talk-data.com talk-data.com

Topic

IBM

technology cloud ai

1631

tagged

Activity Trend

26 peak/qtr
2020-Q1 2026-Q1

Activities

1631 activities · Newest first

Value Realization from Efficient Software Deployment

Unfortunately purchasing software products does not automatically mean that these products are exploited throughout the organization providing the maximum possible value to the business units. Several issues call for a structured approach that gets the most business value out of software already purchased. The objectives of this approach are to: * Create maximum awareness throughout the organization of the software purchased. We can summarize the overall objective of this approach as ensuring that the business units in an organization obtain the maximum possible value of software products purchased, which is also the scope of this IBM Redbooks publication.

IBM Cognos 10 Report Studio: Practical Examples

IBM Cognos 10 is the next generation off the leading performance management, analysis, and reporting standard for mid- to large-sized companies. One of the most exciting and useful aspects of IBM Cognos software is its powerful custom report creation capabilities. After learning the basics, report authors in the enterprise need to apply the technology to reports in their actual, complex work environment. This book provides that advanced know how. Using practical examples based on years of teaching experiences as IBM Cognos instructors, the authors provide you with examples of typical advanced reporting designs and complex queries in reports. The reporting solutions in this book can be directly used in a variety of real-world scenarios to provide answers to your business problems today. The complexity of the queries and the application of design principles go well beyond basic course content or introductory books. IBM Cognos 10 Report Studio: Practical Examples will help you find the answers to specific questions based on your data and your business model. It will use a combination tutorial and cookbook approach to show real-world IBM Cognos 10 Report Studio solutions. If you are still using IBM Cognos 8 BI Report Studio, many of the examples have been tested against this platform as well. The final chapter has been dedicated to showing those features that are unique to the latest version of this powerful reporting solution.

Metadata Management with IBM InfoSphere Information Server

What do you know about your data? And how do you know what you know about your data? Information governance initiatives address corporate concerns about the quality and reliability of information in planning and decision-making processes. Metadata management refers to the tools, processes, and environment that are provided so that organizations can reliably and easily share, locate, and retrieve information from these systems. Enterprise-wide information integration projects integrate data from these systems to one location to generate required reports and analysis. During this type of implementation process, metadata management must be provided along each step to ensure that the final reports and analysis are from the right data sources, are complete, and have quality. This IBM® Redbooks® publication introduces the information governance initiative and highlights the immediate needs for metadata management. It explains how IBM InfoSphere™ Information Server provides a single unified platform and a collection of product modules and components so that organizations can understand, cleanse, transform, and deliver trustworthy and context-rich information. It describes a typical implementation process. It explains how InfoSphere Information Server provides the functions that are required to implement such a solution and, more importantly, to achieve metadata management. This book is for business leaders and IT architects with an overview of metadata management in information integration solution space. It also provides key technical details that IT professionals can use in a solution planning, design, and implementation process.

IBM Style Guide, The: Conventions for Writers and Editors

The IBM Style Guide distills IBM wisdom for developing superior content: information that is consistent, clear, concise, and easy to translate. The IBM Style Guide can help any organization improve and standardize content across authors, delivery mechanisms, and geographic locations. This expert guide contains practical guidance on topic-based writing, writing content for different media types, and writing for global audiences. Throughout, the authors illustrate the guidance with many examples of correct and incorrect usage. Writers and editors will find authoritative guidance on issues ranging from structuring information to writing usable procedures to presenting web addresses to handling cultural sensitivities. The guidelines cover these topics: Using language and grammar to write clearly and consistently Applying punctuation marks and special characters correctly Formatting, organizing, and structuring information so that it is easy to find and use Using footnotes, cross-references, and links to point readers to valuable, related information Presenting numerical information clearly Documenting computer interfaces to make it easy for users to achieve their goals Writing for diverse audiences, including guidelines for improving accessibility Preparing clear and effective glossaries and indexes The IBM Style Guide can help any organization or individual create and manage content more effectively. The guidelines are especially valuable for businesses that have not previously adopted a corporate style guide, for anyone who writes or edits for IBM as an employee or outside contractor, and for anyone who uses modern approaches to information architecture.

