talk-data.com talk-data.com

Topic

IBM

technology cloud ai

1101

tagged

Activity Trend

26 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and Performance Guidelines

This IBM® Redbooks® publication captures several of the preferred practices that are based on field experience and describes the performance gains that can be achieved by implementing the IBM System Storage® SAN Volume Controller and Storwize® V7000 V7.2. This book begins with a look at the latest developments with SAN Volume Controller and Storwize V7000 and reviews the changes in the previous versions of the product. It highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. Then, this book provides performance guidelines for SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. Next, it provides preferred practices for monitoring, maintaining, and troubleshooting SAN Volume Controller and Storwize V7000. Finally, this book highlights several scenarios that demonstrate the preferred practices and performance guidelines.

IBM PowerKVM Configuration and Use

This IBM® Redbooks® publication presents the new IBM PowerKVM virtualization for scale-out Linux systems. This book describes the concepts of PowerKVM and how you can deploy your virtual machines with the software stack included in the product. It helps you install and configure PowerKVM on your Power System server and provides guidance for managing the supported virtualization features by using the Web interface and command-line interface (CLI). This information for professionals who want to acquire a better understanding of PowerKVM virtualization technology to optimize Linux workload consolidation and use the new POWER8 processor features. The intended audience also includes people in these roles: Clients Sales and marketing professionals Technical support professionals IBM Business Partners Independent software vendors Open source community IBM OpenPower™ partners It does not replace the latest marketing materials and configuration tools. It is intended as an additional source of information that, together with existing sources, can be used to enhance your knowledge of IBM virtualization solutions. Before you start reading, you must be familiar with the general concepts of kernel-based virtual machine (KVM), Linux, and IBM Power architecture.

IBM MQ V8 Features and Enhancements

The power of IBM® MQ is its flexibility combined with reliability, scalability, and security. This flexibility provides a large number of design and implementation choices. Making informed decisions from this range of choices can simplify the development of applications and the administration of an MQ messaging infrastructure. Applications that access such an infrastructure can be developed using a wide range of programming paradigms and languages. These applications can run within a substantial array of software and hardware environments. Customers can use IBM MQ to integrate and extend the capabilities of existing and varied infrastructures in the information technology (IT) system of a business. IBM MQ V8.0 was released in June 2014. Before that release, the product name was IBM WebSphere® MQ. This IBM Redbooks® publication covers the core enhancements made in IBM MQ V8 and the concepts that must be understood. A broad understanding of the product features is key to making informed design and implementation choices for both the infrastructure and the applications that access it. Details of new areas of function for IBM MQ are introduced throughout this book, such as the changes to security, publish/subscribe clusters, and IBM System z exploitation. This book is for individuals and organizations who make informed decisions about design and applications before implementing an IBM MQ infrastructure or begin development of an IBM MQ application.

Guide to IBM PowerHA SystemMirror for AIX Version 7.1.3

This IBM® Redbooks® publication for IBM Power Systems™ with IBM PowerHA® SystemMirror® Standard and Enterprise Editions (hardware, software, practices, reference architectures, and tools) documents a well-defined deployment model within an IBM Power Systems environment. It guides you through a planned foundation for a dynamic infrastructure for your enterprise applications. This information is for technical consultants, technical support staff, IT architects, and IT specialists who are responsible for providing high availability and support for the IBM PowerHA SystemMirror Standard and Enterprise Editions on IBM POWER® systems.

Building 360-Degree Information Applications

Today's businesses, applications, social media, and online transactions generate more data than ever before. This data can be explored and analyzed to provide tremendous business value. IBM® Watson™ Explorer and IBM InfoSphere® Master Data Management (InfoSphere MDM) enable organizations to simultaneously explore and derive insights from enterprise data that was traditionally stored in "silos" in enterprise applications, different data repositories, and in different data formats. This IBM Redbooks® publication provides information about Watson Explorer 9.0, InfoSphere MDM, and IBM InfoSphere MDM Probabilistic Matching Engine for InfoSphere BigInsights™ (PME for BigInsights). It gives you an overview, describes the architecture, and presents use cases that you can use to accomplish the following tasks: Understand the core capabilities of Watson Explorer, InfoSphere MDM, and PME for BigInsights. Realize the full potential of Watson Explorer applications. Describe the integration and value of the combination of Watson Explorer and InfoSphere MDM. Build a 360-degree information application. Learn by example by following hands-on lab scenarios.

