Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (934)
  • Arabic
  • International Business Machines Corporation International Technical Support Organization.  (467)
  • Rand Corporation  (467)
Datasource
Material
Language
Subjects(RVK)
  • 101
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition (March 2016).
    Series Statement: IBM redbooks
    Keywords: Client/server computing ; Equipment and supplies ; Open source software ; Virtual computer systems ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redpaper Redbooks® publication presents the IBM PowerKVM virtualization for scale-out Linux systems, including the new LC IBM Power Systems™. PowerKVM is open source server virtualization that is based on the IBM POWER8® processor technology. It includes the Linux open source technology of KVM virtualization, and it complements the performance, scalability, and security qualities of Linux. This book describes the concepts of PowerKVM and how you can deploy your virtual machines with the software stack included in the product. It helps you install and configure PowerKVM on your Power Systems server and provides guidance for managing the supported virtualization features by using the web interface and command-line interface (CLI). This information is for professionals who want to acquire a better understanding of PowerKVM virtualization technology to optimize Linux workload consolidation and use the POWER8 processor features. The intended audience also includes people in these roles: Clients Sales and marketing professionals Technical support professionals IBM Business Partners Independent software vendors Open source community IBM OpenPower partners It does not replace the latest marketing materials and configuration tools. It is intended as an additional source of information that, along with existing sources, can be used to increase your knowledge of IBM virtualization solutions. Before you start reading, you must be familiar with the general concepts of kernel-based virtual machine (KVM), Linux, and IBM Power architecture.
    Note: "This edition applies to Version 3, Release 1, Modification 0 of IBM PowerKVM (product number 5765-KV3).". - Number on back cover: SG24-8231-01. - Includes bibliographical references. - Description based on online resource; title from cover (viewed March 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 102
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    ISBN: 9780738441436
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Seventh edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Handbooks, manuals, etc ; Electronic books ; Electronic books ; local
    Abstract: The superabundance of data that is created by today's businesses is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, the following major initiatives emerge: Flatten and converge your network: IBM® takes an open, standards-based approach to implement the latest advances in the flat, converged data center network designs of today. IBM Storage solutions enable clients to deploy a high-speed, low-latency Unified Fabric Architecture. Optimize and automate virtualization: Advanced virtualization awareness reduces the cost and complexity of deploying physical and virtual data center infrastructure. Simplify management: IBM data center networks are easy to deploy, maintain, scale, and virtualize, delivering the foundation of consolidated operations for dynamic infrastructure management. Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise. This demand is propelling the move of storage into the network. Also, the increasing complexity of managing large numbers of storage devices and vast amounts of data is driving greater business value into software and services. With current estimates of the amount of data to be managed and made available increasing at 60% each year, this outlook is where a storage area network (SAN) enters the arena. SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, and availability; and improved data access, movement, and backup. Welcome to the cognitive era. The smarter data center with the improved economics of IT can be achieved by connecting servers and storage with a high-speed and intelligent network fabric. A smarter data center that hosts IBM Storage solutions can provide an environment that is smarter, faster, greener, open, and easy to manage. This IBM® Redbooks® publication provides an introduction to SAN and Ethernet networking, and how these networks help to achieve a smarter data center. This book is intended for people who are not very familiar with IT, or who are just starting out in the IT world.
    Note: Number on resource description page: SG24547006. - Description based on online resource; title from cover page (viewed February 2, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 103
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition (February 2016).
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM DS8880 family. The book provides reference information to assist readers who need to plan for, install, and configure the DS8880 systems. The IBM DS8000® family is a high-performance, high-capacity, highly secure, and resilient series of disk storage systems. The DS8880 family is the latest and most advanced of the DS8000 offerings to date. The high availability, multiplatform support, including the IBM z Systems™, and simplified management tools help provide a cost-effective path to an on-demand world. The new IBM DS8880 family includes two high-performance models (DS8886 Model 981 with its associated DS8886 Expansion Unit Model 98E, and the DS8884 Model 980 with its associated Expansion Unit Model 98B). Two powerful IBM POWER8® processor-based servers manage the cache to streamline disk I/Os, maximizing performance and throughput. These capabilities are further enhanced with the availability of high-performance flash enclosures (HPFEs). A major change with the introduction of the DS8880 is the reduction of the footprint to a 19-inch rack. Like its predecessors, the DS8880 supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. All disk drives in the DS8880 storage system include the Full Disk Encryption (FDE) feature. The DS8880 can automatically optimize the use of each storage tier, particularly flash drives and flash cards, through the IBM Easy Tier® feature. The DS8880 also can be integrated in a Lightweight Directory Access Protocol (LDAP) infrastructure.
    Note: "Storage.". - "This edition applies to the IBM DS8880 with firmware Release 8.0."--Title page verso. - "SG24-8323-00"--Back cover. - Includes bibliographical references. - Description based on online resource; title from title page (viewed March 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 104
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Public key infrastructure (Computer security) ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 level.
    Note: Number on resource description page: SG24833700. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 17, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 105
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition (February 2016).
    Series Statement: IBM redbooks
    Keywords: Cloud computing ; Security measures ; Cloud computing ; Computer architecture ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power Systems™. The first objectives of this book are to examine how Power Systems can fit into the current and developing cloud computing landscape and to outline the proven Cloud Computing Reference Architecture (CCRA) that IBM employs in building private and hybrid cloud environments. The book then looks more closely at the underlying technology and hones in on the security aspects for the following subsystems: IBM Hardware Management Console IBM PowerVM IBM PowerKVM IBM PowerVC IBM Cloud Manager with OpenStack IBM Bluemix This publication is for professionals who are involved in security design with regard to planning and deploying cloud infrastructures using IBM Power Systems.
    Note: "Cloud. Power systems.". - "This edition applies to IBM PowerVC 1.3.0 (5765-VCS), IBM PowerVM 2.2.4 (5765-PVS Standard Edition, 5765-PVE Enterprise Edition, 5765-PVL Linux Edition), IBM PowerKVM 3.1 (5765-KVM), IBM Cloud Manager with OpenStack 4.3 (5765-OSP), and the IBM Hardware Management Console 8.3.2 (7042-CR8)"--Title page verso. - Number on back cover: SG24-8242-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed March 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 106
    ISBN: 0738435341 , 9780738435343
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: z/VSE ; Client/server computing ; Equipment and supplies ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication is based on the book Introduction to the New Mainframe: z/OS Basics, SG24-6366, which was produced by the International Technical Support Organization (ITSO), Poughkeepsie Center. It provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics, or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation. It is also not a reference book that discusses every feature and option of the mainframe facilities. Others who can benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course, and can include topics not covered in this textbook. In this course, we use simplified examples and focus mainly on basic system functions. Hands-on exercises are provided throughout the course to help students explore the mainframe style of computing. At the end of this course, you will be familiar with the following information: Basic concepts of the mainframe, including its usage and architecture Fundamentals of IBM z/VSE® (VSE), an IBM z™ Systems entry mainframe operating system (OS) An understanding of mainframe workloads and the major middleware applications in use on mainframes today The basis for subsequent course work in more advanced, specialized areas of z/VSE, such as system administration or application programming
    Note: "z systems.". - Includes bibliographical references. - Description based on online resource; title from cover (viewed March 16, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 107
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Twelth [sic] edition.
    Series Statement: IBM redbooks
    Keywords: GDPS (Computer system) ; Parallel processing (Electronic computers) ; Electronic data processing ; Distributed processing ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication presents an overview of the IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) offerings and the roles they play in delivering a business IT resilience solution. The book begins with general concepts of business IT resilience and disaster recovery, along with issues related to high application availability, data integrity, and performance. These topics are considered within the framework of government regulation, increasing application and infrastructure complexity, and the competitive and rapidly changing modern business environment. Next, it describes the GDPS family of offerings with specific reference to how they can help you achieve your defined goals for disaster recovery and high availability. Also covered are the features that simplify and enhance data replication activities, the prerequisites for implementing each offering, and tips for planning for the future and immediate business requirements. Tables provide easy-to-use summaries and comparisons of the offerings, and the additional planning and implementation services available from IBM are explained. Then, several practical client scenarios and requirements are described, along with the most suitable GDPS solution for each case. The introductory chapters of this publication are intended for a broad technical audience, including IT System Architects, Availability Managers, Technical IT Managers, Operations Managers, System Programmers, and Disaster Recovery Planners. The subsequent chapters provide more technical details about the GDPS offerings, and each can be read independently for those readers who are interested in specific topics. Therefore, if you do read all the chapters, be aware that some information is intentionally repeated.
    Note: Number from resource description page: SG24-6374-11. - "This edition applies to Version 3, Release 13, Modification 0 of the GDPS family of offerings"--Front matter. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed August 26, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 108
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: CICS (Computer system) ; Teleprocessing monitors (Computer programs) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides an example approach of an agile IT team that implements development and operations (DevOps) capabilities into an IBM CICS® application. Several tools are used to show how teams can achieve transparency, traceability, and automation in their application lifecycle with the assistance of all the stakeholders to deliver high-quality application changes that meet the requirements. The application changes that are built highlight the composable and dynamic nature of using CICS, the Liberty JVM runtime server, and IBM UrbanCode™ Deploy, which allows developers to get their applications running quickly by using only the programming model features that are required for their applications. The target audience for this publication is IT developers, managers, and architects, and project managers, test managers and developers, and operations managers and developers.
    Note: Number on resource description page: SG24833900. - Description based on online resource; title from cover page (viewed January 26, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 109
    ISBN: 9780738442358
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition (December 2016).
    Series Statement: IBM redbooks
    Keywords: Database management ; Software ; Information retrieval ; Computer storage devices ; Electronic books ; Electronic books ; local
    Abstract: The success or failure of businesses often depends on how well organizations use their data assets for competitive advantage. Deeper insights from data require better information technology. As organizations modernize their IT infrastructure to boost innovation rather than limit it, they need a data storage system that can keep pace with highly virtualized environments, cloud computing, mobile and social systems of engagement, and in-depth, real-time analytics. Making the correct decision on storage investment is critical. Organizations must have enough storage performance and agility to innovate as they need to implement cloud-based IT services, deploy virtual desktop infrastructure, enhance fraud detection, and use new analytics capabilities. At the same time, future storage investments must lower IT infrastructure costs while helping organizations to derive the greatest possible value from their data assets. The IBM® FlashSystem V9000 is the premier, fully integrated, Tier 1, all-flash offering from IBM. It has changed the economics of today's data center by eliminating storage bottlenecks. Its software-defined storage features simplify data management, improve data security, and preserve your investments in storage. The IBM FlashSystem® V9000 SAS expansion enclosures provide new tiering options with read-intensive SSDs or nearline SAS HDDs. IBM FlashSystem V9000 includes IBM FlashCore® technology and advanced software-defined storage available in one solution in a compact 6U form factor. IBM FlashSystem V9000 improves business application availability. It delivers greater resource utilization so you can get the most from your storage resources, and achieve a simpler, more scalable, and cost-efficient IT Infrastructure. This IBM Redbooks® publication provides information about IBM FlashSystem V9000 Software V7.7 and introduces the recently announced V7.8. It describes the product architecture, software, hardware, and implementation, and provides hints and tips. It illustrates use cases and independent software vendor (ISV) scenarios that demonstrate real-world solutions, and also provides examples of the benefits gained by integrating the IBM FlashSystem storage into business environments. This book offers IBM FlashSystem V9000 scalability concepts and guidelines for planning, installing, and configuring, which can help environments scale up and out to add more flash capacity and expand virtualized systems. Port utilization methodologies ar...
    Note: "Storage.". - "This edition applies to IBM FlashSystem V9000 Version 7.7.1"--Front matter. - Part number on resource description page: SG24827302. - Includes bibliographical references. - Description based on online resource; title from cover (viewed January 26, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 110
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Java (Computer program language) ; Web applications ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This IBM® Redbooks® publication covers Microservices best practices for Java. It focuses on creating cloud native applications using the latest version of IBM WebSphere® Application Server Liberty, IBM Bluemix® and other Open Source Frameworks in the Microservices ecosystem to highlight Microservices best practices for Java.
    Note: Number on resource description page: SG24835700. - Description based on online resource; title from cover (Safari, viewed January 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 111
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: z/VM ; Computer security ; Virtual computer systems ; Cloud computing ; Electronic books ; Electronic books ; local
    Abstract: As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
    Note: Number on resource description page: SG24835300. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed November 1, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 112
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Fourth edition (September 2016).
    Keywords: IBM Power systems ; Client/server computing ; Equipment and supplies ; Client/server computing ; Management ; Virtual computer systems ; Management ; Electronic books ; Electronic books ; local
    Abstract: IBM® Power Virtualization Center (IBM® PowerVC™) is an advanced, enterprise virtualization management offering for IBM Power Systems™. This IBM Redbooks® publication introduces PowerVC and helps you understand its functions, planning, installation, and setup. PowerVC Version 1.3.1 supports both large and small deployments, either by managing IBM PowerVM® that is controlled by the Hardware Management Console (HMC) or by IBM PowerVM Novalink, or by managing PowerKVM directly. With this capability, PowerVC can manage IBM AIX®, IBM i, and Linux workloads that run on IBM POWER® hardware, including IBM PurePower systems. PowerVC is available as a Standard Edition, or as a Cloud PowerVC Manager edition. PowerVC Standard Edition includes the following features and benefits: Virtual image capture, deployment, and management Policy-based virtual machine (VM) placement to improve use Management of real-time optimization and VM resilience to increase productivity VM Mobility with placement policies to reduce the burden on IT staff in a simple-to-install and easy-to-use graphical user interface (GUI) Role-based security policies to ensure a secure environment for common tasks IBM Cloud PowerVC Manager includes all of the PowerVC Standard Edition features and adds: A self-service portal that enables user access to the cloud infrastructure on a per-project basis The ability to enable an administrator to enable Dynamic Resource Optimization on a schedule This publication is for experienced users of IBM PowerVM and other virtualization solutions who want to understand and implement the next generation of enterprise virtualization management for Power Systems. Unless stated otherwise, the content of this publication refers to IBM PowerVC Version 1.3.1.
    Note: "This edition applies to Version 1 Release 3, Modification 1 of IBM PowerVC Standard Edition and IBM Cloud PowerVC Manager (product number 5765-VCC)"--Front matter. - Includes bibliographical references. - Description based on online resource; title from cover (viewed October 3, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 113
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition (June 2016).
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Computer systems ; Management ; Systems engineering ; Computer networks ; Electronic books ; Electronic books ; local
    Abstract: Digital business has been driving the transformation of underlying information technology (IT) infrastructure to be more efficient, secure, adaptive, and integrated. IT must be able to handle the explosive growth of mobile clients and employees. It also must be able to process enormous amounts of data to provide deep and real-time insights to help achieve the greatest business impact. This IBM® Redbooks® publication addresses the new IBM z Systems™ single frame, the IBM z13s server. IBM z Systems servers are the trusted enterprise platform for integrating data, transactions, and insight. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. It needs to be an integrated infrastructure that can support new applications. It also needs to have integrated capabilities that can provide new mobile capabilities with real-time analytics delivered by a secure cloud infrastructure. IBM z13s servers are designed with improved scalability, performance, security, resiliency, availability, and virtualization. The superscalar design allows z13s servers to deliver a record level of capacity over the prior single frame z Systems server. In its maximum configuration, the z13s server is powered by up to 20 client characterizable microprocessors (cores) running at 4.3 GHz. This configuration can run more than 18,000 millions of instructions per second (MIPS) and up to 4 TB of client memory. The IBM z13s Model N20 is estimated to provide up to 100% more total system capacity than the IBM zEnterprise® BC12 Model H13. This book provides information about the IBM z13s server and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. It is intended for systems engineers, consultants, planners, and anyone who wants to understand the IBM z Systems™ functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM z Systems technology and terminology.
