• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Unlocking The Power8 Features With IBM i

    November 10, 2014 Timothy Prickett Morgan

    We talk a lot about the hardware features of the Power Systems platforms as they roll into the market, and the idea is always to look at the processors and related technologies specifically. But the performance metrics are always a lot more generic, and as we all know, the variety of applications that can be created for the system is broader than what can be modeled with the Commercial Performance Workload (CPW) online transaction processing test.

    If there is any lesson that has been relearned by the hyperscale datacenter operators like Google, Yahoo, and Facebook that was well known to users of System/360 mainframes and System/38 minicomputers decades ago, it is that you have to tune the software to the hardware to get the best bang for the buck. The availability of lots of compute, memory, storage, and network capacity means that companies don’t often tune as much as they should. But IBM wants to encourage people to tune their software for the advanced hardware it is putting into the field, and the massive Performance Optimization and Tuning Techniques for IBM Processors, including IBM Power8 redbook, which was published in July.

    In some cases, functions within IBM i 7.2 will automagically be accelerated when they run on Power8 iron, including the increased use of decimal floating point and vector math units. Deep down in the guts of the licensed internal code, there are switches you can flip now in IBM i 7.2 that will allow compiled code to be more tightly compiled to make use of specific features of the Power8 chips. There is a new Adaptive Code Generation mode that allows for the portability of code between processor generations and yet also fine tuning for specific hardware. The point is, this document seems to be required reading for programmers, whether they are making their own code or babysitting third party applications. If you are spending big bucks on Power8 iron and moving to IBM i 7.2, then it makes sense to acquaint yourself with these features and make sure you exploit them.

    This programming guide has information about how to tweak and tune Java runtimes and WebSphere middleware, the PowerVM hypervisor as well as AIX and Linux environments. The AIX environment is important because the Portable Application Solution Environment, or PASE, runtime that is used for many IBM i functions is based on AIX itself. You want PASE tuned up, too. While IBM talks about various C, C++, and Fortran compilers and how to tune for Power8, there is nothing in this document about how to tune up RPG and COBOL for Power8.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    HelpSystems Bolsters Automation Tool with Database Triggers TR8 DB2 For i Enhancements, Part 1

    Leave a Reply Cancel reply

Volume 24, Number 38 -- November 10, 2014
THIS ISSUE SPONSORED BY:

ARCAD Software
Infinite Corporation
ASNA
Computer Keyes
Shield Advanced Solutions

Table of Contents

  • First Pass On Power8 Enterprise Performance
  • Dispatches From The IBM i MSP Frontier
  • IBM And ISVs Fight POODLE Vulnerability In SSL 3.0
  • Mad Dog 21/21: Pandora’s Pithos
  • College RPG Needs A Technology Refresh
  • IBM i App Dev Progress: It Doesn’t Just Happen By Itself
  • SaaS Helps Lift Hospitality Software Maker Agilysys
  • Cloud Spending Dominated By SaaS In The Years Ahead
  • Unlocking The Power8 Features With IBM i
  • IBM Builds Infrastructure Resource Site

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power10 Midrange Machine: The Power E1050
  • IBM Puts The Finishing Touches On PowerHA For IBM i 7.5
  • Guru: Regular Expressions, Part 2
  • Get Your Security Education, And Not From The School Of Hard Knocks
  • IBM i PTF Guide, Volume 24, Number 33
  • Power10 Entry Machines: The Power S1024 And Power L1024
  • Thoroughly Modern: Latest IT Trends – Bring Security, Speed, And Consistency To IT With Automation
  • Big Blue Unveils New Scalable VTL For IBM i
  • As I See It: Thank God It’s Thursday
  • IBM i PTF Guide, Volume 24, Number 32

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.