talk-data.com talk-data.com

Topic

IBM

technology cloud ai

1631

tagged

Activity Trend

26 peak/qtr
2020-Q1 2026-Q1

Activities

1631 activities · Newest first

IBM z14 Technical Guide

Abstract This IBM® Redbooks® publication describes the new member of the IBM Z family, IBM z14®. IBM z14 is the trusted enterprise platform for pervasive encryption, integrating data, transactions, and insights into the data. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. It also must be an integrated infrastructure that can support new applications. Finally, it must have integrated capabilities that can provide new mobile capabilities with real-time analytics that are delivered by a secure cloud infrastructure. IBM z14 servers are designed with improved scalability, performance, security, resiliency, availability, and virtualization. The superscalar design allows z14 servers to deliver a record level of capacity over the prior IBM Z platforms. In its maximum configuration, z14 is powered by up to 170 client characterizable microprocessors (cores) running at 5.2 GHz. This configuration can run more than 146,000 million instructions per second (MIPS) and up to 32 TB of client memory. The IBM z14 Model M05 is estimated to provide up to 35% more total system capacity than the IBM z13® Model NE1. This Redbooks publication provides information about IBM z14 and its functions, features, and associated software support. More information is offered in areas that are relevant to technical planning. It is intended for systems engineers, consultants, planners, and anyone who wants to understand the IBM Z servers functions and plan for their usage. It is intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM Z technology and terminology.

Modernizing Your IT Infrastructure with IBM b-type Gen 6 Storage Networking and IBM Spectrum Storage Products

Abstract This IBM® Redbooks® publication describes the challenge that most data centers face when updating and modernizing their IT infrastructure. New business demands are driving new applications, joining, and creating in the digital world. A rich, meaningful digital experience is the key to effective engagement in today’s integrated digital world. Companies are able to customize digital experiences for their employees with personalized, targeted content for fully connecting with customers, co-workers, and business partners in the most powerful and productive ways. To achieve this, a robust infrastructure is required. Speed of access to data is one of the most important factors. The development of the flash storage devices helped with the insatiable desire for data access speed, but even that is not enough for the most demanding uses. The needs of SAN switches, servers, and software defined infrastructure (SDI) technologies are all requiring more; therefore, the bigger picture needs to be wholly analyzed to build a balanced ecosystem. This publication can help you with planning for growth in your IT infrastructure. This publication explores the concept of modernization and considers important aspects of IT, such as SAN switches, storage systems, and software defined storage.

The data available to marketers -- literally at their fingertips by way of a few mouse clicks -- has exploded over the last decade. Yet, while there is more data -- and it is more accessible -- than it has ever been, the way we think about and use data has hardly evolved at all. With the recent advances in cloud computing and processing power, the industry is abuzz with talk of machine learning and artificial intelligence. How, then, will we get from the world of Microsoft Excel (or Tableau) to a world where "the machines" are automatically and dynamically optimizing all aspects of our marketing?

ABCs of IBM z/OS System Programming Volume 3

Abstract The ABCs of IBM z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. The ABCs collection serves as a powerful technical tool to help you become more familiar with z/OS in your current environment, or to help you evaluate platforms to consolidate your e-business applications. This edition is updated to z/OS Version 2 Release 3. The other volumes contain the following content: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program Extended (SMP/E), IBM Language Environment Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart manager (ARM), IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, the IBM Z platform, IBM Z connectivity, LPAR concepts, HCD, and DS Storage Solution. Volume 11: Capacity planning, performance management, WLM, IBM RMF™, and SMF Volume 12: WLM Volume 13: JES3, JES3 SDSF

IBM zPDT 2017 Sysplex Extensions

Abstract This IBM® Redbooks® publication describes the IBM System z® Personal Development Tool (IBM zPDT®) 2017 Sysplex Extensions, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing sysplex up and running with minimal time and effort. This book is a significant revision of zPDT 2016 Sysplex Extensions, SG24-8315, which is still available online for readers who need the IBM z/OS® 2.1 level of this package. This package is designed and tested to be installed on top of a standard Application Developers Controlled Distribution (ADCD) environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS 2.2 sysplex that runs under IBM z/VM® in a zPDT environment.

