Pub Date : 2021-06-30DOI: 10.35429/jrd.2021.19.7.9.21
M. A. Aguilar-Orduña, H. Sira-Ramírez
With sight on maximizing the amount of energy that can be extracted, by a wind turbine, from the wind, this article solves the maximum power point tracking problem for a permanent magnet synchronous generator-based horizontal wind turbine connected to the electrical grid. A three-phase back-to-back converter, which allows a decoupling between the electrical grid and the generator, is employed as an interphase between the wind turbine and the utility grid. Based on the mathematical model in the synchronous reference frame and taking advantage of the differential flatness property the system exhibits, controllers based on the active disturbance rejection methodology are designed, in this work, to track the curve of maximum extracted power from the wind and manage the generated electricity into the grid. At the same time, the phase angle of the electricity generated is synchronized with the phase angle of the electrical grid. Numerical simulations are performed to support the controllers presented in this work.
{"title":"Active disturbance rejection control of a permanent magnet synchronous generator for wind turbine applications","authors":"M. A. Aguilar-Orduña, H. Sira-Ramírez","doi":"10.35429/jrd.2021.19.7.9.21","DOIUrl":"https://doi.org/10.35429/jrd.2021.19.7.9.21","url":null,"abstract":"With sight on maximizing the amount of energy that can be extracted, by a wind turbine, from the wind, this article solves the maximum power point tracking problem for a permanent magnet synchronous generator-based horizontal wind turbine connected to the electrical grid. A three-phase back-to-back converter, which allows a decoupling between the electrical grid and the generator, is employed as an interphase between the wind turbine and the utility grid. Based on the mathematical model in the synchronous reference frame and taking advantage of the differential flatness property the system exhibits, controllers based on the active disturbance rejection methodology are designed, in this work, to track the curve of maximum extracted power from the wind and manage the generated electricity into the grid. At the same time, the phase angle of the electricity generated is synchronized with the phase angle of the electrical grid. Numerical simulations are performed to support the controllers presented in this work.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"32 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76482081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35429/jrd.2021.19.7.31.36
Omar Antonio-Lara, P. García-Vite, R. Castillo-Gutiérrez, H. Cisneros-Villegas
This work presents the design and simulation of a Dynamic Voltage Restorer (DVR) to mitigate power quality problems such as voltage sags and swells at sensitive loads to these types of disturbances, but with a compensation topology using one the most popular of the renewable energies, currently employed, which is photovoltaic solar energy. The DVR must operate with a control loop, monitoring the voltage at the load side and generating the voltage for compensation during the disturbances. The energy is obtained, from an array of solar panels for the injection of active power. The control algorithm discussed in this article is based on the Clark and Park transformations to generate the required signals for voltage compensation, these mathematical techniques allow fixing the variables and hence simplicity for the controller design. The results of the simulation in MATLAB/Simulink are used to show the performance of the proposed topology with symmetrical voltage sags in the distribution system.
{"title":"Design and simulation of Dynamic Voltage Restorer (DVR) supported by solar panels","authors":"Omar Antonio-Lara, P. García-Vite, R. Castillo-Gutiérrez, H. Cisneros-Villegas","doi":"10.35429/jrd.2021.19.7.31.36","DOIUrl":"https://doi.org/10.35429/jrd.2021.19.7.31.36","url":null,"abstract":"This work presents the design and simulation of a Dynamic Voltage Restorer (DVR) to mitigate power quality problems such as voltage sags and swells at sensitive loads to these types of disturbances, but with a compensation topology using one the most popular of the renewable energies, currently employed, which is photovoltaic solar energy. The DVR must operate with a control loop, monitoring the voltage at the load side and generating the voltage for compensation during the disturbances. The energy is obtained, from an array of solar panels for the injection of active power. The control algorithm discussed in this article is based on the Clark and Park transformations to generate the required signals for voltage compensation, these mathematical techniques allow fixing the variables and hence simplicity for the controller design. The results of the simulation in MATLAB/Simulink are used to show the performance of the proposed topology with symmetrical voltage sags in the distribution system.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"3 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88304107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-25DOI: 10.1147/JRD.2020.3009463
{"title":"Preface: IBM z15 Design and Technology","authors":"","doi":"10.1147/JRD.2020.3009463","DOIUrl":"10.1147/JRD.2020.3009463","url":null,"abstract":"","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"1-4"},"PeriodicalIF":1.3,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5288520/9177188/09177210.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46510186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-25DOI: 10.1147/JRD.2020.3009462