Reliability and Performance with IBM DB2 Analytics Accelerator V4.1

The IBM® DB2® Analytics Accelerator for IBM z/OS® is a high-performance appliance that integrates the IBM zEnterprise® infrastructure with IBM PureData™ for Analytics, powered by IBM Netezza® technology. With this integration, you can accelerate data-intensive and complex queries in a DB2 for z/OS highly secure and available environment. DB2 and the Analytics Accelerator appliance form a self-managing hybrid environment running online transaction processing and online transactional analytical processing concurrently and efficiently. These online transactions run together with business intelligence and online analytic processing workloads. DB2 Analytics Accelerator V4.1 expands the value of high-performance analytics. DB2 Analytics Accelerator V4.1 opens to static Structured Query Language (SQL) applications and row set processing, minimizes data movement, reduces latency, and improves availability. This IBM Redbooks® publication provides technical decision-makers with an understanding of the benefits of version 4.1 of the Analytics Accelerator with DB2 11 for z/OS. It describes the installation of the new functions, and the advantages to existing analytical processes as measured in our test environment. This book also introduces the DB2 Analytics Accelerator Loader V1.1, a tool that facilitates the data population of the DB2 Analytics Accelerator.

Practical Migration from x86 to Linux on IBM System z

There are many reasons why you would want to optimize your servers through virtualization using Linux on IBM® System z®: Too many distributed physical servers with low utilization A lengthy provisioning process that delays the implementation of new applications Limitations in data center power and floor space High total cost of ownership (TCO) Difficulty allocating processing power for a dynamic environment Next, we describe total cost of ownership analyses and we guide you in understanding how to analyze your environment before beginning a migration project. We also assist you in determining the expected consolidation ratio for a given workload type. We also describe virtualization concepts along with describing the benefits of migrating from the x86 environment to guests residing on an IBM z/VM® single system image with live guest relocation. This IBM Redbooks publication walks you through a migration approach, includes planning worksheets, as well as a chapter to assist you in analyzing your own systems. We also discuss post migration considerations such as acceptance testing of functionality and performance measurements.

Implementing IBM FlashSystem 840

Almost all technological components in the data center are getting faster; central processing units, network, storage area networks (SAN), and memory. All of them have improved their speed by a minimum of 10X; some of them by 100X, for example, data networks. However, spinning disk performance has only increased by 1.2 times. The IBM FlashSystem™ 840 closes this gap. The FlashSystem 840 is optimized for the data center to enable organizations of all sizes to strategically harness the value of stored data. It provides flexible capacity and extreme performance for the most demanding applications, including virtualized or bare-metal online transaction processing (OLTP) and online analytical processing (OLAP) databases, virtual desktop infrastructures (VDI), technical computing applications, and cloud environments. The system accelerates response times with IBM® MicroLatency™ access times as low as 90 µs write latency and 135 µs read latency to enable faster decision making. The introduction of a low capacity 1 TB flash module allows FlashSystem 840 to be configured in capacity points as low as 2 TB in protected RAID 5 mode. Coupled with 10 GB iSCSI, FlashSystem is positioned to bring extreme performance to small and medium-sized businesses (SMB) and growth markets. Implementing the IBM FlashSystem 840 provides value that goes beyond those benefits that are seen on disk-based arrays. These benefits include better user experience, server and application consolidation, development cycle reduction, application scalability, data center footprint savings, and improved price performance economics. This IBM Redbooks® publication introduces clients to the IBM FlashSystem. It provides in-depth knowledge of the product architecture, software and hardware, its implementation, and hints and tips. Also illustrated are use cases that show real-world solutions for tiering, flash-only, and preferred read, as well as examples of the benefits gained by integrating FlashSystem storage into business environments. Also described are product integration scenarios running the IBM FlashSystem 840 with the IBM SAN Volume Controller, the IBM PureFlex® System, and the IBM Storwize® V7000, as well as considerations when integrating with the IBM FlashSystem 840. The preferred practice guidance is provided for your FlashSystem environment with IBM 16 Gbps b-type products and features, focusing on Fibre Channel design. This book is intended for pre-sales and post-sales technical support professionals and storage administrators, and for anyone who wants to understand and learn how to implement this new and exciting technology.

