EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Exploiting the IBM Health Checker for z OS Infrastructure

Download or read book Exploiting the IBM Health Checker for z OS Infrastructure written by Mario Bezzi and published by IBM Redbooks. This book was released on 2010-12-22 with total page 246 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® Health Checker for z/OS® (also identified in this book as IBM Health Checker) is a key component of the z/OS operating system, whose objective is to identify potential problems before they impact the system's availability. To do this it continuously checks many current, active z/OS and sysplex settings and compares them with those suggested by IBM or defined by you. The IBM Health Checker for z/OS is made of two parts: - A framework that provides check management and execution services. It supports check development by IBM, independent software vendors (ISVs), and users. - Individual checks that look for specific z/OS settings and definitions, checking for potential problems. Customers can use the IBM Health Checker for z/OS infrastructure to run their own checks, extending the reach of IBM Health Checker for z/OS to environment-specific settings. This IBM RedpaperTM publication introduces the IBM Health Checker and describes how to activate and use it. It teaches you how to exploit the IBM Health Checker infrastructure to run custom checks and how to identify good candidates for writing your own checks. This publication also provides a number of sample checks to give you a good start creating custom checks for your environment.

Book Extending z OS System Management Functions with IBM zAware

Download or read book Extending z OS System Management Functions with IBM zAware written by Frank Kyne and published by IBM Redbooks. This book was released on 2013-08-01 with total page 250 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication explains the capabilities of the IBM System z® Advanced Workload Analysis Reporter (IBM zAware), and shows how you can use it as an integral part of your existing System z management tools. IBM zAware is an integrated, self-learning, analytics solution for IBM z/OS® that helps identify unusual system behavior in near real time. It is designed to help IT personnel improve problem determination so they can restore service quickly and improve overall availability. The book gives you a conceptual description of the IBM zAware appliance. It will help you to understand how it fits into the family of IBM mainframe system management tools that include Runtime Diagnostics, Predictive Failure Analysis (PFA), IBM Health Checker for z/OS, and z/OS Management Facility (z/OSMF). You are provided with the information you need to get IBM zAware up and running so you can start to benefit from its capabilities immediately. You will learn how to manage an IBM zAware environment, and see how other products can use the IBM zAware Application Programming Interface to extract information from IBM zAware for their own use. The target audience includes system programmers, system operators, configuration planners, and system automation analysts.

Book z OS Version 2 Release 1 Technical Updates

Download or read book z OS Version 2 Release 1 Technical Updates written by Karan Singh and published by IBM Redbooks. This book was released on 2014-08-25 with total page 566 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication provides a broad understanding of the changes, new features, and new functions introduced with IBM z/OS® Version 2 Release 1 (2.1). This new version marks a new era of z/OS. Version 2 lays the groundwork for the next tier of mainframe computing, enabling you to pursue the innovation to drive highly scalable workloads, including private clouds, support for mobile and social applications, and more. Its unrivaled security infrastructure helps secure vast amounts of data. Its highly optimized availability can help you deliver new data analytics solutions. And its continued improvements in management help automate the operations of IBM zEnterprise® systems. With support for IBM zEnterprise EC12 (zEC12, Enterprise Class) and zEnterprise BC12 (zBC12, Business Class) systems, z/OS 2.1 offers unmatched availability, scalability, and security to meet the business challenges of cloud services and data analytics and the security demands of mobile and social network applications. Through its unique design and qualities of service, z/OS provides the foundation that you need to support these demanding workloads alongside your traditional mission-critical applications. WinterShare 2014 presentation This presentation on z/OS V2.1 (June 2014) represents an update to the WinterShare 2014 presentation and reflects z/OS enhancements delivered since general availability last Fall. Please listen to John Eells of our Technical Strategy team present this one-hour comprehensive technical overview of z/OS V2.1. Audio Presentation (59MB) Corresponding charts

Book System z Parallel Sysplex Best Practices

Download or read book System z Parallel Sysplex Best Practices written by Frank Kyne and published by IBM Redbooks. This book was released on 2011-01-11 with total page 202 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication pulls together diverse information regarding the best way to design, implement, and manage a Parallel Sysplex® to deliver the levels of performance and availability required by your organization. This book should be of interest to system programmers, availability managers, and database administrators who are interested in verifying that your systems conform to IBM best practices for a Parallel Sysplex environment. In addition to z/OS® and the sysplex hardware configuration, this book also covers the major IBM subsystems: CICS® DB2® IMSTM MQ WebSphere® Application Server To get the best value from this book, readers should have hands-on experience with Parallel Sysplex and have working knowledge of how your systems are set up and why they were set up in that manner.

