With this book, you can gain a broad understanding of the IBM PowerHA SystemMirror® architecture. If you plan to install, migrate, or administer a high availability cluster, this book is right for you.
This book can help IBM AIX® professionals who seek a comprehensive and task-oriented guide for developing the knowledge and skills required for PowerHA cluster design, implementation, and daily system administration. It provides a combination of theory and practical experience.
This book is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror Standard on IBM POWER® systems.
It is important to think of big data and analytics together. Big data is the term used to describe the recent explosion of different types of data from disparate sources. Analytics is about examining data to derive interesting and relevant trends and patterns, which can be used to inform decisions, optimize processes, and even drive new business models.
With today's deluge of data comes the problems of processing that data, obtaining the correct skills to manage and analyze that data, and establishing rules to govern the data's use and distribution. The big data technology stack is ever growing and sometimes confusing, even more so when we add the complexities of setting up big data environments with large up-front investments.
Cloud computing seems to be a perfect vehicle for hosting big data workloads. However, working on big data in the cloud brings its own challenge of reconciling two contradictory design principles. Cloud computing is based on the concepts of consolidation and resource pooling, but big data systems (such as Hadoop) are built on the shared nothing principle, where each node is independent and self-sufficient. A solution architecture that can allow these mutually exclusive principles to coexist is required to truly exploit the elasticity and ease-of-use of cloud computing for big data environments.
This IBM® RedpaperTM publication is aimed at chief architects, line-of-business executives, and CIOs to provide an understanding of the cloud-related challenges they face and give prescriptive guidance for how to realize the benefits of big data solutions quickly and cost-effectively.
We also describe how to move your CICS applications, and business, into the mobile space, and how to prepare your CICS environment for the following scenarios:
Taking an existing CICS application and exposing it as a JSON web service
Creating a new CICS application, based on a JSON schema
Using CICS as a JSON client
This Redbooks publication provides information about the installation and configuration steps for both Worklight Studio and Worklight Server. Worklight Studio is the Eclipse interface that a developer uses to implement a Worklight native or hybrid mobile application, and can be installed into an Eclipse instance. Worklight Server is where components developed for the server side (written in Worklight Studio), such as adapters and custom server-side authentication logic, run.
CICS applications and their associated data constitute some of the most valuable assets owned by an enterprise. Therefore, the protection of these assets is an essential part of any CICS mobile project. This Redbooks publication, after a review of the main mobile security challenges, outlines the options for securing CICS JSON web services, and reviews how products, such as Worklight and IBM DataPower®, can help. It then shows examples of security configurations in CICS and Worklight.
Too many distributed physical servers with low utilization
A lengthy provisioning process that delays the implementation of new applications
Limitations in data center power and floor space
High total cost of ownership (TCO)
Difficulty allocating processing power for a dynamic environment
This IBM Redbooks® publication provides a technical planning guide and example for IT organizations to migrate from their x86 environment to Linux on System z. It begins by examining the benefits of migrating workloads to Linux on System z. Here, we describe the workload centric method of information technology and then discuss the benefits of migrating workloads to Linux on System z.
Next, we describe total cost of ownership analyses and we guide you in understanding how to analyze your environment before beginning a migration project. We also assist you in determining the expected consolidation ratio for a given workload type.
We also describe virtualization concepts along with describing the benefits of migrating from the x86 environment to guests residing on an IBM z/VM® single system image with live guest relocation.
This IBM Redbooks publication walks you through a migration approach, includes planning worksheets, as well as a chapter to assist you in analyzing your own systems. We also discuss post migration considerations such as acceptance testing of functionality and performance measurements.
In addition, IBM now provides tools to simplify the enablement process, such as the highly scalable IBM Data Movement Tool for moving schema and data into DB2, and an Editor and Profiler for PL/SQL provided by the IBM Data Studio tool suite.
This Oracle to DB2 migration guide describes new technology, preferred practices for moving to DB2, and common scenarios that can help you as you move from Oracle to DB2. This book is intended for IT architects and developers who are converting from Oracle to DB2.
DB2 compatibility with Oracle is provided through native support. The new capabilities in DB2 that provide compatibility are implemented at the lowest and most intimate levels of the database kernel, as though they were originally engineered for DB2. means that the DB2 implementation is done without the aid of an emulation layer. This intimacy leads to the scalable implementation that DB2 offers, providing identical performance between DB2 compatibility features and DB2 other language elements. For example, DB2 runs SQL PL at the same performance as PL/SQL implementations of the same function.
The book offers application performance examples deployed on IBM Power SystemsTM utilizing performance monitoring tools to leverage the comprehensive set of POWER virtualization features: Logical Partitions (LPARs), micro-partitioning, active memory sharing, workload partitions, and more. We provide a well-defined and documented performance tuning model in a POWER system virtualized environment to help you plan a foundation for scaling, capacity, and optimization
This book targets technical professionals (technical consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing solutions and support on IBM POWER systems, including performance tuning.