Liberty in IBM CICS: Deploying and Managing Java EE Applications

Abstract This IBM® Redbooks® publication is intended for IBM CICS® system programmers and IBM Z architects. It describes how to deploy and manage Java EE 7 web-based applications in an IBM CICS Liberty JVM server and access data on IBM Db2® for IBM z/OS® and IBM MQ for z/OS sub systems. In this book, we describe the key steps to create and install a Liberty JVM server within a CICS region. We then describe how to best use the different deployment techniques for Java EE applications and the specific considerations when deploying applications that use JDBC, JMS, and the new CICS link to Liberty API. Finally, we describe how to secure web applications in CICS Liberty, including transport-level security and request authentication and authorization by using IBM RACF® and LDAP registries. Information is also provided about how to build a high availability infrastructure and how to use the logging and monitoring functions that are available in the CICS Liberty environment. This book is based on IBM CICS Transaction Server (CICS TS) V5.4 that uses the embedded IBM WebSphere® Application Server Liberty technology. It is also applicable to CICS TS V5.3 with the fixes for the continuous delivery APAR PI77502 applied. Sample applications are used throughout this publication and are freely available for download from the IBM CICSDev GitHub organization along with detailed deployment instructions.

IBM Spectrum Archive Enterprise Edition V1.2.5.1 Installation and Configuration Guide

Abstract This IBM® Redbooks® publication helps you with the planning, installation, and configuration of the new IBM Spectrum™ Archive V1.2.5.1 for the IBM TS3310, IBM TS3500, IBM TS4300, and IBM TS4500 tape libraries. IBM Spectrum Archive™ EE enables the use of the LTFS for the policy management of tape as a storage tier in an IBM Spectrum Scale™ based environment. It helps encourage the use of tape as a critical tier in the storage environment. This is the fifth edition of IBM Spectrum Archive Installation and Configuration Guide. IBM Spectrum Archive EE can run any application that is designed for disk files on a physical tape media. IBM Spectrum Archive EE supports the IBM Linear Tape-Open (LTO) Ultrium 8, 7, 6, and 5 tape drives in IBM TS3310, TS3500, TS4300, and TS4500 tape libraries. In addition, IBM TS1155, TS1150, and TS1140 tape drives are supported in TS3500 and TS4500 tape library configurations. IBM Spectrum Archive EE can play a major role in reducing the cost of storage for data that does not need the access performance of primary disk. The use of IBM Spectrum Archive EE to replace disks with physical tape in tier 2 and tier 3 storage can improve data access over other storage solutions because it improves efficiency and streamlines management for files on tape. IBM Spectrum Archive EE simplifies the use of tape by making it transparent to the user and manageable by the administrator under a single infrastructure. This publication is intended for anyone who wants to understand more about IBM Spectrum Archive EE planning and implementation. This book is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.

IBM QRadar Version 7.3 Planning and Installation Guide

Abstract With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: the company's information. This IBM® Redbooks® publication provides information about implementing IBM QRadar® for Security Intelligence and Event Monitoring (SIEM) and protecting an organization's networks through a sophisticated technology, which permits a proactive security posture. It is divided in to the following major sections to facilitate the integration of QRadar with any network architecture: Chapter 2, "Before the installation" on page 3 provides a review of important requirements before the installation of the product. Chapter 3, "Installing IBM QRadar V7.3" on page 57 provides step-by-step procedures to guide you through the installation process. Chapter 4, "After the installation" on page 77 helps you to configure additional features and perform checks after the product is installed. QRadar is an IBM Security prime product that is designed to be integrated with corporate network devices to keep a real-time monitoring of security events through a centralized console. Through this book, any network or security administrator can understand the product's features and benefits.

IBM SPSS Modeler Essentials

Learn how to leverage IBM SPSS Modeler for your data mining and predictive analytics needs in this comprehensive guide. With step-by-step instructions, you'll acquire the skills to import, clean, analyze, and model your data using this robust platform. By the end, you'll be equipped to uncover patterns and trends, enabling data-driven decision-making confidently. What this Book will help me do Understand the fundamentals of data mining and the visual programming interface of IBM SPSS Modeler. Prepare, clean, and preprocess data effectively for analysis and modeling. Build robust predictive models such as decision trees using best practices. Evaluate the performance of your analytical models to ensure accuracy and reliability. Export resulting analyses to apply insights to real-world data projects. Author(s) Keith McCormick and Jesus Salcedo are accomplished professionals in data analytics and statistical modeling. With extensive experience in consulting and teaching, they have guided many in mastering IBM SPSS Modeler through both hands-on workshops and written material. Their approachable teaching style and commitment to clarity ensure accessibility for learners. Who is it for? This book is designed for beginner users of IBM SPSS Modeler who wish to gain practical and actionable skills in data analytics. If you're a data enthusiast looking to explore predictive analytics or a professional eager to discover the insights hidden in your organizational data, this book is for you. A basic understanding of data mining concepts is advantageous but not required. This resource will set any novice on the path toward expert-level comprehension and application.