Book z OS Version 1 Release 13 Implementation

Download or read book z OS Version 1 Release 13 Implementation written by Paul Rogers and published by IBM Redbooks. This book was released on 2012-03-27 with total page 926 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication provides information about installation and migration changes to be aware of if you are responsible for migrating systems from IBM z/OS® V1R10, z/OS V1R11, and z/OS V1R12 to z/OS V1R13. It also highlights actions that are needed to prepare for the installation of z/OS V1R12, including ensuring driving system and target system requirements are met and coexistence requirements are satisfied. There is a special focus on identifying new migration actions that must be performed for selected elements when migrating to z/OS V1R13. The book addresses the following topics: - z/OS V1R13 overview, z/OS V1R13 installation, managing volume backups with fast replication, XCF enhancements, console service enhancements - DFSMSdfp, DFSMSoam, DFSMShsm, ISPF enhancements, DFSMSrmm enhancements, establishing IBM RACF® security for RRSF TCP/IP connections - GRS enhancements, BCP supervisor, contents supervisor and RSM updates, improved channel recovery, Service aids enhancements, System Logger - SMF - z/OS UNIX System Services, z/OS UNIX-related applications, RRS, z/OS Management Facility, z/OS HCD and HCM, C language - Storage management enhancements, Common Information Model, Predictive Failure Analysis, Extended Address Volume, BCPii, Capacity Provisioning - System SSL enhancements, UNICODE, IBM Language Environment®, SDSF enhancements, JES2 enhancements, JES3 enhancements, IBM RMFTM enhancements - IBM WebSphere® Application Server OEM, z/OSMF, CIM, and Capacity Provisioning setups - BCPii Metal C example

Book IBM z OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

Download or read book IBM z OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite written by Axel Buecker and published by IBM Redbooks. This book was released on 2011-08-18 with total page 494 pages. Available in PDF, EPUB and Kindle. Book excerpt: Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

Book z OS Version 1 Release 12 Implementation

Download or read book z OS Version 1 Release 12 Implementation written by Paul Rogers and published by IBM Redbooks. This book was released on 2011-04-27 with total page 888 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication describes changes in installation and migration when migrating from a current z/OS® V1R10 and z/OS V1R11 to z/OS V1R12. Also described are tasks to prepare for the installation of z/OS V1R12, including ensuring that driving system and target system requirements are met, and coexistence requirements are satisfied. New migration actions are introduced in z/OS V1R12. This book focuses on identifying some of the new migration actions that must be performed for selected elements when migrating to z/OS V1R12. This book describes the following enhancements: z/OS V1R12 installation, HiperDispatch, System Logger, Auto-reply to WTORs, Real Storage Manager (RSM) DFSMS, DFSORT, Services aids, z/OS Infoprint Server, TSO/E, RMFTM, Language Environment®, BCP allocation XML System Services, z/OS UNIX® System Services, BCP supervisor, Extended Address Volumes HyperSwap®. BCPii, (de)ciphering, Predictive Failure Analysis, C language, Hardware instrumentation services FICON® dynamic channel-path management, Workload Manager, SDSF, JES2, JES3, SMF, GRS, XCF, HCD Unicode, Capacity provisioning, RRS, Parallel subsystems initialization z/OS Management Facility (z/OSMF)

Book z OS Version 1 Release 11 Implementation

Download or read book z OS Version 1 Release 11 Implementation written by Paul Rogers and published by IBM Redbooks. This book was released on 2010-04-07 with total page 736 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication positions the new z/OS® Version 1 Release 11 for migration by discussing many of the new functions that are available. The goal for the z/OS platform is to eliminate, automate, and simplify tasks without sacrificing z/OS strengths, and to deliver a z/OS management facility that is easy to learn and use. z/OS is a highly secure, scalable, high-performance enterprise operating system on which to build and deploy Internet- and JavaTM-enabled applications, providing a comprehensive and diverse application execution environment. This books describes the following new and changed functions: - IBM z/OS Management Facility - Allocation enhancements in z/OS V1R11 - BCPii function enhancements in z/OS V1R11 - JES2 and JES3 enhancements - zFS file sharing enhancements - Extended access volume enhancements - Choosing whether to run zAAP work on zIIP processors - System REXX enhancements in V1R11 - RRS global panel options - Service aids enhancements in V1R11 - GRS ENQ contention notification enhancements and analysis for GRS latches - Basic HyperSwap® support enhancement - Message Flood Automation enhancements - Program Management new Binder IEWPARMS - Predictive failure analysis (PFA) - SMF enhancements in V1R11 - System Logger enhancements - XCF/XES enhancements in V1R11 - AutoIPL support - Displaying PDSE caching statistics - ISPF enhancements - IBM Health Checker for z/OS enhancements