Ross A. Mauri
{"title":"Message From the General Manager, IBM Z","authors":"Ross A. Mauri","doi":"10.1147/JRD.2020.3009462","DOIUrl":"https://doi.org/10.1147/JRD.2020.3009462","url":null,"abstract":"","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"1-2"},"PeriodicalIF":1.3,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5288520/9177188/09177208.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49986538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.1147/JRD.2020.3008095
B. D. Valentine;M. A. Clark;B. E. Myers;P. Callaghan;J. A. Wierbowski;P. J. Clas
The IBM z15 supports the new IBM Z Hardware Management Appliance optional feature, which provides redundant Hardware Management Consoles (HMCs) and Support Elements (SEs) that run on redundant physical servers inside the CPC (Central Processor Complex) frame. This eliminates the need for having to manage one or more separate physical servers for HMCs outside of the frame. This article describes the host HMC/KVM (kernel-based virtual machine) and Virtual SE environment, which is completely managed by IBM Z firmware as a true appliance. It also illustrates the firmware integrity monitoring environment for the host HMC/KVM extended to the Virtual SE to provide secure boot protection for firmware and continuous monitoring and the utilization of a shared trusted platform module. It describes how physical system errors are processed by problem analysis firmware running on the Virtual SE, thereby enabling online guided repair instructions running on the Virtual SE to be used for both HMC and SE detected errors. This article will shares the innovative design basics of the IBM Z Hardware Management Appliance feature, which has significant positive impact potential for both clients and IBM.
IBM z15支持新的IBM Z Hardware Management Appliance可选功能,该功能提供了在CPC(中央处理器复合体)框架内的冗余物理服务器上运行的冗余硬件管理控制台(HMC)和支持元件(SE)。这就不需要为机架外的HMC管理一个或多个单独的物理服务器。本文描述了主机HMC/KVM(基于内核的虚拟机)和virtual SE环境,它完全由IBMZ固件作为一个真正的设备进行管理。它还说明了扩展到虚拟SE的主机HMC/KVM的固件完整性监控环境,以提供对固件的安全引导保护以及对共享可信平台模块的持续监控和利用。它描述了虚拟SE上运行的问题分析固件如何处理物理系统错误,从而使虚拟SE上的在线指导修复说明能够用于HMC和SE检测到的错误。本文将分享IBM Z Hardware Management Appliance功能的创新设计基础,该功能对客户机和IBM都具有重大的积极影响潜力。
{"title":"Design innovations for IBM Z hardware management appliance","authors":"B. D. Valentine;M. A. Clark;B. E. Myers;P. Callaghan;J. A. Wierbowski;P. J. Clas","doi":"10.1147/JRD.2020.3008095","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008095","url":null,"abstract":"The IBM z15 supports the new IBM Z Hardware Management Appliance optional feature, which provides redundant Hardware Management Consoles (HMCs) and Support Elements (SEs) that run on redundant physical servers inside the CPC (Central Processor Complex) frame. This eliminates the need for having to manage one or more separate physical servers for HMCs outside of the frame. This article describes the host HMC/KVM (kernel-based virtual machine) and Virtual SE environment, which is completely managed by IBM Z firmware as a true appliance. It also illustrates the firmware integrity monitoring environment for the host HMC/KVM extended to the Virtual SE to provide secure boot protection for firmware and continuous monitoring and the utilization of a shared trusted platform module. It describes how physical system errors are processed by problem analysis firmware running on the Virtual SE, thereby enabling online guided repair instructions running on the Virtual SE to be used for both HMC and SE detected errors. This article will shares the innovative design basics of the IBM Z Hardware Management Appliance feature, which has significant positive impact potential for both clients and IBM.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"13:1-13:9"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.1147/JRD.2020.3008122
E. C. McCain;P. Bastien;B. F. Belmar;B. Bhattacharya;K. K. Cheruiyot;M. Coq;R. Dartey;K. Deekaram;K. Ghadai;L. D. Lalima;J. Nettey;A. W. Owolabi;K. Phillips;T. M. Shiling;D. T. Schroeder;C. Slegel;B. Steen;D. A. Thorne;E. Venuto;J. D. Willoughby;D. Yaniv;N. Ziemis
This article discusses how the product development cycle is being transformed with “Artificial Intelligence” (AI) for the first time in zSeries history. This new era of AI, under the project name IBM Z Development Transformation (zDT), has allowed the team to grow and learn new skills in data science. This transformation forces change structurally in how data is prepared and stored. In z14, there were incremental productivity gains with enhancements to automation with eServer Automation Test Solution and a technology data analysis engine called zDataAssist. However, in z15, AI will significantly accelerate our efficiency. This article explains how Design Thinking and Agile principles were used to identify areas that are of high impact and feasible to implement: 1) what and how data is collected via System Test Event Logging and Analysis engine, Problem ticket management system (Jupitr), and Processor data analysis engine (Xrings); 2) problem identification, analysis, and management (AutoJup) along with Intelligent Recovery Verification Assistant; 3) product design documentation search engine (AskTheMachine); and 4) prototype microprocessor allocation processes Intelligent Commodity Fulfillment System using Machine Learning. This article details the approach of these areas for z15, the implementation of these solutions under the zDT project, as well as the results and future work.