This IBM Redbooks® publication provides fundamentals of Informix application development. It covers the Informix Client installation and configuration for application development environments. It discusses the skills and techniques for building Informix applications with Java, ESQL/C, OLE DB, .NET, PHP, Ruby on Rails, DataBlade®, and Hibernate.
The book uses code examples to demonstrate how to develop an Informix application with various drivers, APIs, and interfaces. It also provides application development troubleshooting and considerations for performance.
This book is intended for developers who use IBM Informix for application development. Although some of the topics that we discuss are highly technical, the information in the book might also be helpful for managers or database administrators who are looking to better understand their Informix development environment.
Architectural design techniques (sizing your environment, single versus multiple installations, physical versus virtual servers, deployment in a large, existing storage infrastructure)
Database and server considerations (database backup and restoration methods and scripts, using IBM Data Studio Client for database administration, database placement and relocation, repository sizing and tuning, moving and migrating the server)
Alerting, monitoring and reporting (monitoring thresholds and alerts, performance management and analysis of reports, real-time performance monitoring for IBM SAN Volume Controller)
Security considerations (Tivoli Storage Productivity Center internal user IDs, user authentication configuration methods, how and why to set up and change passwords, configuring, querying, and testing LDAP and Microsoft Active Directory)
Heath checks (server heath and logs, health and recoverability of IBM DB2® databases, using the Database Maintenance tool)
Data management techniques (how to spot unusual growth incidents, scripted actions for Tivoli Storage manager and hierarchical storage management)
This book is for storage administrators who are responsible for the performance and growth of the IT storage infrastructure.
This publication was updated in January 2017 to reflect the latest support information.
Many enterprises implement extended distance connectivity in a silo manner. However, effective extended distance solutions require the involvement of different teams within an organization. Typically there is a network group, a storage group, a systems group, and possibly other teams.
The intent of this publication is to help you design and manage a solution that will provide for all of your System z extended distance needs in the most effective and flexible way possible. This book introduces an approach to help plan, optimize, and maintain all of the moving parts of the solution together.
This IBM Redbooks® publication includes several of the announced features for SQL procedures, triggers, and functions in IBM i versions 6.1, 7.1, and 7.2. This book includes suggestions, guidelines, and practical examples to develop DB2 for i SQL procedures, triggers, and functions effectively.
This book covers the following topics:
Introduction to the SQL/Persistent Stored Modules (PSM) language, which is used in SQL procedures, triggers, and functions
This book is for IBM i database engineers and data-centric developers who strive to provide flexible, extensible, agile, and scalable database solutions that meet business requirements in a timely manner.
Before you read this book, you need to know about relational database technology and the application development environment on the IBM Power SystemsTM with the IBM i operating system.
As part of this trend, the following types of time-based information are collected:
Large data centers support a corporation or provide cloud services. These data centers need to collect temperature, humidity, and other types of
information over time to optimize energy usage.
Utility meters (referred to as smart meters) allow utility companies to collect information over a wireless network and to collect more data than ever before.
IBM Informix® TimeSeries is optimized for the processing of time-based data and can provide the following benefits:
Storage savings: Storage can be optimized when you know the characteristics of your time-based data. Informix TimeSeries often uses one third of the storage space that is required by a standard relational database.
Query performance: Informix TimeSeries takes into consideration the type of data to optimize its organization on disk and eliminates the need for some large indexes and additional sorting. For these reasons and more, some queries can easily have an order of magnitude performance improvement compared to standard relational.
Simpler queries: Informix TimeSeries includes a large set of specialized functions that allow you to better express the processing that you want to execute. It even provides a toolkit so that you can add proprietary algoritms to the library.
This IBM Redbooks® publication is for people who want to implement a solution that revolves around time-based data. It gives you the information that you need to get started and be productive with Informix TimeSeries.
This IBM® RedpaperTM publication explains what the key focus areas are for implementing a successful mobile government, how to address these focus areas with capabilities from IBM MobileFirstTM enterprise software, and what guidance and preferred practices to offer the IT practitioner in the public sector.
This paper explains the key focus areas specific to governments and public sector clients worldwide in terms of enterprise mobility and describes the typical reference architecture for the adoption and implementation of mobile government solutions. This paper provides practical examples through typical use cases and usage scenarios for using the capabilities of the IBM MobileFirst products in the overall solution and provides guidance, preferred practices, and lessons learned to IT consultants and architects working in public sector engagements.