Book ABCs of IBM z OS System Programming Volume 2

Download or read book ABCs of IBM z OS System Programming Volume 2 written by Lydia Parziale and published by IBM Redbooks. This book was released on 2018-04-07 with total page 198 pages. Available in PDF, EPUB and Kindle. Book excerpt: The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you want to become more familiar with z/OS in your current environment or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection can serve as a powerful technical tool. This volume describes the basic system programming activities related to implementing and maintaining the z/OS installation and provides details about the modules that are used to manage jobs and data. It covers the following topics: Overview of the parmlib definitions and the IPL process. The parameters and system data sets necessary to IPL and run a z/OS operating system are described, along with the main daily tasks for maximizing performance of the z/OS system. Basic concepts related to subsystems and subsystem interface and how to use the subsystem services that are provided by IBM subsystems. Job management in the z/OS system using the JES2 and JES3 job entry subsystems. It provides a detailed discussion about how JES2 and JES3 are used to receive jobs into the operating system, schedule them for processing by z/OS, and control their output processing. The link pack area (LPA), LNKLST, authorized libraries, and the role of VLF and LLA components. An overview of SMP/E for z/OS. An overview of IBM Language Environment® architecture and descriptions of Language Environment's full program model, callable services, storage management model, and debug information. Other volumes in this series include the following content: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 3: Introduction to DFSMS, data set basics, storage management, hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, the IBM Z platform and IBM Z connectivity, LPAR concepts, HCD, and the DS Storage Solution Volume 11: Capacity planning, performance management, WLM, IBM RMFTM, and SMF Volume 12: WLM Volume 13: JES3, JES3 SDSF

Book z OS Identity Propagation

Download or read book z OS Identity Propagation written by Karan Singh and published by IBM Redbooks. This book was released on 2011-09-29 with total page 182 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This book provides details on the RACMAP function, filter management and how to use the SMF records to provide an audit trail. In depth coverage is provided about the internal implementation of identity propagation, such as providing information about available callable services. This book examines the current exploiters of z/OS Identity Propagation and provide several detailed examples covering CICS® with CICS Transaction Gateway, DB2®, and CICS Web services with Datapower.

Book IBM z OS V2R2  Security

Download or read book IBM z OS V2R2 Security written by Keith Winnard and published by IBM Redbooks. This book was released on 2015-12-17 with total page 52 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced to the security areas with IBM z/OS® V2R2. The following chapters are included: - Chapter 1, "RACF updates" on page 1: In this chapter, we describe the read-only auditor attribute, password security enhancements, RACDCERT (granular certificate administration), UNIX search authority, and RACF Remote sharing facility (RRSF). - Chapter 2, "LDAP updates" on page 13: In this chapter, we describe the activity log enhancements, compatibility level upgrade without LDAP outage, dynamic group performance enhancements, and replication of password policy attributes from a read-only replica. - Chapter 3, "PKI updates" on page 21: In this chapter, we describe the Network Authentication Service (KERBEROS) PKINIT, PKI nxm authorization, PKI OCSP enhancement, and RACDCERT (granular certificate administration) - Chapter 4, "z/OS UNIX search and file execution authority" on page 27: z/OS UNIX search authority, z/OS UNIX file execution, Examples for exploiting the new functions This book is one of a series of IBM Redbooks that take a modular approach to providing information about the updates that are included with z/OS V2R2. This approach has the following goals: - Provide modular content - Group the technical changes into a topic - Provide a more streamlined way of finding relevant information that is based on the topic We hope you find this approach useful and we welcome your feedback.

