Do you have a question about the IBM DS8886 Series and is the answer not in the manual?
Overview of the different DS8000 machine types and their corresponding function authorization types.
Details the architecture of the IBM DS8000 series based on three major elements and three tiers of processing power.
Describes the five supported DS8880 system types with frames, including models and features.
Explains how to configure storage using the DS8000 Storage Management GUI or DS CLI.
Describes RAID implementation to improve data storage reliability and performance.
Details the web-based GUI for configuring, managing, and monitoring storage and Copy Services.
Describes the DS CLI for creating, deleting, modifying, and viewing Copy Services and logical configuration.
Explains how Copy Services Manager controls Copy Services for data replication and disaster recovery.
Lists feature codes used to order hardware features for the DS8880 system.
Details the types of drives available for the DS8000 storage system.
Explains the licensed function for copying and transferring volume data to cloud storage.
Covers flexible data mirroring for replication between storage systems, including Metro Mirror and Global Mirror.
Discusses data encryption and security features to conform with NIST SP 800-131A requirements.
Details the selection of I/O adapter features, including enclosures, adapters, and cables.
Outlines the necessary power features, including power cords, input voltage, and DC-UPS.
Describes the mandatory license required for each DS8000 storage system.
Details features for data duplication, migration, and disaster recovery.
Explains the optional feature for optimizing performance by placing data on faster storage tiers.
Explains the license based on usable capacity for data duplication, migration, and disaster recovery.
Guides on planning location based on space and floor load requirements.
Addresses safety issues like fire suppression and earthquake safety during storage system planning.
Outlines options for enabling outbound (call home) and inbound (remote services) support.
Details requirements for enabling disk encryption using IBM Security Key Lifecycle Manager.
Defines requirements for cryptographic algorithms and security strengths for NIST SP 800-131A compliance.
Guides on considering workload requirements and use-based licensing for flexibility.
Summarizes the non-concurrent conversion process, model changes, and prerequisites.