This IBM Redbooks® publication provides detailed descriptions and setup instructions, practical examples, and best practices for backing up the IBM System Storage N series using the IBM Tivoli® Storage Manager. This book includes descriptions and instructions for using the latest enhancements made to IBM Tivoli Storage Manager, specifically for the IBM System Storage N series and Network Appliance storage systems.
You will learn how to configure and set up the IBM System Storage N series and IBM Tivoli Storage Manager Version 5.3 and 6.1 using NDMP backup and restore functions.
We address the following topics:
-- Configuring the N series for Network Data Management Protocol (NDMP) usage
-- Using the IBM Tivoli Storage Manager software
-- Backing up qtrees
-- Single folder backup
-- Single file/folder restore
-- Restoring using NDMP via GUI and command-line interface
-- Restoring from NDMP backup to an alternative site/location on N series systems
-- Integrating with Snapshot technology and SnapVault
-- Using SnapShot differencing
-- Using SnapMirror® to Tape
This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System.
The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage.
The focus of this edition is on the XIV Gen3 running Version 11.5.x of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. Version 11.5.1 supports 6TB drives and VMware vSphere Virtual Volumes (VVOL).
In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support.
This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.
IT organizations have limited resources, but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V3700 system provides a solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges.
Storwize V3700 delivers efficient, entry-level configurations that are specifically designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, Storwize V3700 offers advanced software capabilities that are usually found in more expensive systems.
Built on innovative IBM technology, Storwize V3700 addresses the block storage requirements of small and midsize organizations, Storwize V3700 is designed to accommodate the most common storage network technologies. This design enables easy implementation and management.
Storwize V3700 includes the following features:
Web-based GUI provides point-and-click management capabilities.
Internal disk storage virtualization enables rapid, flexible provisioning and simple configuration changes.
Thin provisioning enables applications to grow dynamically, but only use space they actually need.
Enables simple data migration from external storage to Storwize V3700 storage (one-way from another storage device).
Remote Mirror creates copies of data at remote locations for disaster recovery.
IBM FlashCopy® creates instant application copies for backup or application testing.
This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators.
The concepts in this book also relate to the IBM Storwize V3500.
This book was written at a software level of version 7 release 4.
The IBM® Storwize® family, including the IBM SAN Volume Controller Data Platform, is a storage virtualization system that enables a single point of control for storage resources. This functionality helps support improved business application availability and greater resource use. The following list describes the business objectives of this system:
To manage storage resources in your information technology (IT) infrastructure
To make sure that those resources are used to the advantage of your business
To do it quickly, efficiently, and in real time, while avoiding increases in administrative costs
Virtualizing storage with Storwize helps make new and existing storage more effective. Storwize includes many functions traditionally deployed separately in disk systems. By including these functions in a virtualization system, Storwize standardizes them across virtualized storage for greater flexibility and potentially lower costs.
Storwize functions benefit all virtualized storage. For example, IBM Easy Tier® optimizes use of flash memory. In addition, IBM Real-time CompressionTM enhances efficiency even further by enabling the storage of up to five times as much active primary data in the same physical disk space. Finally, high-performance thin provisioning helps automate provisioning. These benefits can help extend the useful life of existing storage assets, reducing costs.
Integrating these functions into Storwize also means that they are designed to operate smoothly together, reducing management effort.
This IBM Redbooks® publication provides information about the latest features and functions of the Storwize V7000 Gen2 and software version 7.3 implementation, architectural improvements, and Easy Tier.
This edition includes information about the Virtual Storage Console (VSC), which is another N series software product that works with VMware. VSC provides local backup and recovery capability. You have the option to replicate backups to a remote storage system by using SnapMirror relationships. Backups can be performed on individual virtual machines or on datastores with the option of updating the SnapMirror relationship as part of the backup on a per job basis. Similarly, restores can be performed at a data-store level or individual virtual machine level.
IBM System Storage N series in conjunction with VMware vSphere 4 helps complete the virtualization hierarchy by providing both a server and storage virtualization solution. Although this configuration can further assist with other areas of virtualization, networks, and applications, these areas of virtualization are not covered in detail in this book.
N series data compression and deduplication technologies can work independently or together to achieve optimal savings. We explain how N series data compression and deduplication work with Data ONTAP 8.1 operating in 7-Mode. We help you decide when to use compression and deduplication based on applications and data types to balance space saving against potential overhead. Optimization and usage considerations are included to help you determine your space savings.
Policy management to control physical volume pooling
Dual copy, including across a grid network
Copy mode control
The TS7700 Virtualization Engine offers enhanced statistical reporting. It also includes a standards-based management interface for TS7700 Virtualization Engine management.
The new IBM Virtualization Engine TS7700 Release 2.0 introduces the next generation of TS7700 Virtualization Engine servers for System z tape:
IBM Virtualization Engine TS7720 Server Model VEB
IBM Virtualization Engine TS7740 Server Model V07
These Virtualization Engines are based on IBM POWER7® technology. They offer improved performance for most System z tape workloads compared to the first generation of TS7700 Virtualization Engine servers.
