EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book SMF Logstream Mode  Optimizing the New Paradigm

Download or read book SMF Logstream Mode Optimizing the New Paradigm written by Frank Kyne and published by IBM Redbooks. This book was released on 2011-02-10 with total page 174 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication positions the use of System Logger log streams as a repository for System Management Facilities (SMF) data against the previous use of Virtual Storage Access Method (VSAM) data sets for SMF data. This book expands on existing material by covering not just the implementation steps, but also by looking at how you use SMF data today, and using that information to help you identify the most appropriate repository for your SMF data. If it transpires that log streams are appropriate for some or all of your SMF data, this book provides all the guidance that you are likely to require for a successful migration to this new paradigm. The target audience for this document is system programmers and anyone who uses SMF data.

Book Reduce Storage Occupancy and Increase Operations Efficiency with IBM zEnterprise Data Compression

Download or read book Reduce Storage Occupancy and Increase Operations Efficiency with IBM zEnterprise Data Compression written by Paolo Bruni and published by IBM Redbooks. This book was released on 2018-12-17 with total page 162 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® zEnterprise® Data Compression (zEDC) capability and the Peripheral Component Interconnect Express (PCIe or PCI Express) hardware adapter called zEDC Express were announced in July 2013 as enhancements to the IBM z/OS® V2.1 operating system (OS) and the IBM zEnterprise EC12 (zEC12) and the IBM zEnterprise BC12 (zBC12). zEDC is optimized for use with large sequential files, and uses an industry-standard compression library. zEDC can help to improve disk usage and optimize cross-platform exchange of data with minimal effect on processor usage. The first candidate for such compression was the System Management Facility (SMF), and support for basic sequential access method (BSAM) and queued sequential access method (QSAM) followed in first quarter 2014. IBM software development kit (SDK) 7 for z/OS Java, IBM Encryption Facility for z/OS, IBM Sterling Connect:Direct® for z/OS and an IBM z/VM® guest can also use zEDC Express. zEDC can also be used for Data Facility Storage Management Subsystem data set services (DFSMSdss) dumps and restores, and for DFSMS hierarchical storage manager (DFSMShsm) when using DFSMSdss for data moves. This IBM Redbooks® publication describes how to set up the zEDC functionality to obtain the benefits of portability, reduced storage space, and reduced processor use for large operational sets of data with the most current IBM System z® environment.

Book Apache Spark Implementation on IBM z OS

Download or read book Apache Spark Implementation on IBM z OS written by Lydia Parziale and published by IBM Redbooks. This book was released on 2016-08-13 with total page 144 pages. Available in PDF, EPUB and Kindle. Book excerpt: The term big data refers to extremely large sets of data that are analyzed to reveal insights, such as patterns, trends, and associations. The algorithms that analyze this data to provide these insights must extract value from a wide range of data sources, including business data and live, streaming, social media data. However, the real value of these insights comes from their timeliness. Rapid delivery of insights enables anyone (not only data scientists) to make effective decisions, applying deep intelligence to every enterprise application. Apache Spark is an integrated analytics framework and runtime to accelerate and simplify algorithm development, depoyment, and realization of business insight from analytics. Apache Spark on IBM® z/OS® puts the open source engine, augmented with unique differentiated features, built specifically for data science, where big data resides. This IBM Redbooks® publication describes the installation and configuration of IBM z/OS Platform for Apache Spark for field teams and clients. Additionally, it includes examples of business analytics scenarios.

Book zPDT 2016 Sysplex Extensions

Download or read book zPDT 2016 Sysplex Extensions written by Frank Kyne and published by IBM Redbooks. This book was released on 2016-05-10 with total page 242 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication describes the IBM zPDT® 2016 Sysplex Extensions, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing, sysplex up and running with minimal time and effort. This package is designed and tested to be installed on top of a standard ADCD environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS® 2.1 or z/OS 2.2 sysplex that runs under ADCD in a zPDT environment. This package differs from the previous zPDT sysplex package in that it provides working examples of more sysplex exploiters. It also is designed to adhere to IBM's sysplex best practice recommendations, in as far as is possible in a zPDT environment. Although the package was not tested with IBM Rational® Development and Test for IBM System z® (RD&T), it might be used to reduce the effort to create a fully functional sysplex under RD&T. Conceptually, the package might also be restored and used as a template to create a sysplex environment that is running on a real IBM z SystemsTM CPC. The target audience for this document is system programmers that are responsible for designing, creating, and maintaining IBM Parallel Sysplex® environments. It can also be beneficial to developers that currently maintain their own ADCD environments and want to extend them to add sysplex functions.

