How IBM does BYOD




Optimizing the World’s Infrastructure
Copenhagen May 22 2012

© 2012 IBM Corporation
What is BYOD


In the consumerization of IT, BYOD is a phrase that has
become widely adopted to refer to employees who bring
their own computing devices – such as smartphones,
laptops and PDAs – to the workplace for use and
connectivity on the corporate network.

BYOD is short for Bring Your Own Device




                                                          1
Why BYOD

Consumer technology is convenient, easy to learn,
and fun to use.

Consumer technology brings real business value in
terms of productivity and business agility.

Users (might) pay for their own equipment.

Cutting edge technology.




                                                    2
And why not . . .

Consumer technology is generally not as secure and
manageable as required by the enterprise.

Lack of a strategic approach to the consumerization of IT
creates security risks, financial exposure, and a
management nightmare.

Difficult to measure improved User Productivity.




                                                            3
Top Free iPhone Apps:              Citrix Receiver
    1. Temple Run (Imangi Studios, LLC) VNC
    2. Doodle Sprint! (Wivvu)                 RDP
    3. Zombie Farm (The Playforge, LLC)vSphere Client
    4. the Sheeps Free (Ivan Starchenkov)
    5. Pocket Potions (Breaktime Studios) iSSH
                      Top Paid iPhone Apps:
                                            Keynote
    6. Social Girl (Crowdstar Inc.) (Clickgamer.com)
                      1. Angry Birds
                      2. Fruit Ninja (Halfbrick Studios)
    7. Dice With Buddies Free (Stofle Quickoffice
    Designs)          3. Camera+ (tap tap tap)
                                    Microsoft OneNote
    8. Facebook (Facebook, Inc.) Water? (Disney)
                      4. Where’s My
                      5. Words         IBM Sametime
    9. Instagram (Burbn, Inc.) With Friends Paid iPad Apps:
                                          Top (Zynga)
    10. Global War RiotCut theLotus Symphony Viewer (Electronic Arts)
                      6. (Addmired, Inc.) MONOPOLY for iPad
                                          1.
                                 Rope (Chillingo Ltd.)
                      7. Tiny Wings (Andreas Illiger) Water? (Disney)
                                          2. Where’s My
                                           Flipboard
                      8. MADDEN NFL 12 SCRABBLE for iPad (Electronic Arts)
                                          3.(Electronic Arts)
                                      Dragon Dictation (Electronic Arts)
                                          4. TETRIS for iPad
                      9. Bejeweled (PopCap)
                                        VMware View
                                          5. Words With Friends HD (Zynga)
                      10. TETRIS (Electronic Arts)
                                       Calculator Pro (Chillingo Ltd.)
                                          6. Angry Birds HD
                                          7. Pages (Apple)
                                           Numbers
                                          8. THE GAME OF LIFE for iPad (Electronic Arts)
                                           PlainText
                                          9. Real Racing 2 HD (Firemint Pty Ltd.)
                                           Dropbox
                                          10. MADDEN NFL 12 by EA SPORTS For iPad
                                         Time Zones
                                          (Electronic Arts)
Source: App Store Official Charts January 2012
ZDNet.com Blog                                      hypOps
                                                 SharePlus Lite                            4
                                                  Zoho Docs
IBM and BYOD


   425.000 IT-experts
   530.000 Workstations and Laptops
   Large number of Mobile Devices
   Strict Business Conduct guidelines
   Role-based Management
   Tivoli Endpoint Manager


                                        5
Roles

 Workstation Roles
 • Primary workstation
 • Secondary workstation
 • Shared workstation
 • Personaly owned workstation
 • Classroom workstation
 • Lab workstation

                          User Roles
                          • Privileged
                          • Non-privileged


                                             6
7
Tivoli Endpoint Manager
    IT Asset              IT Operations            IT Security and               Green IT
  Management                                         Compliance