This IBM RedpaperTM publication provides detailed step-by-step guidance on how to install, configure, and use Worklight Application Center. It provides instructions for installing mobile applications (apps) into Application Center, and for browsing, installing, and rating those apps through the mobile client running on an Android, iOS, or BlackBerry smartphone.
This paper also positions Application Center next to the Enterprise App Management component of IBM Endpoint Manager for Mobile Devices, and describes how to integrate the two solutions.
This IBM Redpaper is of interest to those who are looking to understand, implement, or use an application store in their own enterprise.
Related blog postsAn easier way to share apps within your organization5 Things To Know About IBM Worklight Application Center
Applications that access a WebSphere MQ infrastructure can be developed using a wide range of programming paradigms and languages. These applications can run within a substantial array of software and hardware environments. Customers can use WebSphere MQ to integrate and extend the capabilities of existing and varied infrastructures in the information technology (IT) system of a business.
This IBM RedpaperTM publication provides an introduction to message-oriented middleware to anyone who wants to understand messaging and WebSphere MQ. It covers the concepts of messaging and how WebSphere MQ implements those concepts. It helps you understand the business value of WebSphere MQ. It provides introductory information to help you get started with WebSphere MQ. No previous knowledge of the product and messaging technologies is assumed.
In this IBM Redbooks publication, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of some scenarios, and observed patterns. We also discuss a reference model to address the requirements, patterns of deployment, and usage, and an approach to an integrated security management for SOA.
This book is a valuable resource to senior security officers, architects, and security administrators.
Discover and document
Process owners and business owners can use this solution to engage directly in the improvement of their business processes.
IBM BPM excels in integrating role-based process design, and provides a social BPM experience. It enables asset sharing and creating versions through its Process Center. The Process Center acts as a unified repository, making it possible to manage changes to the business processes with confidence.
IBM BPM supports a wide range of standards for process modeling and exchange. Built-in analytics and search capabilities help to further improve and optimize the business processes.
This IBM Redbooks® publication provides valuable information for project teams and business people that are involved in projects using IBM BPM. It describes the important design decisions that you face as a team. These decisions invariably have an effect on the success of your project.
These decisions range from the more business-centric decisions, such as which should be your first process, to the more technical decisions, such as solution analysis and architectural considerations.
The contents of the volumes are:
Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation
Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, Language Environment, and SMP/E
Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-Managed Storage, catalogs, and DFSMStvs
Volume 4: Communication Server, TCP/IP and VTAM
Volume 5: Base and Parallel Sysplex , System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GPDS), availability in the zSeries environment
Volume 6: Introduction to security, RACF , Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, Enterprise Identity Mapping (EIM), and firewall technologies
Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central
Volume 8: An introduction to z/OS problem diagnosis
Volume 9: z/OS UNIX System Services
Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC
Volume 11: Capacity planning, performance management, RMF, and SMF
Volume 12: WLM
Volume 13: JES3
For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate.
This book can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation or a reference book that discusses every feature and option of the mainframe facilities.
Others who will benefit from this book include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment.
Active Memory Sharing is a virtualization technology that allows multiple partitions to share a pool of physical memory. This is designed to increase system memory utilization, thereby enabling you to realize a cost benefit by reducing the amount of physical memory required.
The paper provides an overview of Active Memory Sharing, and then demonstrates, in detail, how the technology works and in what scenarios it can be used. It also contains chapters that describe how to configure, manage and migrate to Active Memory Sharing based on hands-on examples.
The paper is targeted to both architects and consultants who need to understand how the technology works to design solutions, and to technical specialists in charge of setting up and managing Active Memory Sharing environments.
For performance related information, see:
As one in a series of IBM Redbooks publications and IBM Redpapers publications for V8, the entire series is designed to give you in-depth information about key WebSphere Application Server features. In this book, we provide a detailed exploration of the WebSphere Application Server V8 runtime administration process.
This book includes configuration and administration information for WebSphere Application Server V8 and WebSphere Application Server Network Deployment V8 on distributed platforms and WebSphere Application Server for z/OS® V8.
The following publications are prerequisites for this book:
WebSphere Application Server V8.0 Technical Overview, REDP-4756
IBM WebSphere Application Server V8 Concepts, Planning, and Design Guide, SG24-7957
This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.
The intended audience of this book is network architects and network administrators.
In this IBM® Redbooks® publication we discuss the following topics:
The current state of the data center network
The business drivers making the case for change
The unique capabilities and network requirements of system platforms
The impact of server and storage consolidation on the data center network
The functional overview of the main data center network virtualization and consolidation technologies
The new data center network design landscape
For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors, providing, among many other capabilities, world-class, state-of-the-art, support for the TCP/IP Internet protocol suite.
TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations.
The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for your z/OS networking environment. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions come from unknown users and from untrusted networks such as the Internet, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book.
For more specific information about z/OS Communications Server base functions, standard applications, and high availability, refer to the other volumes in the series:
"IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing," SG24-7798
"IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 2: Standard Applications," SG24-7799
"IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance," SG24-7800
In addition, "z/OS Communications Server: IP Configuration Guide," SC31-8775, "z/OS Communications Server: IP Configuration Reference," SC31-8776, and "z/OS Communications Server: IP User's Guide and Commands," SC31-8780, contain comprehensive descriptions of the individual parameters for setting up and using the functions that we describe in this book. They also include step-by-step checklists and supporting examples.
It is not the intent of this book to duplicate the information in those publications, but to complement them with practical implementation scenarios that might be useful in your environment. To determine at what level a specific function was introduced, refer to "z/OS Communications Server: New Function Summary," GC31-8771.
Rational Application Developer provides integrated development tools for all development roles, including web developers, Java developers, business analysts, architects, and enterprise programmers.
This IBM Redbooks® publication is a programming guide that highlights the features and tooling included with Rational Application Developer V8.0.1. Many of the chapters provide working examples that demonstrate how to use the tooling to develop applications and achieve the benefits of visual and rapid application development. This publication is an update of Rational Application Developer V7.5 Programming Guide, SG24-7672.
In this redpaper, we discuss lessons learned in the two years since the first paper was written. We offer practical guidance about how to select workloads that work best with cloud computing, and about how to address areas, such as performance testing, monitoring, service level agreements, and capacity planning considerations for both single and multi-tenancy environments.
We also provide an example of a recent project where cloud computing solved current business needs (such as cost reduction, optimization of infrastructure utilization, and more efficient systems management and reporting capabilities) and how the solution addressed performance and capacity challenges.
We conclude with a summary of the lessons learned and a perspective about how cloud computing can affect performance and capacity in the future.
Setting up Red Hat Enterprise Linux 5 with DASD
Setting up Red Hat Enterprise Linux 5 with FCP/SCSI
Setting up SLES11 with DASD
Setting up SLES11 with FCP/SCSI disks
Examples include the installation of the Grid Infrastructure, installation of a single instance database and installation of a two-node Real Application Cluster (RAC) database.
In all cases, we use UDEV rules for DASD and single path SCSI, and multipathing for multi-path SCSI to provide device persistency for ASM storage, not ASMLib.
Interested readers would include database consultants, installers, administrators, and system programmers. This is not meant to replace Oracle documentation, but to supplement it with our experiences while installing and using Oracle Database products. We made extensive uses of My Oracle Support notes.
Along with a midmarket customer focus, this IBM RedpaperTM publication is designed to help IBM teams and Business Partners be more effective in serving small and midsized businesses. We illustrate how IBM software for the midmarket can help businesses use the Web to reduce expenses, improve customer service, and expand into new markets. We cover the IBM software offering for the midmarket, which includes what the software does, the platforms it runs on, where to find more information, and how it can help your business become more profitable:
- IBM Business Partners often keep a printed copy of this guide in their briefcases for software references
- Customers can view this guide online and look up software-value messages and IBM product family offering comparisons
- IBM Sales Representatives can print parts of this guide as "leave-behinds" for customers, to give them extra collateral on midmarket software of interest
To make sure that you have the latest version of this guide, download it from this web address:
In this IBM Redbooks® publication, we provide an overview of IBM FileNet P8 and describe the core component architecture. We also introduce major expansion products that extend IBM FileNet P8 functionality in the areas of content ingestion, content accessing through connectors and federation, the application framework, and discovery and compliance. In this book, we discuss the anatomy of an ECM infrastructure, content event processing, content life cycle, and business processes.
This book gives IT architects, IT specialists, and IT Technical Sales a solid understanding of IBM FileNet P8 Platform, its architecture, its functions and extensibility, and its unlimited capabilities.
In addition, IBM now provides tools to simplify the enablement process, such as the highly scalable IBM Data Movement Tool for moving schema and data into DB2, and an Editor and Profiler for PL/SQL provided by the IBM Data Studio tool suite.
This Oracle to DB2 migration guide describes new technology, preferred practices for moving to DB2, and common scenarios that can help you as you move from Oracle to DB2. This book is intended for IT architects and developers who are converting from Oracle to DB2.
DB2 compatibility with Oracle is provided through native support. The new capabilities in DB2 that provide compatibility are implemented at the lowest and most intimate levels of the database kernel, as though they were originally engineered for DB2. means that the DB2 implementation is done without the aid of an emulation layer. This intimacy leads to the scalable implementation that DB2 offers, providing identical performance between DB2 compatibility features and DB2 other language elements. For example, DB2 runs SQL PL at the same performance as PL/SQL implementations of the same function.