Book zPDT Sysplex Extensions   2020

Download or read book zPDT Sysplex Extensions 2020 written by Frank Kyne and published by IBM Redbooks. This book was released on 2020-10-16 with total page 180 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication describes the IBM System z® Personal Development Tool (IBM zPDT®) Sysplex Extensions 2020, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing sysplex up and running with minimal time and effort. This book is a significant revision of zPDT 2017 Sysplex Extensions, SG24-8386. This package is designed and tested to be installed on top of a standard Application Developer Controlled Distribution (ADCD) environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS® 2.4 sysplex that runs under IBM z/VM® in a zPDT environment. This package differs from the zPDT sysplex package delivered in IBM zPDT Guide and Reference System z Personal Development Tool, SG24-8205, in that it provides working examples of more sysplex exploiters. It also is designed to adhere to IBM's sysplex best practice recommendations, in as far as is possible in a zPDT environment. Although the package was not tested with IBM Z® Development and Test Environment (previously known as RD&T), it may be used to reduce the effort to create a fully functional sysplex under zD&T. Conceptually, the package might also be restored and used as a template to create a sysplex environment that is running on a real IBM Z CPC. The target audience for this document is system programmers who are responsible for designing, creating, and maintaining IBM Parallel Sysplex® environments. It can also be beneficial to developers who currently maintain their own ADCD environments and want to extend them to add sysplex functions.

Book IBM System z Personal Development Tool Vol  4 Coupling and Parallel Sysplex

Download or read book IBM System z Personal Development Tool Vol 4 Coupling and Parallel Sysplex written by Bill Ogden and published by IBM Redbooks. This book was released on 2013-05-31 with total page 80 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication describes the usage of Coupling Facility (CF) functions with the IBM System z® Personal Development Tool (zPDT). It describes the System z Coupling Application Developer Controlled Distribution, which is a Parallel Sysplex® "starter system" based on the AD-CD package and lists the exact steps taken to turn the normal AD-CD z/OS® system into a Parallel Sysplex base. This document assumes that the reader is familiar with basic zPDT usage and terminology, with z/OS, with the z/OS AD-CD system, with basic z/VM® usage, and with general Parallel Sysplex concepts. It is not intended as an introduction to any of these topics. This version of the document is based on z/VM 6.2 (as available to authorized users in an AD-CD package) and z/OS 1.13 (as available to authorized users in the January 2013 update of the AD-CD package).

Book IBM PowerVM Virtualization Introduction and Configuration

Download or read book IBM PowerVM Virtualization Introduction and Configuration written by Scott Vetter and published by IBM Redbooks. This book was released on 2015-11-24 with total page 786 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication provides an introduction to PowerVMTM virtualization technologies on Power System servers. PowerVM is a combination of hardware, firmware, and software that provides CPU, network, and disk virtualization. These are the main virtualization technologies: POWER7, POWER6, and POWER5 hardware POWER Hypervisor Virtual I/O Server Though the PowerVM brand includes partitioning, management software, and other offerings, this publication focuses on the virtualization technologies that are part of the PowerVM Standard and Enterprise Editions. This publication is also designed to be an introduction guide for system administrators, providing instructions for these tasks: Configuration and creation of partitions and resources on the HMC Installation and configuration of the Virtual I/O Server Creation and installation of virtualized partitions Examples using AIX, IBM i, and Linux This edition has been updated with the latest updates available and an improved content organization.