The intended audience of this paper includes the following individuals:
Client decision makers and solution architects leading mobile enterprise adoption projects in the public sector
A wide range of IBM services and sales professionals who are involved in selling IBM software and designing public sector client solutions that include the IBM MobileFirst product suite
Solution architects, consultants, and IBM Business Partners responsible for designing and deploying solutions that include the integration of the IBM MobileFirst product suite
This book documents and addresses topics on how to use IBM Platform Cluster Manager to manage PowerLinux BigData data clusters through IBM InfoSphere BigInsights, Spectrum Scale, and Platform Symphony. This book documents how to set up and manage a big data cluster on PowerLinux servers to customize application and programming solutions, and to tune applications to use IBM hardware architectures. This document uses the architectural technologies and the software solutions that are available from IBM to help solve challenging technical and business problems.
This book is targeted at technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) that are responsible for delivering cost-effective Linux on IBM Power SystemsTM solutions that help uncover insights among client's data so they can act to optimize business results, product development, and scientific discoveries.
Modernization is a broad term when applied to applications. It is more than a single event. It is a sequence of actions. But even more, it is a process of rethinking how to approach the creation and maintenance of applications. There are tangible deliveries when it comes to modernization, the most notable being a modern user interface (UI), such as a web browser or being able to access applications from a mobile device. The UI, however, is only the beginning. There are many more aspects to modernization.
Using modern tools and methodologies can significantly improve productivity and reduce long-term cost while positioning applications for the next decade. It is time to put the past away. Tools and methodologies have undergone significant transformation, improving functionality, usability, and productivity. This is true of the plethora of IBM tools and the wealth of tools available from many Independent Solution Providers (ISVs).
This publication is the result of work that was done by IBM, industry experts, and by representatives from many of the ISV Tool Providers. Some of their tools are referenced in the book. In addition to reviewing technologies based on context, there is an explanation of why modernization is important and a description of the business benefits of investing in modernization. This critical information is key for line-of-business executives who want to understand the benefits of a modernization project. This book is appropriate for CIOs, architects, developers, and business leaders.
Making the Case for Modernization, IBM Systems Magazine
Please note: The contents of this publication has been updated and migrated to the following publications. The material in this PDF should no longer be considered accurate.
An introduction to PowerVM that includes basic installation and set up:
IBM PowerVM Virtualization Introduction and Configuration
A deep dive into how to manage PowerVM virtualization 24x7:
IBM PowerVM Virtualization Managing and Monitoring
The enhancements that were added in 2013, including a chapter on mobility:
IBM PowerVM Enhancements What is new in 2013
This IBM Redbooks® publication describes the architecture and components of Optim Performance Manager Extended Edition. We provide information for planning the deployment of Optim Performance Manager and detail steps for successful installation, activation, and configuration of Optim Performance Manager and the Extended Insight client.
Optim Performance Manager delivers a new paradigm in terms of how it is used to monitor and manage database and database application performance issues. We describe individual product dashboards and reports and discuss, with various scenarios, how they can be used to identify, diagnose, prevent, and solve database performance problems.
This IBM® Redbooks® publication provides information to help clients that have JES3 and would like to migrate to JES2. It provides a comprehensive list of the differences between the two job entry subsystems and provides information to help you determine the migration effort and actions.
The book is aimed at operations personnel, system programmers, and application developers.
This document (simply known as xREF) is a quick reference guide to the specifications of the currently available models of each System x and BladeCenter server. Each page can be used in a stand-alone format and provides a dense and comprehensive summary of the features of that particular server model. Links to the related Product Guide are also provided for more information.
An easy-to-remember link you can use to share this guide: http://lenovopress.com/xref
Also available is xREF for Products Withdrawn Prior to 2012, a document that contains xREF sheets of System x, BladeCenter, and xSeries servers, and IntelliStation workstations that were withdrawn from marketing prior to 2012.
Changes in the May 18 update:
Added the Flex System Carrier-Grade Chassis
See the Summary of changes in the document for a complete change history.
This IBM Redbooks® publication helps the network and system administrator install, tailor, and quickly configure the IBM Distributed Virtual Switch 5000V (DVS 5000V) for a new or existing virtualization computing environment. It provides several practical applications of the numerous features of the DVS 5000V, including a step-by-step guide to deploying, configuring, maintaining, and troubleshooting the device. Administrators who are already familiar with the CLI interface of IBM System Networking switches will be comfortable with the DVS 5000V. Regardless of whether the reader has previous experience with IBM System Networking, this publication is designed to help you get the DVS 5000V functional quickly, and provide a conceptual explanation of how the DVS 5000V works in tandem with VMware.
This IBM Redbooks publication is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) responsible for providing continuous availability solutions and support.
The book provides information and references for combining the XIV Storage System with other storage platforms, host servers, or gateways, including IBM N Series, and IBM ProtecTIER®. It is intended for administrators and architects of enterprise storage systems.
