With this book, you can gain a broad understanding of the IBM PowerHA SystemMirror® architecture. If you plan to install, migrate, or administer a high availability cluster, this book is right for you.
This book can help IBM AIX® professionals who seek a comprehensive and task-oriented guide for developing the knowledge and skills required for PowerHA cluster design, implementation, and daily system administration. It provides a combination of theory and practical experience.
This book is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror Standard on IBM POWER® systems.
It is important to think of big data and analytics together. Big data is the term used to describe the recent explosion of different types of data from disparate sources. Analytics is about examining data to derive interesting and relevant trends and patterns, which can be used to inform decisions, optimize processes, and even drive new business models.
With today's deluge of data comes the problems of processing that data, obtaining the correct skills to manage and analyze that data, and establishing rules to govern the data's use and distribution. The big data technology stack is ever growing and sometimes confusing, even more so when we add the complexities of setting up big data environments with large up-front investments.
Cloud computing seems to be a perfect vehicle for hosting big data workloads. However, working on big data in the cloud brings its own challenge of reconciling two contradictory design principles. Cloud computing is based on the concepts of consolidation and resource pooling, but big data systems (such as Hadoop) are built on the shared nothing principle, where each node is independent and self-sufficient. A solution architecture that can allow these mutually exclusive principles to coexist is required to truly exploit the elasticity and ease-of-use of cloud computing for big data environments.
This IBM® RedpaperTM publication is aimed at chief architects, line-of-business executives, and CIOs to provide an understanding of the cloud-related challenges they face and give prescriptive guidance for how to realize the benefits of big data solutions quickly and cost-effectively.
This book addresses the packaging and features in WebSphere Application Server V8 and highlights the most common implementation topologies. It provides information about planning for specific tasks and components that conform to the WebSphere Application Server environment.
Also in this book are planning guidelines for WebSphere Application Server V8 and WebSphere Application Server Network Deployment V8 on distributed platforms and for WebSphere Application Server for z/OS® V8. This book contains information about migration considerations when moving from previous releases.
InfoSphere DataStage is at the core of IBM Information Server, providing components that yield a high degree of freedom. For any particular problem there might be multiple solutions, which tend to be influenced by personal preferences, background, and previous experience. All too often, those solutions yield less than optimal, and non-scalable, implementations.
This book includes a comprehensive detailed description of the components available, and descriptions on how to use them to obtain scalable and efficient solutions, for both batch and real-time scenarios.
The advice provided in this document is the result of the combined proven experience from a number of expert practitioners in the field of high performance information integration, evolved over several years.
This book is intended for IT architects, Information Management specialists, and Information Integration specialists responsible for delivering cost-effective IBM InfoSphere DataStage performance on all platforms.
We also describe how to move your CICS applications, and business, into the mobile space, and how to prepare your CICS environment for the following scenarios:
Taking an existing CICS application and exposing it as a JSON web service
Creating a new CICS application, based on a JSON schema
Using CICS as a JSON client
This Redbooks publication provides information about the installation and configuration steps for both Worklight Studio and Worklight Server. Worklight Studio is the Eclipse interface that a developer uses to implement a Worklight native or hybrid mobile application, and can be installed into an Eclipse instance. Worklight Server is where components developed for the server side (written in Worklight Studio), such as adapters and custom server-side authentication logic, run.
CICS applications and their associated data constitute some of the most valuable assets owned by an enterprise. Therefore, the protection of these assets is an essential part of any CICS mobile project. This Redbooks publication, after a review of the main mobile security challenges, outlines the options for securing CICS JSON web services, and reviews how products, such as Worklight and IBM DataPower®, can help. It then shows examples of security configurations in CICS and Worklight.
In addition, IBM now provides tools to simplify the enablement process, such as the highly scalable IBM Data Movement Tool for moving schema and data into DB2, and an Editor and Profiler for PL/SQL provided by the IBM Data Studio tool suite.
This Oracle to DB2 migration guide describes new technology, preferred practices for moving to DB2, and common scenarios that can help you as you move from Oracle to DB2. This book is intended for IT architects and developers who are converting from Oracle to DB2.
DB2 compatibility with Oracle is provided through native support. The new capabilities in DB2 that provide compatibility are implemented at the lowest and most intimate levels of the database kernel, as though they were originally engineered for DB2. means that the DB2 implementation is done without the aid of an emulation layer. This intimacy leads to the scalable implementation that DB2 offers, providing identical performance between DB2 compatibility features and DB2 other language elements. For example, DB2 runs SQL PL at the same performance as PL/SQL implementations of the same function.
Too many distributed physical servers with low utilization
A lengthy provisioning process that delays the implementation of new applications
Limitations in data center power and floor space
High total cost of ownership (TCO)
Difficulty allocating processing power for a dynamic environment
This IBM Redbooks® publication provides a technical planning guide and example for IT organizations to migrate from their x86 environment to Linux on System z. It begins by examining the benefits of migrating workloads to Linux on System z. Here, we describe the workload centric method of information technology and then discuss the benefits of migrating workloads to Linux on System z.
Next, we describe total cost of ownership analyses and we guide you in understanding how to analyze your environment before beginning a migration project. We also assist you in determining the expected consolidation ratio for a given workload type.
