talk-data.com talk-data.com

Topic

IBM

technology cloud ai

1101

tagged

Activity Trend

26 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
Introduction to IBM Real-time Compression Appliances

Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® is introducing the IBM Real-time Compression Appliances for NAS, an innovative new storage offering that delivers essential storage efficiency technologies, combined with exceptional ease of use and performance. In an era when the amount of information, particularly in unstructured files, is exploding, but budgets for storing that information are stagnant, IBM Real-time Compression technology offers a powerful tool for better information management, protection, and access. IBM Real-time Compression can help slow the growth of storage acquisition, reducing storage costs while simplifying both operations and management. It also enables organizations to keep more data available for use rather than storing it offsite or on harder-to-access tape, so they can support improved analytics and decision making. IBM Real-time Compression Appliances provide on-line storage optimization through real-time data compression, delivering dramatic cost reduction without performance degradation. This IBM Redbooks® publication is an easy-to-follow guide that describes how to design solutions successfully using IBM Real-time Compression Appliances (IBM RTCAs). It provides practical installation examples, ease of use, remote management, high availability, and administration techniques. Furthermore, it explains best practices for RTCA solution design, application integration, and practical RTCA use cases.

PowerHA SystemMirror for IBM i Cookbook

IBM® PowerHA™ SystemMirror for i is the IBM high-availability disk-based clustering solution for the IBM i 7.1 operating system. When combined with IBM i clustering technology, PowerHA for i delivers a complete high-availability and disaster-recovery solution for your business applications running in the IBM System i® environment. PowerHA for i enables you to support high-availability capabilities with either native disk storage or IBM DS8000® or DS6000™ storage servers or IBM Storwize V7000 and SAN Volume Controllers. The latest release of IBM PowerHA SystemMirror for i delivers a brand-new web-based PowerHA graphical user interface that effectively combines the solution-based and task-based activities for your HA environment, all in a single user interface. This IBM Redbooks® publication provides a broad understanding of PowerHA for i. This book is intended for all IBM i professionals who are planning on implementing a PowerHA solution on IBM i.

Running SAP Solutions with IBM DB2 10 for z/OS on the IBM zEnterprise System

This IBM® Redbooks® publication highlights the key enhancements of IBM DB2® 10 for SAP. These enhancements include performance, scalability for several threads, new and more granular privileges, and auditing capabilities. This book is for IT specialists and architects who are interested in how SAP NetWeaver v7.3 interacts and uses the new features of DB2 10 for z/OS®. This book focuses on the SAP Business Suite of applications and how these applications run on IBM zEnterprise™ infrastructures. It begins with a brief overview of the SAP NetWeaver products and hardware and explains the software implementations when DB2 10 for z/OS is used as the database server. It highlights the SAP NetWeaver system architecture. It continues by describing how SAP products benefit from the recent developments by IBM on the hardware side with the zEnterprise 196 (z196) server, in z/OS, and in DB2 10 for z/OS. In addition, this Redbooks publication explains how you can extend an SAP system or change a server configuration by using the IBM zEnterprise Unified Resource Manager. It explores SAP high availability concepts, virtualization, and security enhancements of DB2 10 for SAP solutions.

IBM Tivoli Storage Productivity Center V4.2 Release Guide

IBM® Tivoli® Storage Productivity Center V4.2 is a feature-rich storage management software suite. The integrated suite provides detailed monitoring, reporting, and management within a single console. This IBM Redbooks® publication is intended for storage administrators and users who are installing and using the features and functions in IBM Tivoli Storage Productivity Center V4.2. The information in the book can be used to plan for, install, and customize the components of Tivoli Storage Productivity Center in your storage infrastructure. This release contains several important functional enhancements: - New licensing for Tivoli Storage Productivity Center Select and for Tivoli Storage productivity Center for Disk Select to provide full Tivoli Storage Productivity Center functionality to Midrange. - Support for IBM Storwize V7000. Also new is the capability for customers to generate and see Storwize V7000 and SAN Volume Controller (SVC) Internal Disks report. - New IBM Tivoli Tier reports that help clients make important decisions about storage tiering by utilizing estimated capability and actual performance data for IBM System Storage® SAN Volume Controller and IBM Storwize V7000 storage tier reports. - IBM XIV® Storage System support has been updated, adding discovery, provisioning, and performance management, as well as new replication support for three new XIV sessions: Snapshot, Metro Mirror failover/failback, and Global Mirror Failover/Failback. Step-by-step procedures are provided to help you with tasks such as migrating to Storage Resource agents, using Native APIs, using SAN configuration planning functions, and maintaining your IBM DB2 database repository.