This IBM RedpaperTM publication shows how Cluster NFS file services are delivered and supported today through the configurable order process of the IBM Intelligent Cluster. The audience for this paper includes executive and consultant decision makers and technical administrators who want to know how to implement this solution.
This book, providing an introduction, is the first of three volumes. The second volume describes the installation of zPDT (including the underlying Linux, and a particular z/OS® distribution) and basic usage patterns. The third volume discusses more advanced topics that may not interest all zPDT users. The IBM order numbers for the three volumes are SG24-7721, SG24-7722, and SG24-7723. An additional volume (SG24-7859) describes the use of zPDT in a Parallel Sysplex configuration.
The systems discussed in these volumes are complex, with elements of Linux (for the underlying PC machine), z/Architecture® (for the core zPDT elements), System z I/O functions (for emulated I/O devices), and z/OS (providing the System z application interface), and possibly with other System z operating systems. We assume the reader is familiar with general concepts and terminology of System z hardware and software elements and with basic PC Linux characteristics.
IBM and Intel® provide an answer to this challenge with the IBM DB2® pureScaleTM feature and the latest generation of IBM System x eX5 servers based on the Intel Xeon® E7 processor family. The combined solution enables clients to scale mission-critical, performance-sensitive databases simply, using affordable, industry-standard servers.
This IBM® RedpaperTM publication describes an IBM solution containing high availability and scalability for mission-critical databases on System x®. The audience includes executives and other decision-makers, consultants, and architects.
Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards at no additional cost on all its major platforms and even important non-IBM platforms. The IBM Directory Server implements the Lightweight Directory Access Protocol (LDAP) standard that has emerged quickly in the past years as a result of the demand for such a standard.
This IBM Redbooks publication will help you create a foundation of LDAP skills, as well as install and configure the IBM Directory Server. It is targeted at security architects and specialists who need to know the concepts and the detailed instructions for a successful LDAP implementation.
This paper is aimed at a wide ODM audience, including IBM employees and customers, and provides useful information to both new and experienced users.
Although the product family is known as IBM WebSphere® Operational Decision Management (WODM), at V8.0, with V8.0.1 the the name is now simply IBM Operational Decision Manager (ODM). The performance information in this paper is based on V8.0 of this product family and differences introduced with V8.0.1 are pointed out.
Product integration contains multiple dimensions, such as security, navigation, data and task integrations. Within the context of the scenarios in this book, you see examples of these integrations.
The scenarios implemented in this book are largely based on the input from the integration team, and several clients using IBM products. We based these scenarios on common real-life examples that IT operations often have to deal with. Of course, these scenarios are only a small subset of the possible integration scenarios that can be accomplished by the Tivoli products, but they were chosen to be representative of the integration possibilities using the Tivoli products.
We discuss these implementations and benefits that are realized by these integrations, and also provide sample scenarios of how these integrations work.
This book is a reference guide for IT architects and IT specialists working on integrating Tivoli products in real-life environments.
In this IBM® Redbooks® publication, we describe the IBM InfoSphere Optim Data Growth solutions and a methodology that provides implementation guidance from requirements analysis through deployment and administration planning. We also discuss various implementation topics including system architecture design, sizing, scalability, security, performance, and automation.
This book is intended to provide various systems development professionals, Data Solution Architects, Data Administrators, Modelers, Data Analysts, Data Integrators, or anyone who has to analyze or integrate data structures, a broad understanding about IBM InfoSphere Optim Data Growth solutions. By being used in conjunction with the product manuals and online help, this book provides guidance about implementing an optimal solution for managing your enterprise application data.
IBM POWER7® processor, available at frequencies of 3.7 GHz and 4.0 GHz with TurboCore options of 4.25 GHz and 4.31 GHz
Specialized POWER7 Level 3 cache that provides greater bandwidth, capacity, and reliability
IBM PowerVM® virtualization, including PowerVM Live Partition Mobility and PowerVM IBM Active MemoryTM Sharing
TurboCore mode that delivers the highest performance per core
Enhanced reliability, accessibility, and serviceability (RAS) features that are designed for maximum availability
Active Memory Expansion that provides more usable memory than what is physically installed on the system
IBM EnergyScaleTM technology that provides features such as power trending, power-saving, capping of power, and thermal measurement
Professionals who want to acquire a better understanding of IBM Power SystemsTM products can benefit from reading this paper.
This paper complements the available set of IBM Power Systems documentation by providing a desktop reference that offers a detailed technical description of the Power 795 system.
This paper does not replace the latest marketing materials and configuration tools. It is intended as an additional source of information that, together with existing sources, can be used to enhance your knowledge of IBM server solutions.
