A Tour Inside the IBM Z17

I/O Architecture and Rack Layout

  • Diagram fascinates people: in a 4‑rack z17, most space is I/O drawers, not CPUs; some is intentionally left empty for floor‑loading and power‑density compatibility with previous generations.
  • I/O drawers are large (8U) PCIe Gen5 infrastructure: up to 12 drawers, 192 PCIe slots, multiple channel subsystems (up to 6×256 channels), heavy use of PCIe fan‑out and switches.
  • Each I/O device is on a “channel” (effectively a separate controller computer), with lots of redundancy and hot‑swap support; this design is key to throughput and reliability.

Mainframes vs POWER and Open Hardware

  • Clarification that IBM z and POWER are distinct architectures, though they share ideas.
  • Discussion of Raptor’s POWER9 workstations (Talos II, Blackbird) as expensive but open(ish) alternatives to x86, motivated by ISA diversity and firmware transparency.
  • Contrast between openness levels: POWER9 has open ISA and on‑chip firmware; OpenSPARC Niagara 2 goes much further with full RTL; neither is fully “free” silicon in practice.

Pricing, Licensing, and Procurement

  • No public list prices; everything is negotiated and often NDA‑bound. Estimates range from ~$100k for older/entry systems to “over a million” for large configs; modern z‑class often leased.
  • Pricing is dominated by software and capacity licensing (MIPS / rolling averages, “sub‑capacity” models). z/OS and COBOL capacity is most expensive; Linux on z and Java somewhat cheaper.
  • Note that an IBM Linux‑only mainframe (e.g., Rockhopper) has mid–six‑figure starting prices but won’t run z/OS.

Who Uses Mainframes and For What

  • Widely used by large, long‑lived institutions: big banks, payment networks, insurers, governments, social security systems, healthcare, and other Fortune‑500‑scale orgs.
  • Core workloads: high‑volume OLTP plus batch—payments, ledgers, entitlement calculations, fraud detection—often with Java and COBOL mixed.
  • Many systems still effectively compatible with IBM 360‑era software; some 1980s assembly still runs unchanged.

Reliability, Performance, and New Features

  • Emphasis on extreme reliability (claims of 8 nines), hot‑swappable components, spare processor units, RAID‑like memory, and precise I/O semantics (no “lying” about writes).
  • Architecture prioritizes huge caches and very fat cores for single‑thread/low‑latency performance over core count density; good for workloads that can’t be easily sharded.
  • Crypto is heavily accelerated in hardware (CPACF), including “post‑quantum” algorithms; AI units are aimed at ultra‑low‑latency inference during transactions, not training.

Legacy, Migration, and Growth

  • Mainframe usage is framed as “legacy but growing”: overall compute on z increases as more frontends and analytics are bolted onto old cores.
  • Migration off mainframes is described as risky, expensive, and often performance‑regressive; an example social‑security rewrite reportedly failed by being orders of magnitude slower than the original.
  • Some argue all workloads could migrate but that keeping mainframes is cheaper and less risky; others highlight that modern replacements often undervalue performance and correctness versus developer cost.

Cloud Comparisons and Alternatives

  • One view: cloud is “mainframes gone full circle”—centralized, consumption‑based, specialized hardware; difference is that in the cloud you must build reliability in software across unreliable nodes.
  • For many orgs, a fault‑tolerant distributed x86 system is preferred due to vendor plurality and less IBM lock‑in, despite the engineering effort.
  • Skepticism about cost‑effectiveness: commodity 1U servers can offer more cores, RAM density, and network bandwidth, though defenders note that raw counts ignore latency and reliability needs.

Security and Other Mainframe‑like Systems

  • Side discussion of Unisys ClearPath MCP and BAE’s XTS/STOP as security‑focused “mainframe‑style” systems; debate over whether their security claims meaningfully exceed well‑hardened Linux.
  • Some see these systems’ security story as partly marketing and note that MCP now runs as an emulator atop Linux, changing the threat model.