Book Improving z OS Application Availability by Managing Planned Outages

Download or read book Improving z OS Application Availability by Managing Planned Outages written by Frank Kyne and published by IBM Redbooks. This book was released on 2014-12-22 with total page 328 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication is intended to make System Programmers, Operators, and Availability Managers aware of the enhancements to recent releases of IBM z/OS® and its major subsystems in the area of planned outage avoidance. It is a follow-on to, rather than a replacement for, z/OS Planned Outage Avoidance Checklist, SG24-7328. Its primary objective is to bring together in one place information that is already available, but widely dispersed. It also presents a different perspective on planned outage avoidance. Most businesses care about application availability rather than the availability of a specific system. Also, a planned outage is not necessarily a bad thing, if it does not affect application availability. In fact, running for too long without an IPL or subsystem restart might have a negative impact on application availability because it impacts your ability to apply preventive service. Therefore, this book places more focus on decoupling the ability to make changes and updates to your system from IPLing or restarting your systems.

Book IBM ZPDT Guide and Reference

Download or read book IBM ZPDT Guide and Reference written by Bill Ogden and published by . This book was released on 2017 with total page 356 pages. Available in PDF, EPUB and Kindle. Book excerpt: Abstract This IBM® Redbooks® publication provides both introductory information and technical details about the IBM System z® Personal Development Tool (IBM zPDT®), which produces a small System z environment suitable for application development. zPDT is a PC Linux application. When zPDT is installed (on Linux), normal System z operating systems (such as IBM z/OS®) can be run on it. zPDT provides the basic System z architecture and emulated IBM 3390 disk drives, 3270 interfaces, OSA interfaces, and so on. The systems that are discussed in this document are complex. They have elements of Linux (for the underlying PC machine), IBM z/Architecture® (for the core zPDT elements), System z I/O functions (for emulated I/O devices), z/OS (the most common System z operating system), and various applications and subsystems under z/OS. The reader is assumed to be familiar with general concepts and terminology of System z hardware and software elements, and with basic PC Linux characteristics. This book provides the primary documentation for zPDT.

Book IBM zEnterprise EC12 Technical Guide

Download or read book IBM zEnterprise EC12 Technical Guide written by Octavian Lascu and published by IBM Redbooks. This book was released on 2015-03-04 with total page 568 pages. Available in PDF, EPUB and Kindle. Book excerpt: The popularity of the Internet and the affordability of IT hardware and software have resulted in an explosion of applications, architectures, and platforms. Workloads have changed. Many applications, including mission-critical ones, are deployed on various platforms, and the IBM® System z® design has adapted to this change. It takes into account a wide range of factors, including compatibility and investment protection, to match the IT requirements of an enterprise. This IBM Redbooks® publication addresses the new IBM zEnterprise® System. This system consists of the IBM zEnterprise EC12 (zEC12), an updated IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension (zBX) Model 003. The zEC12 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The superscalar design allows the zEC12 to deliver a record level of capacity over the prior System z servers. It is powered by 120 of the world's most powerful microprocessors. These microprocessors run at 5.5 GHz and are capable of running more than 75,000 millions of instructions per second (MIPS). The zEC12 Model HA1 is estimated to provide up to 50% more total system capacity than the IBM zEnterprise 196 (z196) Model M80. The zBX Model 003 infrastructure works with the zEC12 to enhance System z virtualization and management. It does so through an integrated hardware platform that spans mainframe, IBM POWER7®, and IBM System x® technologies. Through the Unified Resource Manager, the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment. This book provides information about the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. It is intended for systems engineers, consultants, planners, and anyone who wants to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z® technology and terminology.

Book Extending z OS System Management Functions with IBM zAware

Download or read book Extending z OS System Management Functions with IBM zAware written by Frank Kyne and published by IBM Redbooks. This book was released on 2013-08-01 with total page 250 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication explains the capabilities of the IBM System z® Advanced Workload Analysis Reporter (IBM zAware), and shows how you can use it as an integral part of your existing System z management tools. IBM zAware is an integrated, self-learning, analytics solution for IBM z/OS® that helps identify unusual system behavior in near real time. It is designed to help IT personnel improve problem determination so they can restore service quickly and improve overall availability. The book gives you a conceptual description of the IBM zAware appliance. It will help you to understand how it fits into the family of IBM mainframe system management tools that include Runtime Diagnostics, Predictive Failure Analysis (PFA), IBM Health Checker for z/OS, and z/OS Management Facility (z/OSMF). You are provided with the information you need to get IBM zAware up and running so you can start to benefit from its capabilities immediately. You will learn how to manage an IBM zAware environment, and see how other products can use the IBM zAware Application Programming Interface to extract information from IBM zAware for their own use. The target audience includes system programmers, system operators, configuration planners, and system automation analysts.

