• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Adds VXA 320 Tape Drive to i5 Line

    February 13, 2006 Timothy Prickett Morgan

    As part of the System i5 announcements two weeks ago, IBM rolled out a new low-end tape drive for the i5 line. The feature 6279 drive is a 160 GB VXA-320 tape drive, and it costs $1,500. IBM says that it is three times faster than the 30 GB quarter-inch cartridge (QIC) tape drive that has been the entry tape product in the iSeries line for a while. The VXA-320 drive, at a 12 MB/sec data transfer rate, has twice the speed of its predecessor, the VXA-2 drive that IBM launched in the first i5 systems in 2004. Obviously, the VXA-320 supports compression, which gives it a 24 MB/sec transfer rate and a 320 GB capacity per VXA tape.

    The VXA-320 drive requires i5/OS V5R3 or V5R4 on the i5, and luckily, IBM’s AIX 5L V5.2 and Red Hat and Novell Linuxes have been certified on the tape drive, which means if you use AIX or Linux on logical partitions, you can share the VXA-320 drive with i5/OS partitions.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 7 -- February 13, 2006

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Creating an i5/OS User Profile Architecture RPG Looks into the Future

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 7

This Issue Sponsored By

    Table of Contents

    • System i5s Go IOP-Less with i5/OS V5R4
    • IBM Adds VXA 320 Tape Drive to i5 Line
    • Power6 Gets Second Silicon, IBM to Crank the Clock
    • Watch Out for Footnotes: Pricing on i5 520 Express Does Not Include WDS
    • Q&A with Elaine Lennox, VP of System i5 Marketing
    • Jack Henry’s Revenues Increase Thanks to Support and Services
    • The iSeries is Comfort Food for the Food Industry
    • Business Intelligence Advances Don’t Override Caution
    • IBM, Freescale Reunite for the Sake of the Power Processors
    • Enterprise Application Mergers and Acquisitions Big and Getting Bigger

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Power10 Entry Machines: The Power S1024 And Power L1024
    • Thoroughly Modern: Latest IT Trends – Bring Security, Speed, And Consistency To IT With Automation
    • Big Blue Unveils New Scalable VTL For IBM i
    • As I See It: Thank God It’s Thursday
    • IBM i PTF Guide, Volume 24, Number 32
    • JD Edwards Customers Face Support Decisions
    • Security, Automation, and Cloud Top Midrange IT Priorities, Study Says
    • Cleo and SrinSoft in Integration-Modernization Link Up
    • Four Hundred Monitor, August 3
    • IBM i PTF Guide, Volume 24, Number 31

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2022 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.