The book also addresses using the XIV storage with databases and other storage-oriented application software that include:
The goal is to give an overview of the versatility and compatibility of the XIV Storage System with various platforms and environments.
The information that is presented here is not meant as a replacement or substitute for the Host Attachment kit publications. It is meant as a complement and to provide readers with usage guidance and practical illustrations.
As one in a series of IBM Redbooks publications and IBM Redpapers publications for V8, the entire series is designed to give you in-depth information about key WebSphere Application Server features. In this book, we provide a detailed exploration of the WebSphere Application Server V8 runtime administration process.
This book includes configuration and administration information for WebSphere Application Server V8 and WebSphere Application Server Network Deployment V8 on distributed platforms and WebSphere Application Server for z/OS® V8.
The following publications are prerequisites for this book:
WebSphere Application Server V8.0 Technical Overview, REDP-4756
IBM WebSphere Application Server V8 Concepts, Planning, and Design Guide, SG24-7957
The IBM SONAS appliance provides a range of reliable, scalable storage solutions for a variety of storage requirements. These capabilities are achieved by using network access protocols such as NFS, CIFS, HTTPS, FTP, and SCP. Using built-in RAID technologies, all data is well protected with options to add additional protection through mirroring, replication, snapshots, and backup. These storage systems are also characterized by simple management interfaces that make their installation, administration, and troubleshooting uncomplicated and straightforward.
This IBM Redbooks® publication is the companion to the IBM Redbooks publication, SONAS Concepts, Architecture, and Planning Guide, SG24-7963. It is intended for storage administrators who have ordered their SONAS solution and are ready to install, customize, and use it. A quick start scenario takes you through common SONAS administration tasks to familiarize you with the SONAS system through the GUI and CLI. Backup and availability scenarios as well as best practices for setting up and troubleshooting hints and tips are included.
The ubiquitous implementation of a specific networking standard has led to an incredible dependence on the applications enabled by it. Today, we use the TCP/IP protocols and the Internet not only for entertainment and information, but to conduct our business by performing transactions, buying and selling products, and delivering services to customers. We are continually extending the set of applications that leverage TCP/IP, thereby driving the need for further infrastructure support.
It is our hope that both the novice and the expert will find useful information in this publication.
This IBM® RedpaperTM publication describes the concepts and architecture of IPv6 with a focus on:
An overview of IPv6 features
An examination of the IPv6 packet format
An explanation of additional IPv6 functions
A review of IPv6 mobility applications
This paper provides an introduction to Internet Control Message Protocol (ICMP) and describes the functions of ICMP in an IPv6 network.
This paper also provides IPv6 configuration steps for the following clients:
Red Hat Enterprise Linux
VMware vSphere ESXi 5.0
After understanding the basics of IPv6 concepts and architecture, IT network professionals will be able to use the procedures outlined in this paper to configure various host operating systems to suit their network infrastructure.
Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards at no additional cost on all its major platforms and even important non-IBM platforms. The IBM Directory Server implements the Lightweight Directory Access Protocol (LDAP) standard that has emerged quickly in the past years as a result of the demand for such a standard.
This IBM Redbooks publication will help you create a foundation of LDAP skills, as well as install and configure the IBM Directory Server. It is targeted at security architects and specialists who need to know the concepts and the detailed instructions for a successful LDAP implementation.
The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By consolidating network security demands for data security and protection for web applications, the IBM Security Network IPS serves as the security platform that can reduce the costs and complexity of deploying and managing point solutions.
This IBM Redbooks® publication provides IT architects and security specialists a better understanding of the challenging topic of blocking network threats. This book highlights security convergence of IBM Virtual Patch® technology, data security, and Web Application Protection. In addition, this book explores the technical foundation of the IBM Security Network IPS. It explains how to set up, configure, and maintain proper network perimeter protection within a real-world business scenario.
In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.
Smart methods to detect threats and vulnerabilities, as well as highly efficient approaches to analysis, mitigation, and remediation, become necessary to counter a growing number of attacks against networks, servers, and endpoints in every organization.
In this IBM® Redbooks® publication, we examine the aspects of the holistic Threat and Vulnerability Management component in the Network, Server and Endpoint domain of the IBM Security Framework. We explain the comprehensive solution approach, identify business drivers and issues, and derive corresponding functional and technical requirements, which enables us to choose and create matching security solutions.
We discuss IBM Security Solutions for Network, Server and Endpoint to effectively counter threats and attacks using a range of protection technologies and service offerings. Using two customer scenarios, we apply the solution design approach and show how to address the customer requirements by identifying the corresponding IBM service and software products.
Big Data Networked Storage Solution for Hadoop delivers the capabilities for ingesting, storing, and managing large data sets with high reliability. IBM InfoSphere® Big InsightsTM provides an innovative analytics platform that processes and analyzes all types of data to turn large complex data into insight.