本文讨论了zSeries历史上第一次如何用“人工智能”(AI)来改变产品开发周期。这个人工智能的新时代,以IBM Z Development Transformation(zDT)的项目名称,让团队得以成长和学习数据科学的新技能。这种转换迫使数据的准备和存储方式在结构上发生变化。在z14中,通过eServer automation Test Solution和一个名为zDataAssist的技术数据分析引擎对自动化的增强,生产力得到了提高。然而,在z15中,人工智能将显著提高我们的效率。本文解释了如何使用设计思维和敏捷原则来确定具有高影响和可行实施的领域:1)通过系统测试事件日志记录和分析引擎、问题单管理系统(Jupitr)和处理器数据分析引擎(Xrings)收集什么和如何收集数据;2) 问题识别、分析和管理(AutoJup)以及智能恢复验证助手;3) 产品设计文档搜索引擎(AskTheMachine);以及4)使用机器学习的原型微处理器分配处理智能商品履行系统。本文详细介绍了z15的这些领域的方法,zDT项目下这些解决方案的实现,以及结果和未来的工作。
{"title":"IBM Z development transformation","authors":"E. C. McCain;P. Bastien;B. F. Belmar;B. Bhattacharya;K. K. Cheruiyot;M. Coq;R. Dartey;K. Deekaram;K. Ghadai;L. D. Lalima;J. Nettey;A. W. Owolabi;K. Phillips;T. M. Shiling;D. T. Schroeder;C. Slegel;B. Steen;D. A. Thorne;E. Venuto;J. D. Willoughby;D. Yaniv;N. Ziemis","doi":"10.1147/JRD.2020.3008122","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008122","url":null,"abstract":"This article discusses how the product development cycle is being transformed with “Artificial Intelligence” (AI) for the first time in zSeries history. This new era of AI, under the project name IBM Z Development Transformation (zDT), has allowed the team to grow and learn new skills in data science. This transformation forces change structurally in how data is prepared and stored. In z14, there were incremental productivity gains with enhancements to automation with eServer Automation Test Solution and a technology data analysis engine called zDataAssist. However, in z15, AI will significantly accelerate our efficiency. This article explains how Design Thinking and Agile principles were used to identify areas that are of high impact and feasible to implement: 1) what and how data is collected via System Test Event Logging and Analysis engine, Problem ticket management system (Jupitr), and Processor data analysis engine (Xrings); 2) problem identification, analysis, and management (AutoJup) along with Intelligent Recovery Verification Assistant; 3) product design documentation search engine (AskTheMachine); and 4) prototype microprocessor allocation processes Intelligent Commodity Fulfillment System using Machine Learning. This article details the approach of these areas for z15, the implementation of these solutions under the zDT project, as well as the results and future work.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"14:1-14:13"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008122","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.1147/JRD.2020.3008097
T. Webel;O. Morlok;D. Kiss
The IBM Z central processor (CP) and storage controller (SC) chips contain hardware and firmware to serve selfboot and secure boot needs. Selfboot initializes the CP/SC chips from hardware and firmware, which reside in each chip module. This establishes a core root of trust and also guarantees a boot time that is independent of the system configuration, which is key for large enterprise class systems consisting of multiple drawers and chips. Secure boot is built on this core root of trust and is used to authenticate the firmware loaded from system memory prior to execution of that firmware. Selfboot and secure boot also guarantee the integrity of the CP and SC chips by restricting hardware and memory accesses through debug or service interfaces during boot, runtime, and code update phases. In this article, we describe the basic hardware and firmware concepts that are implemented and enabled for the z15 CP and SC chips.
