bastien;B. F. Belmar;B. Bhattacharya;K. K. Cheruiyot;M. Coq;R. Dartey;K. Deekaram;K. Ghadai;L. D. Lalima;J. Nettey;A. W. Owolabi;K. Phillips;T. M. Shiling;D. T. Schroeder;C. Slegel;B. Steen;D. A. Thorne;E. Venuto;J. D. Willoughby;D. Yaniv;N. Ziemis","doi":"10.1147/JRD.2020.3008122","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008122","url":null,"abstract":"This article discusses how the product development cycle is being transformed with “Artificial Intelligence” (AI) for the first time in zSeries history. This new era of AI, under the project name IBM Z Development Transformation (zDT), has allowed the team to grow and learn new skills in data science. This transformation forces change structurally in how data is prepared and stored. In z14, there were incremental productivity gains with enhancements to automation with eServer Automation Test Solution and a technology data analysis engine called zDataAssist. However, in z15, AI will significantly accelerate our efficiency. This article explains how Design Thinking and Agile principles were used to identify areas that are of high impact and feasible to implement: 1) what and how data is collected via System Test Event Logging and Analysis engine, Problem ticket management system (Jupitr), and Processor data analysis engine (Xrings); 2) problem identification, analysis, and management (AutoJup) along with Intelligent Recovery Verification Assistant; 3) product design documentation search engine (AskTheMachine); and 4) prototype microprocessor allocation processes Intelligent Commodity Fulfillment System using Machine Learning. This article details the approach of these areas for z15, the implementation of these solutions under the zDT project, as well as the results and future work.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"14:1-14:13"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008122","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
z15 selfboot and secure boot Z15自启动和安全启动
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008097
T. Webel;O. Morlok;D. Kiss
The IBM Z central processor (CP) and storage controller (SC) chips contain hardware and firmware to serve selfboot and secure boot needs. Selfboot initializes the CP/SC chips from hardware and firmware, which reside in each chip module. This establishes a core root of trust and also guarantees a boot time that is independent of the system configuration, which is key for large enterprise class systems consisting of multiple drawers and chips. Secure boot is built on this core root of trust and is used to authenticate the firmware loaded from system memory prior to execution of that firmware. Selfboot and secure boot also guarantee the integrity of the CP and SC chips by restricting hardware and memory accesses through debug or service interfaces during boot, runtime, and code update phases. In this article, we describe the basic hardware and firmware concepts that are implemented and enabled for the z15 CP and SC chips.
IBM Z中央处理器(CP)和存储控制器(SC)芯片包含满足自我引导和安全引导需求的硬件和固件。Selfboot从驻留在每个芯片模块中的硬件和固件初始化CP/SC芯片。这建立了信任的核心根,并保证了独立于系统配置的引导时间,这对于由多个抽屉和芯片组成的大型企业级系统来说是关键。安全引导建立在这个核心信任根的基础上,用于在固件执行之前对从系统内存加载的固件进行身份验证。Selfboot和secure boot还通过在引导、运行时和代码更新阶段限制调试或服务接口对硬件和内存的访问,从而保证了CP和SC芯片的完整性。在本文中,我们描述了为z15 CP和SC芯片实现和启用的基本硬件和固件概念。
{"title":"z15 selfboot and secure boot","authors":"T. Webel;O. Morlok;D. Kiss","doi":"10.1147/JRD.2020.3008097","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008097","url":null,"abstract":"The IBM Z central processor (CP) and storage controller (SC) chips contain hardware and firmware to serve selfboot and secure boot needs. Selfboot initializes the CP/SC chips from hardware and firmware, which reside in each chip module. This establishes a core root of trust and also guarantees a boot time that is independent of the system configuration, which is key for large enterprise class systems consisting of multiple drawers and chips. Secure boot is built on this core root of trust and is used to authenticate the firmware loaded from system memory prior to execution of that firmware. Selfboot and secure boot also guarantee the integrity of the CP and SC chips by restricting hardware and memory accesses through debug or service interfaces during boot, runtime, and code update phases. In this article, we describe the basic hardware and firmware concepts that are implemented and enabled for the z15 CP and SC chips.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"5:1-5:9"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49979348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing the enterprise SAN with IBM Fibre Channel Endpoint Security 使用IBM光纤通道端点安全保护企业SAN
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008146
P. G. Driever;R. Hathorn;C. Colonna
Controlling access to and privacy of data within the enterprise can prove to be a formidable task with increased complexity and management overhead encountered as the granularity of access control is increased. Fibre Channel is the premier enterprise storage transport, so an organization's most sensitive data flows over Fibre Channel links within and across datacenters. In this article, we discuss a new, easy way to deploy innovation for Fibre Channel connections that ensures data is exchanged only between trusted servers and storage controllers, while also enabling the integrity and confidentiality of the data in flight between the trusted entities. We explain how the components of IBM Fibre Channel Endpoint Security are configured to work together to provide protection from insider threats, requiring minimal steps to deploy, fully controlled via policy, and transparent to applications, middleware, and operating systems.