The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux Server 7.1, SG24-8303
The Virtualization Cookbook for IBM z Systems Volume 3: SUSE Linux Enterprise Server 12, SG24-8890
It is recommended that you start with Volume 1 of this series because IBM z/VM® is the base "layer" when you install Linux on z Systems. Volume 1 starts with an introduction, discusses planning, then describes z/VM installation into a two-node single system image (SSI) cluster, configuration, hardening, automation, and servicing. It adopts a cookbook format that provides a concise, repeatable set of procedures for installing and configuring z/VM by using the z/VM SSI clustering feature.
Volume 1 consists of the following chapters:
Chapter 1, "Introduction to Linux on the IBM mainframe under z/VM" on page 3. This chapter provides a concise introduction to the concept of using the z/VM platform as an enterprise Linux infrastructure on the IBM mainframe.
Chapter 2, "Planning" on page 15. This chapter covers the planning of hardware, software, and networking resources that you need to do before you attempt to install z/VM and Linux.
Chapter 3, "Configuring a workstation for mainframe access" on page 39. This chapter addresses the configuration of a workstation that is running either Linux or Windows to access the mainframe.
Chapter 4, "Installing and configuring z/VM" on page 49. This chapter describes installing z/VM 6.3 as a two-node VM Single System Image feature (VMSSI) cluster, performing the initial configuration, hardening, and enabling basic system automation.
Chapter 5, "Servicing z/VM" on page 153. This chapter focuses on the requirements to keep your z/VM systems updated to ensure full functionality, optimal utility, security, and the elimination of known problems. The process of ordering and applying z/VM Service is described. Programming Temporary Fixes (PTFs) and Recommended Service Upgrades (RSUs) are both covered.
Chapter 6, "Planning and preparing for Linux workloads" on page 171. This chapter describes the necessary steps to begin your first Linux installation. It describes common tasks that are executed during administration, maintenance, and expansion to accommodate additional workloads.
Volumes 2 and 3 describe how to Linux virtual servers on IBM z SystemsTM hardware under IBM z/VM. The cookbook format continues with installing and customizing Linux.
For Volume 1, you need at least two IBM z Systems logical partitions (LPARs) with associated resources and z/VM 6.3 installation media. For Volumes 2 and 3, you will need either the Red Hat Enterprise Linux Server (RHEL) version 7.1 or the SUSE Linux Enterprise Server (SLES) version 12 distribution (or both).
This book series assumes that you are generally familiar with z Systems technology and terminology. It does not assume an in-depth understanding of z/VM or Linux. It is written for those individuals who want to start quickly with z/VM and Linux on the mainframe, and get virtual servers up and running in a short time (days, not weeks or months).
In writing this book, we re-used the same lab environment used in the first book, but expanded it to include IBM DB2® v10 on Linux on System z®, two IBM WebSphere® Application Server environments, and added a WebSphere application, used for performance benchmarking, which provided a workload that allowed us to observe the performance of the WebSphere Application Server during relocation of the z/VM® 6.2 member that was hosting the application server.
Additionally, this book examines the use of small computer system interface (SCSI) disks in the z/VM v6.2 environment and the results of using single system images (SSI) and live guest relocation (LGR) in this type of environment.
In the previous book, a detailed explanation of relocation domains was provided. In this book, we expand that discussion and provide use cases of relocation domains in different situations.
Finally, because the ability to back up and restore your data is of paramount importance, we have provided a discussion about how to use one tool, the IBM Backup and Restore Manager for z/VM, which can be used in the new z/VM6.2 environment. We provide a brief overview of the tool and describe the changes in the installation process as a result of using single system image clusters. We also demonstrate how to set up the configuration file, and how to back up and restore both a user and an identity.
This publication is intended for IT architects who will be responsible for designing the system and IT specialists who will have to build the system.
We start with a general overview of virtualization and describe specific server virtualization technologies to highlight how the server virtualization technologies have been implemented. With this introduction anyone new to virtualization will have a better understanding of server virtualization and the industry server virtualization technologies available in the market.
Following the virtualization concept, we describe in detail the setup, configuration, and managing of DB2 with three leading server virtualization technologies:
IBM Power SystemsTM with PowerVMTM
We discuss the virtual machine setup with DB2 in mind to help IT support understand the effective ways of setting up a virtual environment specific for DB2. We explain the architecture and components of these three server virtualization technologies to allow DBAs to understand how a database environment using DB2 can benefit from using the server virtualization technologies.
In addition, we discuss the DB2 features and functions that can take advantage of using server virtualization. These features are put into practice when describing how to set up DB2 with the three virtualization technologies discussed in this book. This book also includes a list of best practices from the various tests performed while using these virtualization technologies. These best practices can be used as a guideline or a reference when setting up DB2 using these virtualization technologies.
This paper supplements the IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Installation Guide and IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Setup Guide. Do not use this document in isolation. Check the relevant guides in the Tivoli Access Manager for Enterprise Single Sign-On Information Center as you perform the install.