IBM z/OS V2.1 DFSMS Technical Update

Each release of IBM® z/OS® DFSMS builds upon the previous version to provide enhanced storage management, data access, device support, program management, and distributed data access for the z/OS platform in a system-managed storage environment. This IBM Redbooks® publication provides a summary of the functions and enhancements integrated into z/OS V2.1 DFSMS. It provides you with the information that you need to understand and evaluate the content of this DFSMS release, along with practical implementation hints and tips. This book is written for storage professionals and system programmers who have experience with the components of DFSMS. It provides sufficient information so that you can start prioritizing the implementation of new functions and evaluating their applicability in your DFSMS environment.

IBM DS8870 Architecture and Implementation

This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM DS8870. The book provides reference information to assist readers who need to plan for, install, and configure the DS8870. The IBM DS8870 is the most advanced model in the IBM DS8000® series and is equipped with IBM POWER7+™ based controllers. Various configuration options are available that scale from dual 2-core systems up to dual 16-core systems with up to 1 TB of cache. The DS8870 features an integrated high-performance flash enclosure with flash cards that can delivers up to 250,000 IOPS and up to 3.4 GBps bandwidth. A high performance all-flash drive configuration is also available. The DS8870 also features enhanced 8 Gbps device adapters and host adapters. Connectivity options, with up to 128 Fibre Channel/IBM FICON® ports for host connections, make the DS8870 suitable for multiple server environments in open systems and IBM System z® environments. The DS8870 supports advanced disaster recovery solutions, business continuity solutions, and thin provisioning. All disk drives in the DS8870 storage system have the Full Disk Encryption (FDE) feature. The DS8870 also can be integrated in a Lightweight Directory Access Protocol (LDAP) infrastructure. The DS8870 can automatically optimize the use of each storage tier, particularly flash drives and flash cards, through the IBM Easy Tier® feature, which is available at no extra charge.

Implementing IBM Software Defined Network for Virtual Environments

This IBM® Redbooks® publication shows how to integrate IBM Software Defined Network for Virtual Environments (IBM SDN VE) seamlessly within a new or existing data center. This book is aimed at pre- and post-sales support, targeting network administrators and other technical professionals that want to get an overview of this new and exciting technology, and see how it fits into the overall vision of a truly Software Defined Environment. It shows you all of the steps that are required to design, install, maintain, and troubleshoot the IBM SDN VE product. It also highlights specific, real-world examples that showcase the power and flexibility that IBM SDN VE has over traditional solutions with a legacy network infrastructure that is applied to virtual systems. This book assumes that you have a general familiarity with networking and virtualization. It does not assume an in-depth understanding of KVM or VMware. It is written for administrators who want to get a quick start with IBM SDN VE in their respective virtualized infrastructure, and to get some virtual machines up and running by using the rich features of the product in a short amount of time (days, not week, or months).

ABCs of IBM z/OS System Programming Volume 1

The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised. The other volumes contain the following content: Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program/Extended (SMP/E), IBM Language Environment® Volume 3: Introduction to Data Facility Storage Management Subsystem (DFSMS), data set basics, storage management hardware and software, catalogs, and DFSMS Transactional Virtual Storage Access Method (VSAM), or DFSMStvs Volume 4: z/OS Communications Server, Transmission Control Protocol/Internet Protocol (TCP/IP), and IBM Virtual Telecommunications Access Method (IBM VTAM®) Volume 5: Base and IBM Parallel Sysplex®, z/OS System Logger, Resource Recovery Services (RRS), Global Resource Serialization (GRS), z/OS system operations, z/OS Automatic Restart Manager (ARM), IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) Volume 6: Introduction to security, IBM Resource Access Control Facility (IBM RACF®), Digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM eServer™ z990 integrated cryptography, zSeries firewall technologies, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and IBM DS8000® Volume 11: Capacity planning, IBM Performance Management, z/OS Workload Manager (WLM), IBM Resource Management Facility (IBM RMF™), and IBM System Management Facility (SMF) Volume 12: WLM Volume 13: JES2 and JES3 System Display and Search Facility (SDSF)