    Note: "z Systems"--Cover. - Part number on back cover: SG24-8294-00. - Includes bibliographical references. - Description based on online resource; title from cover (viewed July 6, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 114
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fourth edition (April 2016) /
    Series Statement: IBM redbooks
    Keywords: IBM Database 2 ; Database management ; Relational databases ; Database design ; Electronic books ; Electronic books ; local
    Abstract: Procedures, triggers, and user-defined functions (UDFs) are the key database software features for developing robust and distributed applications. IBM Universal Database™ for i (IBM DB2® for i) supported these features for many years, and they were enhanced in V5R1, V5R2, and V5R3 of IBM® OS/400® and V5R4 of IBM i5/OS™. This IBM Redbooks® publication includes several of the announced features for procedures, triggers, and UDFs in V5R1, V5R2, V5R3, and V5R4. This book includes suggestions, guidelines, and practical examples to help you effectively develop IBM DB2 for i procedures, triggers, and UDFs. The following topics are covered in this book: External stored procedures and triggers Java procedures (both Java Database Connectivity (JDBC) and Structured Query Language for Java (SQLJ)) External triggers External UDFs This publication also offers examples that were developed in several programming languages, including RPG, COBOL, C, Java, and Visual Basic, by using native and SQL data access interfaces. This book is part of the original IBM Redbooks publication, Stored Procedures, Triggers, and User-Defined Functions on DB2 Universal Database for iSeries, SG24-6503-02, that covered external procedures, triggers, and functions, and also SQL procedures, triggers, and functions. All of the information that relates to external routines was left in this publication. All of the information that relates to SQL routines was rewritten and updated. This information is in the new IBM Redbooks publication, SQL Procedures, Triggers, and Functions on IBM DB2 for i, SG24-8326. This book is intended for anyone who wants to develop IBM DB2 for i procedures, triggers, and UDFs. Before you read this book, you need to know about relational database technology and the application development environment on the IBM i server.
    Note: "SG24-6503-03"--Back cover. - Includes bibliographical references. - Description based on online resource; title from cover (viewed May 10, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 115
    Online Resource
    Online Resource
    [United States] : IBM, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition (April 2016) /
    Series Statement: Redbooks
    Keywords: IBM Power systems ; Client/server computing ; Virtual computer systems ; Electronic books ; Electronic books ; local
    Abstract: The IBM® Hardware Management Console (HMC) provides to systems administrators a tool for planning, deploying, and managing IBM Power Systems™ servers. This IBM Redbooks® publication is an extension of IBM Power Systems HMC Implementation and Usage Guide, SG24-7491 and also merges updated information from IBM Power Systems Hardware Management Console: Version 8 Release 8.1.0 Enhancements, SG24-8232. It explains the new features of IBM Power Systems Hardware Management Console Version V8.8.1.0 through V8.8.4.0. The major functions that the HMC provides are Power Systems server hardware management and virtualization (partition) management. Further information about virtualization management is in the following publications: IBM PowerVM Virtualization Managing and Monitoring, SG24-7590 IBM PowerVM Virtualization Introduction and Configuration, SG24-7940 IBM PowerVM Enhancements What is New in 2013, SG24-8198 IBM Power Systems SR-IOV: Technical Overview and Introduction, REDP-5065 The following features of HMC V8.8.1.0 through HMC V8.8.4.0 are described in this book: HMC V8.8.1.0 enhancements HMC V8.8.4.0 enhancements System and Partition Templates HMC and IBM PowerVM® Simplification Enhancement Manage Partition Enhancement Performance and Capacity Monitoring HMC V8.8.4.0 upgrade changes
    Note: "SG24-8334-00"--Back cover. - Text enhanced by links to pdf downloads. - Includes bibliographical references. - Description based on online resource; title from cover (viewed May 10, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 116
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: VMware ; IBM Spectrum Virtualize ; Virtual computer systems ; Electronic books ; Electronic books ; local
    Abstract: IBM® Spectrum Virtualize and VMware's Virtual Volumes (VVols) are paving the way toward a true IBM Software Defined Environment (SDE). IBM Spectrum™ Virtualize is at the core of software-defined storage. The addition of VVols enables a fundamentally more efficient operational model for storage in virtualized environments, centering it around the virtual machine (VM) rather than the physical infrastructure. This IBM Redbooks® publication provides an overview of the VVols management framework and its implementation on storage systems managed by IBM Spectrum Virtualize™..
    Note: "Storage.". - Description based on online resource; title from cover (viewed March 17, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 117
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Web site development ; Web sites ; Design ; Electronic books ; Electronic books ; local
    Abstract: A digital experience is a personalized experience that provides employees, customers, business partners, and citizens with a single point of interaction with people, content, and applications anywhere, anytime, and from any device. The IBM® Digital Experience is a platform that is used to build powerful contextual websites. The strengths of the platform include the ability to mix applications and web content into a coherent user experience. Developers can build upon a prescriptive standard to build reusable building bricks, which can be used by line-of-business (LOB) users in a flexible way. LOB users can assemble pages from these building bricks and from rich web content. The page creation is performed inline by easy drag-and-drop operations without requiring sophisticated IT skills. This IBM Redbooks® publication describes how a team can build a website starting from a new installation of Digital Experience. The book provides examples of the basic tasks that are needed to get started with building a proof-of-concept (PoC) website example. The resulting example website illustrates the value and key capabilities of the Digital Experience suite, featuring IBM WebSphere® Portal and IBM Web Content Management. The target audiences for this book include the following groups: Decision makers and solution architects considering Digital Experience as a platform for their internal or external facing website. Developers who are tasked to implement a PoC and must be enabled to start quickly and efficiently, which includes the integration of existing back-end systems. A wide range of IBM services and sales professionals who are involved in selling IBM software and designing client solutions that include Digital Experience.
    Note: Number from resource description page: SG24831300. - Description based on online resource; title from cover (Safari, viewed February 5, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 118
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Database management ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Diagnostics area with IBM z/OS® V2R2. This book is one of a series of IBM Redbooks publications that take a modular approach to providing information about the updates that are included with z/OS V2R2. This approach has the following goals: - Provide modular content - Group the technical changes into a topic - Provide a more streamlined way of finding relevant information that is based on the topic We hope you find this approach useful, and we welcome your feedback.
    Note: Number on resource description page: SG24830600. - "z Systems.". - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed February 9, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 119
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: IBM redbooks
    Keywords: Data tape drives ; Storage area networks (Computer networks) ; Electronic books ; Electronic books ; local
    Abstract: The IBM® TS4500 tape library is a next-generation tape solution that offers higher storage density and integrated management. This IBM Redbooks® publication gives you a close-up view of the new IBM TS4500 tape library. In the TS4500, IBM delivers the density that today's and tomorrow's data growth require, with the cost-effectiveness and the manageability to grow with business data needs, while you preserve existing investments in IBM tape library products. Now, you can achieve both a low cost per terabyte (TB) and a high TB density per square foot, because the TS4500 can store up to 5.5 petabytes (PBs) of data in a single 10 square foot library frame, which is up to 3.4 times more capacity than the IBM TS3500 tape library. The TS4500 offers these benefits: Flexibility to grow: The TS4500 library can grow from both the right side and the left side of the first L frame because models can be placed in any active position. Increased capacity: The TS4500 can grow from a single L frame up to an additional 17 expansion frames with a capacity of over 23,000 cartridges. Capacity on demand (CoD): CoD is supported through entry-level, intermediate, and base-capacity configurations. Advanced Library Management System (ALMS): ALMS supports dynamic storage management, which enables users to create and change logical libraries and configure any drive for any logical library. Support for the IBM TS1150 tape drive: The TS1150 gives organizations an easy way to deliver fast access to data, improve security, and provide long-term retention, all at a lower cost than disk solutions. The TS1150 offers high-performance, flexible data storage with support for data encryption. Also, this fifth-generation drive can help protect investments in tape automation by offering compatibility with existing automation. Support of the IBM Linear Tape-Open (LTO) Ultrium 7 tape drive: The LTO Ultrium 7 offering represents significant improvements in capacity, performance, and reliability over the previous generation, LTO Ultrium 6, while they still protect your investment in the previous technology. This book describes TS4500 components, feature codes, specifications, supported tape drives, encryption, the new integrated management console, and the command-line interface (CLI). You will learn how to accomplish several specific tasks: Improve storage density with increased expansion frame capacity up to 2.4 times and support 33% more tape drives per frame. Manage storage by using t...
    Note: Number on resource description page: SG24823502. - "Storage.". - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed January 21, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 120
    ISBN: 9780738442334
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Seventh edition (December 2016).
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Handbooks, manuals, etc ; Electronic books ; Electronic books ; local
    Abstract: The superabundance of data that is created by today's businesses is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, the following major initiatives emerge: Flatten and converge your network: IBM® takes an open, standards-based approach to implement the latest advances in the flat, converged data center network designs of today. IBM Storage solutions enable clients to deploy a high-speed, low-latency Unified Fabric Architecture. Optimize and automate virtualization: Advanced virtualization awareness reduces the cost and complexity of deploying physical and virtual data center infrastructure. Simplify management: IBM data center networks are easy to deploy, maintain, scale, and virtualize, delivering the foundation of consolidated operations for dynamic infrastructure management. Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise. This demand is propelling the move of storage into the network. Also, the increasing complexity of managing large numbers of storage devices and vast amounts of data is driving greater business value into software and services. With current estimates of the amount of data to be managed and made available increasing at 60% each year, this outlook is where a storage area network (SAN) enters the arena. SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, and availability; and improved data access, movement, and backup. Welcome to the cognitive era. The smarter data center with the improved economics of IT can be achieved by connecting servers and storage with a high-speed and intelligent network fabric. A smarter data center that hosts IBM Storage solutions can provide an environment that is smarter, faster, greener, open, and easy to manage. This IBM® Redbooks® publication provides an introduction to SAN and Ethernet networking, and how these networks help to achieve a smarter data center. This book is intended for people who are not very familiar with IT, or who are just starting out in the IT world.
    Note: Number on back cover: SG24-5470-07. - Includes bibliographical references. - Description based on online resource; title from cover (viewed January 20, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 121
    ISBN: 9780738442259
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition (November 2016).
    Series Statement: IBM redbooks
    Keywords: Database management ; Software ; Information retrieval ; Computer storage devices ; Electronic books ; Electronic books ; local
    Abstract: Today's global organizations depend on being able to unlock business insights from massive volumes of data. Now, with IBM® FlashSystem 900, powered by IBM FlashCore™ technology, they can make faster decisions based on real-time insights and unleash the power of the most demanding applications, including online transaction processing (OLTP) and analytics databases, virtual desktop infrastructures (VDIs), technical computing applications, and cloud environments. This IBM Redbooks® publication introduces clients to the IBM FlashSystem® 900. It provides in-depth knowledge of the product architecture, software and hardware, implementation, and hints and tips. Also illustrated are use cases that show real-world solutions for tiering, flash-only, and preferred-read, and also examples of the benefits gained by integrating the FlashSystem storage into business environments. This book is intended for pre-sales and post-sales technical support professionals and storage administrators, and for anyone who wants to understand how to implement this new and exciting technology. This book describes the following offerings of the IBM Spectrum™ Storage family: IBM Spectrum Storage™ IBM Spectrum Control™ IBM Spectrum Virtualize™ IBM Spectrum Scale™ IBM Spectrum Accelerate™
    Note: "This edition applies to the IBM FlashSystem 900, Release 1.2"--Front matter. - Number on back cover: SG24-8271-01. - Includes bibliographical references. - Description based on online resource; title from title page (viewed January 13, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 122
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM Redbooks
    Keywords: Web-based user interfaces ; Business management ; Computer programs ; Business management ; Electronic books ; Electronic books ; local
    Abstract: IBM® Coach Framework is a key component of the IBM Business Process Manager (BPM) platform that enables custom user interfaces to be easily embedded within business process solutions. Developer tools enable process authors to rapidly create a compelling user experience (UI) that can be delivered to desktop and mobile devices. IBM Process Portal, used by business operations to access, execute, and manage tasks, is entirely coach-based and can easily be configured and styled. A corporate look and feel can be defined using a graphical theme editor and applied consistently across all process applications. The process federation capability enables business users to access and execute all their tasks using a single UI without being aware of the implementation or origin. Using Coach Framework, you can embed coach-based UI in other web applications, develop BPM UI using alternative UI technology, and create mobile applications for off-line working. This IBM Redbooks® publication explains how to fully benefit from the power of the Coach Framework. It focuses on the capabilities that Coach Framework delivers with IBM BPM version 8.5.7. The content of this document, though, is also pertinent to future versions of the application.
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 10, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 123
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition (August 2016).
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides all the messages that are associated with IBM System z® Personal Development Tool (IBM zPDT®) operation in a single reference source. This edition is intended for zPDT Version 1 Release 6 (commonly known as GA6), but should be useful for all zPDT releases.
    Note: "This edition applies to Version 1. Release 6 of the zPDT product"--Front matter. - "SG24-8103-00"--Back cover. - Includes bibliographical references. - Description based on online resource; title from cover (viewed September 14, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 124
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Computer systems ; Computer input-output equipment ; IBM computers ; Programming ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you install, customize, and configure an IBM z13® and build z/OS® environments. This book is intended for those readers who are new to the platform and are faced with the task of installing a mainframe for the first time. By the term mainframe in this instance, we refer to the hardware and the system software. The intention is to show you how this installation can be done. Volume 1 shows you how we set up a mainframe and installed z/OS V2R2 and IBM DB2® V11. The starting point is a basic hardware configuration of an IBM z13 and DS8000® as shipped from the factory. Volume 1 shows you how the following milestones were achieved: Creating a configuration for the Customized Offering Driver (COD) system Stand-alone restoration of the COD Expanding the configuration Installing the z/OS V2R2 ServerPac Loading and running IVPs for z/OS ServerPac Installing DB2 ServerPac and IVPs This publication includes figures that show you how the initial builds were achieved. For this book, we designed a scenario and show you how to build that scenario step-by-step. Although your requirements likely differ from our scenario, we intend to provide you with an example to show you how it can be done and samples and downloadable materials that you can choose to modify to bring you closer to meeting your needs. This book is divided into the following parts: Part 1: Overview and Planning In this part, we introduce you to how we approached the project. Part 2: Configuration and builds In this part, we describe the tasks that must be completed to create the initial build for the scenario that is described in Part 1.
    Note: Number on resource description page: SG24832900. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 17, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 125
    ISBN: 9780833092922 , 0833092928
    Language: English
    Pages: Online Ressource (xxxv, 148 pages) , color illustrations, color map, color charts.