There might be various reasons to install Tivoli Access Manager for Enterprise Single Sign-On into either a single server or a clustered environment. A small-scale deployment, a typical proof of technology, or a proof of concept might be the best examples for a single server installation, whereas larger scale deployments or requirements for high availability and scalability might be reasons to deploy in a clustered environment.
This IBM Redpaper is targeted towards administrators and engineers who are facing a Tivoli Access Manager for Enterprise Single Sign-On deployment on either a single IBM WebSphere Application Server or a clustered IBM WebSphere Application Server Network Deployment configuration.
IBM RedpaperTM publication, Rapid deployment of integrated WebSphere solutions in your cloud, REDP-5132, is an extension to this IBM Redbooks publication. Using the same practical solution covered in this Redbooks publication, REDP-5132 demonstrates how the IBM PureApplication® System is a "logical extension" versus a "whole new world", covering PureApplication Patterns and the new PureApplication as a service on Softlayer.
The intended audience for this book is architects, developers, administrators, and DevOps personnel.
This book helps you to tailor and configure the Marketing tool in IBM Management Center for WebSphere Commerce to create and manage various promotion campaigns as needed by your business.
This book provides several business scenarios which can be implemented through simple customizations. Each scenario addresses a unique requirement which can be mapped with similar business scenarios.
This book has been developed for an experienced WebSphere Commerce design and developers audience.
The new IBM POWER8TM processor, available at frequencies of 3.02 GHz, 3.52 GHz, 3.72 GHz, 3.89 GHz, and 4.15 GHz
Significantly strengthened cores and larger caches
Two integrated memory controllers with improved latency and bandwidth
Integrated I/O subsystem and hot-pluggable PCIe Gen3 I/O slots
Improved reliability, serviceability, and availability (RAS) functions
IBM EnergyScaleTM technology that provides features such as power trending, power-saving, capping of power, and thermal measurement
This publication is for professionals who want to acquire a better understanding of IBM Power SystemsTM products.
This paper expands the current set of IBM Power Systems documentation by providing a desktop reference that offers a detailed technical description of the Power S814 and Power S824 systems.
This paper does not replace the latest marketing materials and configuration tools. It is intended as an additional source of information that, together with existing sources, can be used to enhance your knowledge of IBM server solutions.
Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational rather than incremental innovation.
This IBM® Redbooks® publication has an end-to-end example of creating a scalable, secure mobile application infrastructure that uses data that is on an IBM mainframe. The book uses an insurance-based application as an example, and shows how the application is built, tested, and deployed into production. This book is for application architects and decision-makers who want to employ mobile technology in concert with their mainframe environment.
This IBM Redbooks® publication addresses the new IBM zEnterprise® System. This system consists of the IBM zEnterprise EC12 (zEC12), an updated IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension (zBX) Model 003.
The zEC12 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The superscalar design allows the zEC12 to deliver a record level of capacity over the prior System z servers. It is powered by 120 of the world's most powerful microprocessors. These microprocessors run at 5.5 GHz and are capable of running more than 75,000 millions of instructions per second (MIPS). The zEC12 Model HA1 is estimated to provide up to 50% more total system capacity than the IBM zEnterprise 196 (z196) Model M80.
The zBX Model 003 infrastructure works with the zEC12 to enhance System z virtualization and management. It does so through an integrated hardware platform that spans mainframe, IBM POWER7®, and IBM System x® technologies. Through the Unified Resource Manager, the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment.
This book provides information about the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. It is intended for systems engineers, consultants, planners, and anyone who wants to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z® technology and terminology.
Support for live guest relocation (LGR) allows you to move Linux virtual servers without disruption to the business, helping you to avoid planned outages. The z/VM systems are aware of each other and can take advantage of their combined resources. LGR enables clients to avoid loss of service due to planned outages by relocating guests from a system requiring maintenance to a system that remains active during the maintenance period.
Together, the SSI and LGR technologies offer substantial client value, and they are a major departure from past z/VM practices.
This IBM Redbooks® publication gives you a broad understanding of the new SSI architecture and an overview of LGR. We show an LGR example that shows a typical SAP user environment. In our example, the SAP Application Server Central Instance resides on a Linux on System z® guest and an IBM DB2® 10 database server runs on z/OS®.
This book is written for IT architects, who design the systems, and IT specialists, who build the systems.
The target audience for this book is IT developers, IT managers, IT architects, project managers, test managers, test developers, operations managers, and operations developers.
This Redbooks publication documents topics to leverage the strengths of IBM PowerHA SystemMirror Standard and Enterprise Editions 7.1.3 for IBM Power Systems to solve customers' application high availability challenges, and maximize systems' availability, and management.
This Redbooks publication focuses on providing the readers with technical information and references on the capabilities of each edition, functionalities, usability, and features that make IBM PowerHA SystemMirror a premier solution for high availability and disaster recovery for IBM Power Systems servers.