控制企业内数据的访问和隐私是一项艰巨的任务,随着访问控制粒度的增加,复杂性和管理开销也会增加。光纤通道是首要的企业存储传输,因此组织中最敏感的数据在数据中心内部和跨数据中心的光纤通道链路上流动。在本文中,我们将讨论为光纤通道连接部署创新的一种新的简单方法,该方法可确保仅在可信服务器和存储控制器之间交换数据,同时还支持可信实体之间传输的数据的完整性和机密性。我们将解释IBM Fibre Channel Endpoint Security的组件如何配置为协同工作以提供对内部威胁的保护,只需最少的部署步骤,通过策略完全控制,并且对应用程序、中间件和操作系统透明。
{"title":"Securing the enterprise SAN with IBM Fibre Channel Endpoint Security","authors":"P. G. Driever;R. Hathorn;C. Colonna","doi":"10.1147/JRD.2020.3008146","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008146","url":null,"abstract":"Controlling access to and privacy of data within the enterprise can prove to be a formidable task with increased complexity and management overhead encountered as the granularity of access control is increased. Fibre Channel is the premier enterprise storage transport, so an organization's most sensitive data flows over Fibre Channel links within and across datacenters. In this article, we discuss a new, easy way to deploy innovation for Fibre Channel connections that ensures data is exchanged only between trusted servers and storage controllers, while also enabling the integrity and confidentiality of the data in flight between the trusted entities. We explain how the components of IBM Fibre Channel Endpoint Security are configured to work together to provide protection from insider threats, requiring minimal steps to deploy, fully controlled via policy, and transparent to applications, middleware, and operating systems.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"4:1-4:8"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008146","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49986537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sysplex time synchronization using IEEE 1588 Precision Time Protocol (PTP) 基于IEEE 1588精确时间协议(PTP)的Sysplex时间同步
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008108
S. R. Guendert;J. S. Houston;P. A. Wojciak;S. Cherniak;D. L. Massey
Timekeeping and highly accurate, precise time synchronization are key requirements for modern information technology systems. While true for several industries, this is especially true for industries involved in transaction processing such as the financial industry. As such, the IBM Z Sysplex needs highly accurate timing/timekeeping and synchronization technology to ensure data integrity, and to also provide the ability to reconstruct a database based upon logs. Recently enacted changes and new regulatory requirements, both in Europe and the United States, have brought increasing attention to time synchronization accuracy. These regulations spurred an interest, both from IBM Z and from our IBM Z clients, in the IEEE 1588 Precision Time Protocol (PTP) being implemented in IBM Z. This article explains the history of PTP, PTP technology, the regulations that led IBM to introduce PTP to IBM Z, PTP's implementation on IBM Z, and IBM's involvement and leadership in the development of the PTP technology and standards going forward.