    Series Statement: Research Report RR-1236-OSD
    Parallel Title: Erscheint auch als
    DDC: 303.62509599
    Keywords: United States / Army / Special Forces ; United States ; United States ; United States ; Terrorism Prevention ; Philippines ; Counterinsurgency Philippines ; Transnational crime Prevention ; International cooperation ; Operation Enduring Freedom, 2001- ; Combined operations (Military science) ; Transnational crime Prevention ; International cooperation ; Counterinsurgency ; Terrorism Prevention ; Terrorism Prevention ; Operation Enduring Freedom, 2001- ; Counterinsurgency ; Transnational crime Prevention ; International cooperation ; Combined operations (Military science) ; Terrorism ; Prevention ; HISTORY ; Asia ; Southeast Asia ; Military relations ; Strategic aspects of individual places ; Combined operations (Military science) ; Counterinsurgency ; Philippines Strategic aspects ; 21st century ; United States Military relations ; Philippines ; Philippines Military relations ; United States ; Philippines Military relations ; Philippines Strategic aspects 21st century ; United States Military relations ; United States Military relations ; Philippines Military relations ; Philippines Strategic aspects 21st century ; Philippines ; United States ; Electronic books
    Abstract: "This report examines the 14-year experience of U.S. special operations forces in the Philippines from 2001 through 2014. The objective of this case history is to document and evaluate the activities and effects of special operations capabilities employed to address terrorist threats in Operation Enduring Freedom--Philippines through (1) training and equipping Philippine security forces, (2) providing operational advice and assistance, and (3) conducting civil–military and information operations. The report evaluates the development, execution, and adaptation of the U.S. effort to enable the Philippine government to counter transnational terrorist groups. An average of 500 to 600 U.S. Army, Navy, Air Force, and Marine Corps special operations units were employed continuously under the command of a joint special operations task force. They provided training, advice, and assistance during combat operations to both Philippine special operations units and selected air, ground, and naval conventional units; conducted civil–military and information operations on Basilan, in the Sulu archipelago, and elsewhere in Mindanao; provided intelligence, surveillance, reconnaissance, medical evacuation, and emergency care; aided planning and intelligence fusion at joint operational commands and force development at institutional headquarters; and coordinated their programs closely with the U.S. embassy country team. The authors conclude that Operation Enduring Freedom--Philippines contributed to the successful degradation of transnational terrorist threats in the Philippines and the improvement of its security forces, particularly special operations units. It identifies contributing and limiting factors, which could be relevant to the planning and implementation of future such efforts"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Summary -- Acknowledgments -- Abbreviations -- Chapter 1: Introduction: Study Purpose -- Research Approach -- Organization of the Report -- Chapter 2: U.S.-Philippine Relations in Historical Perspective: U.S.-Philippine Policy Decisions -- The Initial Assessment -- Joint Task Force 510 and the Terms of Reference -- 2003-2004: Transition to Joint Special Operations Task Force--Philippines -- Summary -- Chapter 4: 2005-2007: The Move to Jolo and Operation Ultimatum: Assessment and Adaptation -- Plan Execution -- Increased Emphasis on Armed Forces of Philippines Targeting of Abu Sayyaf Group Leaders -- Summary -- Chapter 6: 2010-2012: Transitioning Up: Assessment and Adaptation -- Plan Execution -- Summary -- Chapter 7: 2012-2014: Zamboanga Siege and Transitioning Out: Assessment and Adaptation -- Plan Execution -- Summary -- Chapter 8: Conclusion: Overall Outcomes -- Limiting Factors -- Key Contributing Factors -- Generalizability of Findings -- Appendixes: A. Balikatan 02-1 Terms of Reference -- B. Plan Analysis Tool -- Bibliography.
    Note: "April 6, 2016"--Table of contents page. - Includes bibliographical references (pages 139-148). - Online resource; title from PDF title page (RAND, viewed April 7, 2016) , Includes bibliographical references (pages 139-148)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 126
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Computer systems ; Management ; Systems engineering ; Computer networks ; Electronic books ; Electronic books ; local
    Abstract: Digital business has been driving the transformation of underlying IT infrastructure to be more efficient, secure, adaptive, and integrated. Information Technology (IT) must be able to handle the explosive growth of mobile clients and employees. IT also must be able to use enormous amounts of data to provide deep and real-time insights to help achieve the greatest business impact. This IBM® Redbooks® publication addresses the IBM Mainframe, the IBM z13™. The IBM z13 is the trusted enterprise platform for integrating data, transactions, and insight. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. It needs to be an integrated infrastructure that can support new applications. It needs to have integrated capabilities that can provide new mobile capabilities with real-time analytics delivered by a secure cloud infrastructure. IBM z13 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The superscalar design allows the z13 to deliver a record level of capacity over the prior IBM z Systems™. In its maximum configuration, z13 is powered by up to 141 client characterizable microprocessors (cores) running at 5 GHz. This configuration can run more than 110,000 millions of instructions per second (MIPS) and up to 10 TB of client memory. The IBM z13 Model NE1 is estimated to provide up to 40% more total system capacity than the IBM zEnterprise® EC12 (zEC1) Model HA1. This book provides information about the IBM z13 and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. It is intended for systems engineers, consultants, planners, and anyone who wants to understand the IBM z Systems functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM z Systems technology and terminology.
    Note: Number on resource description page: SG24825101. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 15, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 127
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Computer networks ; Management ; Information storage and retrieval systems ; Business ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps administrators and technical professionals understand Internet Small Computer System Interface (iSCSI) and how to implement it for use with IBM Storwize® storage systems. iSCSI can be used alone or with other technologies. This publication provides an overview of the iSCSI protocol and helps you understand how it is similar to and different from Fibre Channel (FC) technology. It helps you plan and design your network topology. It explains how to configure your IBM Storwize storage systems and hosts (including IBM AIX®, Linux, VMware, and Microsoft Windows hosts) to interact with it. It also provides an overview of using IBM Storwize storage systems with OpenStack. This book describes iSCSI configuring for IBM Storwize and SAN Volume Controller storage systems at Version 7.6 or later. In addition to configuration, this publication provides information about performance and troubleshooting.
    Note: Number on resource description page: SG24832700. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 29, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 128
    Language: English
    Pages: 1 online resource (xvi, 534 pages) , illustrations.
    Edition: First edition (June 2016).
    Series Statement: IBM redbooks
    Keywords: IBM i ; Operating systems (Computers) ; Multiprocessors ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: IBM® PowerHA® SystemMirror® for i is the IBM high-availability (HA), disk-based clustering solution for the IBM i operating system. When PowerHA for i is combined with IBM i clustering technology, PowerHA for i delivers a complete HA and disaster-recovery (DR) solution for business applications that run in an IBM i environment. With PowerHA for i, you can support HA capabilities with either native disk storage, IBM DS8000® storage servers, or IBM Storwize® storage servers. This IBM Redbooks® publication helps you to install, tailor, and configure IBM PowerHA SystemMirror for i with the IBM System Storage® DS8000 series. This publication provides you with planning information to prepare to use the various PowerHA offerings for the IBM DS8000 family. It also provides implementation and management information. It provides guidance about troubleshooting these solutions and identifies the documentation and data that you need to capture before you call IBM Support. This book is part of a four-book volume set that gives you a complete understanding of PowerHA for i that uses native disk storage, IBM DS8000 storage servers, or IBM Storwize storage servers. The following IBM Redbooks publications are part of this PowerHA for i volume set: IBM PowerHA SystemMirror for i: Preparation, SG24-8400 IBM PowerHA SystemMirror for i: Using IBM Storwize, SG24-8402 IBM PowerHA SystemMirror for i: Using Geographic Mirroring, SG24-8401 Important: The information that is presented in this volume set is for technical consultants, technical support staff, IT architects, and IT specialists who are responsible for providing HA and support for IBM i solutions. If you are new to HA, review the information that is presented in the first book of this volume set, IBM PowerHA SystemMirror for i: Preparation (Volume 1 of 4), SG24-8400, to get a general understanding of clustering technology, independent auxiliary storage pools (IASPs), and the PowerHA architecture.
    Note: "This edition applies to Version 7, Release 2 of PowerHA SystemMirror for IBM i (product number 5770-HAS).". - "SG24-8403-00"--Back cover. - Includes bibliographical references (pages 519-520) and index. - Description based on online resource; title from cover (viewed June 22, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 129
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM Redbooks
    Keywords: z/OS ; CICS (Computer system) ; Electronic data processing ; Distributed processing ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication gives a broad understanding of several important concepts that are used when describing IBM CICS® Transaction Server (TS) for IBM z/OS® (CICS TS) performance. This publication also describes many of the significant performance improvements that can be realized by upgrading your environment to the most recent release of CICS TS. This IBM Redbooks publication targets the following audience: Systems Architects wanting to understand the performance characteristics and capabilities of a specific CICS TS release. Capacity Planners and Performance Analysts wanting to understand how an upgrade to the latest release of CICS TS affects their environment. Application Developers wanting to design and code highly optimized applications for deployment into a CICS TS environment. This publication covers the following topics: A description of the factors that are involved in the interaction between IBM z Systems™ hardware and a z/OS software environment. A definition of key terminology that is used when describing the results of CICS TS performance benchmarks. A presentation of how to collect the required data (and the methodology used) when applying Large Scale Performance Reference (LSPR) capacity information to a CICS workload in your environment. An outline of the techniques that are applied by the CICS TS performance team to achieve consistent and accurate performance benchmark results. High-level descriptions of several key workloads that are used to determine the performance characteristics of a CICS TS release. An introduction to the open transaction environment and task control block (TCB) management logic in CICS TS, including a reference that describes how several configuration attributes combine to affect the behavior of the CICS TS dispatcher. Detailed information that relates to changes in performance characteristics between successive CICS TS releases, covering comparisons that relate to CICS TS V4.2, V5.1, V5.2, and V5.3. The results of several small performance studies to determine the cost of using a specific CICS functional area.
    Note: Number on resource description page: SG24829800. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed April 15, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 130
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition (February 2016).
    Series Statement: IBM Redbooks
    Keywords: z/OS ; Linux ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the basic installation processes of Linux for z Systems™ on an IBM zPDT® base. It is intended for readers who are not familiar with IBM z Systems or with the zPDT product. This book assume the reader is familiar with Linux on Intel-compatible platforms. This book provides basic introductions to necessary z Systems and zPDT topics, and proceeds in a cookbook manner. This book is not intended for readers who are already familiar with these topics.
    Note: "z Systems.". - "This edition applies to Version 1, Release 6, of the zPDT product.". - Description based on online resource; title from title page (viewed March 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 131
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition (March 2016).
    Series Statement: IBM redbooks
    Keywords: IBM Spectrum ; Computer storage devices ; Memory management (Computer science) ; Electronic books ; Electronic books ; local
    Abstract: IBM® Spectrum Control (Spectrum Control), a member of the IBM Spectrum™ Family of products, is the next-generation data management solution for software-defined environments (SDEs). With support for block, file, object workloads, and software-defined storage and predictive analytics, and automated and advanced monitoring to identify proactively storage performance problems, Spectrum Control enables administrators to provide efficient management for heterogeneous storage environments. IBM Spectrum Control™ (formerly IBM Tivoli® Storage Productivity Center) delivers a complete set of functions to manage IBM Spectrum Virtualize™, IBM Spectrum Accelerate™, and IBM Spectrum Scale™ storage infrastructures, and traditional IBM and select third-party storage hardware systems. This IBM Redbooks® publication provides practical examples and use cases that can be deployed with IBM Spectrum Control Standard Edition, with an overview of IBM Spectrum Control Advanced Edition. This book complements the Spectrum Control IBM Knowledge Center, which is referenced for product details, and for installation and implementation details throughout this book. You can find this resource as the following website: IBM Spectrum Control Knowledge Center Also provided are descriptions and an architectural overview of the IBM Spectrum Family, highlighting Spectrum Control, as integrated into software-defined storage environments. This publication is intended for storage administrators, clients who are responsible for maintaining IT and business infrastructures, and anyone who wants to learn more about employing Spectrum Control and Spectrum Control Standard Edition.
    Note: "Analytics. Storage.". - Number on resource description page: SG24-8321-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed March 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 132
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Database management ; Software ; Information retrieval ; Computer storage devices ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication presents the architecture, design, concepts, and technology that are used in IBM FlashSystem® A9000 and IBM FlashSystem A9000R. FlashSystem A9000 and FlashSystem A9000R deliver the microsecond latency and high availability of IBM FlashCore™ technology with grid architecture, simple scalability, and industry-leading IBM software that is designed to drive your business into the cognitive era. Comprehensive data reduction capabilities, including inline deduplication and a new compression engine, help lower total cost of ownership, while a new, highly intuitive user interface simplifies management. FlashSystem A9000 and FlashSystem A9000R transform technology infrastructure into business innovation. From a functional standpoint, FlashSystem A9000 and FlashSystem A9000R take advantage of most of the software-defined storage features that are offered by the IBM Spectrum™ Accelerate software, including multi-tenancy and business continuity functions. This book contains numerous illustrations about how to manage and configure the storage system, by using the new user interface. This publication is intended for those individuals who need to plan, install, tailor, and configure FlashSystem A9000 and FlashSystem A9000R.
    Note: "Storage.". - Number on resource description page: SG24834500. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed July 20, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 133
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: CICS (Computer system) ; Teleprocessing monitors (Computer programs) ; Web servers ; Computer programs ; Web applications ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication, intended for architects, application developers, and system programmers, describes how to design and implement Java web-based applications in an IBM CICS® Liberty JVM server. This book is based on IBM CICS Transaction Server V5.3 (CICS TS) using the embedded IBM WebSphere® Application Server Liberty V8.5.5 technology. Liberty is an asset to your organization, whether you intend to extend existing enterprise services hosted in CICS, or develop new web-based applications supporting new lines of business. Fundamentally, Liberty is a composable, dynamic profile of IBM WebSphere Application Server that enables you to provision Java EE technology on a feature-by-feature basis. Liberty can be provisioned with as little as the HTTP transport and a servlet web container, or with the entire Java EE 6 Web Profile feature set depending on your application requirements. This publication includes a Technology Essentials section for architects and application developers to help understand the underlying technology, an Up-and-Running section for system programmers implementing the Liberty JVM server for the first time, and a set of real-life application development scenarios.
    Note: Number on resource description page: SG24833500. - Description based on online resource; title from cover page (viewed January 26, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 134
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Application software ; Development ; Java (Computer program language) ; Business enterprises ; Computer networks ; Management ; Electronic books ; Electronic books ; local
    Abstract: Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This IBM® Redbooks® publication shows how to break out a traditional Java EE application into separate microservices and provides a set of code projects that illustrate the various steps along the way. These code projects use the IBM WebSphere® Application Server Liberty, IBM API Connect™, IBM Bluemix®, and other Open Source Frameworks in the microservices ecosystem. The sample projects highlight the evolution of monoliths to microservices with Java and Node.
