Implementing an InfoSphere Optim Data Growth Solution

Implementing an InfoSphere Optim Data Growth Solution
Author :
Publisher : IBM Redbooks
Total Pages : 548
Release :
ISBN-10 : 9780738436135
ISBN-13 : 0738436135
Rating : 4/5 (35 Downloads)

Synopsis Implementing an InfoSphere Optim Data Growth Solution by : Whei-Jen Chen

Today, organizations face tremendous challenges with data explosion and information governance. InfoSphereTM OptimTM solutions solve the data growth problem at the source by managing the enterprise application data. The Optim Data Growth solutions are consistent, scalable solutions that include comprehensive capabilities for managing enterprise application data across applications, databases, operating systems, and hardware platforms. You can align the management of your enterprise application data with your business objectives to improve application service levels, lower costs, and mitigate risk. In this IBM® Redbooks® publication, we describe the IBM InfoSphere Optim Data Growth solutions and a methodology that provides implementation guidance from requirements analysis through deployment and administration planning. We also discuss various implementation topics including system architecture design, sizing, scalability, security, performance, and automation. This book is intended to provide various systems development professionals, Data Solution Architects, Data Administrators, Modelers, Data Analysts, Data Integrators, or anyone who has to analyze or integrate data structures, a broad understanding about IBM InfoSphere Optim Data Growth solutions. By being used in conjunction with the product manuals and online help, this book provides guidance about implementing an optimal solution for managing your enterprise application data.

AIX 5L Differences Guide Version 5.3 Edition

AIX 5L Differences Guide Version 5.3 Edition
Author :
Publisher : IBM Redbooks
Total Pages : 420
Release :
ISBN-10 : 9780738491530
ISBN-13 : 0738491535
Rating : 4/5 (30 Downloads)

Synopsis AIX 5L Differences Guide Version 5.3 Edition by : Scott Vetter

This IBM Redbooks publication focuses on the differences introduced in AIX 5L Version 5.3 when compared to AIX 5L Version 5.2. It is intended to help system administrators, developers, and users understand these enhancements and evaluate potential benefits in their own environments. AIX 5L Version 5.3 introduces many new features, including NFS Version 4 and Advanced Accounting, and exploits the advanced capabilities of POWER5 equipped severs, such as Virtual SCSI, Virtual Ethernet SMT, Micro-Partitioning, and others. There are many other enhancements available with AIX 5L Version 5.3, and you can explore them in this book. For customers who are not familiar with the enhancements of AIX 5L through Version 5.2, a companion publication, AIX 5L Differences Guide Version 5.2 Edition, SG24-5765 is available.

AIX V6 Advanced Security Features Introduction and Configuration

AIX V6 Advanced Security Features Introduction and Configuration
Author :
Publisher : IBM Redbooks
Total Pages : 418
Release :
ISBN-10 : 9780738489247
ISBN-13 : 0738489247
Rating : 4/5 (47 Downloads)

Synopsis AIX V6 Advanced Security Features Introduction and Configuration by : Chris Almond

AIX Version 6.1 provides many significant new security technologies and security enhancements. The purpose of this IBM Redbooks publication is to highlight and explain the security features at the conceptual level, as well as provide practical examples of how they may be implemented. Some features are extensions of features made available in prior AIX releases, and some are new features introduced with AIX V6. Major new security enhancements will be introduced with AIX V6 in 2007: - Trusted AIX (Multilevel Security) - Role Based Access Control (RBAC) - Encrypted File System - Trusted Execution - AIX Security Expert Enhancements This IBM Redbooks publication will provide a technical introduction to these new enhancements. The topics are both broad and very complex. This book will serve as an initial effort in describing all of the enhancements together in a single volume to the security/system hardening oriented audience.

Implementing IBM InfoSphere Change Data Capture for DB2 z/OS V6.5

Implementing IBM InfoSphere Change Data Capture for DB2 z/OS V6.5
Author :
Publisher : IBM Redbooks
Total Pages : 64
Release :
ISBN-10 : 9780738450452
ISBN-13 : 0738450456
Rating : 4/5 (52 Downloads)

Synopsis Implementing IBM InfoSphere Change Data Capture for DB2 z/OS V6.5 by : Jason Arnold

IBM® InfoSphereTM Change Data Capture for z/OS® uses log-based change data capture technology to provide low impact capture and rapid delivery of changes to and from DB2® z/OS in heterogeneous environments without impacting source systems. Customers get the up-to-date information they need to make actionable, trusted business decisions while optimizing MIPS costs. Change Data Capture can also be used to synchronize data in real time between multiple data environments to support active data warehousing, live reporting, operational business intelligence, application consolidations and migrations, master data management, and to deliver data to SOA environments. This IBM RedpaperTM document describes InfoSphere Change Data Capture, how to install and configure it, and how to migrate to the latest release.