Book ABCs of IBM z OS System Programming Volume 6

Download or read book ABCs of IBM z OS System Programming Volume 6 written by Karan Singh and published by IBM Redbooks. This book was released on 2014-08-12 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: The ABCs of IBM® z/OS® System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you want to become more familiar with z/OS in your current environment or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection can serve as a powerful technical tool. Following are the contents of the volumes: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, IBM Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-managed storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), and IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM z9® integrated cryptography, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, IBM System z® processor design, System z connectivity, logical partition (LPAR) concepts, hardware configuration definition (HCD), and Hardware Management Console (HMC) Volume 11: Capacity planning, performance management, Workload Manager (WLM), IBM Resource Measurement FacilityTM (RMFTM), and System Management Facilities (SMF)

Book Reduce Risk and Improve Security on IBM Mainframes  Volume 3 Mainframe Subsystem and Application Security

Download or read book Reduce Risk and Improve Security on IBM Mainframes Volume 3 Mainframe Subsystem and Application Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2015-11-02 with total page 200 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

Book z OS V1 11 DFSMS Release Guide

Download or read book z OS V1 11 DFSMS Release Guide written by Mary Lovelace and published by IBM Redbooks. This book was released on 2010-11-19 with total page 552 pages. Available in PDF, EPUB and Kindle. Book excerpt: Each release of data facility storage management subsystem (DFSMS) builds upon the previous version to provide enhanced storage management, data access, device support, program management, and distributed data access for the z/OS® platform in a system-managed storage environment. This IBM® Redbooks® publication provides a summary of the functions and enhancements in z/OS V1R11 DFSMS. It provides you with the information that you need to understand and evaluate the content of this DFSMS release, along with practical implementation hints and tips. Also included are enhancements that were made available through an enabling PTF that has been integrated into z/OS DFSMS V1R11. This book was written for storage professionals and system programmers who have experience with the components of DFSMS. It provides sufficient information so that you can start prioritizing the implementation of new functions and evaluating their applicability in your DFSMS environment.

Book IBM z OS V2R2  Availability Management

Download or read book IBM z OS V2R2 Availability Management written by Keith Winnard and published by IBM Redbooks. This book was released on 2015-12-17 with total page 74 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Availability Management areas with IBM z/OS® V2R2. This book is one of a series of IBM Redbooks that take a modular approach to providing information about the updates that are included with z/OS V2R2. This approach has the following goals: - Provide modular content - Group the technical changes into a topic - Provide a more streamlined way of finding relevant information that is based on the topic We hope you find this approach useful and we welcome your feedback.

Book IBM z15  8561  Technical Guide

Download or read book IBM z15 8561 Technical Guide written by Octavian Lascu and published by IBM Redbooks. This book was released on 2022-07-13 with total page 554 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication describes the features and functions the latest member of the IBM Z® platform, the IBM z15TM (machine type 8561). It includes information about the IBM z15 processor design, I/O innovations, security features, and supported operating systems. The z15 is a state-of-the-art data and transaction system that delivers advanced capabilities, which are vital to any digital transformation. The z15 is designed for enhanced modularity, which is in an industry standard footprint. This system excels at the following tasks: Making use of multicloud integration services Securing data with pervasive encryption Accelerating digital transformation with agile service delivery Transforming a transactional platform into a data powerhouse Getting more out of the platform with IT Operational Analytics Accelerating digital transformation with agile service delivery Revolutionizing business processes Blending open source and Z technologies This book explains how this system uses new innovations and traditional Z strengths to satisfy growing demand for cloud, analytics, and open source technologies. With the z15 as the base, applications can run in a trusted, reliable, and secure environment that improves operations and lessens business risk.

Book Feedback Systems

Download or read book Feedback Systems written by Karl Johan Åström and published by Princeton University Press. This book was released on 2021-02-02 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The essential introduction to the principles and applications of feedback systems—now fully revised and expanded This textbook covers the mathematics needed to model, analyze, and design feedback systems. Now more user-friendly than ever, this revised and expanded edition of Feedback Systems is a one-volume resource for students and researchers in mathematics and engineering. It has applications across a range of disciplines that utilize feedback in physical, biological, information, and economic systems. Karl Åström and Richard Murray use techniques from physics, computer science, and operations research to introduce control-oriented modeling. They begin with state space tools for analysis and design, including stability of solutions, Lyapunov functions, reachability, state feedback observability, and estimators. The matrix exponential plays a central role in the analysis of linear control systems, allowing a concise development of many of the key concepts for this class of models. Åström and Murray then develop and explain tools in the frequency domain, including transfer functions, Nyquist analysis, PID control, frequency domain design, and robustness. Features a new chapter on design principles and tools, illustrating the types of problems that can be solved using feedback Includes a new chapter on fundamental limits and new material on the Routh-Hurwitz criterion and root locus plots Provides exercises at the end of every chapter Comes with an electronic solutions manual An ideal textbook for undergraduate and graduate students Indispensable for researchers seeking a self-contained resource on control theory