• Network Asset        • Patch management        • Security Baselines     • Windows and Mac
  Discovery            • Software                • Vulnerability            power management
• Hardware and           Distribution              assessment             • Wake-on-LAN
  Software inventory   • OS deployment           • Network quarantine • Current power
• Software Use         • Remote control          • Multi-vendor anti-   usage baselines
  Analysis                                         virus Management     and savings models
                       • Mobile Device
• Software license       Management              • Endpoint protection
  compliance
  analysis

                             1 console, 1 agent, 1 server,

            Microsoft Windows • Mac OSX • IBM AIX • HP-UX • Solaris • VMWare ESX Server •
                      7 versions of Linux • iOS • Android • Symbian • Windows Mobile

                                                                                               8
9
IBM Internal Project
      Global endpoint security            Endpoint security issue by
               issues                               GEO




                                                                       Americas
                                                                       Europe
                                                                       Asia




     2006   2007    2008    2009   2006      2007   2008   2009




                                                                                10
10
11
       Country A
       Country B
       Country C
       Country D
       Country E
       Country F
       Country G
       Country H
        Country I
       Country J
       Country K
       Country L
       Country M
       Country N
       Country O
       Country P
       Country Q
       Country R
       Country S
       Country T
       Country U
       Country V
      Country W
       Country X
       Country Y
       Country Z
     Country AA
     Country BB
                    Normalized security issues




     Country CC
     Country DD
     Country EE
      Country FF
     Country GG
     Country HH
       Country II
      Country JJ
     Country KK
          BigFix
      Country LL
     Country MM
     Country NN
11
Endpoint security issues by GEO

             Before TEM                                         After TEM




                                                                                          America
                                     Americas                                             Europe
                                     Europe
                                                                                          Asia
                                     Asia




     2006   2007   2008     2009                2006   2007   2008   2009   2010   2011




                                                                                             12
12
Endpoint Manager - Mobile Device Management




                                              13
BlueMac




          14
BYOD


Key elements

• Strategi

• Policy

• Tool




               15
Ibm.com/mobile-enterprise
                      ibm.com/tivoli/endpoint
Martin Vittrup
Senior Technology Specialist
IBM Denmark
vittrup@dk.ibm.com
                                                  16
Speaker instructions
•   IBM speakers, IF you make any reference to product/services content
    that won’t be announced until after your PCTY 2012 event concludes,
    you must include the disclaimer language (on slide 2 here) verbatim.
    The disclaimer language must be on the second slide in your
    presentation and is in addition to the “Acknowledgements, disclaimers
    and trademarks” page which is to be included in all presentations (slide
    7 here).
•   IBM speakers, you must include the “Acknowledgements, disclaimers
    and trademarks” page (slide 7 here) at the end of your presentation. IF
    you are speaking with a customer or Business Partner, you MUST use
    the disclaimer slide.




                                                                               17
Please note:
•   IBM’s statements regarding its plans, directions, and intent are
    subject to change or withdrawal without notice at IBM’s sole discretion.
•   Information regarding potential future products is intended to outline
    our general product direction and it should not be relied on in making a
    purchasing decision.
•   The information mentioned regarding potential future products is not a
    commitment, promise, or legal obligation to deliver any material, code or
    functionality. Information about potential future products may not be
    incorporated into any contract. The development, release, and timing of
    any future features or functionality described for our products remains at
    our sole discretion.
•   Performance is based on measurements and projections using standard
    IBM benchmarks in a controlled environment. The actual throughput or
    performance that any user will experience will vary depending upon
    many factors, including considerations such as the amount of
    multiprogramming in the user's job stream, the I/O configuration, the
    storage configuration, and the workload processed. Therefore, no
    assurance can be given that an individual user will achieve results similar
    to those stated here.


                                                                                  18
19
Divider Slide
21
Acknowledgements, disclaimers
and trademarks
© Copyright IBM Corporation 2012. All rights reserved.

The information contained in this publication is provided for informational purposes only. While efforts were made to verify the
completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or
implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without
notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other
materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations
from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM
software.

References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in
which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature
availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any
activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM
future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.

Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested
these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBM
products and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of those
products and services.

All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products
and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will
vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have
the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.

Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating
system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography.

IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products
and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other
countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark
symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was
published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is
available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml




                                                                                                                                               22

More Related Content

PDF
Founder Labs - Summer 2011 - The Mobile Ecosystem
PPTX
Spain Startup Pitches 3
PDF
Tech comm presentation 2012 08-16
PDF
Mobile Apps- Business Toolkit for the Manager
PDF
Adobe: Changing the game
PDF
Japan gaming
PDF
The Future of Things
PDF
CES 2011 Recap - by @AdamB
Founder Labs - Summer 2011 - The Mobile Ecosystem
Spain Startup Pitches 3
Tech comm presentation 2012 08-16
Mobile Apps- Business Toolkit for the Manager
Adobe: Changing the game
Japan gaming
The Future of Things
CES 2011 Recap - by @AdamB

What's hot (13)

PDF
Mobile Apps 2012 conference: From concept to release
PDF
Conferencia de Prensa CES 2013
PPT
Whatz App - The Power of Android
ZIP
Beautiful Mind: iPhone Anatomy & Architecture
DOC
The War of the Tablets
PDF
Mobile App Developers - DevBatch Mobile Apps Portfolio
PDF
Ibm watson - how it works, and what it means for society beyond winning jeo...
PPTX
E mental Health Conference - Presentations
PDF
Mobile design matters - iOS and Android
PDF
[GAMENEXT] yodo1, Mobilize Your Games in China
PDF
On the Origins of Digital Species
PDF
The Journey of Mobile Computing
PDF
Roadshow Europe Qualcomm - Julian Harris
Mobile Apps 2012 conference: From concept to release
Conferencia de Prensa CES 2013
Whatz App - The Power of Android
Beautiful Mind: iPhone Anatomy & Architecture
The War of the Tablets
Mobile App Developers - DevBatch Mobile Apps Portfolio
Ibm watson - how it works, and what it means for society beyond winning jeo...
E mental Health Conference - Presentations
Mobile design matters - iOS and Android
[GAMENEXT] yodo1, Mobilize Your Games in China
On the Origins of Digital Species
The Journey of Mobile Computing
Roadshow Europe Qualcomm - Julian Harris
Ad

Similar to PCTY 2012, How IBM does BYOD v. Martin Vittrup (20)

PPTX
Securing mobile population for White Hats
PPTX
Mobile – Adoption and Adaption in 2012
PDF
Mobile gaming sxsw
KEY
콘텐츠 플랫폼 구조 분석
PDF
Online information conference 2011
PPTX
Mobile Gaming: Past Present and Future
PDF
The New Mobile Landscape - OWASP Ireland
KEY
Playground
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PPT
37 New Gadgets for 2012 that will Launch your Small Business into the 21st Ce...
PDF
Windows In Academia Intro
PDF
Apptizr January Top Apps
PDF
iPhone App Development Overview
PDF
Apptizr Top Apps March 2010
PPT
Softjourn mobile experience
PDF
Gaming is on-the-go
PPT
Mobility and Apps: The Intersection of Productivity in Business
PPTX
Defending Behind the Mobile Device
PDF
Nintendo Avenues For Growth Hult2010
PDF
《氪周刊:互联网创业必读》(第61期)
Securing mobile population for White Hats
Mobile – Adoption and Adaption in 2012
Mobile gaming sxsw
콘텐츠 플랫폼 구조 분석
Online information conference 2011
Mobile Gaming: Past Present and Future
The New Mobile Landscape - OWASP Ireland
Playground
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
37 New Gadgets for 2012 that will Launch your Small Business into the 21st Ce...
Windows In Academia Intro
Apptizr January Top Apps
iPhone App Development Overview
Apptizr Top Apps March 2010
Softjourn mobile experience
Gaming is on-the-go
Mobility and Apps: The Intersection of Productivity in Business
Defending Behind the Mobile Device
Nintendo Avenues For Growth Hult2010
《氪周刊:互联网创业必读》(第61期)
Ad

More from IBM Danmark (20)