Security on IBM z/VSE

One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent—they could have been using resources without the business even being aware that they are there. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.

Implementing an InfoSphere Optim Data Growth Solution

Today, organizations face tremendous challenges with data explosion and information governance. InfoSphere™ Optim™ solutions solve the data growth problem at the source by managing the enterprise application data. The Optim Data Growth solutions are consistent, scalable solutions that include comprehensive capabilities for managing enterprise application data across applications, databases, operating systems, and hardware platforms. You can align the management of your enterprise application data with your business objectives to improve application service levels, lower costs, and mitigate risk. In this IBM® Redbooks® publication, we describe the IBM InfoSphere Optim Data Growth solutions and a methodology that provides implementation guidance from requirements analysis through deployment and administration planning. We also discuss various implementation topics including system architecture design, sizing, scalability, security, performance, and automation. This book is intended to provide various systems development professionals, Data Solution Architects, Data Administrators, Modelers, Data Analysts, Data Integrators, or anyone who has to analyze or integrate data structures, a broad understanding about IBM InfoSphere Optim Data Growth solutions. By being used in conjunction with the product manuals and online help, this book provides guidance about implementing an optimal solution for managing your enterprise application data.

IBM Business Process Manager V7.5 Production Topologies

This IBM® Redbooks® publication describes how to build production topologies for IBM Business Process Manager Advanced V7.5. It is aimed at IT Architects and IT Specialists who want to understand and implement these topologies. Use this book to select the appropriate production topologies for a given environment, then follow the step-by-step instructions included in this book to build these topologies. Part one introduces IBM Business Process Manager and provides an overview of basic topology components, and Process Server and Process Center. This part also provides an overview of the production topologies that we describe in this book, including a selection criteria for when to select a given topology. Part two provides a series of step-by-step instructions for creating production topology environments using deployment environment patterns. This includes topologies that incorporate IBM Business Monitor. This part also discusses advanced topology topics.

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalable, and cannot capture and express enterprise-wide policy to ensure consistency and compliance. In this IBM® Redbooks® publication, we discuss an IBM Security policy management solution, which is composed of both policy management and enforcement using IT security services. We discuss how this standards-based unified policy management and enforcement solution can address authentication, identity propagation, and authorization requirements, and thereby help organizations demonstrate compliance, secure their services, and minimize the risk of data loss. This book is a valuable resource for security officers, consultants, and architects who want to understand and implement a centralized security policy management and entitlement solution.

IBM IMS Version 12 Technical Overview

IBM® Information Management System (IMS™) provides leadership in performance, reliability, and security to help you implement the most strategic and critical enterprise applications. IMS also keeps pace with the IT industry. IMS, Enterprise Suite 2.1, and IMS Tools continue to evolve to provide value and meet the needs of enterprise customers. With IMS 12, integration and open access improvements provide flexibility and support business growth requirements. Manageability enhancements help optimize system staff productivity by improving ease of use and autonomic computing facilities and by providing increased availability. Scalability improvements have been made to the well-known performance, efficiency, availability, and resilience of IMS by using 64-bit storage. IBM IMS Enterprise Suite for z/OS® V2.1 components enhance the use of IMS applications and data. In this release, components (either orderable or downloaded from the web) deliver innovative new capabilities for your IMS environment. They enhance connectivity, expand application development, extend standards and tools for a service-oriented architecture (SOA), ease installation, and provide simplified interfaces. This IBM Redbooks® publication explores the new features of IMS 12 and Enterprise Suite 2.1 and provides an overview of the IMS tools. In addition, this book highlights the major new functions and facilitates database administrators in their planning for installation and migration.

IBM zEnterprise 196 Technical Guide

The popularity of the Internet and the affordability of IT hardware and software have resulted in an explosion of applications, architectures, and platforms. Workloads have changed. Many applications, including mission-critical ones, are deployed on a variety of platforms, and the System z® design has adapted to this change. It takes into account a wide range of factors, including compatibility and investment protection, to match the IT requirements of an enterprise. The zEnterprise System consists of the IBM zEnterprise 196 central processor complex, the IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension. The z196 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The z196 Model M80 provides up to 1.6 times the total system capacity of the z10™ EC Model E64, and all z196 models provide up to twice the available memory of the z10 EC. The zBX infrastructure works with the z196 to enhance System z virtualization and management through an integrated hardware platform that spans mainframe, POWER7™, and System x® technologies. Through the Unified Resource Manager, the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment. This IBM® Redbooks® publication provides an overview of the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. This book is intended for systems engineers, consultants, planners, and anyone wanting to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z technology and terminology. The changes to this edition are based on the System z hardware announcement dated July 12, 2011.