Book DB2 9 for z OS and Storage Management

Download or read book DB2 9 for z OS and Storage Management written by Paolo Bruni and published by IBM Redbooks. This book was released on 2010-09-17 with total page 436 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication can help you tailor and configure DFSMS constructs to be used in an IBM DB2® 9 for z/OS® environment. In addition, it provides a broad understanding of new disk architectures and their impact in DB2 data set management for large installations. This book addresses both the DB2 administrator and the storage administrator. The DB2 administrator can find information about how to use DFSMS for managing DB2 data sets; the storage administrator can find information about the characteristics of DB2 data sets and how DB2 uses the disks. This book describes optimal use of disk storage functions in DB2 for z/OS environments that can best make productive use of the synergy with I/O subsystem on IBM System z®. This book covers the following topics: - Using SMS to manage DB2 catalog, log, data, indexes, image copies, archives, work files - Taking advantage of IBM FlashCopy® for DB2 utilities, striping, copy pools - Setting page sizes and using sliding allocation - A description of PAV, MA, MIDAW, EF, EA, EAV, zHPF and why they are helpful - Compressing data and the use disk and tape for large data sets - Backup and restore, and remote copy services

Book Reduce Risk and Improve Security on IBM Mainframes  Volume 3 Mainframe Subsystem and Application Security

Download or read book Reduce Risk and Improve Security on IBM Mainframes Volume 3 Mainframe Subsystem and Application Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2015-11-02 with total page 200 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

Book Scaling BPM Adoption  From Project to Program with IBM Business Process Manager

Download or read book Scaling BPM Adoption From Project to Program with IBM Business Process Manager written by Lisa Dyer and published by IBM Redbooks. This book was released on 2012-10-04 with total page 268 pages. Available in PDF, EPUB and Kindle. Book excerpt: Your first Business Process Management (BPM) project is a crucial first step on your BPM journey. It is important to begin this journey with a philosophy of change that allows you to avoid common pitfalls that lead to failed BPM projects, and ultimately, poor BPM adoption. This IBM® Redbooks® publication describes the methodology and best practices that lead to a successful project and how to use that success to scale to enterprise-wide BPM adoption. This updated edition contains a new chapter on planning a BPM project. The intended audience for this book includes all people who participate in the discovery, planning, delivery, deployment, and continuous improvement activities for a business process. These roles include process owners, process participants, subject matter experts (SMEs) from the operational business, and technologists responsible for delivery, including BPM analysts, BPM solution architects, BPM administrators, and BPM developers.

Book Using the IBM Security Framework and IBM Security Blueprint to Realize Business Driven Security

Download or read book Using the IBM Security Framework and IBM Security Blueprint to Realize Business Driven Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2014-02-06 with total page 240 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.

Book Introduction to the New Mainframe

Download or read book Introduction to the New Mainframe written by Mike Ebbers and published by IBM.Com/Redbooks. This book was released on 2006 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.

Book System Programmer s Guide to Z OS System Logger

Download or read book System Programmer s Guide to Z OS System Logger written by Frank Kyne and published by IBM.Com/Redbooks. This book was released on 2007 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: The z/OS System Logger is a function provided by the operating system to exploiters running on z/OS. The number of exploiters of this component is increasing, as is its importance in relation to system performance and availability. This IBM Redbooks document provides system programmers with a solid understanding of the System Logger component and guidance about how it should be set up for optimum performance with each of the exploiters. System Logger is an MVS component that provides a logging facility for applications running in a single-system or multi-system sysplex. The advantage of using System Logger is that the responsibility for tasks such as saving the log data (with the requested persistence), retrieving the data (potentially from any system in the sysplex), archiving the data, and expiring the data is removed from the creator of the log records. In addition, Logger provides the ability to have a single, merged, log, containing log data from multiple instances of an application within the sysplex.