We also describe virtualization concepts along with describing the benefits of migrating from the x86 environment to guests residing on an IBM z/VM® single system image with live guest relocation.
This IBM Redbooks publication walks you through a migration approach, includes planning worksheets, as well as a chapter to assist you in analyzing your own systems. We also discuss post migration considerations such as acceptance testing of functionality and performance measurements.
The MQTT protocol is a lightweight messaging protocol that uses publish/subscribe architecture to deliver messages over low bandwidth or unreliable networks. A publish/subscribe architecture works well for HTML5, native, and hybrid mobile applications by removing the wait time of a request/response model. This creates a better, richer user experience.
The MQTT protocol is simple, which results in a client library with a low footprint. MQTT was proposed as an Organization for the Advancement of Structured Information Standards (OASIS) standard. This book provides information about version 3.1 of the MQTT specification.
This IBM Redbooks® publication provides information about how IBM MessageSight, in combination with MQTT, facilitates the expansion of enterprise systems to include mobile devices and m2m communications. This book also outlines how to connect IBM MessageSight to an existing infrastructure, either through the use of IBM WebSphere® MQ connectivity or the IBM Integration Bus (formerly known as WebSphere Message Broker).
This book describes IBM MessageSight product features and facilities that are relevant to technical personnel, such as system architects, to help them make informed design decisions regarding the integration of the messaging appliance into their enterprise architecture.
Using a scenario-based approach, you learn how to develop a mobile application, and how to integrate IBM MessageSight with other IBM products. This publication is intended to be of use to a wide-ranging audience.
This IBM Redbooks® publication provides fundamentals of Informix application development. It covers the Informix Client installation and configuration for application development environments. It discusses the skills and techniques for building Informix applications with Java, ESQL/C, OLE DB, .NET, PHP, Ruby on Rails, DataBlade®, and Hibernate.
The book uses code examples to demonstrate how to develop an Informix application with various drivers, APIs, and interfaces. It also provides application development troubleshooting and considerations for performance.
This book is intended for developers who use IBM Informix for application development. Although some of the topics that we discuss are highly technical, the information in the book might also be helpful for managers or database administrators who are looking to better understand their Informix development environment.
The book offers application performance examples deployed on IBM Power SystemsTM utilizing performance monitoring tools to leverage the comprehensive set of POWER virtualization features: Logical Partitions (LPARs), micro-partitioning, active memory sharing, workload partitions, and more. We provide a well-defined and documented performance tuning model in a POWER system virtualized environment to help you plan a foundation for scaling, capacity, and optimization
This book targets technical professionals (technical consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing solutions and support on IBM POWER systems, including performance tuning.
This IBM Redbooks® publication includes several of the announced features for SQL procedures, triggers, and functions in IBM i versions 6.1, 7.1, and 7.2. This book includes suggestions, guidelines, and practical examples to develop DB2 for i SQL procedures, triggers, and functions effectively.
This book covers the following topics:
Introduction to the SQL/Persistent Stored Modules (PSM) language, which is used in SQL procedures, triggers, and functions
This book is for IBM i database engineers and data-centric developers who strive to provide flexible, extensible, agile, and scalable database solutions that meet business requirements in a timely manner.
Before you read this book, you need to know about relational database technology and the application development environment on the IBM Power SystemsTM with the IBM i operating system.
Architectural design techniques (sizing your environment, single versus multiple installations, physical versus virtual servers, deployment in a large, existing storage infrastructure)
Database and server considerations (database backup and restoration methods and scripts, using IBM Data Studio Client for database administration, database placement and relocation, repository sizing and tuning, moving and migrating the server)
Alerting, monitoring and reporting (monitoring thresholds and alerts, performance management and analysis of reports, real-time performance monitoring for IBM SAN Volume Controller)
Security considerations (Tivoli Storage Productivity Center internal user IDs, user authentication configuration methods, how and why to set up and change passwords, configuring, querying, and testing LDAP and Microsoft Active Directory)
Heath checks (server heath and logs, health and recoverability of IBM DB2® databases, using the Database Maintenance tool)
Data management techniques (how to spot unusual growth incidents, scripted actions for Tivoli Storage manager and hierarchical storage management)
This book is for storage administrators who are responsible for the performance and growth of the IT storage infrastructure.
This publication was updated in January 2017 to reflect the latest support information.
As part of this trend, the following types of time-based information are collected:
Large data centers support a corporation or provide cloud services. These data centers need to collect temperature, humidity, and other types of
information over time to optimize energy usage.
Utility meters (referred to as smart meters) allow utility companies to collect information over a wireless network and to collect more data than ever before.
IBM Informix® TimeSeries is optimized for the processing of time-based data and can provide the following benefits:
Storage savings: Storage can be optimized when you know the characteristics of your time-based data. Informix TimeSeries often uses one third of the storage space that is required by a standard relational database.
Query performance: Informix TimeSeries takes into consideration the type of data to optimize its organization on disk and eliminates the need for some large indexes and additional sorting. For these reasons and more, some queries can easily have an order of magnitude performance improvement compared to standard relational.