This Redbooks publication helps strengthen the position of the IBM PowerHA SystemMirror solution with a well-defined and documented best practices, usability, functionality, migration and deployment model within an IBM POWER® system virtualized environment allowing customers a planned foundation for business resilient infrastructure solutions.
This Redbooks publication is targeted toward technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror on IBM POWER.
This IBM Redbooks® publication explains what Classification Module does, the key concepts to understand when working with Classification Module, and its integration with other products and systems. With this book, we show you how Classification Module helps your organization to automate the classification of large volumes of unstructured content in a consistent and accurate manner. The topics that are covered include building, training, and fine-tuning the knowledge base, creating decision plans, working with Classification Workbench, and step-by-step integration with other products and solutions.
This book is intended to educate both technical specialists and nontechnical personnel in how to make Classification Module work for your organizations.
This IBM RedpaperTM publication describes the different Security Access Manager Appliance V9.0 deployment patterns and uses hands-on examples to demonstrate how to initially configure systems in those deployments. It also describes various deployment considerations, such as networking, high-availability, performance, disaster recovery, and scalability. All of these deployment patterns are covered within the context of realistic business scenarios.
This paper is especially helpful to Security Access Manager architects and deployment specialists.
The newest release, CICS Transaction Server for z/OS® (CICS TS) V4.2, includes scalability enhancements so that you can perform more work more quickly in a single CICS system. The advantage of this enhancement is that you can increase vertical scaling and decrease the need to scale horizontally, reducing the number of regions that are required to run the production business applications. The scalability enhancements in CICS TS V4.2 fall into two broad areas, which are increased usage of open transaction environment (OTE) and of 64-bit storage.
This IBM Redbooks® publication is a comprehensive guide to threadsafe concepts and implementation for IBM CICS. This book explains how systems programmers, applications developers, and architects can implement threadsafe applications in an environment. It describes the real-world experiences of users, and our own experiences, of migrating applications to be threadsafe. This book also highlights the two most critical aspects of threadsafe applications: system performance and integrity.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.Provides step-by-step instructions on how to investigate crimes onlineCovers how new software tools can assist in online investigationsDiscusses how to track down, interpret, and understand online electronic evidence to benefit investigationsDetails guidelines for collecting and documenting online evidence that can be presented in court
What You’ll LearnInstall SharePoint Server 2016, both using the user interface provided by Microsoft, and by using PowerShell
Understand your authentication options and associated security considerations
Deploy add-ins, either from the store, or from your own custom app catalog
Configure Search Service Application using either the provided UI or PowerShell
Configure business intelligence components such as Excel Services, SQL Server Reporting Services, and PowerPivot
Migrate to SharePoint Server 2016 from either SharePoint Server 2010 or 2013Understand approaches to high availability, disaster recovery, patching, and ways to monitor and maintain your SharePoint 2016 deployment once it’s up and running
Who This Book Is For
Anyone tasked with installing, configuring, and maintaining SharePoint Server 2016 in their organization. This book assumes some working knowledge of a previous release of SharePoint Server, such as SharePoint 2010 or SharePoint 2013
While you can interface with Google in 97 languages and glean results in 35, you can't find any kind of instruction manual from Google. Lucky for you, our fully updated and greatly expanded second edition to the bestselling Google: The Missing Manual covers everything you could possibly want to know about Google, including the newest and coolest--and often most underused (what is Froogle, anyway?)--features. There's even a full chapter devoted to Gmail, Google's free email service that includes a whopping 2.5 GB of space).
This wise and witty guide delivers the complete scoop on Google, from how it works to how you can search far more effectively and efficiently (no more scrolling through 168 pages of seemingly irrelevant results); take best advantage of Google's lesser-known features, such as Google Print, Google Desktop, and Google Suggest; get your website listed on Google; track your visitors with Google Analytics; make money with AdWords and AdSense; and much more.
Whether you're new to Google or already a many-times-a-day user, you're sure to find tutorials, tips, tricks, and tools that take you well beyond simple search to Google gurudom.
If you’re looking for more leads, sales, and profit from your website, then look no further than this expert guide to Google’s free A/B and multivariate website testing tool, Google Website Optimizer. Recognized online marketing guru and New York Times bestselling author, Bryan Eisenberg, and his chief scientist, John Quarto-vonTivadar, show you how to test and tune your site to get more visitors to contact you, buy from you, subscribe to your services, or take profitable actions on your site. This practical and easy-to-follow reference will help you:Develop a testing framework to meet your goals and objectives Improve your website and move more of your customers to action Select and categorize your products and services with a customer-centric view Optimize your landing pages and create copy that sells Choose the best test for a given application Reap the fullest benefits from your testing experience Increase conversions with over 250 testing ideas
Take the guesswork out of your online marketing efforts. Let Always Be Testing: The Complete Guide to Google Website Optimizer show you why you should test, how to test, and what to test on your site, and ultimately, help you discover what is best for your site and your bottom line.