IBM CICS Asynchronous API: Concurrent Processing Made Simple

Abstract This IBM® Redbooks® publication covers the background and implementation of the IBM CICS® asynchronous API, which is a simple, accessible API that is designed to enable CICS application developers to create efficient asynchronous programs in all CICS-supported languages. Using the API, application developers can eliminate the overhead that is involved in coding and managing homegrown asynchronous solutions, instead using a set of CICS-supported API commands to underpin CICS applications, which are more responsive and robust than ever. Initially, the book reviews the history and motivations of asynchronous processing in computing and the benefits involved when calling external services. It then introduces the asynchronous API itself and its commands. It also provides a range of scenarios, including sample code, that cover everything from the basics of making an asynchronous request to updating existing synchronous program calls, with the goal of illustrating how to harness the CICS asynchronous API to solve real business problems. Later chapters take a deeper dive into the capabilities of the asynchronous API for advanced use cases. Beyond application development, CICS provides a complete solution for system programmers to manage and monitor asynchronous business logic. Thus, the final chapters of this book cover enhancements to CICS monitoring, statistics, trace, and dumps. Using supporting CICS tooling, system programmers have greater insight than ever, with improved transaction tracking capabilities and CICS policies to provide maximum control and optimization of asynchronous processing in CICS environments.

IBM zPDT Guide and Reference

Abstract This IBM® Redbooks® publication provides both introductory information and technical details about the IBM System z® Personal Development Tool (IBM zPDT®), which produces a small System z environment suitable for application development. zPDT is a PC Linux application. When zPDT is installed (on Linux), normal System z operating systems (such as IBM z/OS®) can be run on it. zPDT provides the basic System z architecture and emulated IBM 3390 disk drives, 3270 interfaces, OSA interfaces, and so on. The systems that are discussed in this document are complex. They have elements of Linux (for the underlying PC machine), IBM z/Architecture® (for the core zPDT elements), System z I/O functions (for emulated I/O devices), z/OS (the most common System z operating system), and various applications and subsystems under z/OS. The reader is assumed to be familiar with general concepts and terminology of System z hardware and software elements, and with basic PC Linux characteristics. This book provides the primary documentation for zPDT.

IBM DS8880 Architecture and Implementation (Release 8.3)

Abstract This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM DS8880 family. The book provides reference information to assist readers who need to plan for, install, and configure the DS8880 systems. The IBM DS8000® family is a high-performance, high-capacity, highly secure, and resilient series of disk storage systems. The DS8880 family is the latest and most advanced of the DS8000 offerings to date. The high availability, multiplatform support, including IBM Z, and simplified management tools help provide a cost-effective path to an on-demand and cloud-based infrastructures. The IBM DS8880 family now offers business-critical, all-flash, and hybrid data systems that span a wide range of price points: DS8884 -- Business Class DS8886 -- Enterprise Class DS8888 -- Analytics Class The DS8884 and DS8886 are available as either hybrid models, or can be configured as all-flash. Each model represents the most recent in this series of high-performance, high-capacity, flexible, and resilient storage systems. These systems are intended to address the needs of the most demanding clients. Two powerful IBM POWER8® processor-based servers manage the cache to streamline disk I/O, maximizing performance and throughput. These capabilities are further enhanced with the availability of the second generation of high-performance flash enclosures (HPFEs Gen-2) and newer flash drives. Like its predecessors, the DS8880 supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. All disk drives in the DS8880 storage system include the Full Disk Encryption (FDE) feature. The DS8880 can automatically optimize the use of each storage tier, particularly flash drives, by using the IBM Easy Tier® feature.

Db2 Skeleton Cloning: Protecting Your Production Environment

IBM Db2® for z/OS® is well known as the gold-standard information steward. Deep synergy with the z/OS operating system and System Z platform provides support for the highest transaction volumes with the ultimate levels of availability. Just like any high-performance engine, occasional maintenance or upgrades are needed to maintain peak performance and to incorporate new features. Those that demand the highest standards and protection of their production environments know that you want to test changes outside of production first. It is common to have development or test environments for application development and verification. What about applying Db2 maintenance or performing migrations to new version or release levels? Sure, you probably perform these activities outside of production first, but are these environments similar enough to production to surface the same results as those you might encounter in production? Your production Db2 Catalog & Directory often has a different mix and complexity of objects, which were created at different levels of Db2, that can span decades of time. The best test of these activities is against your production system, but this is the system that we want to protect. How can we accomplish this? Clone it! Skeleton cloning produces a specific kind of clone, which provides a replica of the portions of your Db2 production environment that are needed to complete your testing. You can use the skeleton clone to find issues before they occur in production. This process allows you to refine maintenance steps in a safe environment and to minimize potential downtime when performing the same steps in a production system. This IBM® Redpaper™ publication gives a high-level overview of the IBM Db2 Cloning Tool and includes specific use cases for the tool. It also details the skeleton cloning process, which you can use to test migration, function levels, and maintenance, and includes demo examples that show a Db2 11 to 12 migration test using skeleton cloning.