Bitemporal Data

Bitemporal data has always been important. But it was not until 2011 that the ISO released a SQL standard that supported it. Currently, among major DBMS vendors, Oracle, IBM and Teradata now provide at least some bitemporal functionality in their flagship products. But to use these products effectively, someone in your IT organization needs to know more than how to code bitemporal SQL statements. Perhaps, in your organization, that person is you. To correctly interpret business requests for temporal data, to correctly specify requirements to your IT development staff, and to correctly design bitemporal databases and applications, someone in your enterprise needs a deep understanding of both the theory and the practice of managing bitemporal data. Someone also needs to understand what the future may bring in the way of additional temporal functionality, so their enterprise can plan for it. Perhaps, in your organization, that person is you. This is the book that will show the do-it-yourself IT professional how to design and build bitemporal databases and how to write bitemporal transactions and queries, and will show those who will direct the use of vendor-provided bitemporal DBMSs exactly what is going on "under the covers" of that software. Explains the business value of bitemporal data in terms of the information that can be provided by bitemporal tables and not by any other form of temporal data, including history tables, version tables, snapshot tables, or slowly-changing dimensions Provides an integrated account of the mathematics, logic, ontology and semantics of relational theory and relational databases, in terms of which current relational theory and practice can be seen as unnecessarily constrained to the management of nontemporal and incompletely temporal data Explains how bitemporal tables can provide the time-variance and nonvolatility hitherto lacking in Inmon historical data warehouses Explains how bitemporal dimensions can replace slowly-changing dimensions in Kimball star schemas, and why they should do so Describes several extensions to the current theory and practice of bitemporal data, including the use of episodes, "whenever" temporal transactions and queries, and future transaction time Points out a basic error in the ISO’s bitemporal SQL standard, and warns practitioners against the use of that faulty functionality. Recommends six extensions to the ISO standard which will increase the business value of bitemporal data Points towards a tritemporal future for bitemporal data, in which an Aristotelian ontology and a speech-act semantics support the direct management of the statements inscribed in the rows of relational tables, and add the ability to track the provenance of database content to existing bitemporal databases This book also provides the background needed to become a business ontologist, and explains why an IT data management person, deeply familiar with corporate databases, is best suited to play that role. Perhaps, in your organization, that person is you

IBM ProtecTIER Implementation and Best Practices Guide

This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM System Storage® TS7600 ProtecTIER® family of products. This guide provides the current best practices for using ProtecTIER software version physical general availability (pGA) 3.3 and the revolutionary and patented IBM HyperFactor® deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation. The System Storage TS7650G ProtecTIER Deduplication Gateway and the System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems that are configured for three available interfaces: The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates traditional automated tape libraries. The OpenStorage (OST) application programming interface (API) can be integrated with Symantec NetBackup to provide backup-to-disk without having to emulate traditional tape libraries. The File System Interface (FSI) supports Common Internet File System (CIFS) and Network File System (NFS) as backup targets. When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best options and scenarios for data deduplication for their environments. This guide helps you optimize your deduplication ratio, and at the same time reduce the hardware, power and cooling, and management costs. This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS) group, development, and quality assurance (QA) teams.

