The IBM i Operating System (IBM i) is unique in the IT industry for its level of integration and for the underlying architecture of the operating system itself. IBM i has greatly evolved over the years and continues to offer tremendous value in low total cost of ownership. It provides IT professionals with a platform to implement and run business solutions while protecting the significant investments they have made over the years in mission-critical software.
The “i” in IBM i stands for integration and may be one of the single most defining characteristics of the operating system. Through this IBM i integration and the built-in automation of many system and data management functions, customers are able to run their businesses. It also boasts an extensive list of software features that can be added on or managed separately, including:
- Database: DB2 for i is characterized by its level of automation, which allows many customers to have a minimal number of technical staff devoted to database management and administration.
- Multiple Workload Virtualization: There are a host of security capabilities which make isolation of data between workloads straightforward and secure, along with a subsystem design that allows customers to balance the importance of various workloads to ensure that each is getting the amount of system resources appropriate for its function.
- Programming Languages: IBM i ships the underlying support for languages such as CL, RPG, C/C++ and Java, with enhancements in every release.
- High-Availability and Integrity Underpinnings: Allows for a simpler, more complete approach to highly available applications and data integrity that can be built on the standard file systems of other operating environments.
- System Management Tool: Allows customers to track, monitor and plan for the performance and resource use on their system.
In addition to the IBM i integration, another key differentiator is the architecture that allows for simplicity, stability and security.
- Simplicity: Storage management is based on single-level storage architecture. It treats all of the storage managed by IBM i as if it is one long stream of memory that encompasses the system memory, as well as the storage on disks. This makes the management of storage, and the data base objects contained in that storage, significantly simpler.
- Stability: IBM i is able to fundamentally change the implementation of underlying hardware, firmware and virtualization features, without requiring rewriting, changing or even recompiling the applications written by users. It also separates the address spaces of user applications and the operating system, making it practically impossible for poorly written or malicious software to intrude upon the underlying operating system support.
- Security: IBM i has an object-based architecture where each entity on the system is an object. These objects can be edited, locked and/or hidden from other users. Users who have a similar role on the system can be grouped together for role-based security.
Author: Drew W.
Key Information Systems