Peter Christen’s book is divided into three parts: Part I, “Overview”, introduces the subject by presenting several sample applications and their special challenges, as well as a general overview of a generic data matching process. Part II, “Steps of the Data Matching Process”, then details its main steps like pre-processing, indexing, field and record comparison, classification, and quality evaluation. Lastly, part III, “Further Topics”, deals with specific aspects like privacy, real-time matching, or matching unstructured data. Finally, it briefly describes the main features of many research and open source systems available today.By providing the reader with a broad range of data matching concepts and techniques and touching on all aspects of the data matching process, this book helps researchers as well as students specializing in data quality or data matching aspects to familiarize themselves with recent research advances and to identify open research challenges in the area of data matching. To this end, each chapter of the book includes a final section that provides pointers to further background and research material. Practitioners will better understand the current state of the art in data matching as well as the internal workings and limitations of current systems. Especially, they will learn that it is often not feasible to simply implement an existing off-the-shelf data matching system without substantial adaption and customization. Such practical considerations are discussed for each of the major steps in the data matching process.
This book is targeted at all aspiring administrators, architects, or students who want to build cloud environments using Openstack. Knowledge of IaaS or cloud computing is recommended.What You Will LearnGet an introduction to OpenStack and its componentsAuthenticate and authorize the cloud environment using KeystoneStore and retrieve data and images using storage components such as Cinder, Swift, and GlanceUse Nova to build a Cloud Computing fabric controllerAbstract technology-agnostic networks using the Neutron network componentGain an understanding of optional components such as Ceilometer, Trove, Ironic, Sahara, Barbican, Zaqar, Designate, Manila, and many moreSee how all of the OpenStack components collaborate to provide IaaS to usersCreate a production-grade OpenStack and automate your OpenStack CloudIn Detail
OpenStack is a free and open source cloud computing platform that is rapidly gaining popularity in Enterprise data centres. It is a scalable operating system and is used to build private and public clouds. It is imperative for all the aspiring cloud administrators to possess OpenStack skills if they want to succeed in the cloud-led IT infrastructure space.
This book will help you gain a clearer understanding of OpenStack's components and their interaction with each other to build a cloud environment. You will learn to deploy a self-service based cloud using just four virtual machines and standard networking.
You begin with an introduction on the basics of cloud computing. This is followed by a brief look into the need for authentication and authorization, the different aspects of dashboards, cloud computing fabric controllers, along with “Networking as a Service” and “Software Defined Networking.” Then, you will focus on installing, configuring, and troubleshooting different architectures such as Keystone, Horizon, Nova, Neutron, Cinder, Swift, and Glance. Furthermore, you will see how all of the OpenStack components come together in providing IaaS to users. Finally, you will take your OpenStack cloud to the next level by integrating it with other IT ecosystem elements before automation.
By the end of this book, you will be proficient with the fundamentals and application of OpenStack.Style and approach
This is a practical step-by-step guide comprising of installation prerequisites and basic troubleshooting instructions to help you build an error-free OpenStack cloud easily.
This third edition of the successful Analysis and Design of Information Systems provides a comprehensive introduction and user-friendly survey to all aspects of business transformation and analysis, and aims to provide the complex set of tools covering all types of systems, including legacy, transactional, database, and web/e-commerce topics. Focusing on the applied aspects of analysis to create systems that meet the needs of their users, (consumers and businesses), this revised text aims to enhance the set of techniques and tools that the analyst/designer requires for success and to organizations to implement business transformation of operations.
Topics and features:
• Additional chapters on Web interface tools, security and change control, and data warehouse system design
• Developments on new designs and technologies, particularly in the area of web analysis and design; a revised Web/Commerce chapter addresses component middleware for complex systems design
• New case studies and more examples, providing readers with a deeper understanding of practicalities
• Presents modelling tools within a SDLC framework, thereby providing readers with a step-by-step understanding of when and how to use them
• More coverage on converting logical models to physical models, how to generate DDL, and testing database functionalities
• Expanded scope of analysis and design to include more specific conventions, such as logical to physical design steps, XML, data values, and denormalization
Based on feedback the author received from instructors and practitioners in industry, this enhanced text/reference presents a set of good practices that allow readers to adjust to the constraints and needs of any business. It is a valuable resource and guide for all information systems students, as well as practitioners and professionals who need an in-depth understanding of the principles of the analysis and design process.
Dr. Arthur M. Langer is the senior director of the Center for Technology, Innovation, and Community Engagement at Columbia University’s Fu Foundation School of Engineering and Applied Science. He is on the faculty in the Department of Organization and Leadership at the Graduate School of Education (Teachers College), and associate director of instruction and curricular development for programs in information technology in the School of Continuing Education.
The book offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners interested in Web mining and data mining both as a learning text and as a reference book. Professors can readily use it for classes on data mining, Web mining, and text mining. Additional teaching materials such as lecture slides, datasets, and implemented algorithms are available online.