Simpler queries: Informix TimeSeries includes a large set of specialized functions that allow you to better express the processing that you want to execute. It even provides a toolkit so that you can add proprietary algoritms to the library.
This IBM Redbooks® publication is for people who want to implement a solution that revolves around time-based data. It gives you the information that you need to get started and be productive with Informix TimeSeries.
Many enterprises implement extended distance connectivity in a silo manner. However, effective extended distance solutions require the involvement of different teams within an organization. Typically there is a network group, a storage group, a systems group, and possibly other teams.
The intent of this publication is to help you design and manage a solution that will provide for all of your System z extended distance needs in the most effective and flexible way possible. This book introduces an approach to help plan, optimize, and maintain all of the moving parts of the solution together.
This IBM® RedpaperTM publication explains what the key focus areas are for implementing a successful mobile government, how to address these focus areas with capabilities from IBM MobileFirstTM enterprise software, and what guidance and preferred practices to offer the IT practitioner in the public sector.
This paper explains the key focus areas specific to governments and public sector clients worldwide in terms of enterprise mobility and describes the typical reference architecture for the adoption and implementation of mobile government solutions. This paper provides practical examples through typical use cases and usage scenarios for using the capabilities of the IBM MobileFirst products in the overall solution and provides guidance, preferred practices, and lessons learned to IT consultants and architects working in public sector engagements.
The intended audience of this paper includes the following individuals:
Client decision makers and solution architects leading mobile enterprise adoption projects in the public sector
A wide range of IBM services and sales professionals who are involved in selling IBM software and designing public sector client solutions that include the IBM MobileFirst product suite
Solution architects, consultants, and IBM Business Partners responsible for designing and deploying solutions that include the integration of the IBM MobileFirst product suite
This book documents and addresses topics on how to use IBM Platform Cluster Manager to manage PowerLinux BigData data clusters through IBM InfoSphere BigInsights, Spectrum Scale, and Platform Symphony. This book documents how to set up and manage a big data cluster on PowerLinux servers to customize application and programming solutions, and to tune applications to use IBM hardware architectures. This document uses the architectural technologies and the software solutions that are available from IBM to help solve challenging technical and business problems.
This book is targeted at technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) that are responsible for delivering cost-effective Linux on IBM Power SystemsTM solutions that help uncover insights among client's data so they can act to optimize business results, product development, and scientific discoveries.
Modernization is a broad term when applied to applications. It is more than a single event. It is a sequence of actions. But even more, it is a process of rethinking how to approach the creation and maintenance of applications. There are tangible deliveries when it comes to modernization, the most notable being a modern user interface (UI), such as a web browser or being able to access applications from a mobile device. The UI, however, is only the beginning. There are many more aspects to modernization.
Using modern tools and methodologies can significantly improve productivity and reduce long-term cost while positioning applications for the next decade. It is time to put the past away. Tools and methodologies have undergone significant transformation, improving functionality, usability, and productivity. This is true of the plethora of IBM tools and the wealth of tools available from many Independent Solution Providers (ISVs).
This publication is the result of work that was done by IBM, industry experts, and by representatives from many of the ISV Tool Providers. Some of their tools are referenced in the book. In addition to reviewing technologies based on context, there is an explanation of why modernization is important and a description of the business benefits of investing in modernization. This critical information is key for line-of-business executives who want to understand the benefits of a modernization project. This book is appropriate for CIOs, architects, developers, and business leaders.
Making the Case for Modernization, IBM Systems Magazine
PowerVM is a combination of hardware, firmware, and software that provides CPU, network, and disk virtualization. These are the main virtualization technologies:
POWER7, POWER6, and POWER5 hardware
Virtual I/O Server
Though the PowerVM brand includes partitioning, management software, and other offerings, this publication focuses on the virtualization technologies that are part of the PowerVM Standard and Enterprise Editions.
This publication is also designed to be an introduction guide for system administrators, providing instructions for these tasks:
Configuration and creation of partitions and resources on the HMC
Installation and configuration of the Virtual I/O Server
Creation and installation of virtualized partitions
Examples using AIX, IBM i, and Linux
This edition has been updated with the latest updates available and an improved content organization.
Please note: The contents of this publication has been updated and migrated to the following publications. The material in this PDF should no longer be considered accurate.
An introduction to PowerVM that includes basic installation and set up:
IBM PowerVM Virtualization Introduction and Configuration
A deep dive into how to manage PowerVM virtualization 24x7:
IBM PowerVM Virtualization Managing and Monitoring
The enhancements that were added in 2013, including a chapter on mobility:
IBM PowerVM Enhancements What is new in 2013
This IBM Redbooks publication is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) responsible for providing continuous availability solutions and support.
This IBM Redbooks® publication helps the network and system administrator install, tailor, and quickly configure the IBM Distributed Virtual Switch 5000V (DVS 5000V) for a new or existing virtualization computing environment. It provides several practical applications of the numerous features of the DVS 5000V, including a step-by-step guide to deploying, configuring, maintaining, and troubleshooting the device. Administrators who are already familiar with the CLI interface of IBM System Networking switches will be comfortable with the DVS 5000V. Regardless of whether the reader has previous experience with IBM System Networking, this publication is designed to help you get the DVS 5000V functional quickly, and provide a conceptual explanation of how the DVS 5000V works in tandem with VMware.