IBM Tivoli Storage Manager as a Data Protection Solution

When you hear IBM® Tivoli® Storage Manager, the first thing that you typically think of is data backup. Tivoli Storage Manager is the premier storage management solution for mixed platform environments. Businesses face a tidal wave of information and data that seems to increase daily. The ability to successfully and efficiently manage information and data has become imperative. The Tivoli Storage Manager family of products helps businesses successfully gain better control and efficiently manage the information tidal wave through significant enhancements in multiple facets of data protection. Tivoli Storage Manager is a highly scalable and available data protection solution. It takes data protection scalability to the next level with a relational database, which is based on IBM DB2® technology. Greater availability is delivered through enhancements such as online, automated database reorganization. This IBM Redbooks® publication describes the evolving set of data-protection challenges and how capabilities in Tivoli Storage Manager can best be used to address those challenges. This book is more than merely a description of new and changed functions in Tivoli Storage Manager; it is a guide to use for your overall data protection solution.

ABCs of IBM z/OS System Programming Volume 6

The ABCs of IBM® z/OS® System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you want to become more familiar with z/OS in your current environment or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection can serve as a powerful technical tool. Following are the contents of the volumes: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, IBM Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-managed storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), and IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM z9® integrated cryptography, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, IBM System z® processor design, System z connectivity, logical partition (LPAR) concepts, hardware configuration definition (HCD), and Hardware Management Console (HMC) Volume 11: Capacity planning, performance management, Workload Manager (WLM), IBM Resource Measurement Facility™ (RMF™), and System Management Facilities (SMF)

GDPS Family: An Introduction to Concepts and Capabilities

This IBM® Redbooks® publication presents an overview of the IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) family of offerings and the role they play in delivering a business IT resilience solution. The book begins with general concepts of business IT resilience and disaster recovery, along with issues related to high application availability, data integrity, and performance. These topics are considered within the framework of government regulation, increasing application and infrastructure complexity, and the competitive and rapidly changing modern business environment. Next, it describes the GDPS family of offerings with specific reference to how they can help you achieve your defined goals for disaster recovery and high availability. Also covered are the features that simplify and enhance data replication activities, the prerequisites for implementing each offering, and hints for planning for the future and immediate business requirements. Tables provide easy-to-use summaries and comparisons of the offerings, and the additional planning and implementation services available from IBM are explained. Finally, several practical client scenarios and requirements are described, along with the most suitable GDPS solution for each case. The introductory chapters of this publication are intended for a broad technical audience including IT System Architects, Availability Managers, Technical IT Managers, Operations Managers, System Programmers, and Disaster Recovery Planners. The subsequent chapters provide more technical details about the GDPS offerings, and each can be read in isolation for those readers who are interested. Therefore, if you do read all the chapters, be aware that some information is repeated.

The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration

In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.

IBM System Storage N series Software Guide

Corporate workgroups, distributed enterprises, and small to medium-sized companies are increasingly seeking to network and consolidate storage to improve availability, share information, reduce costs, and protect and secure information. These organizations require enterprise-class solutions capable of addressing immediate storage needs cost-effectively, while providing an upgrade path for future requirements. IBM® System Storage® N series storage systems and their software capabilities are designed to meet these requirements. IBM System Storage N series storage systems offer an excellent solution for a broad range of deployment scenarios. IBM System Storage N series storage systems function as a multiprotocol storage device that is designed to allow you to simultaneously serve both file and block-level data across a single network. These activities are demanding procedures that, for some solutions, require multiple, separately managed systems. The flexibility of IBM System Storage N series storage systems, however, allows them to address the storage needs of a wide range of organizations, including distributed enterprises and data centers for midrange enterprises. IBM System Storage N series storage systems also support sites with computer and data-intensive enterprise applications, such as database, data warehousing, workgroup collaboration, and messaging. This IBM Redbooks® publication explains the software features of the IBM System Storage N series storage systems. This book also covers topics such as installation, setup, and administration of those software features from the IBM System Storage N series storage systems and clients and provides example scenarios.

Implementing the IBM System Storage SAN Volume Controller V7.2

This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller Version 7.2. SAN Volume Controller is a virtualization appliance solution, which maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the “block” level in a network, which enables applications and servers to share storage devices on a network. This book is intended for readers who must implement the SAN Volume Controller at a 7.2 release level with minimal effort.