IBM InfoSphere BigInsights brings the power of Hadoop to the enterprise. With built-in analytics, extensive integration capabilities, and the reliability, security and support that you require, IBM can help put your big data to work for you.
This IBM Redpaper publication provides basic guidelines and best practices for how to size and configure Big Data Networked Storage Solution for Hadoop.
Sometimes there is a need for one host to send packets that are received by multiple hosts. The problem with implementing this kind of transmission using unicast is that the stream of packets must be replicated as many times as there are receivers. IP Multicast addresses the problem by intelligently sending only one stream of packets and then replicating the stream when it reaches the target domain that includes multiple receivers or reaches a necessary bifurcation point leading to different receiver domains.
In this IBM® RedpapersTM publication, we introduce principles of IP Multicast and describe the IPv4 addressing used for multicast. We discuss the protocols that are used to implement multicast in an IP network and then provide the general IP Multicast configuration procedures and then presents IP Multicast configuration in a sample network using IBM System Networking Ethernet Switches. We conclude this paper with command references that include all commands and their parameters for configuration of multicast protocols
After understanding the basics of how to configure IP Multicast for the networking scenario described in this paper, IT network professionals will be able replicate a similar design and configuration to suit their network infrastructure.
SmartCloud Control Desk helps to reduce total cost of ownership by using one unified solution to license, install, and manage multiple ITIL processes under one price point. It can also help reduce business risk by using advanced impact analysis and defining automated change procedures that ensure integrity of existing infrastructure while supporting business agility.
SmartCloud Control Desk improves efficiency and quality of service by unifying asset, change, and problem management. It lowers cost and mitigates license compliance risk by performing end to end software asset management.
It also delivers an adaptive, role-based simplified UI that can be more intuitive for novice users, which reduces training costs, while allowing access from anywhere at anytime through mobile device support that includes BlackBerry, iOS, and Android.
In addition, SmartCloud Control Desk supports both a profit center business model for internal IT organizations, and an external Service Provider model. It allows organizations to manage customers and customer agreements and bills for managed assets, usage, and work activities while improving utilization rates and reducing unnecessary purchases by managing the IT asset lifecycle.
You can deploy SmartCloud Control Desk in a variety of ways; traditional on-premise, SaaS, VM image. This approach can make it more affordable to meet your current business needs, and seamlessly move between delivery models while keeping the same functionality.
This IBM® Redbooks® publication covers IBM SmartCloud® Control Desk product configuration, customization, and implementation best practices.
The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability, security, and manageability by enabling devices in separate SAN fabrics to communicate without merging fabrics into a single, large SAN fabric. This capability enables clients to initially deploy separate SAN solutions at the departmental and data center levels. Then, clients can consolidate these separate solutions into large enterprise SAN solutions as their experience and requirements grow and change.
Alternatively, multiprotocol routers can help to connect existing enterprise SANs for a variety of reasons. For example, the introduction of Small Computer System Interface over IP (iSCSI) provides for the connection of low-end, low-cost hosts to enterprise SANs. The use of an Internet Protocol (IP) in the Fibre Channel (FC) environment provides for resource consolidation and disaster recovery planning over long distances. And the use of FC-FC routing services provides connectivity between two or more fabrics without having to merge them into a single SAN.
To derive the maximum benefit from this book, you should already be familiar with SANs. Otherwise, we recommend that you first read the following IBM Redbooks publications:
IBM TotalStorage: SAN Product, Design, and Optimization Guide, SG24-6384
Introduction to Storage Area Networks, SG24-5470
Implementing an IBM/Cisco SAN, SG24-7545
This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.
The intended audience of this book is network architects and network administrators.
In this IBM® Redbooks® publication we discuss the following topics:
The current state of the data center network
The business drivers making the case for change
The unique capabilities and network requirements of system platforms
The impact of server and storage consolidation on the data center network
The functional overview of the main data center network virtualization and consolidation technologies
The new data center network design landscape
We examine the various aspects of network setups and introduce the main Linux on System z networking commands and configuration files. We describe the management of network interface parameters, assignment of addresses to a network interface, and usage of the ifconfig command to configure network interfaces.
We provide an overview of connectivity options available on the System z platform. We also describe high availability concepts and building a high availability solution using IBM Tivoli® System Automation. We also provide the implementation steps necessary to build a redundant network connections set up between an IBM z/VM® system and the external network switches using two Open Systems Adapter-Express 3 (OSA-Express 3) adapters with 10 Gb Ethernet ports.
We describe the tests performed in our lab environment. The objectives of these tests were to gather information about performance and failover from the perspective of a real scenario, where the concepts of described in this book were applied.
This book is focused on information that is practical and useful for readers with experience in network analysis and engineering networks, System z and Linux systems administrators, especially for readers that administer networks in their day-to-day activities.