    Note: Number on resource description page: SG24835800. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 18, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 135
    ISBN: 9780833092991 , 0833092995
    Language: English
    Pages: xix, 57 pages , 23 cm
    Edition: Also issued online
    DDC: 302.30285
    Keywords: Social media Psychological aspects ; Online social networks Psychological aspects ; Public opinion ; Food Safety measures ; Government policy ; Food contamination ; Food security ; Food supply ; China ; Social Media ; Lebensmittelqualität ; Ernährungspolitik
    Note: Includes bibliographical references (pages 51-57) , Also issued online.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 136
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Memory management (Computer science) ; Database management ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication gives a broad understanding of integrated catalog facility (ICF) catalog environments. It includes suggestions for design, planning, and deployment tasks to help you create and maintain a balanced and efficient catalog environment. Four scenarios are provided to illustrate sample implementations of typical activities that are associated with an organization's requirements. Chapter 5, "Record-level sharing support for ICF catalogs" describes Record Level Sharing (RLS) for Catalogs and shows the results of our tests in a controlled laboratory environment. This version of the book is set at the IBM z/OS V2R2 level. This publication is for readers who want to gain an understanding of ICF catalogs and the considerations and practices that surround an ICF catalog environment deployment.
    Note: Number on resource description page: SG24826201. - "zSystems.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed October 31, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 137
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition (February 2016).
    Series Statement: IBM redbooks
    Keywords: z/OS ; User interfaces (Computer systems) ; Database management ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Serverpac area with IBM z/OS® V2R2. This publication includes the following chapters: - Chapter 1, "ServerPac" on page 1: Provides a summary of the z/OS V2R2 enhancements. - Chapter 2, "Order receive" on page 5: Describes the use of HTTPS to receive your order. - Chapter 3, "Creating a configuration" on page 9: Describes the affect of the SDSF zone change. - Chapter 4, "Variable Panel updates" on page 13: Describes setting up z/OSMF and the SMF option. - Chapter 5, "Modify System Layout option" on page 17: Describes large file system default allocation, enhanced support for file system merge, enhanced support for SMS managed data sets, and new data set view options. - Chapter 6, "Installation job changes" on page 29: Describes changes that were made to the create and submit installation jobs functions, which includes z/OSMF configuration, PFA configuration, KC4z configuration, and SMF logstream setup. This book is one of a series of IBM Redbooks publications that take a modular approach to providing information about the updates that are included with z/OS V2R2. This approach has the following goals: - Provide modular content - Group the technical changes into a topic - Provide a more streamlined way of finding relevant information that is based on the topic We hope you find this approach useful and we welcome your feedback.
    Note: Number on back cover: SG24-8500-00. - "z Systems.". - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed March 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 138
    ISBN: 9780833093134 , 0833093134 , 0833093134 , 9780833093134
    Language: English
    Pages: 1 Online-Ressource (xxii, 70 pages)
    Series Statement: Research report RR-1067-AF
    Parallel Title: Erscheint auch als McLeod, Gary, 1948- Enhancing space resilience through non-materiel means
    DDC: 358/.84
    Keywords: United States Operational readiness ; United States ; Astronautics, Military History 21st century ; Space security History 21st century ; Organizational resilience History 21st century ; Astronautics, Military ; Space security ; Organizational resilience ; Organizational resilience ; Air Forces ; Astronautics, Military ; Space security ; United States ; United States ; Military & Naval Science ; Law, Politics & Government ; History ; Armed Forces ; Operational readiness ; Electronic book
    Abstract: "Space is now a congested, contested, and competitive environment. Space systems must become more resilient to potential adversary actions and system failures, but changes to space systems are costly. To provide a complete look at resilience and possibly realize some benefit at lower cost, the Air Force asked RAND to identify non-materiel means--doctrine, organization, training, leadership and education, personnel, facilities, and policy--to enhance space resilience over the near and far terms.The authors developed implementation options to improve resilience based on a notional space protection operational concept: enhancing the capability of space operators to respond, in a timely and effective manner, to adversary counterspace actions. Operators need actionable information, appropriate organization and tactics, and dynamic command and control, supported by appropriate tools and decision aids, relevant training and exercises, and qualified personnel brought into the career field. The authors also recommend that Air Force Space Command develop a formal, end-to-end, space protection concept of operations (CONOPS) that captures all elements needed to improve resilience. In addition, the CONOPS could potentially follow the tenet of centralized control and decentralized execution in certain situations, such as when responding to adversary counterspace actions. For the near-term options, the rough order of magnitude (ROM) nonrecurring engineering (NRE) cost of implementation is estimated to be between 2.5 million dollars and 3.6 million dollars. For the far-term options, the ROM NRE cost is estimated to be between 109 million dollars and 166 million dollars, with the ROM recurring cost between 4 million dollars and 5.4 million dollars per year"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- 1. Introduction: Background -- Objectives -- Scope -- Space resilience -- Approach -- Report structure -- 2. Resilience and civil institutions: General approaches for building resilient operations: Impact avoidance -- Adaptation and flexibility -- Recovery and restoration -- Potential applications to the space operations community -- Summary -- 3. Resilience and U.S. government civil space agencies: Civil policy considerations: Full and open access -- Rapid delivery -- Continuity of operations -- Security classification -- Civil practices: Information -- Organization and tactics -- Command and control -- Training -- Personnel -- Summary -- 4. Resilience and Air Force space operations: Operational concept -- Findings: information: Space order of battle -- Limited intelligence at SOPS/SWS -- Space knowledge of intelligence personnel -- Space Weather effects -- Summary -- Findings: organization and tactics: Space protection lead -- Space protection tactics -- Tactics-sharing -- Summary -- Findings: command and control: Satellite C2 contacts -- Responsibilities and authorities -- Anomaly resolution -- Summary -- Findings: training: Space protection training -- Exercises -- Multiple satellite C2 systems -- Summary -- Findings: personnel: Initial qualifications -- Career progression -- Trained operators -- Summary -- Cost of implementation options -- Detailed recommendations -- 5. Resilience and a world with international and commercial partners: Information -- Organization and tactics -- Command and control -- 6. Recommendations: Overarching recommendations: Resilience as a priority -- Space protection CONOPS -- Detailed recommendations: Near-term recommendations -- Far-term recommendations -- ROM costs -- Appendix A: Space resilience cost analysis.
    Note: "RAND Project Air Force" --Title page , "RR-1067-AF"--Cover page 4 , Includes bibliographical references (pages 63-70)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 139
    ISBN: 9780833090973 , 0833093258
    Language: English
    Pages: 1 Online-Ressource
    DDC: 306.0951
    Keywords: Sustainable development ; Quality of life ; Pearl River Delta (China) ; Pearl River Delta (China)
    URL: Volltext  (Kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 140
    ISBN: 9780833090973 , 0833090976 , 9780833093257 , 0833093258
    Language: English
    Pages: 1 Online-Ressource (xxxi, 218 Seiten :) , Illustrations (chiefly color), color Karten
    Series Statement: [Research report] ; RR-871-DHURDGP
    DDC: 306.0951
    Keywords: Quality of life ; Sustainable development ; TRANSPORTATION Automotive ; General ; Economic history ; Quality of life ; Social conditions ; Sustainable development ; Pearl River Delta (China) Economic conditions 21st century ; Pearl River Delta (China) Social conditions 21st century
    Note: Includes bibliographical references (pages 201-218)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 141
    ISBN: 9780833088444 , 0833088440 , 9780833088451 , 0833088459 , 9780833088239 , 0833088432
    Language: English
    Pages: 1 Online-Ressource
    DDC: 303.6/9096623
    Keywords: Mali ; Mali ; Mali ; History ; Electronic book
    Abstract: Introduction -- A brief history of Mali's rebellions and the implementation of peace accords -- Explaining the failure of past peace accords -- Moving forward -- Is there a Nigerien model of resilience? -- Conclusion
    Abstract: This report examines the prospects for stabilization in Mali following the political and military crisis that began in 2012. To this end, it examines Mali's peace settlements since the early 1990s to identify flaws and successes. The authors find that five recurrent issues have impeded the implementation of successive accords: the lack of representativeness of the peace-accord signatories; a flawed understanding of decentralization and democracy; the limited perceived legitimacy, in the north, of Bamako; persistent insecurity; and an absence of transitional justice and reconciliation. The report recommends building representativeness through a variety of measures to simultaneously address these issues and help craft a peaceful way forward for Mali. The report also explores whether Mali's neighbor Niger owes its current stability to a more favorable context, shrewd policies, or sheer luck and whether it might offer a model of resilience for Mali. The authors recommend emulating some of the policies that could account for Niger's sustained stability, such as better integration of Tuareg populations and a focus on development programs in addition to security, while recognizing that these do not make Niger impervious to a resurgence of the political turmoil it experienced in the past
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 142
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corporation
    ISBN: 9780833090379 , 0833090372 , 9780833090386 , 0833090380 , 9780833088505 , 0833090313
    Language: English
    Pages: 1 Online-Ressource (xxii, 110 pages)
    DDC: 303.48/25106
    Keywords: Geopolitics ; National security ; China ; Africa ; China ; Africa ; United States ; Electronic books ; Electronic books ; Electronic book
    Abstract: "This report explores China's rapidly expanding involvement in Africa in order to better inform U.S. thinking about its relations both with China and with African states. The report pays particular attention to geostrategic competition in Africa, potential security threats, and opportunities on the continent. It examines the economic, political, and security interests driving Chinese engagement with African states and assesses potential medium-term changes in Sino-African relations across these three dimensions. It then assesses how China's interests and behavior on the continent affect the interests of the United States. In this matter, misperceptions often result from faulty assumptions about the potential for conflict over resources, images of Cold War-style geopolitical competition, and the nature of China's economic engagement with the continent. The report concludes by offering policy recommendations for U.S. and Army leaders concerned with U.S. security relationships with African states and with managing Sino-American relations in Africa. In particular, the report recommends that the United States should view China's sometimes-unfavorable activities in Africa in context and continue to seek opportunities to engage Beijing on mutual interests, such as defeating violent extremists, improving African infrastructure to promote trade and development, and encouraging economic and political stability on the continent."--Page 4 of cover
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 143
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: IBM redbooks
    Keywords: CICS (Computer system) ; Teleprocessing monitors (Computer programs) ; Electronic books ; Electronic books ; local
    Abstract: The IBM® CICS® Interdependency Analyzer (CICS IA®) is a runtime tool for use with IBM CICS Transaction Server for z/OS®. CICS IA allows both system programmers and application developers to get an understanding of the relationships and dependencies of your CICS applications and the environment on which they run. By analyzing data collected by CICS IA, you can make changes to your environment in a safe and controlled but timely manner to address changing demands on your business applications. In this IBM Redbooks® publication, we first provide a detailed overview of what CICS IA is and what business issues it addresses before we review how to configure CICS IA to collect the data that you require with the minimum provenance impact. We then show how you can analyze this data to assist with day-to-day application changes and major projects such as application onboarding.
    Note: Number on resource description page: SG24645802. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed January 22, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 144
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: z/VM ; Equipment and supplies ; Virtual computer systems ; Equipment and supplies ; Operating systems (Computers) ; Management ; Electronic books ; Electronic books ; local
    Abstract: IBM® Wave for z/VM® (IBM Wave) is a virtualization management solution for IBM z/VM and Linux on z Systems™. This virtualization management software provides a simplified and cost-effective way for companies to harness the consolidation capabilities of the IBM z™ Systems platform and its ability to host the workloads of tens of thousands of commodity servers. IBM Wave is a complete management solution for z Systems based virtual server farms. This IBM Redbooks® publication provides a guide to understanding IBM Wave by providing information about the IBM Wave architecture and how it fits into the cloud. This publication also provides a planning and design guide that is based on common scenarios. This publication also provides installation and configuration task information and how to manage and operate the environment. The intended audience for this publication is IT Architects who are responsible for planning their IBM Wave environments and IT Specialists who are responsible for implementing them.
    Note: Number on resource description page: SG24819201. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed January 22, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 145
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Database management ; Software ; Information retrieval ; Software ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication updates and complements the previous publication: Implementing the IBM General Parallel File System in a Cross Platform Environment, SG24-7844, with additional updates since the previous publication version was released with IBM General Parallel File System (GPFS™). Since then, two releases have been made available up to the latest version of IBM Spectrum™ Scale 4.1. Topics such as what is new in Spectrum Scale, Spectrum Scale licensing updates (Express/Standard/Advanced), Spectrum Scale infrastructure support/updates, storage support (IBM and OEM), operating system and platform support, Spectrum Scale global sharing - Active File Management (AFM), and considerations for the integration of Spectrum Scale in IBM Tivoli® Storage Manager (Spectrum Protect) backup solutions are discussed in this new IBM Redbooks publication. This publication provides additional topics such as planning, usability, best practices, monitoring, problem determination, and so on. The main concept for this publication is to bring you up to date with the latest features and capabilities of IBM Spectrum Scale as the solution has become a key component of the reference architecture for clouds, analytics, mobile, social media, and much more. This publication targets technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) responsible for delivering cost effective cloud services and big data solutions on IBM Power Systems™ helping to uncover insights among clients' data so they can take actions to optimize business results, product development, and scientific discoveries.
    Note: Number on resource description page: SG24825400. - Description based on online resource; title from cover (Safari, viewed June 9, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 146
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    ISBN: 9780738440729
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: IBM redbooks
    Keywords: Decision support systems ; Computer systems ; Management ; Systems engineering ; Computer networks ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: The IBM® Operational Decision Manager product family provides value to organizations that want to improve the responsiveness and precision of automated decisions. This decision management platform on IBM z/OS® provides comprehensive automation and governance of operational decisions that are made within mainframe applications. These decisions can be shared with other cross-platform applications, providing true enterprise decision management. This IBM Redbooks® publication makes the case for using Operational Decision Manager for z/OS and provides an overview of its components. It is aimed at IT architects, enterprise architects, and development managers looking to build rule-based solutions. Step-by-step guidance is provided about getting started with business rules by using a scenario-based approach. This book provides detailed guidelines for testing and simulation and describes advanced options for decision authoring. Finally, it describes and documents multiple runtime configuration options. This third edition, SG24-8014-02, of this IBM Redbooks publication updated the information presented in this book to reflect function available in IBM Operational Decision Manager for z/OS Version 8.7.1.
    Note: "Z systems.". - Number on resource description page: SG24801402. - Description based on online resource; title from cover page (Safari, viewed July 14, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 147
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Electronic digital computers ; Workload ; Management ; Computer programs ; Business enterprises ; Computer networks ; Electronic data processing ; Distributed processing ; Management ; Data mining ; Big data ; Cloud computing ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication documents how IBM Platform Computing, with its IBM Platform Symphony® MapReduce framework, IBM Spectrum Scale (based Upon IBM GPFS™), IBM Platform LSF®, the Advanced Service Controller for Platform Symphony are work together as an infrastructure to manage not just Hadoop-related offerings, but many popular industry offeringsm such as Apach Spark, Storm, MongoDB, Cassandra, and so on. It describes the different ways to run Hadoop in a big data environment, and demonstrates how IBM Platform Computing solutions, such as Platform Symphony and Platform LSF with its MapReduce Accelerator, can help performance and agility to run Hadoop on distributed workload managers offered by IBM. This information is for technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for delivering cost-effective cloud services and big data solutions on IBM Power Systems™ to help uncover insights among client's data so they can optimize product development and business results.
    Note: Number from resource description page: SG24-8234-00. - Description based on online resource; title from cover (Safari, viewed July 22, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 148
    ISBN: 9780738440477
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fourth edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information retrieval ; Electronic books ; Electronic books ; local
    Abstract: Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution, an innovative storage offering that delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The IBM Storwize V7000 solution incorporates some of the top IBM technologies typically found only in enterprise-class storage systems, raising the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing, storage administrators, and will help you understand the architecture of the Storwize V7000, how to implement it, and take advantage of the industry-leading functions and features.