This IBM Redbooks® publication describes the architecture and components of Optim Performance Manager Extended Edition. We provide information for planning the deployment of Optim Performance Manager and detail steps for successful installation, activation, and configuration of Optim Performance Manager and the Extended Insight client.
Optim Performance Manager delivers a new paradigm in terms of how it is used to monitor and manage database and database application performance issues. We describe individual product dashboards and reports and discuss, with various scenarios, how they can be used to identify, diagnose, prevent, and solve database performance problems.
This IBM® Redbooks® publication provides information to help clients that have JES3 and would like to migrate to JES2. It provides a comprehensive list of the differences between the two job entry subsystems and provides information to help you determine the migration effort and actions.
The book is aimed at operations personnel, system programmers, and application developers.
This document (simply known as xREF) is a quick reference guide to the specifications of the currently available models of each System x and BladeCenter server. Each page can be used in a stand-alone format and provides a dense and comprehensive summary of the features of that particular server model. Links to the related Product Guide are also provided for more information.
An easy-to-remember link you can use to share this guide: http://lenovopress.com/xref
Also available is xREF for Products Withdrawn Prior to 2012, a document that contains xREF sheets of System x, BladeCenter, and xSeries servers, and IntelliStation workstations that were withdrawn from marketing prior to 2012.
Changes in the May 18 update:
Added the Flex System Carrier-Grade Chassis
See the Summary of changes in the document for a complete change history.
The book provides information and references for combining the XIV Storage System with other storage platforms, host servers, or gateways, including IBM N Series, and IBM ProtecTIER®. It is intended for administrators and architects of enterprise storage systems.
The book also addresses using the XIV storage with databases and other storage-oriented application software that include:
The goal is to give an overview of the versatility and compatibility of the XIV Storage System with various platforms and environments.
The information that is presented here is not meant as a replacement or substitute for the Host Attachment kit publications. It is meant as a complement and to provide readers with usage guidance and practical illustrations.
As one in a series of IBM Redbooks publications and IBM Redpapers publications for V8, the entire series is designed to give you in-depth information about key WebSphere Application Server features. In this book, we provide a detailed exploration of the WebSphere Application Server V8 runtime administration process.
This book includes configuration and administration information for WebSphere Application Server V8 and WebSphere Application Server Network Deployment V8 on distributed platforms and WebSphere Application Server for z/OS® V8.
The following publications are prerequisites for this book:
WebSphere Application Server V8.0 Technical Overview, REDP-4756
IBM WebSphere Application Server V8 Concepts, Planning, and Design Guide, SG24-7957
Various methodologies can be used to help organizations achieve their objectives depending on their criteria: lowest risk of failure, fast to resolution, or lowest cost for deployment. But what every organization should consider is which methodology will have the greatest impact.
Lean, a systematic approach to understanding and optimizing processes, may be the fit for your organization. Learn more in this new IBM® RedpaperTM publication, A Guide to Lean Healthcare Workflows, by Jerry Green and Amy Valentini of Phytel (An IBM Company).
The paper delves into the five steps of Lean:
Define value from the patient's perspective
Map the value stream, and identify issues and constraints
Remove waste, and make the value flow without interruption
Implement the solution, and allow patients to pull value
Maintain the gain, and pursue perfection
It describes each step in-depth and includes techniques, example worksheets, and materials that can be used during the overall analysis and implementation process. And it provides insights that are derived from the real-world experience of the authors.
This paper is intended to serve as a guide for readers during a process-improvement project and is not necessarily intended to be read end-to-end in one sitting. It is written primarily for clinical practitioners to use as a step-by-step guide to lean out clinical workflows without having to rely on complex statistical hypothesis-testing tools. This guide can also be used by clinical or nonclinical practitioners in non-patient-centered workflows. The steps are based on a universal Lean language that uses industry-standard terms and techniques and, therefore, can be applied to almost any process.
The IBM SONAS appliance provides a range of reliable, scalable storage solutions for a variety of storage requirements. These capabilities are achieved by using network access protocols such as NFS, CIFS, HTTPS, FTP, and SCP. Using built-in RAID technologies, all data is well protected with options to add additional protection through mirroring, replication, snapshots, and backup. These storage systems are also characterized by simple management interfaces that make their installation, administration, and troubleshooting uncomplicated and straightforward.
This IBM Redbooks® publication is the companion to the IBM Redbooks publication, SONAS Concepts, Architecture, and Planning Guide, SG24-7963. It is intended for storage administrators who have ordered their SONAS solution and are ready to install, customize, and use it. A quick start scenario takes you through common SONAS administration tasks to familiarize you with the SONAS system through the GUI and CLI. Backup and availability scenarios as well as best practices for setting up and troubleshooting hints and tips are included.
The ubiquitous implementation of a specific networking standard has led to an incredible dependence on the applications enabled by it. Today, we use the TCP/IP protocols and the Internet not only for entertainment and information, but to conduct our business by performing transactions, buying and selling products, and delivering services to customers. We are continually extending the set of applications that leverage TCP/IP, thereby driving the need for further infrastructure support.