For additional reading: A Technote is availalble that explains changes to using channel bonding interfaces introduced with SLES 11 SP 2.
It can be found at:
Business intelligence is comprised of a data warehousing infrastructure, and a query, analysis, and reporting environment. Here we focus on the data warehousing infrastructure. But only a specific element of it, the data model - which we consider the base building block of the data warehouse. Or, more precisely, the topic of data modeling and its impact on the business and business applications. The objective is not to provide a treatise on dimensional modeling techniques, but to focus at a more practical level.
There is technical content for designing and maintaining such an environment, but also business content.
For example, we use case studies to demonstrate how dimensional modeling can impact the business intelligence requirements for your business initiatives. In addition, we provide a detailed discussion on the query aspects of BI and data modeling. For example, we discuss query optimization and how you can determine performance of the data model prior to implementation. You need a solid base for your data warehousing infrastructure . . . . a solid data model.
For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate.
This book can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation or a reference book that discusses every feature and option of the mainframe facilities.
Others who will benefit from this book include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment.
In this IBM Redbooks publication, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of some scenarios, and observed patterns. We also discuss a reference model to address the requirements, patterns of deployment, and usage, and an approach to an integrated security management for SOA.
This book is a valuable resource to senior security officers, architects, and security administrators.
In this redpaper, we discuss lessons learned in the two years since the first paper was written. We offer practical guidance about how to select workloads that work best with cloud computing, and about how to address areas, such as performance testing, monitoring, service level agreements, and capacity planning considerations for both single and multi-tenancy environments.
We also provide an example of a recent project where cloud computing solved current business needs (such as cost reduction, optimization of infrastructure utilization, and more efficient systems management and reporting capabilities) and how the solution addressed performance and capacity challenges.
We conclude with a summary of the lessons learned and a perspective about how cloud computing can affect performance and capacity in the future.
This IBM RedpaperTM publication provides detailed step-by-step guidance on how to install, configure, and use Worklight Application Center. It provides instructions for installing mobile applications (apps) into Application Center, and for browsing, installing, and rating those apps through the mobile client running on an Android, iOS, or BlackBerry smartphone.
This paper also positions Application Center next to the Enterprise App Management component of IBM Endpoint Manager for Mobile Devices, and describes how to integrate the two solutions.
This IBM Redpaper is of interest to those who are looking to understand, implement, or use an application store in their own enterprise.
Related blog postsAn easier way to share apps within your organization5 Things To Know About IBM Worklight Application Center
Rational Application Developer is part of the IBM Rational Software Delivery Platform (SDP), which contains products in four life cycle categories:
- Architecture management, which includes integrated development environments (Application Developer is here)
- Change and release management
- Process and portfolio management
- Quality management
This IBM Redbooks® publication is a programming guide that highlights the features and tooling included with Rational Application Developer V7.0. Many of the chapters provide working examples that demonstrate how to use the tooling to develop applications, as well as achieve the benefits of visual and rapid application development. This publication is an update of Rational Application Developer V6 Programming Guide, SG24-6449.
This book consists of six parts:
- Introduction to Rational Application Developer
- Develop applications
- Test and debug applications
- Deploy and profile applications
- Team development
IBM® zEnterprise System has the unique capability to create a heterogeneous cloud solution in one-single managed environment. It provides the opportunity to optimize your cloud environment with the integration of the mainframe, IBM POWER®, IBM System x®, and the management of these workloads is simplified by the IBM zEnterprise Unified Resource Manager. Cloud computing on the zEnterprise System provides service management capabilities that result in higher levels of staff productivity and enhance the qualities of services that are delivered to the consumer. A zEnterprise cloud environment also allows providers to more closely align their IT investments with their business goals and user demands.
The contents of the volumes are:
Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation
Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, Language Environment, and SMP/E
Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-Managed Storage, catalogs, and DFSMStvs
Volume 4: Communication Server, TCP/IP and VTAM
Volume 5: Base and Parallel Sysplex , System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GPDS), availability in the zSeries environment
Volume 6: Introduction to security, RACF , Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, Enterprise Identity Mapping (EIM), and firewall technologies
Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central
Volume 8: An introduction to z/OS problem diagnosis
Volume 9: z/OS UNIX System Services
Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC
Volume 11: Capacity planning, performance management, RMF, and SMF
Volume 12: WLM
Volume 13: JES3
Applications that access a WebSphere MQ infrastructure can be developed using a wide range of programming paradigms and languages. These applications can run within a substantial array of software and hardware environments. Customers can use WebSphere MQ to integrate and extend the capabilities of existing and varied infrastructures in the information technology (IT) system of a business.
This IBM RedpaperTM publication provides an introduction to message-oriented middleware to anyone who wants to understand messaging and WebSphere MQ. It covers the concepts of messaging and how WebSphere MQ implements those concepts. It helps you understand the business value of WebSphere MQ. It provides introductory information to help you get started with WebSphere MQ. No previous knowledge of the product and messaging technologies is assumed.