    Note: Part Number: SG24793803. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 10, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 149
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , illustrations.
    Edition: Fifth edition.
    Series Statement: IBM redbooks
    Keywords: Computer architecture ; Storage area networks (Computer networks) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM DS8870. The book provides reference information to assist readers who need to plan for, install, and configure the DS8870. The IBM DS8870 is the most advanced model in the IBM DS8000 series and is equipped with IBM POWER7+™ based controllers. Various configuration options are available that scale from dual 2-core systems up to dual 16-core systems with up to 1 TB of cache. The DS8870 features an integrated high-performance flash enclosure with flash cards that can deliver up to 250,000 IOPS and up to 3.4 GBps bandwidth. A High-Performance All-Flash configuration is also available. The DS8870 also features enhanced 8 Gbps device adapters and host adapters. Connectivity options, with up to 128 Fibre Channel/IBM FICON® ports for host connections, make the DS8870 suitable for multiple server environments in open systems and IBM System z® environments. The DS8870 supports advanced disaster recovery solutions, business continuity solutions, and thin provisioning. All disk drives in the DS8870 storage system have the Full Disk Encryption (FDE) feature. The DS8870 also can be integrated in a Lightweight Directory Access Protocol (LDAP) infrastructure. The DS8870 can automatically optimize the use of each storage tier, particularly flash drives and flash cards, through the IBM Easy Tier® feature, which is available at no extra charge. This edition applies to Version 7, release 4 of IBM DS8870.
    Note: Number on resource description page: SG24808504. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed April 6, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 150
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: Data tape drives ; Storage area networks (Computer networks) ; Electronic books ; Electronic books ; local
    Abstract: The IBM® TS4500 tape library is a next-generation tape solution that offers higher storage density and integrated management. This IBM Redbooks® publication gives you a close-up view of the new IBM TS4500 tape library. In the TS4500, IBM delivers the density that today's and tomorrow's data growth require, with the cost-effectiveness and the manageability to grow with business data needs, while preserving existing investments in IBM tape library products. Now, you can achieve both a low cost per terabyte (TB) and a high TB density per square foot, because the TS4500 can store up to 5.5 PBs of data in a single 10 square foot library frame, which is up to 3.4 times more capacity than the IBM TS3500 tape library. This guide describes TS4500 components, feature codes, specifications, supported tape drives, encryption, the new integrated management console, and the command-line interface (CLI) and provides instructions for several specific tasks. It is for anyone who wants to understand more about the IBM TS4500 tape library. It is particularly suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.
    Note: Number on resource description page: SG24-8235-01. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed January 29, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 151
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fifth edition.
    Series Statement: IBM redbooks
    Keywords: Content manager ; Knowledge management ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides a practical guide to the design, installation, configuration, and maintenance of IBM Content Manager OnDemand Version 9.5. Content Manager OnDemand manages the high-volume storage and retrieval of electronic statements and provides efficient enterprise report management. Content Manager OnDemand transforms formatted computer output and printed reports, such as statements and invoices, into electronic information for easy report management. Content Manager OnDemand helps eliminate costly, high-volume print output by capturing, indexing, archiving, and presenting electronic information for improved customer service. This publication covers the key areas of Content Manager OnDemand, some of which might not be known to the Content Manager OnDemand community or are misunderstood. The book covers various topics, including basic information in administration, database structure, storage management, and security. In addition, the book covers data indexing, loading, conversion, and expiration. Other topics include user exits, performance, retention management, records management, and many more. Because many other resources are available that address subjects on different platforms, this publication is not intended as a comprehensive guide for Content Manager OnDemand. Rather, it is intended to complement the existing Content Manager OnDemand documentation and provide insight into the issues that might be encountered in the setup and use of Content Manager OnDemand. This book is intended for individuals who need to design, install, configure, and maintain Content Manager OnDemand.
    Note: "ECM.". - Number on resource description page: SG24691504. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed November 4, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 152
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First editon.
    Series Statement: IBM redbooks
    Keywords: Microprocessors ; Programming ; Configuration management ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you install, configure, and maintain the IBM z13™. The z13 offers new functions that require a comprehensive understanding of the available configuration options. This book presents configuration setup scenarios, and describes implementation examples in detail. This publication is intended for systems engineers, hardware planners, and anyone who needs to understand IBM z Systems™ configuration and implementation. Readers should be generally familiar with current IBM z Systems technology and terminology. For details about the functions of the z13, see IBM z13 Technical Introduction , SG24-8250 and IBM z13 Technical Guide , SG24-8251.
    Note: Number on resource description page: SG24826000. - Description based on online resource; title from cover page (Safari, viewed May 13, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 153
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Series Statement: WebSphere
    Keywords: Business ; Data processing ; Management ; IBM computers ; Industrial management ; Data processing ; Management information systems ; Electronic books ; Electronic books ; local
    Abstract: IBM® Business Process Manager (IBM BPM) is a comprehensive business process management (BPM) suite that provides visibility and management of your business processes. IBM BPM supports the whole BPM lifecycle approach: Discover and document Plan Implement Deploy Manage Optimize Process owners and business owners can use this solution to engage directly in the improvement of their business processes. IBM BPM excels in integrating role-based process design, and provides a social BPM experience. It enables asset sharing and creating versions through its Process Center. The Process Center acts as a unified repository, making it possible to manage changes to the business processes with confidence. IBM BPM supports a wide range of standards for process modeling and exchange. Built-in analytics and search capabilities help to further improve and optimize the business processes. This IBM Redbooks® publication provides valuable information for project teams and business people that are involved in projects using IBM BPM. It describes the important design decisions that you face as a team. These decisions invariably have an effect on the success of your project. These decisions range from the more business-centric decisions, such as which should be your first process, to the more technical decisions, such as solution analysis and architectural considerations.
    Note: Part number from resource description page: SG24828200. - Description based on online resource; title from cover page (Safari, viewed May 11, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 154
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Computer systems ; Management ; Systems engineering ; Computer networks ; Electronic books ; Electronic books ; local
    Abstract: Digital business has been driving the transformation of underlying IT infrastructure to be more efficient, secure, adaptive, and integrated. Information Technology (IT) must be able to handle the explosive growth of mobile clients and employees. IT also must be able to use enormous amounts of data to provide deep and real-time insights to help achieve the greatest business impact. This IBM® Redbooks® publication addresses the new IBM Mainframe, the IBM z13. The IBM z13 is the trusted enterprise platform for integrating data, transactions, and insight. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. It needs to be an integrated infrastructure that can support new applications. It needs to have integrated capabilities that can provide new mobile capabilities with real-time analytics delivered by a secure cloud infrastructure. IBM z13 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The superscalar design allows the z13 to deliver a record level of capacity over the prior z Systems. In its maximum configuration, z13 is powered by up to 141 client characterizable microprocessors (cores) running at 5 GHz. This configuration can run more than 110,000 millions of instructions per second (MIPS) and up to 10 TB of client memory. The IBM z13 Model NE1 is estimated to provide up to 40% more total system capacity than the IBM zEnterprise® EC12 (zEC1) Model HA1. This book provides information about the IBM z13 and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. It is intended for systems engineers, consultants, planners, and anyone who wants to understand the IBM z Systems functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM z Systems technology and terminology.
    Note: Part number on resource description page: SG24825100. - Description based on online resource; title from title page (Safari, viewed May 7, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 155
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Mobile computing ; Programming ; Mobile computing ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: In today's business in motion environments, workers expect to be connected to their critical business processes while on-the-go. It is imperative to deliver more meaningful user engagements by extending business processes to the mobile working environments. This IBM® Redbooks® publication provides an overview of the market forces that push organizations to reinvent their process with Mobile in mind. It describes IBM Mobile Smarter Process and explains how the capabilities provided by the offering help organizations to mobile-enable their processes. This book outlines an approach that organizations can use to identify where within the organization mobile technologies can offer the greatest benefits. It provides a high-level overview of the IBM Business Process Manager and IBM Worklight® features that can be leveraged to mobile-enable processes and accelerate the adoption of mobile technologies, improving time-to-value. Key IBM Worklight and IBM Business Process Manager capabilities are showcased in the examples included in this book. The examples show how to integrate with IBM Bluemix™ as the platform to implement various supporting processes. This IBM Redbooks publication discusses architectural patterns for exposing business processes to mobile environments. It includes an overview of the IBM MobileFirst reference architecture and deployment considerations. Through use cases and usage scenarios, this book explains how to build and deliver a business process using IBM Business Process Manager and how to develop a mobile app that enables remote users to interact with the business process while on-the-go, using the IBM Worklight Platform. The target audience for this book consists of solution architects, developers, and technical consultants who will learn the following information: What is IBM Mobile Smarter Process Patterns and benefits of a mobile-enabled Smarter Process IBM BPM features to mobile-enable processes IBM Worklight features to mobile-enable processes Mobile architecture and deployment topology IBM BPM interaction patterns Enterprise mobile security with IBM Security Access Manager and IBM Worklight Implementing mobile apps to mobile-enabled business processes
    Note: Number on resource description page: SG24824000. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed March 5, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 156
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Data protection ; Data recovery (Computer science) ; Application software ; Development ; Middleware ; Cloud computing ; Emergency management ; Electronic books ; Electronic books ; local
    Abstract: This IBM Redbooks publication describes and demonstrates common, prescriptive scenarios for setting up disaster recovery for common workloads using IBM WebSphere Application Server, IBM DB2, and WebSphere MQ between two IBM PureApplication System racks using the features in PureApplication System V2. The intended audience for this book is pattern developers and operations team members who are setting up production systems using software patterns from IBM that must be highly available or able to recover from a disaster (defined as the complete loss of a data center).
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 17, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 157
    ISBN: 9780833088437 , 0833088432 , 9780833088444 , 0833088440 , 9780833088451 , 0833088459
    Language: English
    Pages: Online Ressource
    Parallel Title: Erscheint auch als Pézard, Stéphanie Achieving peace in northern Mali
    DDC: 303.69096623
    Keywords: Coup d'état (Mali : 2012) ; SOCIAL SCIENCE ; General ; History ; Politics and government ; Mali History ; Tuareg Rebellion, 2012- ; Mali History ; Coup d'état, 2012 ; Mali Politics and government ; 1991- ; Mali ; Mali Politics and government 1991- ; Mali History Tuareg Rebellion, 2012- ; Mali History Coup d'état, 2012 ; Mali ; Electronic books History
    Abstract: This report examines the prospects for stabilization in Mali following the political and military crisis that began in 2012. To this end, it examines Mali's peace settlements since the early 1990s to identify flaws and successes. The authors find that five recurrent issues have impeded the implementation of successive accords: the lack of representativeness of the peace-accord signatories; a flawed understanding of decentralization and democracy; the limited perceived legitimacy, in the north, of Bamako; persistent insecurity; and an absence of transitional justice and reconciliation. The report recommends building representativeness through a variety of measures to simultaneously address these issues and help craft a peaceful way forward for Mali. The report also explores whether Mali's neighbor Niger owes its current stability to a more favorable context, shrewd policies, or sheer luck and whether it might offer a model of resilience for Mali. The authors recommend emulating some of the policies that could account for Niger's sustained stability, such as better integration of Tuareg populations and a focus on development programs in addition to security, while recognizing that these do not make Niger impervious to a resurgence of the political turmoil it experienced in the past
    Note: Includes bibliographical references. - Print version record and CIP data provided by publisher; resource not viewed
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 158
    ISBN: 9780833089199 , 0833089196
    Language: English
    Pages: 1 Online-Ressource
    DDC: 362.209794
    Keywords: Mental health services Evaluation ; Mental illness Prevention ; Mental health services ; Mental illness ; Mental illness ; Prevention ; California ; Mental health services ; Evaluation ; Electronic books
    Note: Caption title , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 159
    ISBN: 9780833089755 , 0833089757
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Research report
    DDC: 331.2/81362172
    Keywords: Medical fees ; Medicare Finance ; Medical care, Cost of ; Medical fees ; Medicare ; Medical care, Cost of ; Medicare ; Finance ; Medical care, Cost of ; Medical fees ; Electronic books
    Note: "Sponsored by the Centers for Medicare & Medicaid Services , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 160
    ISBN: 9780833088888 , 083309145X , 0833088882 , 9780833091451
    Language: English
    Pages: 1 Online-Ressource (xxvi, 105 pages)
    Series Statement: RR-653-OSD
    Parallel Title: Print version Ayer, Lynsay Care transitions to and from the National Intrepid Center of Excellence (NICoE) for service members with traumatic brain injury
    Keywords: Brain Wounds and injuries ; Treatment ; Evaluation ; Soldiers Medical care ; Evaluation ; Brain ; Soldiers ; Disciplines and Occupations ; Disease ; Health Care Facilities, Manpower, and Services ; Health Occupations ; Health Services ; Health ; Medicine ; Military Medicine ; Military Personnel ; Named Groups ; Nervous System Diseases ; Occupational Groups ; Persons ; Physical and Rehabilitation Medicine ; Population Characteristics ; Rehabilitation ; Therapeutics ; Trauma, Nervous System ; Veterans Health ; Wounds and Injuries ; Central Nervous System Diseases ; Brain Diseases ; Analytical, Diagnostic and Therapeutic Techniques and Equipment ; Craniocerebral Trauma ; Delivery of Health Care ; Brain Injuries ; Law, Politics & Government ; MEDICAL ; Neurology ; United States ; Military & Naval Science ; Military Administration ; Electronic book
    Abstract: Improvised explosive devices (IEDs) have been one of the leading causes of death and injury among U.S. troops. Those who survive an IED blast or other injuries may be left with a traumatic brain injury (TBI) and attendant or co-occurring psychological symptoms. In response to the need for specialized services for these populations, the U.S. Department of Defense (DoD) established the National Intrepid Center of Excellence (NICoE) in Bethesda, Maryland, in 2010. The NICoE's success in fulfilling its mission is impacted by its relationships with home station providers, patients, and their families. The RAND Corporation was asked to evaluate these relationships and provide recommendations for strengthening the NICoE's efforts to communicate with these groups to improve patients' TBI care. Through surveys, site visits, and interviews with NICoE staff, home station providers, service members who have received care at the NICoE, and the families of these patients, RAND's evaluation examined the interactions between the NICoE and the providers responsible for referring patients and implementing treatment plans
    Note: "Prepared for the Office of the Secretary of Defense. Approved for public release; distribution unlimited , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 161
    ISBN: 9780833088932 , 0833091352 , 0833088939 , 9780833091352
    Language: English
    Pages: 1 Online-Ressource (xviii, 180 pages)
    Parallel Title: Print version Keller, Kirsten M Integrated survey system for addressing abuse and misconduct toward Air Force trainees during basic military training
    Keywords: Sexual harassment in the military ; Social surveys ; Sexual harassment in the military ; Social surveys ; Social surveys ; United States ; HISTORY ; Military ; Aviation ; Sexual harassment in the military ; United States Armed Forces ; Airmen ; Training of ; United States ; Electronic book
    Abstract: "In response to several high-profile incidents of sexual misconduct by military training instructors (MTIs) during Basic Military Training (BMT), in 2012 the U.S. Air Force's Air Education and Training Command (AETC) asked RAND Project AIR FORCE to develop an integrated survey system to help address abuse and misconduct towad trainees in the BMT environment. Based on an extensive review of relevant materials--including internal AETC investigations of these incidents, Air Force and Department of Defense policies, and the scientific literature--trainee experiences and related reporting behaviors for the following abuse and misconduct categories: trainee bullying, maltreatment and maltraining, unprofessional relationships, sexual harassment, and unwanted sexual experiences. The survey also measures individual perceptions of the squadron climate and BMT feedback and support systems. The MTI survey assesses the extent to which MTIs were aware of trainees experiencing abuse, as well of their perceptions of the related squadron climate and MTI reporting behaviors. The MTI survey also includes a section on MTI quality of life, including job attitudes, the work environment, and job stressors. The report concludes with recommendations about survey administration, reporting the results, and additional areas for improvement to better track and monitor actual instances of and the potential for abuse and misconduct"--Page 4 of cover
    Abstract: "In response to several high-profile incidents of sexual misconduct by military training instructors (MTIs) during Basic Military Training (BMT), in 2012 the U.S. Air Force's Air Education and Training Command (AETC) asked RAND Project AIR FORCE to develop an integrated survey system to help address abuse and misconduct towad trainees in the BMT environment. Based on an extensive review of relevant materials--including internal AETC investigations of these incidents, Air Force and Department of Defense policies, and the scientific literature--trainee experiences and related reporting behaviors for the following abuse and misconduct categories: trainee bullying, maltreatment and maltraining, unprofessional relationships, sexual harassment, and unwanted sexual experiences. The survey also measures individual perceptions of the squadron climate and BMT feedback and support systems. The MTI survey assesses the extent to which MTIs were aware of trainees experiencing abuse, as well of their perceptions of the related squadron climate and MTI reporting behaviors. The MTI survey also includes a section on MTI quality of life, including job attitudes, the work environment, and job stressors. The report concludes with recommendations about survey administration, reporting the results, and additional areas for improvement to better track and monitor actual instances of and the potential for abuse and misconduct"--Page 4 of cover
    Note: "Rand Project Air Force , "RR-964-AF"--Page 4 of cover , "Prepared for the United States Air Force , "Approved for public release; distribution unlimited , Includes bibliographical references (pages 171-180)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 162
    ISBN: 9780833091475 , 0833091476
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Research report
    DDC: 616.044
    Keywords: Chronic diseases Treatment ; Chronic diseases ; Chronic diseases ; Chronic diseases ; Chronic diseases ; Chronic diseases ; Treatment ; Electronic books
    Abstract: 1. Introduction -- 2. Program prevalence -- 3. Program design -- 4. Member interaction -- 5. Coordinating plan and provider activities -- 6. Chronic care management program evaluation -- 7. Challenges to chronic care management program success -- 8. Conclusions -- Appendix A. Detailed results from survey -- Appendix B. Case studies.