计时和高度准确、精确的时间同步是现代信息技术系统的关键要求。虽然一些行业是如此,但金融业等涉及交易处理的行业尤其如此。因此,IBM Z Sysplex需要高度准确的计时/计时和同步技术,以确保数据的完整性,并提供基于日志重建数据库的能力。欧洲和美国最近颁布的变化和新的监管要求越来越引起人们对时间同步准确性的关注。这些规定激发了IBM Z和我们的IBM Z客户对在IBM Z中实现的IEEE 1588精确时间协议(PTP)的兴趣。本文解释了PTP的历史,PTP技术,导致IBM将PTP引入IBM Z的规定,PTP在IBM Z上的实现,以及IBM在PTP技术和标准发展方面的参与和领导。
{"title":"Sysplex time synchronization using IEEE 1588 Precision Time Protocol (PTP)","authors":"S. R. Guendert;J. S. Houston;P. A. Wojciak;S. Cherniak;D. L. Massey","doi":"10.1147/JRD.2020.3008108","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008108","url":null,"abstract":"Timekeeping and highly accurate, precise time synchronization are key requirements for modern information technology systems. While true for several industries, this is especially true for industries involved in transaction processing such as the financial industry. As such, the IBM Z Sysplex needs highly accurate timing/timekeeping and synchronization technology to ensure data integrity, and to also provide the ability to reconstruct a database based upon logs. Recently enacted changes and new regulatory requirements, both in Europe and the United States, have brought increasing attention to time synchronization accuracy. These regulations spurred an interest, both from IBM Z and from our IBM Z clients, in the IEEE 1588 Precision Time Protocol (PTP) being implemented in IBM Z. This article explains the history of PTP, PTP technology, the regulations that led IBM to introduce PTP to IBM Z, PTP's implementation on IBM Z, and IBM's involvement and leadership in the development of the PTP technology and standards going forward.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"12:1-12:9"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure your cloud workloads with IBM Secure Execution for Linux on IBM z15 and LinuxONE III 在IBM z15和LinuxONE III上使用IBM Secure Execution for Linux保护您的云工作负载
IF 1.3 4区 计算机科学 Q1 Computer Science Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008109
C. Bornträger;J. D. Bradbury;R. Bündgen;F. Busaba;L. C. Heller;V. Mihajlovski
With the growth of IBM Z and LinuxONE in the cloud, customers are expecting their workloads and data to have the same levels of security, isolation, and privacy as running on-premise. In order to achieve these levels of trust, the IBM z15 and LinuxONE III provide the IBM Secure Execution for Linux facility, which isolates customers’ data from each other, as well as from the cloud administrators. Unlike other solutions in the industry, IBM Secure Execution does not require remote attestation, thus simplifying the deployment of applications into the protected environment. Also, unlike some other solutions in the industry, the integrity of data is protected end-to-end, that is, from the boot image on disk to memory as it is paged by the hypervisor and throughout execution. The isolation and integrity are provided by hardware and trusted firmware known as the ultravisor. In this article, we describe the security model of IBM Secure Execution, the functionality of the hardware and ultravisor, as well as the required changes to the hypervisor in order to support protected virtual machines.
随着IBM Z和LinuxONE在云中的发展,客户希望他们的工作负载和数据具有与在本地运行相同的安全性、隔离性和隐私级别。为了实现这些级别的信任,IBM z15和LinuxONE III提供了IBM Secure Execution for Linux功能,该功能将客户的数据相互隔离,并将其与云管理员隔离。与行业中的其他解决方案不同,IBM Secure Execution不需要远程认证,从而简化了应用程序在受保护环境中的部署。此外,与行业中的其他一些解决方案不同,数据的完整性受到端到端的保护,即从磁盘上的启动映像到内存,在系统管理程序对其进行分页时以及在整个执行过程中都受到保护。隔离和完整性由被称为超级监控程序的硬件和可信固件提供。在本文中,我们描述了IBM Secure Execution的安全模型、硬件和超级管理程序的功能,以及为支持受保护的虚拟机而对管理程序进行的必要更改。
{"title":"Secure your cloud workloads with IBM Secure Execution for Linux on IBM z15 and LinuxONE III","authors":"C. Bornträger;J. D. Bradbury;R. Bündgen;F. Busaba;L. C. Heller;V. Mihajlovski","doi":"10.1147/JRD.2020.3008109","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008109","url":null,"abstract":"With the growth of IBM Z and LinuxONE in the cloud, customers are expecting their workloads and data to have the same levels of security, isolation, and privacy as running on-premise. In order to achieve these levels of trust, the IBM z15 and LinuxONE III provide the IBM Secure Execution for Linux facility, which isolates customers’ data from each other, as well as from the cloud administrators. Unlike other solutions in the industry, IBM Secure Execution does not require remote attestation, thus simplifying the deployment of applications into the protected environment. Also, unlike some other solutions in the industry, the integrity of data is protected end-to-end, that is, from the boot image on disk to memory as it is paged by the hypervisor and throughout execution. The isolation and integrity are provided by hardware and trusted firmware known as the ultravisor. In this article, we describe the security model of IBM Secure Execution, the functionality of the hardware and ultravisor, as well as the required changes to the hypervisor in order to support protected virtual machines.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"2:1-2:11"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
IBM Journal of Research and Development
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1