We describe the DB2 product family and features for Linux, and we provide step-by-step instructions for a single as well as for a multiple partition DB2 system installation and configuration. We discuss how to migrate single and multiple partition DB2 to DB2 Version 9.5, and discuss, in detail, DB2 database administration in a Linux environment, procedures and tools for database backup and recovery, online maintenance, and system monitoring. We cover DB2 integrated tools and their features and use.
We discuss aspects of DB2 application development in the Linux environment and provide general tips about building and running DB2 applications on Linux and the use of DB2 application development tools.
First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalable, and cannot capture and express enterprise-wide policy to ensure consistency and compliance.
In this IBM® Redbooks® publication, we discuss an IBM Security policy management solution, which is composed of both policy management and enforcement using IT security services. We discuss how this standards-based unified policy management and enforcement solution can address authentication, identity propagation, and authorization requirements, and thereby help organizations demonstrate compliance, secure their services, and minimize the risk of data loss.
This book is a valuable resource for security officers, consultants, and architects who want to understand and implement a centralized security policy management and entitlement solution.
Rational Application Developer provides integrated development tools for all development roles, including web developers, Java developers, business analysts, architects, and enterprise programmers.
This IBM Redbooks® publication is a programming guide that highlights the features and tooling included with Rational Application Developer V8.0.1. Many of the chapters provide working examples that demonstrate how to use the tooling to develop applications and achieve the benefits of visual and rapid application development. This publication is an update of Rational Application Developer V7.5 Programming Guide, SG24-7672.
Setting up Red Hat Enterprise Linux 5 with DASD
Setting up Red Hat Enterprise Linux 5 with FCP/SCSI
Setting up SLES11 with DASD
Setting up SLES11 with FCP/SCSI disks
Examples include the installation of the Grid Infrastructure, installation of a single instance database and installation of a two-node Real Application Cluster (RAC) database.
In all cases, we use UDEV rules for DASD and single path SCSI, and multipathing for multi-path SCSI to provide device persistency for ASM storage, not ASMLib.
Interested readers would include database consultants, installers, administrators, and system programmers. This is not meant to replace Oracle documentation, but to supplement it with our experiences while installing and using Oracle Database products. We made extensive uses of My Oracle Support notes.
This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve.
The base for a secure system is tightly related to the way the architecture and virtualization has been implemented on IBM System z. Since its inception 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform.
This book is intended for system engineers and security administrators who want to customize a Linux on System z environment to meet strict security, audit, and control regulations.
For additional information, there is a tech note that describes the best practices for securing your network. It can be found at:
This book addresses the packaging and features in WebSphere Application Server, and highlights the most common implementation topologies. It provides information about planning for specific tasks and components that conform to the WebSphere Application Server environment.
Also in this book are planning guidelines for Websphere Application Server and Websphere Application Server Network Deployment on distributed platforms. It also includes guidelines for WebSphere Application Server for IBM z/OS®. This book contains information about migration considerations when moving from previous releases.
This book has been updated with the new features introduced with WebSphere Application Server V8.5.5.
IBM® WebSphere® Cast Iron® meets the challenge of integrating cloud applications with on-premise systems, cloud applications-to-cloud applications, and on-premise to on-premise applications. It contains a graphical development environment that provides built-in connectivity to many cloud and on-premise applications and reusable solution templates that can be downloaded from a solution repository. The integration solutions that are created can then run on either an on-premise integration appliance or the multi-tenant WebSphere Cast Iron Live cloud service.
This IBM Redbooks® publication is intended for application integrators, integration designers, and administrators evaluating or already using IBM WebSphere Cast Iron. Executives, leaders, and architects who are looking for a way to integrate cloud applications with their on-premise applications are also shown how WebSphere Cast Iron can help to resolve their integration challenges.
The book helps you gain an understanding of Cast Iron and explains how to integrate cloud and on-premise applications quickly and simply. It gives a detailed introduction to the development tool and the administration interfaces and how they are used. It also discusses security, high availability, and re-usability. The book also includes three detailed scenarios covering real-world implementations of a Cast Iron Integration Solution.
The first scenario shows the use of an HTTPS web gateway to allow files to be transferred from an external web client to an internal WebSphere MQ File Transfer Edition backbone network. This option uses the WebSphere MQ File Transfer Edition Web Gateway SupportPac FO02.
The second scenario uses the WebSphere MQ File Transfer Edition bridge agent to allow files to be transferred from an external File Transfer Protocol (FTP)/Secure File Transfer Protocol (SFTP) server to a WebSphere MQ File Transfer Edition backbone network
The third scenario extends the concept of file transfer between enterprises by introducing more sophisticated transfer capabilities, along with enhanced security. This scenario uses the IBM WebSphere DataPower B2B Appliance XB60 to look at the specific case of file transfers between business partners.