    Abstract: The need for better management of chronic conditions is urgent. Many health plans have developed innovative approaches to improving care for their members with chronic conditions. This report documents the current range of health plans' chronic care management services, identifies best practices and industry trends, and examines factors in plans' operating environment that limit their ability to optimize chronic care programs
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 163
    ISBN: 9780833091864 , 0833093800 , 0833091867 , 9780833093806
    Language: English
    Pages: 1 Online-Ressource (23 pages)
    Series Statement: Research report RR-1267-OSD
    Parallel Title: Print versionShatz, Howard J Islamic state we knew
    Keywords: IS (Organization) ; IS (Organization) ; Terrorism Prevention ; International cooperation ; Radicalism ; Islamic fundamentalism ; Terrorism ; Radicalism ; Islamic fundamentalism ; Radicalism ; Terrorism ; Prevention ; International cooperation ; Middle East ; HISTORY ; General ; IS (Organization) ; Islamic fundamentalism ; Electronic books
    Abstract: "The group calling itself the Islamic State poses a grave threat, not just to Iraq and Syria but to the region more broadly and to the United States and its global coalition partners. A deadly and adaptive foe, the Islamic State seemed to come out of nowhere in June 2014, when it conquered Mosul. However, the Islamic State of today is the direct descendant of a group that Iraq, the United States, and their partners once fought as al-Qa'ida in Iraq and then as the Islamic State of Iraq. The wealth of publicly available information about the group indicates that the Islamic State's reemergence in 2014, and especially its methods and goals, should not have come as a surprise, although the strength and scope of that reemergence were rightfully shocking. The history considered in this report provides information known by the end of 2011 about the group's origins, finances, organization, methods of establishing control over territory, and response to airpower. Now that the Islamic State has reemerged, countering it can rely, in part, on the great deal of accumulated knowledge available. Because Iraqis and coalition forces routed the group once, the group's history can inform four components of a successful strategy against the Islamic State: degrading the group's finances, eliminating its leadership and potential leadership, creating a better strategy to hold recaptured territory, and making use of airpower"-- Provided by publisher
    Note: "This report is derived from a May 27, 2015 talk presented at the 11th Annual National Security Conference of the Fisher Institute for Air and Space Strategic Studies in Herzliya, Israel, "Winning Small Wars and the Role of Air Power." The talk appeared in a session titled "Knowing, Perceiving, Understanding: What We Knew but Did Not Understand." The full conference agenda and videos of selected presentations are available on the Fisher Instituter's website"-- Back cover , Includes bibliographical references (pages 20-23)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 164
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corporation
    ISBN: 9780833089014 , 0833092081 , 0833089013 , 9780833092083
    Language: English
    Pages: 1 Online-Ressource (xxx, 286 pages)
    Series Statement: Rand Corporation research report series RR-1021-AF
    Parallel Title: Print version Blank, Jonah Look east, cross black waters
    Keywords: India ; Southeast Asia ; United States ; Politics and government ; Southeast Asia ; Regions & Countries - Asia & the Middle East ; History & Archaeology ; Diplomatic relations ; POLITICAL SCIENCE ; International Relations ; General ; POLITICAL SCIENCE ; Government ; International ; Southeast Asia Foreign relations ; India Politics and government 21st century ; India Foreign relations ; United States Foreign relations ; India Foreign relations ; Southeast Asia ; India ; India ; United States ; India ; Electronic books
    Abstract: "The global security interests of India and the United States overlap far more than they clash, and this is particularly the case in Southeast Asia. India's core goals for Southeast Asia are all in basic harmony with those of the United States -- including regional stability; prevention of any outside nation from dominating the politics or economy of the region; peaceful settlement of territorial disputes such as the South China Sea; secure shipping through the Straits of Malacca and other crucial transit points; increased land, sea and air connectivity infrastructure; Myanmar's democratic transition; and containment of radicalism in states including Indonesia and Malaysia. But America should not expect India to enter any sort of alliance (formal or de facto), nor join any coalition to balance against China. This does not indicate an anti-American outlook, but a determination to engage with Southeast Asia at a pace and manner of India's own choosing -- and a deep caution about precipitating conflict with Beijing. The replacement of a Congress Party government with a Bharatiya Janata Party administration in May 2014 has resulted in a recalibration of India's foreign policy, but not a radical shift in its overall direction. For U.S. policymakers in the security arena, the challenge in building cooperation with India in Southeast Asia will boil down to four elements: (1) understanding India's own goals for the region better, (2) adopting strategic patience in working at a pace and manner comfortable to India, (3) finding specific areas on which to focus attention, such as technology transfer, humanitarian assistance/disaster relief, Andaman and Nicobar Islands, and Myanmar policy, and (4) moving forward, laying the foundation for future progress"--Publisher's web site
    Abstract: "The global security interests of India and the United States overlap far more than they clash, and this is particularly the case in Southeast Asia. India's core goals for Southeast Asia are all in basic harmony with those of the United States -- including regional stability; prevention of any outside nation from dominating the politics or economy of the region; peaceful settlement of territorial disputes such as the South China Sea; secure shipping through the Straits of Malacca and other crucial transit points; increased land, sea and air connectivity infrastructure; Myanmar's democratic transition; and containment of radicalism in states including Indonesia and Malaysia. But America should not expect India to enter any sort of alliance (formal or de facto), nor join any coalition to balance against China. This does not indicate an anti-American outlook, but a determination to engage with Southeast Asia at a pace and manner of India's own choosing -- and a deep caution about precipitating conflict with Beijing. The replacement of a Congress Party government with a Bharatiya Janata Party administration in May 2014 has resulted in a recalibration of India's foreign policy, but not a radical shift in its overall direction. For U.S. policymakers in the security arena, the challenge in building cooperation with India in Southeast Asia will boil down to four elements: (1) understanding India's own goals for the region better, (2) adopting strategic patience in working at a pace and manner comfortable to India, (3) finding specific areas on which to focus attention, such as technology transfer, humanitarian assistance/disaster relief, Andaman and Nicobar Islands, and Myanmar policy, and (4) moving forward, laying the foundation for future progress"--Publisher's web site
    Note: "RAND Project AIR FORCE , Includes bibliographical references (pages 233-286) , Series from web site
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 165
    ISBN: 9780833093950 , 0833093959
    Language: English
    Pages: 1 Online-Ressource (xiii, 56 pages)
    Series Statement: Rand Corporation research report series RR-1349-OSD
    Keywords: Military spouses Employment ; Military spouses ; United States ; LAW ; Labor & Employment ; Electronic books
    Abstract: "The frequent relocations associated with military service place distinct demands on service members and their families and can complicate military spouses' career trajectories. Recognizing this challenge, the White House published a directive in 2011 ordering the Department of Defense to expand the Army Spouse Employment Partnership, which had recruited 52 employer partners since its inception in 2003 to assist military spouses seeking employment, to serve Navy, Marine Corps, and Air Force spouses. The resulting Military Spouse Employment Partnership, launched on June 29, 2011, is one of four initiatives under the Department of Defense's Spouse Education and Career Opportunities program. In December 2014, the U.S. Congress mandated an evaluation of the Partnership and the Office of the Deputy Assistant Secretary of Defense for Military Community and Family Policy sponsored RAND to assess the extent to which the Partnership addresses its objectives. This report documents the first phase of research to help meet the congressional requirement for a 'report evaluating the progress of military spouse employment programs.' This research should be of interest to policymakers responsible for programs or oversight of programs supporting military spouse quality of life, as well as scholars who study military spouse issues and program evaluation"--Publisher's web site
    Abstract: "The frequent relocations associated with military service place distinct demands on service members and their families and can complicate military spouses' career trajectories. Recognizing this challenge, the White House published a directive in 2011 ordering the Department of Defense to expand the Army Spouse Employment Partnership, which had recruited 52 employer partners since its inception in 2003 to assist military spouses seeking employment, to serve Navy, Marine Corps, and Air Force spouses. The resulting Military Spouse Employment Partnership, launched on June 29, 2011, is one of four initiatives under the Department of Defense's Spouse Education and Career Opportunities program. In December 2014, the U.S. Congress mandated an evaluation of the Partnership and the Office of the Deputy Assistant Secretary of Defense for Military Community and Family Policy sponsored RAND to assess the extent to which the Partnership addresses its objectives. This report documents the first phase of research to help meet the congressional requirement for a 'report evaluating the progress of military spouse employment programs.' This research should be of interest to policymakers responsible for programs or oversight of programs supporting military spouse quality of life, as well as scholars who study military spouse issues and program evaluation"--Publisher's web site
    Note: "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 53-56) , Series from web site
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 166
    ISBN: 9780833089182 , 0833089188
    Language: English
    Pages: 1 Online-Ressource
    DDC: 353.6/4
    Keywords: Mental Health First Aid (Program) ; Mental Health First Aid (Program) ; Mental illness Diagnosis ; Mental health services ; Substance abuse Diagnosis ; First aid in illness and injury ; Substance abuse Treatment ; Mental illness Treatment ; Mental illness ; Mental health services ; Substance abuse ; First aid in illness and injury ; Substance abuse ; Mental illness ; Mental health services ; Mental illness ; Diagnosis ; Mental illness ; Treatment ; Substance abuse ; Diagnosis ; Substance abuse ; Treatment ; California ; First aid in illness and injury ; Electronic books
    Note: "RR-972-CMHSA"--Colophon , Caption title , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 167
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corporation
    ISBN: 9780833089335 , 0833089331
    Language: English
    Pages: 1 Online-Ressource
    DDC: 363.739/20951
    Keywords: Air quality management Government policy ; Air quality management Government policy ; Costs ; Air Pollution ; Government policy ; Air Pollution ; Government policy ; Costs ; Air quality management ; Air quality management ; Air ; Air ; Air quality management ; Government policy ; China ; Air ; Pollution ; Government policy ; Electronic books
    Abstract: "Air pollution has been one of the most pernicious consequences of China's last three decades of economic transformation and growth. This report estimates the costs of three measures to reduce air pollution in China: replacing coal with natural gas for residential and commercial heating, replacing half of China's coal-fired electric power generation with renewables or nuclear power, and scrapping highly polluting vehicles"--Publisher's description
    Abstract: "Air pollution has been one of the most pernicious consequences of China's last three decades of economic transformation and growth. This report estimates the costs of three measures to reduce air pollution in China: replacing coal with natural gas for residential and commercial heating, replacing half of China's coal-fired electric power generation with renewables or nuclear power, and scrapping highly polluting vehicles"--Publisher's description
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 168
    ISBN: 9780833091512 , 0833091549 , 0833091514 , 9780833091543
    Language: English
    Pages: 1 Online-Ressource (35 pages)
    Series Statement: Strategic rethink
    Series Statement: Research reports RR-1223-RC
    Keywords: Terrorism Prevention 21st century ; International cooperation ; Civil-military relations 21st century ; Security, International 21st century ; Strategic planning 21st century ; National security 21st century ; Terrorism ; Civil-military relations ; Security, International ; Strategic planning ; National security ; Security, International ; Strategic planning ; Terrorism ; Prevention ; International cooperation ; POLITICAL SCIENCE ; Terrorism ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Operational readiness ; United States ; Civil-military relations ; National security ; United States Armed Forces ; Operational readiness ; United States Foreign relations 21st century ; Decision making ; United States Armed Forces ; Appropriations and expenditures ; United States ; United States ; United States ; Electronic book
    Abstract: "This report is the second in RAND's ongoing Strategic Rethink series, in which RAND experts explore the elements of a national strategy for the conduct of U.S. foreign and security policy in this administration and the next. The report analyzes defense options available to the United States in responding to the re-emergence of a belligerent Russia, the seizure of significant territory in Iraq and Syria by violent extremists, growing Chinese military power and assertiveness, and other threats to U.S. security and interests. It focuses on ways that the United States might adapt military instruments to meet these emerging challenges, assessing in broad terms the cost of defense investments commensurate with the interests at stake. The report argues that currently projected levels of defense spending are insufficient to meet the demands of an ambitious national security strategy"--Publisher's description
    Description / Table of Contents: Preface -- Acknowledgments -- America's Security Deficiit -- Changing Demands on Defense -- Readiness -- Enhancing Allied Defenses -- Choices for Sizing the Defense Budget -- Abbreviations -- References -- Figures -- Tables.