It is our hope that both the novice and the expert will find useful information in this publication.
This IBM Redbooks® publication is focused on helping the IBM i development community understand the modern RPG language. The world of application development has been rapidly changing over the past years. The good news is that IBM i has been changing right along with it, and has made significant changes to the RPG language. This book is intended to help developers understand what modern RPG looks like and how to move from older versions of RPG to a newer, modern version. Additionally, it covers the basics of Integrated Language Environment® (ILE), interfacing with many other languages, and the best tools for doing development on IBM i.
Using modern tools, methodologies, and languages are key to continuing to stay relevant in today's world. Being able to find the right talent for your company is key to your continued success. Using the guidelines and principles in this book can help set you up to find that talent today and into the future.
This publication is the result of work that was done by IBM, industry experts, business partners, and some of the original authors of the first edition of this book. This information is important not only for developers, but also business decision makers (CIO for example) to understand that the IBM i is not an 'old' system. IBM i has modern languages and tools. It is a matter of what you choose to do with the IBM i that defines its age.
This IBM® RedpaperTM publication describes the concepts and architecture of IPv6 with a focus on:
An overview of IPv6 features
An examination of the IPv6 packet format
An explanation of additional IPv6 functions
A review of IPv6 mobility applications
This paper provides an introduction to Internet Control Message Protocol (ICMP) and describes the functions of ICMP in an IPv6 network.
This paper also provides IPv6 configuration steps for the following clients:
Red Hat Enterprise Linux
VMware vSphere ESXi 5.0
After understanding the basics of IPv6 concepts and architecture, IT network professionals will be able to use the procedures outlined in this paper to configure various host operating systems to suit their network infrastructure.
The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By consolidating network security demands for data security and protection for web applications, the IBM Security Network IPS serves as the security platform that can reduce the costs and complexity of deploying and managing point solutions.
This IBM Redbooks® publication provides IT architects and security specialists a better understanding of the challenging topic of blocking network threats. This book highlights security convergence of IBM Virtual Patch® technology, data security, and Web Application Protection. In addition, this book explores the technical foundation of the IBM Security Network IPS. It explains how to set up, configure, and maintain proper network perimeter protection within a real-world business scenario.
In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.
Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards at no additional cost on all its major platforms and even important non-IBM platforms. The IBM Directory Server implements the Lightweight Directory Access Protocol (LDAP) standard that has emerged quickly in the past years as a result of the demand for such a standard.
This IBM Redbooks publication will help you create a foundation of LDAP skills, as well as install and configure the IBM Directory Server. It is targeted at security architects and specialists who need to know the concepts and the detailed instructions for a successful LDAP implementation.
Smart methods to detect threats and vulnerabilities, as well as highly efficient approaches to analysis, mitigation, and remediation, become necessary to counter a growing number of attacks against networks, servers, and endpoints in every organization.
In this IBM® Redbooks® publication, we examine the aspects of the holistic Threat and Vulnerability Management component in the Network, Server and Endpoint domain of the IBM Security Framework. We explain the comprehensive solution approach, identify business drivers and issues, and derive corresponding functional and technical requirements, which enables us to choose and create matching security solutions.
We discuss IBM Security Solutions for Network, Server and Endpoint to effectively counter threats and attacks using a range of protection technologies and service offerings. Using two customer scenarios, we apply the solution design approach and show how to address the customer requirements by identifying the corresponding IBM service and software products.
Sometimes there is a need for one host to send packets that are received by multiple hosts. The problem with implementing this kind of transmission using unicast is that the stream of packets must be replicated as many times as there are receivers. IP Multicast addresses the problem by intelligently sending only one stream of packets and then replicating the stream when it reaches the target domain that includes multiple receivers or reaches a necessary bifurcation point leading to different receiver domains.
In this IBM® RedpapersTM publication, we introduce principles of IP Multicast and describe the IPv4 addressing used for multicast. We discuss the protocols that are used to implement multicast in an IP network and then provide the general IP Multicast configuration procedures and then presents IP Multicast configuration in a sample network using IBM System Networking Ethernet Switches. We conclude this paper with command references that include all commands and their parameters for configuration of multicast protocols
After understanding the basics of how to configure IP Multicast for the networking scenario described in this paper, IT network professionals will be able replicate a similar design and configuration to suit their network infrastructure.
This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.
SmartCloud Control Desk helps to reduce total cost of ownership by using one unified solution to license, install, and manage multiple ITIL processes under one price point. It can also help reduce business risk by using advanced impact analysis and defining automated change procedures that ensure integrity of existing infrastructure while supporting business agility.
SmartCloud Control Desk improves efficiency and quality of service by unifying asset, change, and problem management. It lowers cost and mitigates license compliance risk by performing end to end software asset management.
It also delivers an adaptive, role-based simplified UI that can be more intuitive for novice users, which reduces training costs, while allowing access from anywhere at anytime through mobile device support that includes BlackBerry, iOS, and Android.
In addition, SmartCloud Control Desk supports both a profit center business model for internal IT organizations, and an external Service Provider model. It allows organizations to manage customers and customer agreements and bills for managed assets, usage, and work activities while improving utilization rates and reducing unnecessary purchases by managing the IT asset lifecycle.