NIM from A to Z in AIX 5L

NIM from A to Z in AIX 5L
Author :
Publisher : IBM.Com/Redbooks
Total Pages : 658
Release :
ISBN-10 : 0738486310
ISBN-13 : 9780738486314
Rating : 4/5 (10 Downloads)

Synopsis NIM from A to Z in AIX 5L by : Hassan Elsetohy

IBM System p5 Approaches to 24x7 Availability Including AIX 5L

IBM System p5 Approaches to 24x7 Availability Including AIX 5L
Author :
Publisher : IBM Redbooks
Total Pages : 468
Release :
ISBN-10 : 9780738495873
ISBN-13 : 0738495875
Rating : 4/5 (73 Downloads)

Synopsis IBM System p5 Approaches to 24x7 Availability Including AIX 5L by : Scott Vetter

This IBM Redbooks publication focuses on the technology, serviceability, and features that are used by the IBM eServer p5 and IBM System p5 servers, which allow you to make your server one of the most reliable and available parts of your IT infrastructure. This book explains how the server availability can be improved by: - Proper planning of the server environment and configuration - Understanding the role of the service processors and firmware components, and how they can be best configured and managed -Using high availability and redundancy features provided by the AIX 5L operating system and the Virtual IO server This book contains many detailed examples and step-by-step scenarios of usual server operation and maintenance tasks, such as the setup of redundant HMC and service processors, firmware upgrades, hot-addition of RIO drawers, or configuration of redundant Virtual IO servers. This book is intended for architects, specialists, and system administrators who are responsible for planning or developing an availability strategy for IBM System p servers.

Exploiting the IBM Health Checker for z/OS Infrastructure

Exploiting the IBM Health Checker for z/OS Infrastructure
Author :
Publisher : IBM Redbooks
Total Pages : 246
Release :
ISBN-10 : 9780738450216
ISBN-13 : 0738450219
Rating : 4/5 (16 Downloads)

Synopsis Exploiting the IBM Health Checker for z/OS Infrastructure by : Mario Bezzi

The IBM® Health Checker for z/OS® (also identified in this book as IBM Health Checker) is a key component of the z/OS operating system, whose objective is to identify potential problems before they impact the system's availability. To do this it continuously checks many current, active z/OS and sysplex settings and compares them with those suggested by IBM or defined by you. The IBM Health Checker for z/OS is made of two parts: - A framework that provides check management and execution services. It supports check development by IBM, independent software vendors (ISVs), and users. - Individual checks that look for specific z/OS settings and definitions, checking for potential problems. Customers can use the IBM Health Checker for z/OS infrastructure to run their own checks, extending the reach of IBM Health Checker for z/OS to environment-specific settings. This IBM RedpaperTM publication introduces the IBM Health Checker and describes how to activate and use it. It teaches you how to exploit the IBM Health Checker infrastructure to run custom checks and how to identify good candidates for writing your own checks. This publication also provides a number of sample checks to give you a good start creating custom checks for your environment.

IBM Power 520 Technical Overview

IBM Power 520 Technical Overview
Author :
Publisher : IBM Redbooks
Total Pages : 218
Release :
ISBN-10 : 9780738451244
ISBN-13 : 073845124X
Rating : 4/5 (44 Downloads)

Synopsis IBM Power 520 Technical Overview by : Scott Vetter

This IBM Redpaper publication is a comprehensive guide covering the IBM Power 520 server, machine type model 8203-E4A. The goal of this paper is to introduce this innovative server that includes IBM System i and IBM System p and new hardware technologies. The major hardware offerings include: - The POWER6 processor, available at frequencies of 4.2 GHz and 4.7 GHz. - Specialized POWER6 DDR2 memory that provides greater bandwidth, capacity, and reliability. - The 1 Gb or 10 Gb Integrated Virtual Ethernet adapter that brings native hardware virtualization to this server. - EnergyScale technology that provides features such as power trending, power-saving, capping of power, and thermal measurement. - PowerVM virtualization technology. - Mainframe continuous availability brought to the entry server environment. This Redpaper expands the current set of IBM Power System documentation by providing a desktop reference that offers a detailed technical description of the Power 520 system. This Redpaper does not replace the latest marketing materials and tools. It is intended as an additional source of information that, together with existing sources, can be used to enhance your knowledge of IBM server solutions.

Securing NFS in AIX An Introduction to NFS v4 in AIX 5L Version 5.3

Securing NFS in AIX An Introduction to NFS v4 in AIX 5L Version 5.3
Author :
Publisher : IBM Redbooks
Total Pages : 334
Release :
ISBN-10 : 9780738490809
ISBN-13 : 0738490806
Rating : 4/5 (09 Downloads)

Synopsis Securing NFS in AIX An Introduction to NFS v4 in AIX 5L Version 5.3 by : Chris Almond

NFS Version 4 (NFS V4) is the latest defined client-to-server protocol for NFS. A significant upgrade from NFS V3, it was defined under the IETF framework by many contributors. NFS V4 introduces major changes to the way NFS has been implemented and used before now, including stronger security, wide area network sharing, and broader platform adaptability. This IBM Redbooks publication is intended to provide a broad understanding of NFS V4 and specific AIX NFS V4 implementation details. It discusses considerations for deployment of NFS V4, with a focus on exploiting the stronger security features of the new protocol. In the initial implementation of NFS V4 in AIX 5.3, the most important functional differences are related to security. Chapter 3 and parts of the planning and implementation chapters in Part 2 cover this topic in detail.