    Note: Includes bibliographical references (pages 33-35)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 169
    ISBN: 9780833092151 , 0833092154
    Language: English
    Pages: 1 Online-Ressource (xxxii, 377 pages)
    Keywords: United States Evaluation ; United States ; Health services accessibility ; Veterans Medical care ; Health services accessibility ; Veterans ; United States ; MEDICAL ; Evidence-Based Medicine ; Evaluation ; Health services accessibility ; Veterans ; Medical care ; United States ; Electronic books
    Abstract: The Veterans Access, Choice, and Accountability Act of 2014 addressed the need for access to timely, high-quality health care for veterans. Section 201 of the legislation called for an independent assessment of various aspects of veterans' health care. The RAND Corporation was tasked with an assessment of the Department of Veterans Affairs (VA's) current and projected health care capabilities and resources. An examination of data from a variety of sources, along with a survey of VA medical facility leaders, revealed the breadth and depth of VA resources and capabilities: fiscal resources, workforce and human resources, physical infrastructure, interorganizational relationships, and information resources. The assessment identified barriers to the effective use of these resources and capabilities. Analysis of data on access to VA care and the quality of that care showed that almost all veterans live within 40 miles of a VA health facility, but fewer have access to VA specialty care. Veterans usually receive care within 14 days of their desired appointment date, but wait times vary considerably across VA facilities. VA has long played a national leadership role in measuring the quality of health care. The assessment showed that VA health care quality was as good or better on most measures compared with other health systems, but quality performance lagged at some VA facilities. VA will require more resources and capabilities to meet a projected increase in veterans' demand for VA care over the next five years. Options for increasing capacity include accelerated hiring, full nurse practice authority, and expanded use of telehealth
    Abstract: The Veterans Access, Choice, and Accountability Act of 2014 addressed the need for access to timely, high-quality health care for veterans. Section 201 of the legislation called for an independent assessment of various aspects of veterans' health care. The RAND Corporation was tasked with an assessment of the Department of Veterans Affairs (VA's) current and projected health care capabilities and resources. An examination of data from a variety of sources, along with a survey of VA medical facility leaders, revealed the breadth and depth of VA resources and capabilities: fiscal resources, workforce and human resources, physical infrastructure, interorganizational relationships, and information resources. The assessment identified barriers to the effective use of these resources and capabilities. Analysis of data on access to VA care and the quality of that care showed that almost all veterans live within 40 miles of a VA health facility, but fewer have access to VA specialty care. Veterans usually receive care within 14 days of their desired appointment date, but wait times vary considerably across VA facilities. VA has long played a national leadership role in measuring the quality of health care. The assessment showed that VA health care quality was as good or better on most measures compared with other health systems, but quality performance lagged at some VA facilities. VA will require more resources and capabilities to meet a projected increase in veterans' demand for VA care over the next five years. Options for increasing capacity include accelerated hiring, full nurse practice authority, and expanded use of telehealth
    Note: "Sponsored by the U.S. Department of Veterans Affairs , DOI: 10.7249/RR1165.2 , Includes bibliographical references (pages 347-377)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 170
    ISBN: 9780833086440 , 0833086448 , 9780833086457 , 0833086456 , 9780833086433 , 083308643X
    Language: English
    Pages: 1 Online-Ressource
    Parallel Title: Print version Ramchand, Rajeev Suicide postvention in the Department of Defense
    Keywords: United States Personnel management ; Research ; United States ; Soldiers Suicidal behavior ; Military research ; Suicide Prevention ; Government policy ; Suicide Prevention ; Research ; Psychology, Military ; Soldiers ; Military research ; Suicide ; Suicide ; Psychology, Military ; POLITICAL SCIENCE ; Public Policy ; Social Security ; POLITICAL SCIENCE ; Public Policy ; Social Services & Welfare ; Military research ; Personnel management ; Research ; Psychology, Military ; Soldiers ; Suicidal behavior ; Suicide ; Prevention ; Government policy ; United States ; United States ; United States Armed Forces ; Mental health services ; United States ; Electronic books
    Abstract: The U.S. Department of Defense (DoD) has been struggling with increasing rates of suicide among military personnel for the past decade. As DoD continues to implement new programs and examine its policies in an effort to prevent military personnel from taking their own lives, it is important to assess its current responses to suicide and to identify opportunities to enhance these programs and policies. Unfortunately, there is little scientific evidence on how best to respond to suicides, how to ensure that surveillance activities are managed appropriately and that loss survivors are given sufficient support to grieve, how additional suicides can be prevented, and how to honor and respect the decedent and his or her loved ones. At the same time, there are many resource guides intended to provide recommendations for organizations (mostly schools) in responding to suicides. A review of the existing scientific evidence on postvention (responses to prevent additional suicides in the aftermath of a suicide) and guidance for other types of organizations provides potential insights for DoD, however. Complemented by the perspectives of those most intimately touched by military suicide - the family and friends of those who have died - these sources may help DoD formulate its guidance in a practical and sensitive way
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 171
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833088079 , 0833088076 , 9780833088086 , 0833088092 , 0833088084 , 0833087932 , 9780833087935 , 9780833088093
    Language: English
    Pages: 1 Online-Ressource (xviii, 447 pages)
    Series Statement: Research report RR-676-AF
    Parallel Title: Print version Mueller, Karl P Precision and purpose
    Keywords: Air power History 21st century ; Air power ; HISTORY ; Africa ; North ; Air power ; Military campaigns ; Military operations, Aerial ; Civil War (Libya : 2011- ) ; Libya ; HISTORY ; Military ; Aviation ; History ; Libya History Civil War, 2011- ; Aerial operations ; Libya History Civil War, 2011- ; Campaigns ; Libya ; Libya ; Electronic book
    Abstract: Preface -- Figures and Tables -- Acknowledgments -- Abbreviations -- Chapter 1: Examining the Air Campaign in Libya / Karl P. Mueller -- Chapter 2: Strategic and Political Overview of the Intervention Christopher / S. Chivvis -- Chapter 3: The Libyan Experience / Frederic Wehrey -- Chapter 4: The U.S. Experience: National Strategy and Campaign Support / Robert C. Owen -- Chapter 5: The U.S. Experience: Operational / Deborah C. Kidwell -- Chapter 6: The British Experience: Operation Ellamy / Christina Goulter -- Chapter 7: The French Experience: Sarkozy's War? / Camille Grand -- Chapter 8: The Italian Experience: Pivotal and Underestimated / Gregory Alegi -- Chapter 9: The Canadian Experience: Operation Mobile / Richard O. Mayne -- Chapter 10: The Belgian, Danish, Dutch, and Norwegian Experiences / Christian F. Anrig -- Chapter 11: The Swedish Experience: Overcoming the Non-NATO-Member Conundrum / Robert Egnell -- Chapter 12: The Arab States' Experiences / Bruce R. Nardulli -- Chapter 13: Victory Through (Not By) Airpower / Karl P. Mueller -- Appendixes -- About the Authors -- Bibliography
    Abstract: Preface -- Figures and Tables -- Acknowledgments -- Abbreviations -- Chapter 1: Examining the Air Campaign in Libya / Karl P. Mueller -- Chapter 2: Strategic and Political Overview of the Intervention Christopher / S. Chivvis -- Chapter 3: The Libyan Experience / Frederic Wehrey -- Chapter 4: The U.S. Experience: National Strategy and Campaign Support / Robert C. Owen -- Chapter 5: The U.S. Experience: Operational / Deborah C. Kidwell -- Chapter 6: The British Experience: Operation Ellamy / Christina Goulter -- Chapter 7: The French Experience: Sarkozy's War? / Camille Grand -- Chapter 8: The Italian Experience: Pivotal and Underestimated / Gregory Alegi -- Chapter 9: The Canadian Experience: Operation Mobile / Richard O. Mayne -- Chapter 10: The Belgian, Danish, Dutch, and Norwegian Experiences / Christian F. Anrig -- Chapter 11: The Swedish Experience: Overcoming the Non-NATO-Member Conundrum / Robert Egnell -- Chapter 12: The Arab States' Experiences / Bruce R. Nardulli -- Chapter 13: Victory Through (Not By) Airpower / Karl P. Mueller -- Appendixes -- About the Authors -- Bibliography
    Note: "July 8, 2015"--Table of contents page , Includes bibliographical references (pages 411-447)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 172
    ISBN: 9780833088796 , 0833090240 , 0833088793 , 9780833090249
    Language: English
    Pages: 1 Online-Ressource (xvii, 83 pages)
    Parallel Title: Print version Silberglitt, R.S. (Richard S.) Visions of law enforcement technology in the period 2024-2034
    Keywords: Technological forecasting Congresses ; Law enforcement Congresses Technological innovations 21st century ; Technological forecasting ; Law enforcement ; Conference papers and proceedings ; COMPUTERS ; Data Modeling & Design ; Law enforcement ; Technological innovations ; Technological forecasting ; United States ; Electronic books
    Abstract: "This report describes the results of the Law Enforcement Futuring Workshop, which was held at RAND's Washington Office in Arlington, Virginia, from July 22 to 25, 2014. The objective of this workshop was to identify high-priority technology needs for law enforcement based on consideration of current and future trends in society, technology, and law enforcement over a ten- to 20-year time period. During the workshop, participants developed sets of future scenarios, constructed pathways from the present to alternative futures, and considered how law enforcement use of technology might affect these pathways. They then identified technology needs (including training and changes in policies or practice) that, if addressed, could enable pathways to desirable futures or prevent or mitigate the effects of pathways to undesirable futures. On the final days of the workshop, the technology needs were prioritized using a Delphi method. The output of this workshop described in the report included ten future scenarios and 30 technology needs. The technology needs fell into three general categories--technology-related knowledge and practice, information sharing and use, and technology research and development--and were placed into three priority tiers"--Back cover
    Abstract: "This report describes the results of the Law Enforcement Futuring Workshop, which was held at RAND's Washington Office in Arlington, Virginia, from July 22 to 25, 2014. The objective of this workshop was to identify high-priority technology needs for law enforcement based on consideration of current and future trends in society, technology, and law enforcement over a ten- to 20-year time period. During the workshop, participants developed sets of future scenarios, constructed pathways from the present to alternative futures, and considered how law enforcement use of technology might affect these pathways. They then identified technology needs (including training and changes in policies or practice) that, if addressed, could enable pathways to desirable futures or prevent or mitigate the effects of pathways to undesirable futures. On the final days of the workshop, the technology needs were prioritized using a Delphi method. The output of this workshop described in the report included ten future scenarios and 30 technology needs. The technology needs fell into three general categories--technology-related knowledge and practice, information sharing and use, and technology research and development--and were placed into three priority tiers"--Back cover
    Note: "Sponsored by the National Institute of Justice , "Results of a workshop held at the RAND Corporation's Washington Office in Arlington, Virginia, from July 22 to 25, 2014"--Page iii , "RR-908-NIJ."--Back cover , At head of title: Priority Criminal Justice Needs Initiative. A project of the RAND Corporation, the Police Executive Research Forum, RTI International, and the University of Denver , Includes bibliographical references (pages 77-83)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 173
    ISBN: 9780833091284 , 083309128X , 9780833090485 , 0833090488
    Language: English
    Pages: 1 Online-Ressource (xxxi, 233 pages)
    Series Statement: Research report RR-1075-DOS
    Parallel Title: Print versionGreenfield, Victoria A., 1964- Reducing the cultivation of opium poppies in southern Afghanistan
    DDC: 362.293
    Keywords: Opium poppy growers ; Rural development ; Opium trade ; Opium poppy growers ; Rural development ; Opium trade ; Opium trade ; Rural development ; Social Sciences ; Afghanistan ; Social Welfare & Social Work ; Substance Abuse ; Agriculture ; Opium poppy growers ; Afghanistan Agriculture ; Afghanistan ; Electronic books
    Abstract: "This report identifies a broad range of factors that drive opium poppy cultivation in southern Afghanistan, the locus of opium production in that country, and assesses the positive and negative effects of programs designed to promote rural development, eradicate opium poppies, or otherwise create incentives for farmers to reduce the cultivation of opium poppies. The authors consider the decision to cultivate opium poppy or other crops from the perspective of farmers who must balance concerns about household income and food sufficiency in the context of socio-economic and environmental factors that, for example, relate to security, eradication, and environmental risks; governance and religiosity; landholding terms and conditions; household circumstances; and agricultural input costs and commodity prices. A factor might encourage or discourage opium poppy cultivation and, in some instances, it could have indeterminate or conflicting effects. Then, the authors examine how rural development, crop eradication, and other programs touch on the factors --and affect poppy cultivation--through mechanisms that include subsidies on fertilizer, high-quality wheat seed, saplings and vines, and farm equipment and facilities; infrastructure investment; training; introduction of non-traditional crops; cash-for-work programs; improved market links; and non-agricultural rural income. On the basis of the assessment, the authors also provide advice on how to design programs that might better serve to reduce the cultivation of opium poppies in southern Afghanistan over the long term"--Abstract
    Abstract: "This report identifies a broad range of factors that drive opium poppy cultivation in southern Afghanistan, the locus of opium production in that country, and assesses the positive and negative effects of programs designed to promote rural development, eradicate opium poppies, or otherwise create incentives for farmers to reduce the cultivation of opium poppies. The authors consider the decision to cultivate opium poppy or other crops from the perspective of farmers who must balance concerns about household income and food sufficiency in the context of socio-economic and environmental factors that, for example, relate to security, eradication, and environmental risks; governance and religiosity; landholding terms and conditions; household circumstances; and agricultural input costs and commodity prices. A factor might encourage or discourage opium poppy cultivation and, in some instances, it could have indeterminate or conflicting effects. Then, the authors examine how rural development, crop eradication, and other programs touch on the factors --and affect poppy cultivation--through mechanisms that include subsidies on fertilizer, high-quality wheat seed, saplings and vines, and farm equipment and facilities; infrastructure investment; training; introduction of non-traditional crops; cash-for-work programs; improved market links; and non-agricultural rural income. On the basis of the assessment, the authors also provide advice on how to design programs that might better serve to reduce the cultivation of opium poppies in southern Afghanistan over the long term"--Abstract
    Note: "June 17, 2015"--Table of contents page , Includes bibliographical references (pages 221-233)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 174
    ISBN: 9780833093653 , 0833093657 , 9780833041920 , 0833041924
    Language: English
    Pages: 1 Online-Ressource (xli, 414 pages)
    Series Statement: RR 1214-A
    Parallel Title: Erscheint auch als Perry, Walter L Operation Iraqi Freedom
    DDC: 956.7044/3
    Keywords: Iraq War, 2003-2011 Evaluation ; Iraq War, 2003-2011 ; History & Archaeology ; Iraq War (2003-2011) ; Iraq ; Evaluation ; Middle East ; Regions & Countries - Asia & the Middle East ; Electronic book