You can deploy SmartCloud Control Desk in a variety of ways; traditional on-premise, SaaS, VM image. This approach can make it more affordable to meet your current business needs, and seamlessly move between delivery models while keeping the same functionality.
This IBM® Redbooks® publication covers IBM SmartCloud® Control Desk product configuration, customization, and implementation best practices.
The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability, security, and manageability by enabling devices in separate SAN fabrics to communicate without merging fabrics into a single, large SAN fabric. This capability enables clients to initially deploy separate SAN solutions at the departmental and data center levels. Then, clients can consolidate these separate solutions into large enterprise SAN solutions as their experience and requirements grow and change.
Alternatively, multiprotocol routers can help to connect existing enterprise SANs for a variety of reasons. For example, the introduction of Small Computer System Interface over IP (iSCSI) provides for the connection of low-end, low-cost hosts to enterprise SANs. The use of an Internet Protocol (IP) in the Fibre Channel (FC) environment provides for resource consolidation and disaster recovery planning over long distances. And the use of FC-FC routing services provides connectivity between two or more fabrics without having to merge them into a single SAN.
To derive the maximum benefit from this book, you should already be familiar with SANs. Otherwise, we recommend that you first read the following IBM Redbooks publications:
IBM TotalStorage: SAN Product, Design, and Optimization Guide, SG24-6384
Introduction to Storage Area Networks, SG24-5470
Implementing an IBM/Cisco SAN, SG24-7545
We examine the various aspects of network setups and introduce the main Linux on System z networking commands and configuration files. We describe the management of network interface parameters, assignment of addresses to a network interface, and usage of the ifconfig command to configure network interfaces.
We provide an overview of connectivity options available on the System z platform. We also describe high availability concepts and building a high availability solution using IBM Tivoli® System Automation. We also provide the implementation steps necessary to build a redundant network connections set up between an IBM z/VM® system and the external network switches using two Open Systems Adapter-Express 3 (OSA-Express 3) adapters with 10 Gb Ethernet ports.
We describe the tests performed in our lab environment. The objectives of these tests were to gather information about performance and failover from the perspective of a real scenario, where the concepts of described in this book were applied.
This book is focused on information that is practical and useful for readers with experience in network analysis and engineering networks, System z and Linux systems administrators, especially for readers that administer networks in their day-to-day activities.
For additional reading: A Technote is availalble that explains changes to using channel bonding interfaces introduced with SLES 11 SP 2.
It can be found at:
The intended audience of this book is network architects and network administrators.
In this IBM® Redbooks® publication we discuss the following topics:
The current state of the data center network
The business drivers making the case for change
The unique capabilities and network requirements of system platforms
The impact of server and storage consolidation on the data center network
The functional overview of the main data center network virtualization and consolidation technologies
The new data center network design landscape
Business intelligence is comprised of a data warehousing infrastructure, and a query, analysis, and reporting environment. Here we focus on the data warehousing infrastructure. But only a specific element of it, the data model - which we consider the base building block of the data warehouse. Or, more precisely, the topic of data modeling and its impact on the business and business applications. The objective is not to provide a treatise on dimensional modeling techniques, but to focus at a more practical level.
There is technical content for designing and maintaining such an environment, but also business content.
For example, we use case studies to demonstrate how dimensional modeling can impact the business intelligence requirements for your business initiatives. In addition, we provide a detailed discussion on the query aspects of BI and data modeling. For example, we discuss query optimization and how you can determine performance of the data model prior to implementation. You need a solid base for your data warehousing infrastructure . . . . a solid data model.
For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate.
This book can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation or a reference book that discusses every feature and option of the mainframe facilities.
Others who will benefit from this book include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment.
Discover and document
Process owners and business owners can use this solution to engage directly in the improvement of their business processes.
IBM BPM excels in integrating role-based process design, and provides a social BPM experience. It enables asset sharing and creating versions through its Process Center. The Process Center acts as a unified repository, making it possible to manage changes to the business processes with confidence.
IBM BPM supports a wide range of standards for process modeling and exchange. Built-in analytics and search capabilities help to further improve and optimize the business processes.
This IBM Redbooks® publication provides valuable information for project teams and business people that are involved in projects using IBM BPM. It describes the important design decisions that you face as a team. These decisions invariably have an effect on the success of your project.
These decisions range from the more business-centric decisions, such as which should be your first process, to the more technical decisions, such as solution analysis and architectural considerations.
In this redpaper, we discuss lessons learned in the two years since the first paper was written. We offer practical guidance about how to select workloads that work best with cloud computing, and about how to address areas, such as performance testing, monitoring, service level agreements, and capacity planning considerations for both single and multi-tenancy environments.
We also provide an example of a recent project where cloud computing solved current business needs (such as cost reduction, optimization of infrastructure utilization, and more efficient systems management and reporting capabilities) and how the solution addressed performance and capacity challenges.
We conclude with a summary of the lessons learned and a perspective about how cloud computing can affect performance and capacity in the future.
This IBM RedpaperTM publication provides detailed step-by-step guidance on how to install, configure, and use Worklight Application Center. It provides instructions for installing mobile applications (apps) into Application Center, and for browsing, installing, and rating those apps through the mobile client running on an Android, iOS, or BlackBerry smartphone.