PPTX
DevOps, Development and Operations, Tina McGinley
PPTX
Velkomst, Universitetssporet 2013, Pia Rønhøj
PPTX
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
PPT
Mobile, Philip Nyborg
PPTX
IT innovation, Kim Escherich
PPTX
Echo.IT, Stefan K. Madsen
PPT
Big Data & Analytics, Peter Jönsson
PPTX
Social Business, Alice Bayer
PDF
Numascale Product IBM
PDF
Mellanox IBM
PDF
Intel HPC Update
PDF
IBM general parallel file system - introduction
PDF
NeXtScale HPC seminar
PDF
Future of Power: PowerLinux - Jan Kristian Nielsen
PDF
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
PDF
Future of Power: Big Data - Søren Ravn
PDF
Future of Power: IBM PureFlex - Kim Mortensen
PDF
Future of Power: IBM Trends & Directions - Erik Rex
PDF
Future of Power: Håndtering af nye teknologier - Kim Escherich
PDF
Future of Power - Lars Mikkelgaard-Jensen
DevOps, Development and Operations, Tina McGinley
Velkomst, Universitetssporet 2013, Pia Rønhøj
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Mobile, Philip Nyborg
IT innovation, Kim Escherich
Echo.IT, Stefan K. Madsen
Big Data & Analytics, Peter Jönsson
Social Business, Alice Bayer
Numascale Product IBM
Mellanox IBM
Intel HPC Update
IBM general parallel file system - introduction
NeXtScale HPC seminar
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Big Data - Søren Ravn
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power - Lars Mikkelgaard-Jensen

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
August Patch Tuesday
PPT
Geologic Time for studying geology for geologist
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Enhancing emotion recognition model for a student engagement use case through...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Group 1 Presentation -Planning and Decision Making .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Assigned Numbers - 2025 - Bluetooth® Document
August Patch Tuesday
Geologic Time for studying geology for geologist
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
Taming the Chaos: How to Turn Unstructured Data into Decisions
DP Operators-handbook-extract for the Mautical Institute
Benefits of Physical activity for teenagers.pptx
Getting Started with Data Integration: FME Form 101
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
sustainability-14-14877-v2.pddhzftheheeeee
O2C Customer Invoices to Receipt V15A.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Enhancing emotion recognition model for a student engagement use case through...