Value Realization from Efficient Software Deployment

Unfortunately purchasing software products does not automatically mean that these products are exploited throughout the organization providing the maximum possible value to the business units. Several issues call for a structured approach that gets the most business value out of software already purchased. The objectives of this approach are to: * Create maximum awareness throughout the organization of the software purchased. We can summarize the overall objective of this approach as ensuring that the business units in an organization obtain the maximum possible value of software products purchased, which is also the scope of this IBM Redbooks publication.

Metadata Management with IBM InfoSphere Information Server

What do you know about your data? And how do you know what you know about your data? Information governance initiatives address corporate concerns about the quality and reliability of information in planning and decision-making processes. Metadata management refers to the tools, processes, and environment that are provided so that organizations can reliably and easily share, locate, and retrieve information from these systems. Enterprise-wide information integration projects integrate data from these systems to one location to generate required reports and analysis. During this type of implementation process, metadata management must be provided along each step to ensure that the final reports and analysis are from the right data sources, are complete, and have quality. This IBM® Redbooks® publication introduces the information governance initiative and highlights the immediate needs for metadata management. It explains how IBM InfoSphere™ Information Server provides a single unified platform and a collection of product modules and components so that organizations can understand, cleanse, transform, and deliver trustworthy and context-rich information. It describes a typical implementation process. It explains how InfoSphere Information Server provides the functions that are required to implement such a solution and, more importantly, to achieve metadata management. This book is for business leaders and IT architects with an overview of metadata management in information integration solution space. It also provides key technical details that IT professionals can use in a solution planning, design, and implementation process.

IBM Style Guide, The: Conventions for Writers and Editors

The IBM Style Guide distills IBM wisdom for developing superior content: information that is consistent, clear, concise, and easy to translate. The IBM Style Guide can help any organization improve and standardize content across authors, delivery mechanisms, and geographic locations. This expert guide contains practical guidance on topic-based writing, writing content for different media types, and writing for global audiences. Throughout, the authors illustrate the guidance with many examples of correct and incorrect usage. Writers and editors will find authoritative guidance on issues ranging from structuring information to writing usable procedures to presenting web addresses to handling cultural sensitivities. The guidelines cover these topics: Using language and grammar to write clearly and consistently Applying punctuation marks and special characters correctly Formatting, organizing, and structuring information so that it is easy to find and use Using footnotes, cross-references, and links to point readers to valuable, related information Presenting numerical information clearly Documenting computer interfaces to make it easy for users to achieve their goals Writing for diverse audiences, including guidelines for improving accessibility Preparing clear and effective glossaries and indexes The IBM Style Guide can help any organization or individual create and manage content more effectively. The guidelines are especially valuable for businesses that have not previously adopted a corporate style guide, for anyone who writes or edits for IBM as an employee or outside contractor, and for anyone who uses modern approaches to information architecture.

SAP Applications on IBM PowerVM

IBM® invented the virtualization technology starting in the 1960s on the mainframe, and the functionalities evolved and were ported to other platforms and improved the reliability, availability, and serviceability (RAS) features. With virtualization, you achieve better asset utilization, reduced operating costs, and faster responsiveness to changing business demands. Every technology vendor in the SAP ecosystem understands virtualization as slightly different capabilities on different levels (storage and server hardware, processor, memory, I/O resources or the application, and so on). It is important to understand exactly what functionality is offered and how it supports the client’s business requirements. In this IBM Redbooks® publication we focus on server virtualization technologies in the IBM Power Systems™ hardware, AIX®, IBM i, and Linux space and what they mean specifically for SAP applications running on this platform. SAP clients can leverage the technology that the IBM Power Systems platform offers. In this book, we describe the technologies and functions, what they mean, and how they apply to the SAP system landscape.

IBM InfoSphere Streams: Assembling Continuous Insight in the Information Revolution

In this IBM® Redbooks® publication, we discuss and describe the positioning, functions, capabilities, and advanced programming techniques for IBM InfoSphere™ Streams (V2), a new paradigm and key component of IBM Big Data platform. Data has traditionally been stored in files or databases, and then analyzed by queries and applications. With stream computing, analysis is performed moment by moment as the data is in motion. In fact, the data might never be stored (perhaps only the analytic results). The ability to analyze data in motion is called real-time analytic processing (RTAP). IBM InfoSphere Streams takes a fundamentally different approach to Big Data analytics and differentiates itself with its distributed runtime platform, programming model, and tools for developing and debugging analytic applications that have a high volume and variety of data types. Using in-memory techniques and analyzing record by record enables high velocity. Volume, variety and velocity are the key attributes of Big Data. The data streams that are consumable by IBM InfoSphere Streams can originate from sensors, cameras, news feeds, stock tickers, and a variety of other sources, including traditional databases. It provides an execution platform and services for applications that ingest, filter, analyze, and correlate potentially massive volumes of continuous data streams. This book is intended for professionals that require an understanding of how to process high volumes of streaming data or need information about how to implement systems to satisfy those requirements. See: http://www.redbooks.ibm.com/abstracts/sg247865.html for the IBM InfoSphere Streams (V1) release.