SAP Applications on IBM PowerVM

IBM® invented the virtualization technology starting in the 1960s on the mainframe, and the functionalities evolved and were ported to other platforms and improved the reliability, availability, and serviceability (RAS) features. With virtualization, you achieve better asset utilization, reduced operating costs, and faster responsiveness to changing business demands. Every technology vendor in the SAP ecosystem understands virtualization as slightly different capabilities on different levels (storage and server hardware, processor, memory, I/O resources or the application, and so on). It is important to understand exactly what functionality is offered and how it supports the client’s business requirements. In this IBM Redbooks® publication we focus on server virtualization technologies in the IBM Power Systems™ hardware, AIX®, IBM i, and Linux space and what they mean specifically for SAP applications running on this platform. SAP clients can leverage the technology that the IBM Power Systems platform offers. In this book, we describe the technologies and functions, what they mean, and how they apply to the SAP system landscape.

IBM InfoSphere Streams: Assembling Continuous Insight in the Information Revolution

In this IBM® Redbooks® publication, we discuss and describe the positioning, functions, capabilities, and advanced programming techniques for IBM InfoSphere™ Streams (V2), a new paradigm and key component of IBM Big Data platform. Data has traditionally been stored in files or databases, and then analyzed by queries and applications. With stream computing, analysis is performed moment by moment as the data is in motion. In fact, the data might never be stored (perhaps only the analytic results). The ability to analyze data in motion is called real-time analytic processing (RTAP). IBM InfoSphere Streams takes a fundamentally different approach to Big Data analytics and differentiates itself with its distributed runtime platform, programming model, and tools for developing and debugging analytic applications that have a high volume and variety of data types. Using in-memory techniques and analyzing record by record enables high velocity. Volume, variety and velocity are the key attributes of Big Data. The data streams that are consumable by IBM InfoSphere Streams can originate from sensors, cameras, news feeds, stock tickers, and a variety of other sources, including traditional databases. It provides an execution platform and services for applications that ingest, filter, analyze, and correlate potentially massive volumes of continuous data streams. This book is intended for professionals that require an understanding of how to process high volumes of streaming data or need information about how to implement systems to satisfy those requirements. See: http://www.redbooks.ibm.com/abstracts/sg247865.html for the IBM InfoSphere Streams (V1) release.

Implementing Imaging Solutions with IBM Production Imaging Edition and IBM Datacap Taskmaster Capture

Organizations face many challenges in managing documents that they need to conduct their business. IBM® Production Imaging Edition V5.0 is the comprehensive product that combines imaging, capture, and automation to provide the capabilities to process and manage high volumes of document imaging over their entire life cycle. This IBM Redbooks® publication introduces Production Imaging Edition, its components, the system architecture, its functions, and its capabilities. It primarily focuses on IBM Datacap Taskmaster Capture V8.0, including how it works, how to design a document image capture solution, and how to implement the solution using Datacap Studio. Datacap Studio is a development tool that designers use to create rules and rule sets, configure a document hierarchy and task profiles, and set up a verification panel for image verification. This book highlights the advanced technologies that are used to create dynamic applications, such as IBM Taskmaster Accounts Payable Capture. It includes an in-depth walkthrough of the dynamic application, Taskmaster Accounts Payable Capture, which provides invaluable insight to designers in developing and customizing their applications. In addition, this book includes information about high availability, scalability, performance, and backup and recovery options for the document imaging solution. It provides known best practices and recommendations for designing and implementing such a solution. This book is for IT architects and professionals who are responsible for creating, improving, designing, and implementing document imaging solutions for their organizations.