The last scenario also illustrates the integration of the IBM WebSphere DataPower B2B Appliance XB60 and WebSphere MQ File Transfer Edition, but in this case, non-business-to-business protocols are used. The file transfer is further enhanced through the use of WebSphere® Message Broker to mediate the file transfer for routing and protocol transformation within the enterprise.
As one in a series of IBM Redbooks publications and RedpapersTM publications for V7, the entire series is designed to give you in-depth information about key WebSphere Application Server features. In this book, we provide a detailed exploration of the WebSphere Application Server V7 runtime administration process.
The book includes configuration and administration information for WebSphere Application Server V7 and WebSphere Application Server Network Deployment V7 on distributed platforms and WebSphere Application Server for z/OS® V7.
The following publications are considered prerequisites to this book:
- WebSphere Application Server V7.0: Technical Overview, REDP-4482
- WebSphere Application Server V7: Concepts, Planning and Design, SG24-7708
This IBM RedpaperTM publication provides a starting point for using the Feature Pack for SCA. It provides an architectural view of SCA and of the Feature Pack. In addition, this paper explains how to create simple SCA components from existing JavaTM and Spring implementations. It discusses how to apply quality of service to applications, and how to deploy and manage SCA artifacts in WebSphere Application Server. The examples in this paper use Rational® Application Developer to illustrate how to create and package SCA applications.
Processing logic in WebSphere Message Broker is implemented using message flows. Through message flows, messages from business applications can be transformed, augmented, and routed to other business applications. Message flows are created by connecting nodes together. A wide selection of built-in nodes are provided with WebSphere Message Broker. These nodes perform tasks that are associated with message routing, transformation, and enrichment. Message flows are created and tested using the Message Broker Toolkit, a sophisticated, easy-to-use programming tool that provides a full range of programming aids.
This IBM® Redbooks® publication focuses on two specific integration requirements that apply to many midmarket companies. The first is the ability to use WebSphere Message Broker to integrate Microsoft.NET applications into a broader connectivity solution. WebSphere Message Broker V8 introduces the ability to integrate with existing Microsoft .NET Framework applications. A .NET assembly can be called from within a message flow and the WebSphere Message Broker runtime can host and run .NET code. Solutions explored in this book cover connectivity to applications using Windows Communications Framework (WCF), Microsoft Message Queuing, Microsoft Dynamics CRM, and other Microsoft applications.
The second is the ability to integrate WebSphere Message Broker with file transfer networks, specifically with WebSphere MQ File Transfer Edition and IBM Sterling Connect Direct.
The book will help you understand the position of these new technologies as well as how to use them for Java enterprise development in a WebSphere Application Server environment. Though synergetic, both technologies can be used in isolation.
This publication is structured to appeal to administrators, application developers, and all those individuals using the technologies together or independently.
The book is split into two parts. Part 1, "Architecture and overview" on page 1 introduces OSGi applications and JPA 2.0 and describes how to set up a development and test environment. Part 2, "Examples" on page 55 uses examples to illustrate how to exploit the features of OSGi applications and JPA 2.0.
This book discusses the scalability challenges and solutions facing today's dynamic business and IT environments. Topics discussed include existing scalability solutions, how WebSphere eXtreme Scale can be integrated into these solutions, and best practices for using WebSphere eXtreme Scale in different environments, including application data caching and database caching. Also included is an in-depth discussion of the WebSphere eXtreme Scale infrastructure, such as grid clients and servers, the grid catalog service, zone support, and scalability sizing considerations.
This book focuses on the challenges and benefits of integrating WebSphere eXtreme Scale with other middleware products, including WebSphere® Business Events, WebSphere Commerce, WebSphere Portal, and Rational® JazzTM-based products. Detailed procedures for integrating, configuring, and monitoring WebSphere eXtreme Scale in WebSphere Portal and WebSphere Commerce environments are provided.
This book focuses on the virtual systems capability of the IBM Workload Deployer and specifically addresses the process of building customized virtual systems that go beyond the standard capabilities of the virtual images available with the product.
The book starts by describing private clouds and how they can benefit your business. It introduces the IBM Workload Deployer and its capabilities, and then talks about the various tools that you can use to enhance the process of planning, customizing, and automating virtual system deployment. A sample is used to illustrate how the standard virtual images that are available for the IBM Workload Deployer can be customized for a robust solution that includes dynamic workload management, high-performing data caching, and monitoring of system state. The book then discusses how you can use the IBM Workload Deployer to facilitate the progression of an application through its lifecycle. Finally, an overview is provided of the troubleshooting capabilities that come with the IBM Workload Deployer.