This paper also positions Application Center next to the Enterprise App Management component of IBM Endpoint Manager for Mobile Devices, and describes how to integrate the two solutions.
This IBM Redpaper is of interest to those who are looking to understand, implement, or use an application store in their own enterprise.
Related blog postsAn easier way to share apps within your organization5 Things To Know About IBM Worklight Application Center
The contents of the volumes are:
Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation
Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, Language Environment, and SMP/E
Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-Managed Storage, catalogs, and DFSMStvs
Volume 4: Communication Server, TCP/IP and VTAM
Volume 5: Base and Parallel Sysplex , System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GPDS), availability in the zSeries environment
Volume 6: Introduction to security, RACF , Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, Enterprise Identity Mapping (EIM), and firewall technologies
Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central
Volume 8: An introduction to z/OS problem diagnosis
Volume 9: z/OS UNIX System Services
Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC
Volume 11: Capacity planning, performance management, RMF, and SMF
Volume 12: WLM
Volume 13: JES3
Applications that access a WebSphere MQ infrastructure can be developed using a wide range of programming paradigms and languages. These applications can run within a substantial array of software and hardware environments. Customers can use WebSphere MQ to integrate and extend the capabilities of existing and varied infrastructures in the information technology (IT) system of a business.
This IBM RedpaperTM publication provides an introduction to message-oriented middleware to anyone who wants to understand messaging and WebSphere MQ. It covers the concepts of messaging and how WebSphere MQ implements those concepts. It helps you understand the business value of WebSphere MQ. It provides introductory information to help you get started with WebSphere MQ. No previous knowledge of the product and messaging technologies is assumed.
In this IBM Redbooks publication, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of some scenarios, and observed patterns. We also discuss a reference model to address the requirements, patterns of deployment, and usage, and an approach to an integrated security management for SOA.
This book is a valuable resource to senior security officers, architects, and security administrators.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.Provides step-by-step instructions on how to investigate crimes onlineCovers how new software tools can assist in online investigationsDiscusses how to track down, interpret, and understand online electronic evidence to benefit investigationsDetails guidelines for collecting and documenting online evidence that can be presented in court
While you can interface with Google in 97 languages and glean results in 35, you can't find any kind of instruction manual from Google. Lucky for you, our fully updated and greatly expanded second edition to the bestselling Google: The Missing Manual covers everything you could possibly want to know about Google, including the newest and coolest--and often most underused (what is Froogle, anyway?)--features. There's even a full chapter devoted to Gmail, Google's free email service that includes a whopping 2.5 GB of space).
This wise and witty guide delivers the complete scoop on Google, from how it works to how you can search far more effectively and efficiently (no more scrolling through 168 pages of seemingly irrelevant results); take best advantage of Google's lesser-known features, such as Google Print, Google Desktop, and Google Suggest; get your website listed on Google; track your visitors with Google Analytics; make money with AdWords and AdSense; and much more.
Whether you're new to Google or already a many-times-a-day user, you're sure to find tutorials, tips, tricks, and tools that take you well beyond simple search to Google gurudom.
If you’re looking for more leads, sales, and profit from your website, then look no further than this expert guide to Google’s free A/B and multivariate website testing tool, Google Website Optimizer. Recognized online marketing guru and New York Times bestselling author, Bryan Eisenberg, and his chief scientist, John Quarto-vonTivadar, show you how to test and tune your site to get more visitors to contact you, buy from you, subscribe to your services, or take profitable actions on your site. This practical and easy-to-follow reference will help you:Develop a testing framework to meet your goals and objectives Improve your website and move more of your customers to action Select and categorize your products and services with a customer-centric view Optimize your landing pages and create copy that sells Choose the best test for a given application Reap the fullest benefits from your testing experience Increase conversions with over 250 testing ideas
Take the guesswork out of your online marketing efforts. Let Always Be Testing: The Complete Guide to Google Website Optimizer show you why you should test, how to test, and what to test on your site, and ultimately, help you discover what is best for your site and your bottom line.
What You’ll Learn:Install SharePoint Server 2016, both using the user interface provided by Microsoft, and by using PowerShell.
Understand your authentication options and associated security considerations.
Deploy add-ins, either from the store, or from your own custom app catalog.
Configure Search Service Application using either the provided UI or PowerShell.
Configure business intelligence components such as Excel Services, SQL Server Reporting Services, and PowerPivot.
Migrate to SharePoint Server 2016 from either SharePoint Server 2010 or 2013.Understand approaches to high availability, disaster recovery, patching, and ways to monitor and maintain your SharePoint 2016 deployment once it’s up and running.
Who This Book Is For:
Anyone tasked with installing, configuring, and maintaining SharePoint Server 2016 in their organization. This book assumes some working knowledge of a previous release of SharePoint Server, such as SharePoint 2010 or SharePoint 2013.