IBM zEnterprise 114 Technical Guide

The popularity of the Internet and the affordability of IT hardware and software have resulted in an explosion of applications, architectures, and platforms. Workloads have changed. Many applications, including mission-critical ones, are deployed on a variety of platforms, and the System z® design has adapted to this change. It takes into account a wide range of factors, including compatibility and investment protection, to match the IT requirements of an enterprise. This IBM® Redbooks® publication discusses the IBM zEnterprise System, an IBM scalable mainframe server. IBM is taking a revolutionary approach by integrating separate platforms under the well-proven System z hardware management capabilities, while extending System z qualities of service to those platforms. The zEnterprise System consists of the IBM zEnterprise 114 central processor complex, the IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension. The z114 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The z114 provides up to 18% improvement in uniprocessor speed and up to a 12% increase in total system capacity for z/OS®, z/VM®, and Linux on System z over the z10™ Business Class (BC). The zBX infrastructure works with the z114 to enhance System z virtualization and management through an integrated hardware platform that spans mainframe, POWER7™, and System x technologies. The federated capacity from multiple architectures of the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment through the Unified Resource Manager. This book provides an overview of the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. This book is intended for systems engineers, consultants, planners, and anyone wanting to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z technology and terminology.

Scaling BPM Adoption from Project to Program with IBM Business Process Manager

Your first Business Process Management (BPM) project is a crucial first step on your BPM journey. It is important to begin this journey with a philosophy of change that will enable you to avoid common pitfalls that lead to failed BPM projects, and ultimately, poor BPM adoption. This IBM® Redbooks® publication describes the methodology and best practices that lead to a successful project and how to use that success to scale to enterprise-wide BPM adoption. The intended audience for this book includes all people who participate in the discovery, planning, delivery, deployment, and continuous improvement activities for a business process. These roles include process owners, process participants and subject matter experts (SMEs) from the operational business as well as technologists responsible for delivery including BPM analysts, BPM solution architects, BPM administrators, and BPM developers.

SAN Storage Performance Management Using Tivoli Storage Productivity Center

IBM Tivoli® Storage Productivity Center is an ideal tool for performing storage management reporting, because it uses industry standards for cross vendor compliance, and it can provide reports based on views from all application servers, all Fibre Channel fabric devices, and storage subsystems from different vendors, both physical and virtual. This IBM® Redbooks® publication is intended for experienced storage managers who want to provide detailed performance reports to satisfy their business requirements. The focus of this book is to use the reports provided by Tivoli Storage Productivity Center for performance management. We do address basic storage architecture in order to set a level playing field for understanding of the terminology that we are using throughout this book. Although this book has been created to cover storage performance management, just as important in the larger picture of Enterprise-wide management are both Asset Management and Capacity Management. Tivoli Storage Productivity Center is an excellent tool to provide all of these reporting and management requirements.

Security Functions of IBM DB2 10 for z/OS

IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority. The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system. In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration. DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model. This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.

IBM BladeCenter Virtual Fabric Solutions

The deployment of server virtualization technologies in data centers requires significant efforts in providing sufficient network I/O bandwidth to satisfy the demand of virtualized applications and services. For example, every virtualized system can host several dozen network applications and services, and each of these services requires certain bandwidth (or speed) to function properly. Furthermore, because of different network traffic patterns relevant to different service types, these traffic flows may interfere with each other, leading to serious network problems including the inability of the service to perform its functions. The IBM® Virtual Fabric solution for IBM BladeCenter addresses these issues. The solution is based on the IBM BladeCenter H chassis with a 10-Gb Converged Enhanced Ethernet infrastructure built on 10-Gb Ethernet switch modules in the chassis and the Emulex or Broadcom Virtual Fabric Adapters in each blade server.

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

IBM System Storage TS7650, TS7650G, and TS7610

This IBM® Redbooks® publication describes the IBM solution for data deduplication, the IBM System Storage® TS7650G ProtecTIER® Deduplication Gateway, and the IBM System Storage TS7650 ProtecTIER Deduplication Appliance. This solution consists of IBM System Storage ProtecTIER Enterprise Edition V2.3 software and the IBM System Storage TS7650G Deduplication Gateway (3958-DD1 and DD3) hardware, as well as the IBM System Storage TS7650 Deduplication Appliance (3958-AP1). They are designed to address the disk-based data protection needs of enterprise data centers. We introduce data deduplication and IP replication and describe in detail the components that make up IBM System Storage TS7600 with ProtecTIER. We provide extensive planning and sizing guidance that enables you to determine your requirements and the correct configuration for your environment. We then guide you through the basic setup steps on the system and on the host, and describe all operational tasks that might be required during normal day-to-day operation or when upgrading the TS7650G and TS7650. This publication is intended for system programmers, storage administrators, hardware and software planners, and other IT personnel involved in planning, implementing, and using the IBM deduplication solution, as well as anyone seeking detailed technical information about the IBM System Storage TS7600 with ProtecTIER.

