Connect With Us

Mel Beckman


Mel Beckman is a senior technical director for Penton Media, a software engineer, and a network engineering consultant.

Follow Mel on Twitter (@PurePowerbyMel).

power7+ chip design
Suzhou PowerCore to Start Using IBM POWER Tech for New Chip Design in China 
The IBM-backed OpenPOWER Foundation has taken a major step forward this week: Two Chinese organizations, Suzhou PowerCore Technology Company and the Research Institute of Jiangsu Industrial Technology, will join the OpenPOWER Foundation.
ibm linux on power
Power Trends News: IBM Expands Integrated Facility for Linux 
PowerLinux began as a line of specially priced IBM hardware products aiming to make IBM Power an attractive dedicated host for Linux-based applications. This fall, IBM announced a dramatic expansion of PowerLinux scalability with its IFL.
IBM Fall 2013 Power Systems Announcements 
IBM unleashed a slew of new Power Systems features and capabilities in its Q4 2013 announcement package today. Topics include Big Data management and performance, new OpenStack and PowerVM virtualization products, PowerLinux embedded in mainline POWER7+ systems, a new performance management feature called Power Enterprise Pools, and AIX and IBM i Technology spiffs.
IBM Hitches Its Cloud to OpenStack 
IBM today announces that its cloud services and software will be based on open cloud standards, primarily OpenStack (, beginning with a new service offering called SmartCloud Orchestrator. OpenStack is a consortium of cloud computing developers that specifies standards and reference implementations for an open cloud architecture. OpenStack aims to free businesses from proprietary vendor lock-in. Significantly, IBM says it has already migrated parts of its SmartCloud infrastructure to OpenStack.
OpenFlow, PureFlex, and the Future of Networking, Part 2 
OpenFlow's internal mechanics are clean, elegant, and powerful. Once you know how OpenFlow works. you won't stop thinking about the possibilities.
OpenFlow cools down hot networks
OpenFlow, PureFlex, and the Future of Networking, Part 1 
Converged network are the current state of the art in private clouds. OpenFlow is the new state of the art in both private and public clouds.
Converged networks are the key to a scalable cloud infrastructure
Understanding Converged Networks and PureFlex  3
Network guru Mel Beckman explains the new world of converged network architectures, and how IBM's Flex System Fabric gives you extreme flexibility in deploying virtual machines throughout your enterprises.
Manage your workloads with IBM's Power Systems
Workload Management 
Mel Beckman discusses workload management and explains how IBM’s Power Systems were engineered to provide high-quality workload management tools.
PowerLinux Pumps Up Apps
PowerLinux Pumps Up Linux Apps 
In this overview of the PowerLinux landscape, Mel Beckman describes how PowerLinux brings big-iron reliability and scalability to Linux while still offering a cost-competitive entry point.
AIX and UNIX User-Related Commands Cheat Sheet
Cheat Sheet for AIX User-related Commands 
This infographic cheat sheet gives you a quick guide to the differences between user administration commands on AIX and other UNIX-derived operating systems so that you can exploit user administration tools and techniques you find in forums and elsewhere on the web.
Hosted Infrastructure Checklist Art
Checklist for Hosted Infrastructure Deployment 
The concept of hosted infrastructure isn’t a new one, but the advent of public cloud computing has made it a lot easier to buy offsite compute services. Not all hosted infrastructure is in the public cloud, however. The economies of cloud-based infrastructure have created a surge in the use of private colocation, or “colo,” facilities that let you host your own servers, switches, and routers, or lease dedicated hardware from the colo operator. It’s true that you can buy cloud computing in smaller increments, with zero capital investment. But in the long run, the cloud still costs more than owning your own hardware.
Private or public cloud smack down
Private vs Public Cloud Smackdown 
The public cloud showed IT technologists the advantages of multi-tenant infrastructure: Low startup costs, elastic resource expansion, stellar business agility, and simplified disaster recovery and business continuity. But public clouds have their problems. They’re still more expensive in the long run than private infrastructure, and IT faces control, security and performance difficulties.
Business Continuity from the Cloud
Exploiting the Cloud for Business Continuity 
Disasters happen, and prepared businesses survive them. But simple survival is no longer enough in today’s highly competitive business climate. With traditional disaster recovery (DR) thinking, a disaster occurs, the business relocates to another location with adequate compute resources, restores its applications and data from backup, and goes to work in “recovery” mode. That approach worked in the batch processing era, but it doesn’t work so well with modern IT systems composed of interwoven server and database complexes. Today’s IT data centers weren’t built in a day, and they can’t be rebuilt that quickly, either.
Automated Tiered Storage Illustration
Automated Tiered Storage with IBM Power Systems  1
Data center storage has always been a moving target. Capacities and speeds steadily improve as prices drop, while application storage demands simultaneously grow. New devices are added at a much more rapid rate than the rate at which old hardware is retired, so storage stratifies into tiers based on cost and performance. Older applications gradually find themselves running on the oldest, slowest storage, while new -- but not necessarily mission-critical applications -- get first crack at fresh, speedy storage. It's complex and inconvenient so optimization rarely gets done. . . .
Solid State Disk: PureFlex and the Speed for Need 
Moore’s Law, often used to predict computer cost/performance improvement over time, states that the number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years. This means that CPUs and memory generally double in speed and capacity every two years at a constant price. Alas, Moore’s Law doesn’t apply to traditional mechanical disk storage, which is made of spinning magnetic platters and ratcheting access arms rather than transistors. In the past 10 years, disk data transfer rates have increased only 25 percent against CPU speed increases of more than 30,000 percent (through multi-core parallelism) and memory capacity improvements of the same magnitude. As a result, the number-one bottleneck in most business applications today is storage, resulting in systems that don’t have the speed to meet users’ needs.
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.

POWER IT Pro Blogs
Working without Windows
Mar 24, 2014

Working in a World Without Windows  

For a long time there have been few options when it comes to the desktop. But tablets, smartphones, and web-based services/applications have made people think twice about their reliance on Windows. Erwin Earley recently moved to a Linux-based desktop; in this blog, he shares his thoughts (both good and bad) on the experience....More
Mar 10, 2014

Indian exchange shows scale of IBM's cloud ambition  

Anyone seeking evidence of IBM's accelerating commitment to cloud-based business offerings need look no further than a massive project it launched in India last week....More
Mar 10, 2014

Halcyon tour highlights strength of Infor M3  

British systems management specialist Halcyon Software is setting off on a tour of M3 user group events this month that will take in the Netherlands, Denmark, Sweden and Norway....More
eBooks & Training
Dec 3, 2012

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×