Peter Christen’s book is divided into three parts: Part I, “Overview”, introduces the subject by presenting several sample applications and their special challenges, as well as a general overview of a generic data matching process. Part II, “Steps of the Data Matching Process”, then details its main steps like pre-processing, indexing, field and record comparison, classification, and quality evaluation. Lastly, part III, “Further Topics”, deals with specific aspects like privacy, real-time matching, or matching unstructured data. Finally, it briefly describes the main features of many research and open source systems available today.By providing the reader with a broad range of data matching concepts and techniques and touching on all aspects of the data matching process, this book helps researchers as well as students specializing in data quality or data matching aspects to familiarize themselves with recent research advances and to identify open research challenges in the area of data matching. To this end, each chapter of the book includes a final section that provides pointers to further background and research material. Practitioners will better understand the current state of the art in data matching as well as the internal workings and limitations of current systems. Especially, they will learn that it is often not feasible to simply implement an existing off-the-shelf data matching system without substantial adaption and customization. Such practical considerations are discussed for each of the major steps in the data matching process.
This book is targeted at all aspiring administrators, architects, or students who want to build cloud environments using Openstack. Knowledge of IaaS or cloud computing is recommended.What You Will LearnGet an introduction to OpenStack and its componentsAuthenticate and authorize the cloud environment using KeystoneStore and retrieve data and images using storage components such as Cinder, Swift, and GlanceUse Nova to build a Cloud Computing fabric controllerAbstract technology-agnostic networks using the Neutron network componentGain an understanding of optional components such as Ceilometer, Trove, Ironic, Sahara, Barbican, Zaqar, Designate, Manila, and many moreSee how all of the OpenStack components collaborate to provide IaaS to usersCreate a production-grade OpenStack and automate your OpenStack CloudIn Detail
OpenStack is a free and open source cloud computing platform that is rapidly gaining popularity in Enterprise data centres. It is a scalable operating system and is used to build private and public clouds. It is imperative for all the aspiring cloud administrators to possess OpenStack skills if they want to succeed in the cloud-led IT infrastructure space.
This book will help you gain a clearer understanding of OpenStack's components and their interaction with each other to build a cloud environment. You will learn to deploy a self-service based cloud using just four virtual machines and standard networking.
You begin with an introduction on the basics of cloud computing. This is followed by a brief look into the need for authentication and authorization, the different aspects of dashboards, cloud computing fabric controllers, along with “Networking as a Service” and “Software Defined Networking.” Then, you will focus on installing, configuring, and troubleshooting different architectures such as Keystone, Horizon, Nova, Neutron, Cinder, Swift, and Glance. Furthermore, you will see how all of the OpenStack components come together in providing IaaS to users. Finally, you will take your OpenStack cloud to the next level by integrating it with other IT ecosystem elements before automation.
By the end of this book, you will be proficient with the fundamentals and application of OpenStack.Style and approach
This is a practical step-by-step guide comprising of installation prerequisites and basic troubleshooting instructions to help you build an error-free OpenStack cloud easily.
This third edition of the successful Analysis and Design of Information Systems provides a comprehensive introduction and user-friendly survey to all aspects of business transformation and analysis, and aims to provide the complex set of tools covering all types of systems, including legacy, transactional, database, and web/e-commerce topics. Focusing on the applied aspects of analysis to create systems that meet the needs of their users, (consumers and businesses), this revised text aims to enhance the set of techniques and tools that the analyst/designer requires for success and to organizations to implement business transformation of operations.
Topics and features:
• Additional chapters on Web interface tools, security and change control, and data warehouse system design
• Developments on new designs and technologies, particularly in the area of web analysis and design; a revised Web/Commerce chapter addresses component middleware for complex systems design
• New case studies and more examples, providing readers with a deeper understanding of practicalities
• Presents modelling tools within a SDLC framework, thereby providing readers with a step-by-step understanding of when and how to use them
• More coverage on converting logical models to physical models, how to generate DDL, and testing database functionalities
• Expanded scope of analysis and design to include more specific conventions, such as logical to physical design steps, XML, data values, and denormalization
Based on feedback the author received from instructors and practitioners in industry, this enhanced text/reference presents a set of good practices that allow readers to adjust to the constraints and needs of any business. It is a valuable resource and guide for all information systems students, as well as practitioners and professionals who need an in-depth understanding of the principles of the analysis and design process.
Dr. Arthur M. Langer is the senior director of the Center for Technology, Innovation, and Community Engagement at Columbia University’s Fu Foundation School of Engineering and Applied Science. He is on the faculty in the Department of Organization and Leadership at the Graduate School of Education (Teachers College), and associate director of instruction and curricular development for programs in information technology in the School of Continuing Education.
Liu has written a comprehensive text on Web mining, which consists of two parts. The first part covers the data mining and machine learning foundations, where all the essential concepts and algorithms of data mining and machine learning are presented. The second part covers the key topics of Web mining, where Web crawling, search, social network analysis, structured data extraction, information integration, opinion mining and sentiment analysis, Web usage mining, query log mining, computational advertising, and recommender systems are all treated both in breadth and in depth. His book thus brings all the related concepts and algorithms together to form an authoritative and coherent text.
The book offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners interested in Web mining and data mining both as a learning text and as a reference book. Professors can readily use it for classes on data mining, Web mining, and text mining. Additional teaching materials such as lecture slides, datasets, and implemented algorithms are available online.