PCTY 2012, How IBM does BYOD v. Martin Vittrup

  • 1. How IBM does BYOD Optimizing the World’s Infrastructure Copenhagen May 22 2012 © 2012 IBM Corporation
  • 2. What is BYOD In the consumerization of IT, BYOD is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and PDAs – to the workplace for use and connectivity on the corporate network. BYOD is short for Bring Your Own Device 1
  • 3. Why BYOD Consumer technology is convenient, easy to learn, and fun to use. Consumer technology brings real business value in terms of productivity and business agility. Users (might) pay for their own equipment. Cutting edge technology. 2
  • 4. And why not . . . Consumer technology is generally not as secure and manageable as required by the enterprise. Lack of a strategic approach to the consumerization of IT creates security risks, financial exposure, and a management nightmare. Difficult to measure improved User Productivity. 3
  • 5. Top Free iPhone Apps: Citrix Receiver 1. Temple Run (Imangi Studios, LLC) VNC 2. Doodle Sprint! (Wivvu) RDP 3. Zombie Farm (The Playforge, LLC)vSphere Client 4. the Sheeps Free (Ivan Starchenkov) 5. Pocket Potions (Breaktime Studios) iSSH Top Paid iPhone Apps: Keynote 6. Social Girl (Crowdstar Inc.) (Clickgamer.com) 1. Angry Birds 2. Fruit Ninja (Halfbrick Studios) 7. Dice With Buddies Free (Stofle Quickoffice Designs) 3. Camera+ (tap tap tap) Microsoft OneNote 8. Facebook (Facebook, Inc.) Water? (Disney) 4. Where’s My 5. Words IBM Sametime 9. Instagram (Burbn, Inc.) With Friends Paid iPad Apps: Top (Zynga) 10. Global War RiotCut theLotus Symphony Viewer (Electronic Arts) 6. (Addmired, Inc.) MONOPOLY for iPad 1. Rope (Chillingo Ltd.) 7. Tiny Wings (Andreas Illiger) Water? (Disney) 2. Where’s My Flipboard 8. MADDEN NFL 12 SCRABBLE for iPad (Electronic Arts) 3.(Electronic Arts) Dragon Dictation (Electronic Arts) 4. TETRIS for iPad 9. Bejeweled (PopCap) VMware View 5. Words With Friends HD (Zynga) 10. TETRIS (Electronic Arts) Calculator Pro (Chillingo Ltd.) 6. Angry Birds HD 7. Pages (Apple) Numbers 8. THE GAME OF LIFE for iPad (Electronic Arts) PlainText 9. Real Racing 2 HD (Firemint Pty Ltd.) Dropbox 10. MADDEN NFL 12 by EA SPORTS For iPad Time Zones (Electronic Arts) Source: App Store Official Charts January 2012 ZDNet.com Blog hypOps SharePlus Lite 4 Zoho Docs
  • 6. IBM and BYOD 425.000 IT-experts 530.000 Workstations and Laptops Large number of Mobile Devices Strict Business Conduct guidelines Role-based Management Tivoli Endpoint Manager 5
  • 7. Roles Workstation Roles • Primary workstation • Secondary workstation • Shared workstation • Personaly owned workstation • Classroom workstation • Lab workstation User Roles • Privileged • Non-privileged 6
  • 8. 7
  • 9. Tivoli Endpoint Manager IT Asset IT Operations IT Security and Green IT Management Compliance • Network Asset • Patch management • Security Baselines • Windows and Mac Discovery • Software • Vulnerability power management • Hardware and Distribution assessment • Wake-on-LAN Software inventory • OS deployment • Network quarantine • Current power • Software Use • Remote control • Multi-vendor anti- usage baselines Analysis virus Management and savings models • Mobile Device • Software license Management • Endpoint protection compliance analysis 1 console, 1 agent, 1 server, Microsoft Windows • Mac OSX • IBM AIX • HP-UX • Solaris • VMWare ESX Server • 7 versions of Linux • iOS • Android • Symbian • Windows Mobile 8
  • 10. 9
  • 11. IBM Internal Project Global endpoint security Endpoint security issue by issues GEO Americas Europe Asia 2006 2007 2008 2009 2006 2007 2008 2009 10 10
  • 12. 11 Country A Country B Country C Country D Country E Country F Country G Country H Country I Country J Country K Country L Country M Country N Country O Country P Country Q Country R Country S Country T Country U Country V Country W Country X Country Y Country Z Country AA Country BB Normalized security issues Country CC Country DD Country EE Country FF Country GG Country HH Country II Country JJ Country KK BigFix Country LL Country MM Country NN 11
  • 13. Endpoint security issues by GEO Before TEM After TEM America Americas Europe Europe Asia Asia 2006 2007 2008 2009 2006 2007 2008 2009 2010 2011 12 12
  • 14. Endpoint Manager - Mobile Device Management 13
  • 15. BlueMac 14
  • 17. Ibm.com/mobile-enterprise ibm.com/tivoli/endpoint Martin Vittrup Senior Technology Specialist IBM Denmark vittrup@dk.ibm.com 16
  • 18. Speaker instructions • IBM speakers, IF you make any reference to product/services content that won’t be announced until after your PCTY 2012 event concludes, you must include the disclaimer language (on slide 2 here) verbatim. The disclaimer language must be on the second slide in your presentation and is in addition to the “Acknowledgements, disclaimers and trademarks” page which is to be included in all presentations (slide 7 here). • IBM speakers, you must include the “Acknowledgements, disclaimers and trademarks” page (slide 7 here) at the end of your presentation. IF you are speaking with a customer or Business Partner, you MUST use the disclaimer slide. 17
  • 19. Please note: • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. • Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 18
  • 20. 19
  • 22. 21
  • 23. Acknowledgements, disclaimers and trademarks © Copyright IBM Corporation 2012. All rights reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBM products and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of those products and services. All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography. IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml 22