IBM Z中央处理器(CP)和存储控制器(SC)芯片包含满足自我引导和安全引导需求的硬件和固件。Selfboot从驻留在每个芯片模块中的硬件和固件初始化CP/SC芯片。这建立了信任的核心根,并保证了独立于系统配置的引导时间,这对于由多个抽屉和芯片组成的大型企业级系统来说是关键。安全引导建立在这个核心信任根的基础上,用于在固件执行之前对从系统内存加载的固件进行身份验证。Selfboot和secure boot还通过在引导、运行时和代码更新阶段限制调试或服务接口对硬件和内存的访问,从而保证了CP和SC芯片的完整性。在本文中,我们描述了为z15 CP和SC芯片实现和启用的基本硬件和固件概念。
{"title":"z15 selfboot and secure boot","authors":"T. Webel;O. Morlok;D. Kiss","doi":"10.1147/JRD.2020.3008097","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008097","url":null,"abstract":"The IBM Z central processor (CP) and storage controller (SC) chips contain hardware and firmware to serve selfboot and secure boot needs. Selfboot initializes the CP/SC chips from hardware and firmware, which reside in each chip module. This establishes a core root of trust and also guarantees a boot time that is independent of the system configuration, which is key for large enterprise class systems consisting of multiple drawers and chips. Secure boot is built on this core root of trust and is used to authenticate the firmware loaded from system memory prior to execution of that firmware. Selfboot and secure boot also guarantee the integrity of the CP and SC chips by restricting hardware and memory accesses through debug or service interfaces during boot, runtime, and code update phases. In this article, we describe the basic hardware and firmware concepts that are implemented and enabled for the z15 CP and SC chips.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"5:1-5:9"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49979348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.1147/JRD.2020.3008146
P. G. Driever;R. Hathorn;C. Colonna
Controlling access to and privacy of data within the enterprise can prove to be a formidable task with increased complexity and management overhead encountered as the granularity of access control is increased. Fibre Channel is the premier enterprise storage transport, so an organization's most sensitive data flows over Fibre Channel links within and across datacenters. In this article, we discuss a new, easy way to deploy innovation for Fibre Channel connections that ensures data is exchanged only between trusted servers and storage controllers, while also enabling the integrity and confidentiality of the data in flight between the trusted entities. We explain how the components of IBM Fibre Channel Endpoint Security are configured to work together to provide protection from insider threats, requiring minimal steps to deploy, fully controlled via policy, and transparent to applications, middleware, and operating systems.
{"title":"Securing the enterprise SAN with IBM Fibre Channel Endpoint Security","authors":"P. G. Driever;R. Hathorn;C. Colonna","doi":"10.1147/JRD.2020.3008146","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008146","url":null,"abstract":"Controlling access to and privacy of data within the enterprise can prove to be a formidable task with increased complexity and management overhead encountered as the granularity of access control is increased. Fibre Channel is the premier enterprise storage transport, so an organization's most sensitive data flows over Fibre Channel links within and across datacenters. In this article, we discuss a new, easy way to deploy innovation for Fibre Channel connections that ensures data is exchanged only between trusted servers and storage controllers, while also enabling the integrity and confidentiality of the data in flight between the trusted entities. We explain how the components of IBM Fibre Channel Endpoint Security are configured to work together to provide protection from insider threats, requiring minimal steps to deploy, fully controlled via policy, and transparent to applications, middleware, and operating systems.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"4:1-4:8"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008146","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49986537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.1147/JRD.2020.3008108
S. R. Guendert;J. S. Houston;P. A. Wojciak;S. Cherniak;D. L. Massey
Timekeeping and highly accurate, precise time synchronization are key requirements for modern information technology systems. While true for several industries, this is especially true for industries involved in transaction processing such as the financial industry. As such, the IBM Z Sysplex needs highly accurate timing/timekeeping and synchronization technology to ensure data integrity, and to also provide the ability to reconstruct a database based upon logs. Recently enacted changes and new regulatory requirements, both in Europe and the United States, have brought increasing attention to time synchronization accuracy. These regulations spurred an interest, both from IBM Z and from our IBM Z clients, in the IEEE 1588 Precision Time Protocol (PTP) being implemented in IBM Z. This article explains the history of PTP, PTP technology, the regulations that led IBM to introduce PTP to IBM Z, PTP's implementation on IBM Z, and IBM's involvement and leadership in the development of the PTP technology and standards going forward.