IBM zEnterprise System Technical Introduction

Recently, the IT industry has seen an explosion in applications, architectures, and platforms. With the generalized availability of the internet and the appearance of commodity hardware and software, several patterns have emerged that have gained center stage. Workloads have changed. Many applications, including mission-critical ones, are deployed in heterogeneous infrastructures. System z® design has adapted to this change. IBM® has a holistic approach to System z design, which includes hardware, software, and procedures. It takes into account a wide range of factors, including compatibility and investment protection, which ensures a tighter fit with IT requirements of an enterprise. This IBM Redbooks® publication introduces the revolutionary scalable IBM zEnterprise System, which consists of the IBM zEnterprise 196 (z196) or the IBM zEnterprise 114 (z114), the IBM zEnterprise BladeCenter® Extension (zBX), and the IBM zEnterprise Unified Resource Manager. IBM is taking a bold step by integrating heterogeneous platforms under the proven System z hardware management capabilities, while extending System z qualities of service to those platforms. The z196 and z114 are general-purpose servers that are equally at ease with compute-intensive workloads and with I/O-intensive workloads. The integration of heterogeneous platforms is based on IBM BladeCenter technology, allowing improvements in price and performance for key workloads, while enabling a new range of heterogeneous platform solutions. The z196 and z114 are at the core of the enhanced System z platforms, which are designed to deliver technologies that businesses need today along with a foundation to drive future business growth. The changes to this edition are based on the System z hardware announcement dated July 12, 2011. This book provides basic information about z196, z114, zBX, and Unified Resource Manager capabilities, hardware functions and features, and associated software support. It is intended for IT managers, architects, consultants, and anyone else who wants to understand the elements of the zEnterprise System. For this introduction to the zEnterprise System, readers are not expected to be familiar with current IBM System z technology and terminology.

Exploiting IBM AIX Workload Partitions

This IBM® Redbooks® publication provides an update of the latest AIX Workload Partition (WPAR) capabilities. It provides a how-to guide and well-defined and documented deployment model for system administrators and architects using WPARs in AIX® Version 7.1 within an IBM POWER® System virtualized environment. This book helps clients create a planned foundation for their future deployments. This book is targeted toward technical professionals, such as business intelligence (BI) consultants, technical support staff, IT architects, and IT specialists, who are responsible for providing solutions and support for IBM POWER Systems and IBM AIX Version 7.1.

IBM System Storage Solutions for Smarter Systems

IBM® offers storage solutions that address the key needs of storage efficiency and data protection and retention. This IBM Redbooks® publication shows that IBM has the technology, products, and services to help keep your storage systems enabled and your business flourishing. The information presented is structured as follows: Storage efficiency: Data protection: This book has been written for those most concerned about efficient, protected, and available data, along with maintaining their IT environment at a competitive price. The audience for this book is that of IT professionals, such as CEOs, CIOs, CFOs, practitioners, information architects, and current and prospective IBM clients and Business Partners.

Introduction to IBM Real-time Compression Appliances

Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® is introducing the IBM Real-time Compression Appliances for NAS, an innovative new storage offering that delivers essential storage efficiency technologies, combined with exceptional ease of use and performance. In an era when the amount of information, particularly in unstructured files, is exploding, but budgets for storing that information are stagnant, IBM Real-time Compression technology offers a powerful tool for better information management, protection, and access. IBM Real-time Compression can help slow the growth of storage acquisition, reducing storage costs while simplifying both operations and management. It also enables organizations to keep more data available for use rather than storing it offsite or on harder-to-access tape, so they can support improved analytics and decision making. IBM Real-time Compression Appliances provide on-line storage optimization through real-time data compression, delivering dramatic cost reduction without performance degradation. This IBM Redbooks® publication is an easy-to-follow guide that describes how to design solutions successfully using IBM Real-time Compression Appliances. It provides practical installation examples, ease of use, remote management, high availability, and administration techniques.