ABCs of IBM z/OS System Programming Volume 1

Abstract The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised.

IBM Spectrum Virtualize Considerations for PCI-DSS Compliance

The Payment Card Industry Data Security Standard (PCI-DSS) is the global information security standard for organizations that process, store, or transmit data with any of the major credit card brands. More and more organizations are looking for compliance with this standard. This IBM® Redpaper™ describes how the features and functions of IBM Spectrum™ Virtualize help organizations towards compliance of their IT infrastructure on relevant areas of the PCI-DSS standard. IBM Spectrum Virtualize™ is the software common to all IBM Storwize® products such as IBM SAN Volume Controller (SVC), IBM Storwize V5000 family, IBM Storwize V7000, IBM FlashSystem® V9000, and IBM Spectrum Virtualize as Software. Therefore, all recommendations in this paper equally apply to these storage products.

IBM Copy Services Manager Implementation Guide

Abstract This IBM® Redbooks® publication provides an overview of IBM Copy Services Manager (CSM) for IBM Z and open systems, and documents a set of scenarios for using IBM Copy Services manager to automate and manage replication tasks based on IBM Storage. This book reviews and explains the usage of copy services functions and describes how these functions are implemented in IBM Copy Services Manager. IBM Copy Services Manager key concepts, architecture, session types and usage, and new functionality as of IBM Copy Services Manager version 6.1 are also described.

IBM z14 Configuration Setup

Abstract IThis IBM® Redbooks® publication helps you install, configure, and maintain the IBM z14. The z14 offers new functions that require a comprehensive understanding of the available configuration options. This book presents configuration setup scenarios, and describes implementation examples in detail. This publication is intended for systems engineers, hardware planners, and anyone who needs to understand IBM Z configuration and implementation. Readers should be generally familiar with current IBM Z technology and terminology. For more information about the functions of the z14, see IBM z14 Technical Introduction, SG24-8450 and IBM z14 Technical Guide, SG24-8451.

Data Analysis with IBM SPSS Statistics

"Data Analysis with IBM SPSS Statistics" is a comprehensive guide designed to help you master IBM SPSS Statistics for performing robust statistical analyses. Through a practical approach, the book delves into critical techniques like data visualization, regression analysis, and hypothesis testing, enabling you to uncover patterns, make informed decisions, and enhance data interpretation. What this Book will help me do Set up and configure IBM SPSS Statistics for effective data analysis workflows. Perform data cleaning and preparation, including addressing missing data and restructuring datasets. Master statistical techniques such as ANOVA, regression analysis, and clustering to draw insights from data. Generate intuitive visualizations like charts and graphs to communicate findings effectively. Build predictive models and evaluate their effectiveness for decision-making purposes. Author(s) Ken Stehlik-Barry and Anthony Babinec are seasoned data analysts and IBM SPSS experts with extensive experience in statistical methodologies and data science. They have a knack for translating complex concepts into accessible lessons, making this book an ideal resource for learners aiming to build their SPSS aptitude. Their expertise ensures a well-rounded learning journey. Who is it for? This book is tailored for data analysts and researchers who need to analyze and interpret data effectively using IBM SPSS Statistics. Readers should have basic familiarity with statistical concepts, making it ideal for those with a foundational understanding of statistics. If you aim to grasp practical applications of SPSS for real-world data challenges, this book is for you.

IBM zPDT 2017 Sysplex Extensions

Abstract This IBM® Redbooks® publication describes the IBM System z® Personal Development Tool (IBM zPDT®) 2017 Sysplex Extensions, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing sysplex up and running with minimal time and effort. This book is a significant revision of zPDT 2016 Sysplex Extensions, SG24-8315, which is still available online for readers who need the IBM z/OS® 2.1 level of this package. This package is designed and tested to be installed on top of a standard Application Developer Controlled Distribution (ADCD) environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS 2.2 sysplex that runs under IBM z/VM® in a zPDT environment.

High Availability for Oracle Database with IBM PowerHA SystemMirror and IBM Spectrum Virtualize HyperSwap

This IBM® Redpaper™ publication describes the use of the IBM Spectrum™ Virtualize HyperSwap® function to provide a high availability (HA) storage infrastructure for Oracle databases across metro distances, using the IBM SAN Volume Controller. The HyperSwap function is available on all IBM storage technologies that use IBM Spectrum Virtualize™ software, which include the IBM SAN Volume Controller, IBM Storwize® V5000, IBM Storwize V7000, IBM FlashSystem® V9000, and IBM Spectrum Virtualize as software. This paper focuses on the functional behavior of HyperSwap when subjected to various failure conditions and provides detailed timings and error recovery sequences that occur in response to these failure conditions. This paper does not provide the details necessary to implement the reference architectures (although some implementation detail is provided).