Implementing Imaging Solutions with IBM Production Imaging Edition and IBM Datacap Taskmaster Capture

Organizations face many challenges in managing documents that they need to conduct their business. IBM® Production Imaging Edition V5.0 is the comprehensive product that combines imaging, capture, and automation to provide the capabilities to process and manage high volumes of document imaging over their entire life cycle. This IBM Redbooks® publication introduces Production Imaging Edition, its components, the system architecture, its functions, and its capabilities. It primarily focuses on IBM Datacap Taskmaster Capture V8.0, including how it works, how to design a document image capture solution, and how to implement the solution using Datacap Studio. Datacap Studio is a development tool that designers use to create rules and rule sets, configure a document hierarchy and task profiles, and set up a verification panel for image verification. This book highlights the advanced technologies that are used to create dynamic applications, such as IBM Taskmaster Accounts Payable Capture. It includes an in-depth walkthrough of the dynamic application, Taskmaster Accounts Payable Capture, which provides invaluable insight to designers in developing and customizing their applications. In addition, this book includes information about high availability, scalability, performance, and backup and recovery options for the document imaging solution. It provides known best practices and recommendations for designing and implementing such a solution. This book is for IT architects and professionals who are responsible for creating, improving, designing, and implementing document imaging solutions for their organizations.

IBM zEnterprise 114 Technical Guide

The popularity of the Internet and the affordability of IT hardware and software have resulted in an explosion of applications, architectures, and platforms. Workloads have changed. Many applications, including mission-critical ones, are deployed on a variety of platforms, and the System z® design has adapted to this change. It takes into account a wide range of factors, including compatibility and investment protection, to match the IT requirements of an enterprise. This IBM® Redbooks® publication discusses the IBM zEnterprise System, an IBM scalable mainframe server. IBM is taking a revolutionary approach by integrating separate platforms under the well-proven System z hardware management capabilities, while extending System z qualities of service to those platforms. The zEnterprise System consists of the IBM zEnterprise 114 central processor complex, the IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension. The z114 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The z114 provides up to 18% improvement in uniprocessor speed and up to a 12% increase in total system capacity for z/OS®, z/VM®, and Linux on System z over the z10™ Business Class (BC). The zBX infrastructure works with the z114 to enhance System z virtualization and management through an integrated hardware platform that spans mainframe, POWER7™, and System x technologies. The federated capacity from multiple architectures of the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment through the Unified Resource Manager. This book provides an overview of the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. This book is intended for systems engineers, consultants, planners, and anyone wanting to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z technology and terminology.

Scaling BPM Adoption from Project to Program with IBM Business Process Manager

Your first Business Process Management (BPM) project is a crucial first step on your BPM journey. It is important to begin this journey with a philosophy of change that will enable you to avoid common pitfalls that lead to failed BPM projects, and ultimately, poor BPM adoption. This IBM® Redbooks® publication describes the methodology and best practices that lead to a successful project and how to use that success to scale to enterprise-wide BPM adoption. The intended audience for this book includes all people who participate in the discovery, planning, delivery, deployment, and continuous improvement activities for a business process. These roles include process owners, process participants and subject matter experts (SMEs) from the operational business as well as technologists responsible for delivery including BPM analysts, BPM solution architects, BPM administrators, and BPM developers.

SAN Storage Performance Management Using Tivoli Storage Productivity Center

IBM Tivoli® Storage Productivity Center is an ideal tool for performing storage management reporting, because it uses industry standards for cross vendor compliance, and it can provide reports based on views from all application servers, all Fibre Channel fabric devices, and storage subsystems from different vendors, both physical and virtual. This IBM® Redbooks® publication is intended for experienced storage managers who want to provide detailed performance reports to satisfy their business requirements. The focus of this book is to use the reports provided by Tivoli Storage Productivity Center for performance management. We do address basic storage architecture in order to set a level playing field for understanding of the terminology that we are using throughout this book. Although this book has been created to cover storage performance management, just as important in the larger picture of Enterprise-wide management are both Asset Management and Capacity Management. Tivoli Storage Productivity Center is an excellent tool to provide all of these reporting and management requirements.

Security Functions of IBM DB2 10 for z/OS

IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority. The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system. In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration. DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model. This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.