Expert Oracle GoldenGate

Expert Oracle GoldenGate is a hands-on guide to creating and managing complex data replication environments using the latest in database replication technology from Oracle. GoldenGate is the future in replication technology from Oracle, and aims to be best-of-breed. GoldenGate supports homogeneous replication between Oracle databases. It supports heterogeneous replication involving other brands such as Microsoft SQL Server and IBM DB2 Universal Server. GoldenGate is high-speed, bidirectional, highly-parallelized, and makes only a light impact on the performance of databases involved in replication. The authors share their experience in the form of tutorials on designing and implementing all types of Oracle GoldenGate environments. You'll learn methods for tuning Oracle GoldenGate performance. You'll discover GoldenGate's utility as a migration and ETL tool. You'll learn to configure highly-available environments involving GoldenGate, RAC, and Data Guard. From installation to design to implementation and troubleshooting, Expert Oracle GoldenGate helps you master all aspects of using and applying Oracle GoldenGate as the replication tool of choice in your environment. Explains all aspects of using GoldenGate for replication Covers homogeneous, heterogeneous, and bidirectional replication Shows the use of GoldenGate for data migration and extract, transform, load (ETL) What you'll learn Install Oracle GoldenGate quickly and painlessly Design single- and bi-directional replication solutions Apply GoldenGate to high-availability solutions Troubleshoot and tune GoldenGate for performance Verify data synchronization using GoldenGate Veridata Manage and monitor GoldenGate environments using GoldenGate Director Who this book is for Expert Oracle GoldenGate is for database professionals needing to master the latest in replication technology from Oracle. It is for the Oracle database administrator, technical manager, or Oracle developer requiring a solid base of expertise on to implement or manage replication environments with GoldenGate technology. Expert Oracle GoldenGate is an appropriate and timely reference for all users of the GoldenGate software.

IBM Tivoli Directory Server for z/OS

This IBM® Redbooks® publication examines the IBM Tivoli® Directory Server for z/OS®. IBM Tivoli Directory Server is a powerful Lightweight Directory Access Protocol (LDAP) infrastructure that provides a foundation for deploying comprehensive identity management applications and advanced software architectures. This publication provides an introduction to the IBM Tivoli Directory Server for z/OS that provides a brief summary of its features and a examination of the possible deployment topologies. It discusses planning a deployment of IBM Tivoli Directory Server for z/OS, which includes prerequisites, planning considerations, and data stores, and provides a brief overview of the configuration process. Additional chapters provide a detailed discussion of the IBM Tivoli Directory Server for z/OS architecture that examines the supported back ends, discusses in what scenarios they are best used, and provides usage examples for each back end. The discussion of schemas breaks down the schema and provides guidance on extending it. A broad discussion of authentication, authorization, and security examines the various access protections, bind mechanisms, and transport security available with IBM Tivoli Directory Server for z/OS. This chapter also provides an examination of the new Password Policy feature. Basic and advanced replication topologies are also covered. A discussion on plug-ins provides details on the various types of plug-ins, the plug-in architecture, and creating a plug-in, and provides an example plug-in. Integration of IBM Tivoli Directory Server for z/OS into the IBM Workload Manager environment is also covered. This publication also provides detailed information about the configuration of IBM Tivoli Directory Server for z/OS. It discusses deploying IBM Tivoli Directory Server for z/OS on a single system, with examples of configuring the available back ends. Configuration examples are also provided for deploying the server in a Sysplex, and for both basic and advanced replication topologies. Finally it provides guidance on monitoring and debugging IBM Tivoli Directory Server for z/OS.