计时和高度准确、精确的时间同步是现代信息技术系统的关键要求。虽然一些行业是如此,但金融业等涉及交易处理的行业尤其如此。因此,IBM Z Sysplex需要高度准确的计时/计时和同步技术,以确保数据的完整性,并提供基于日志重建数据库的能力。欧洲和美国最近颁布的变化和新的监管要求越来越引起人们对时间同步准确性的关注。这些规定激发了IBM Z和我们的IBM Z客户对在IBM Z中实现的IEEE 1588精确时间协议(PTP)的兴趣。本文解释了PTP的历史,PTP技术,导致IBM将PTP引入IBM Z的规定,PTP在IBM Z上的实现,以及IBM在PTP技术和标准发展方面的参与和领导。
{"title":"Sysplex time synchronization using IEEE 1588 Precision Time Protocol (PTP)","authors":"S. R. Guendert;J. S. Houston;P. A. Wojciak;S. Cherniak;D. L. Massey","doi":"10.1147/JRD.2020.3008108","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008108","url":null,"abstract":"Timekeeping and highly accurate, precise time synchronization are key requirements for modern information technology systems. While true for several industries, this is especially true for industries involved in transaction processing such as the financial industry. As such, the IBM Z Sysplex needs highly accurate timing/timekeeping and synchronization technology to ensure data integrity, and to also provide the ability to reconstruct a database based upon logs. Recently enacted changes and new regulatory requirements, both in Europe and the United States, have brought increasing attention to time synchronization accuracy. These regulations spurred an interest, both from IBM Z and from our IBM Z clients, in the IEEE 1588 Precision Time Protocol (PTP) being implemented in IBM Z. This article explains the history of PTP, PTP technology, the regulations that led IBM to introduce PTP to IBM Z, PTP's implementation on IBM Z, and IBM's involvement and leadership in the development of the PTP technology and standards going forward.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"12:1-12:9"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.1147/JRD.2020.3008109
C. Bornträger;J. D. Bradbury;R. Bündgen;F. Busaba;L. C. Heller;V. Mihajlovski
With the growth of IBM Z and LinuxONE in the cloud, customers are expecting their workloads and data to have the same levels of security, isolation, and privacy as running on-premise. In order to achieve these levels of trust, the IBM z15 and LinuxONE III provide the IBM Secure Execution for Linux facility, which isolates customers’ data from each other, as well as from the cloud administrators. Unlike other solutions in the industry, IBM Secure Execution does not require remote attestation, thus simplifying the deployment of applications into the protected environment. Also, unlike some other solutions in the industry, the integrity of data is protected end-to-end, that is, from the boot image on disk to memory as it is paged by the hypervisor and throughout execution. The isolation and integrity are provided by hardware and trusted firmware known as the ultravisor. In this article, we describe the security model of IBM Secure Execution, the functionality of the hardware and ultravisor, as well as the required changes to the hypervisor in order to support protected virtual machines.
{"title":"Secure your cloud workloads with IBM Secure Execution for Linux on IBM z15 and LinuxONE III","authors":"C. Bornträger;J. D. Bradbury;R. Bündgen;F. Busaba;L. C. Heller;V. Mihajlovski","doi":"10.1147/JRD.2020.3008109","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008109","url":null,"abstract":"With the growth of IBM Z and LinuxONE in the cloud, customers are expecting their workloads and data to have the same levels of security, isolation, and privacy as running on-premise. In order to achieve these levels of trust, the IBM z15 and LinuxONE III provide the IBM Secure Execution for Linux facility, which isolates customers’ data from each other, as well as from the cloud administrators. Unlike other solutions in the industry, IBM Secure Execution does not require remote attestation, thus simplifying the deployment of applications into the protected environment. Also, unlike some other solutions in the industry, the integrity of data is protected end-to-end, that is, from the boot image on disk to memory as it is paged by the hypervisor and throughout execution. The isolation and integrity are provided by hardware and trusted firmware known as the ultravisor. In this article, we describe the security model of IBM Secure Execution, the functionality of the hardware and ultravisor, as well as the required changes to the hypervisor in order to support protected virtual machines.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":"64 5/6","pages":"2:1-2:11"},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}