    Abstract: Soon after Operation IRAQI FREEDOM (OIF) began in March 2003, RAND Arroyo Center began compiling an authoritative account of the planning and execution of combat and stability operations in Iraq through 2004 in order to identify key issues that could affect Army plans, operational concepts, doctrine, and other Title 10 functions. The resulting analysis, completed in January 2006, will interest those involved in organizing, training, and equipping military forces to plan for, deploy to, participate in, and support joint and multinational operations. Although focused primarily on Army forces and activities, the analysis also describes aspects of joint and multinational operations. RAND analysts collected the information in this report from many sources, including unit after-action reports, compilations of lessons learned, official databases, media reports, other contemporary records, and interviews with key participants in OIF. This report presents a broad overview of the study findings based on unclassified source material. It traces the operation from its root causes in the first Gulf War through operations up to approximately the end of June 2004. It addresses strategy, planning, and organization for OIF; air and ground force operations; personnel, deployment, and logistics issues; coalition operations; the occupation that followed combat operations; and civil military operations. Also, because the research conducted for this report covers events only through June 2004, events that occurred after that date would alter some of the conclusions and recommendations. In other cases, some recommendations might already have been implemented in whole or in part. Nevertheless, the report's recommendations are provided as they were originally formulated
    Note: Includes bibliographical references (pages 399-414) , Introduction ; Genesis of the War , Planning the War and the Transition to Peace , Land Operations , Air Operations , Why the Iraqi Resistance Was So Weak , Managing the War , The Aftermath: Civilian Planning Efforts and the Occupation of Iraq , Mobilization, Deployment, and Sustainment in Operation IRAQI FREEDOM , Conclusions and Recommendations.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 175
    ISBN: 9780833088383 , 0833091484 , 0833088386 , 9780833091482
    Language: English
    Pages: 1 Online-Ressource (xx, 160 pages)
    Series Statement: Research report
    Parallel Title: Print version Sims, Carra S Navigating the road to reintegration
    Keywords: United States ; United States ; Veteran reintegration ; Veterans Services for ; Disabled veterans Rehabilitation ; Veterans Medical care ; Disabled veterans Services for ; Veteran reintegration ; Veterans ; Disabled veterans ; Veterans ; Disabled veterans ; Veterans Health ; Military Personnel ; Community Integration ; Veterans psychology ; Military & Naval Science ; Law, Politics & Government ; Disabled veterans ; Services for ; Veteran reintegration ; Veterans ; Medical care ; Veterans ; Services for ; United States ; Military Administration ; HISTORY ; Military ; Aviation ; Disabled veterans ; Rehabilitation ; United States ; United States ; Electronic book
    Abstract: The U.S. Air Force, wanting to gain greater insight into the well-being of its members who have sustained mental or physical injuries in combat or combat-related situations, including their quality of life and the challenges they will confront in their reintegration following separation or retirement, asked the RAND Corporation for assistance in gauging the current status of the Air Force's wounded warriors, including their use of and satisfaction with Air Force programs designed to serve them. This report presents the baseline findings from a longitudinal analysis of enrollees in the Air Force Wounded Warrior (AFW2) program who were receiving benefits or undergoing evaluation to receive benefits, the majority of whom had a primary administrative diagnosis of post-traumatic stress disorder (PTSD). A high proportion of the Airmen in the sample screened positive for PTSD (roughly 78 percent) and major depressive disorder (MDD) (roughly 75 percent); 69 percent screened positive for both. Although more than 90 percent of those in the sample who screened positive for PTSD or MDD were receiving treatment, about half indicated that there was at least one instance during the past year in which they desired mental health treatment but did not receive it. Participants reported concerns about stigma, confidentiality, and the quality of available treatment as barriers to receiving mental health care, though the current data do not link these concerns to a particular treatment setting. About 10 percent of Airmen reported a financial situation that could be considered as living in poverty based on U.S. Department of Health and Human Services' poverty guidelines. Similarly, close to 15 percent of those in the labor force could be considered unemployed. Reserve and National Guard Airmen evidenced heightened challenges across examined domains. Respondents were overall satisfied with the services they received from the AFW2 and Air Force Recovery Care Coordinator programs
    Abstract: The U.S. Air Force, wanting to gain greater insight into the well-being of its members who have sustained mental or physical injuries in combat or combat-related situations, including their quality of life and the challenges they will confront in their reintegration following separation or retirement, asked the RAND Corporation for assistance in gauging the current status of the Air Force's wounded warriors, including their use of and satisfaction with Air Force programs designed to serve them. This report presents the baseline findings from a longitudinal analysis of enrollees in the Air Force Wounded Warrior (AFW2) program who were receiving benefits or undergoing evaluation to receive benefits, the majority of whom had a primary administrative diagnosis of post-traumatic stress disorder (PTSD). A high proportion of the Airmen in the sample screened positive for PTSD (roughly 78 percent) and major depressive disorder (MDD) (roughly 75 percent); 69 percent screened positive for both. Although more than 90 percent of those in the sample who screened positive for PTSD or MDD were receiving treatment, about half indicated that there was at least one instance during the past year in which they desired mental health treatment but did not receive it. Participants reported concerns about stigma, confidentiality, and the quality of available treatment as barriers to receiving mental health care, though the current data do not link these concerns to a particular treatment setting. About 10 percent of Airmen reported a financial situation that could be considered as living in poverty based on U.S. Department of Health and Human Services' poverty guidelines. Similarly, close to 15 percent of those in the labor force could be considered unemployed. Reserve and National Guard Airmen evidenced heightened challenges across examined domains. Respondents were overall satisfied with the services they received from the AFW2 and Air Force Recovery Care Coordinator programs
    Note: "Approved for public release; distribution unlimited , "Rand Project Air Force , "RR-599-AF"--Page 4 of cover , "Prepared for the United States Air Force , Includes bibliographical references (pages 139-160)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 176
    ISBN: 9780833093776 , 0833093770 , 9780833091437 , 0833091433
    Language: English
    Pages: 1 Online-Ressource
    DDC: 347.7367
    Keywords: Evidence, Expert ; Forensic sciences ; Evidence, Expert ; Forensic sciences ; Forensic sciences ; Evidence, Expert ; Electronic books
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 177
    ISBN: 9780833093783 , 0833093789
    Language: English
    Pages: 1 Online-Ressource (11 pages)
    Series Statement: Research report RR-1257-CMHSA
    DDC: 362.209794
    Keywords: Mental health services Evaluation ; Discrimination against the mentally ill ; Mental illness Public opinion ; Mental health services ; Discrimination against the mentally ill ; Mental illness ; Health Services Research ; Program Evaluation ; Mental Health Services ; Prejudice prevention & control ; Social Stigma ; Mental illness ; Public opinion ; Discrimination against the mentally ill ; California ; Mental health services ; Evaluation ; California ; Electronic books ; Review
    Abstract: "Describes the methods and results of a RAND evaluation of stigma and discrimination reduction efforts by Runyon Saltzman Einhorn, Inc., involving screenings of a documentary film called 'A New State of Mind: Ending the Stigma of Mental Illness' "--Publisher's description
    Description / Table of Contents: Key Findings -- Methods: Sampling Procedure and Survey Administration -- Measures -- Expected Short-Term Outcomes of RSE Documentary Screening Events -- Results: Sample Characteristics -- Analysis Strategy -- Short-Term Outcomes of RSE Documentary Screening Events -- RSE documentary screening event participation reduced perceptions of dangerousness, increased beliefs about recovery, and had no effect on beliefs about the contributions that people with mental illness can make to society -- RSE documentary screening events resulted in slight increases in awareness of stigma and intentions to reduce discrimination -- RSE documentary screening events resulted in a very small increase in the likelihood of seeking professional help if needed, a very small decrease in likelihood of delaying treatment, and a small decrease in the likelihood of concealing a mental health problem -- RSE documentary screening events were more effective at reducing stigma among participants who had never personally experienced a mental illness and who had never had family members with mental illness -- RSE documentary screening event effectiveness varied by participant race/ethnicity, but not by stakeholder role or gender -- Discussion -- Notes -- Appendix. RSE Documentary Screening Event Effectiveness Variation Among Participant Subgroups -- References -- About the Authors -- Acknowledgments.
    Note: "October 27, 2015"--Table of contents page , Includes bibliographical references (page 11)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 178
    ISBN: 9780833093349 , 0833093347
    Language: English
    Pages: 1 Online-Ressource (xxi, 115 pages)
    Series Statement: Rand Corporation research report series RR-963-WWP
    Keywords: Wounded Warrior Project Evaluation ; Wounded Warrior Project ; Disabled veterans Employment ; Disabled veterans Education ; Disabled veterans Health and hygiene ; Disabled veterans Mental health ; Disabled veterans ; Disabled veterans ; Disabled veterans ; Disabled veterans ; Evaluation ; United States ; SELF-HELP ; Substance Abuse & Addictions ; General ; Disabled veterans ; Employment ; Electronic books
    Abstract: "Wounded Warrior Project® (WWP) provides support and raises public awareness for service members and veterans who incurred physical or mental injury, illness, or wound coincident to their military service on or after September 11, 2001, as well as their families and caregivers. Through WWP, members (Alumni) have access to programs that support four main areas of recovery -- engagement, mind, body, and economic empowerment. Using 2014 WWP Annual Alumni Survey data, RAND researchers offer a detailed analysis of how Alumni of different genders, races and ethnicities, military service histories, and service-related health conditions fare in terms of mental health, physical health, and economic well-being. The report also offers recommendations for the organization's decisionmakers to consider in setting goals and creating programs to support WWP Alumni"--Publisher's web site
    Abstract: "Wounded Warrior Project® (WWP) provides support and raises public awareness for service members and veterans who incurred physical or mental injury, illness, or wound coincident to their military service on or after September 11, 2001, as well as their families and caregivers. Through WWP, members (Alumni) have access to programs that support four main areas of recovery -- engagement, mind, body, and economic empowerment. Using 2014 WWP Annual Alumni Survey data, RAND researchers offer a detailed analysis of how Alumni of different genders, races and ethnicities, military service histories, and service-related health conditions fare in terms of mental health, physical health, and economic well-being. The report also offers recommendations for the organization's decisionmakers to consider in setting goals and creating programs to support WWP Alumni"--Publisher's web site
    Note: "Prepared for the Wounded Warrior Project , "National Security Research Division , Includes bibliographical references (pages 111-115) , Series from web site
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 179
    ISBN: 9780833091833 , 083309369X , 0833091832 , 9780833093691
    Language: English
    Pages: 1 Online-Ressource (xvii, 83 pages)
    Series Statement: Rand Corporation research report series RR-1231-OSD
    Parallel Title: Print versionBaron, Joshua William National security implications of virtual currency
    Keywords: National security Economic aspects ; Electronic funds transfers Political aspects ; National security ; Electronic funds transfers ; COMPUTERS ; Internet ; General ; National security ; Economic aspects ; Banking ; Finance ; Business & Economics ; Electronic books
    Abstract: "This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that can be transferred, stored, or traded electronically and that is neither issued by a central bank or public authority, nor necessarily attached to a fiat currency (dollars, euros, etc.), but is accepted by people as a means of payment. We addressed the following research questions from both the technological and political-economic perspectives: (1) Why would a non-state actor deploy a VC? That is, what political and/or economic utility is there to gain? How might this non-state actor go about such a deployment? What challenges would it have to overcome? (2) How might a government or organization successfully technologically disrupt a VC deployment by a non-state actor, and what degree of cyber sophistication would be required? (3) What additional capabilities become possible when the technologies underlying the development and implementation of VCs are used for purposes broader than currency?"--Publisher's web site
    Description / Table of Contents: Preface -- Summary -- Acknowledgments -- Abbreviations -- Chapter One: Introduction: Approach -- Chapter Two: The Current State of Virtual Currencies: The Evolution to Virtual Currencies -- Origins and Trends of Virtual Currencies -- Early Systems -- Bitcoin -- Virtual Currencies After Bitcoin: Altcoins -- Authority (De)centralization and Implications for Virtual Currency Design -- Virtual Currencies and Non-State Actors -- Chapter Three: Can Virtual Currencies Increase Political Power?: Non-State Currencies Emerge When State Currencies Do Not Meet Groups' Needs -- Non-State Currencies Are Not Likely to Be VCs Now But Could Be VCs in the Future -- Chapter Four: Technical Challenges to Virtual Currency Deployment: Developing and Deploying a Virtual Currency: Developing Software for a Virtual Currency -- Physically Deploying a Virtual Currency -- Deployment Challenges for Decentralized Virtual Currencies -- Virtual Currencies, Adoption, and Value -- Ensuring Anonymity of Currency Use: Anonymity Versus Virtual Currency Centralization -- "Anonymity": A Bitcoin Case Study -- Some New Altcoins Build in Anonymous Transactions -- Cyber Threats to Virtual Currencies: Attacks Used by Tier I and Tier II Opponents -- Attacks Used by Tier III and Tier IV Opponents -- Attacks Used by Tier V and Tier VI Opponents -- The Possibility of Successful Defense -- Chapter Five: Implications Beyond Currency: Block-Chain Technology and Distributed Consensus -- Virtual Currencies Increase Cryptographic Sophistication -- Virtual Currencies and the Trend Toward Resilient, Decentralized Cyber Services -- Toward Resilient, Public Cyber Key Terrain -- Chapter Six: Conclusions and Future Research: For Future Research -- Appendix: Rating Cyber Threat Sophistication by Tiers -- References.
    Note: "National Defense Research Institute , Includes bibliographical references (pages 73-83) , Series from web site
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 180
    ISBN: 9780833092427 , 0833093215 , 0833092421 , 9780833093219
    Language: English
    Pages: 1 Online-Ressource (xi, 52 pages)
    Parallel Title: Erscheint auch als Balkovich, Edward Electronic surveillance of mobile devices
    Keywords: Electronics in criminal investigation ; Mobile communication systems ; Electronic surveillance Law and legislation ; Electronics in criminal investigation ; Mobile communication systems ; Electronic surveillance ; Law - U.S. - General ; Law - U.S ; Law, Politics & Government ; United States ; LAW ; Privacy ; Electronic surveillance ; Law and legislation ; Electronics in criminal investigation ; Mobile communication systems ; Electronic book
    Abstract: Mobile phones, the networks they connect to, the applications they use, and the services they access all collect and retain enormous amounts of information that can be useful in criminal investigations. However, state and local law enforcement face two substantial challenges when accessing these data: (1) maintaining awareness of the sources and nature of commercial data available to an investigator and (2) determining the legal rules for access to these data. This report explores these issues and describes the development of a prototype tool, the Mobile Information and Knowledge Ecosystem (MIKE), intended to help law enforcement, commercial entities, and policy analysts explore the mobile ecosystem and understand the laws regulating law enforcement's use of data contained within the mobile ecosystem. The tool might also serve as a mechanism for sharing best practices in electronic surveillance
    Abstract: Mobile phones, the networks they connect to, the applications they use, and the services they access all collect and retain enormous amounts of information that can be useful in criminal investigations. However, state and local law enforcement face two substantial challenges when accessing these data: (1) maintaining awareness of the sources and nature of commercial data available to an investigator and (2) determining the legal rules for access to these data. This report explores these issues and describes the development of a prototype tool, the Mobile Information and Knowledge Ecosystem (MIKE), intended to help law enforcement, commercial entities, and policy analysts explore the mobile ecosystem and understand the laws regulating law enforcement's use of data contained within the mobile ecosystem. The tool might also serve as a mechanism for sharing best practices in electronic surveillance
    Note: Includes bibliographical references (pages 49-52)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 181
    ISBN: 9780833091741 , 0833093509 , 0833091743 , 9780833093509
    Language: English
    Pages: 1 Online-Ressource (xix, 76 pages)
    Series Statement: Research report RR-1082-AF
    Keywords: Sex offenders Psychology ; Research ; Sex offenders ; HISTORY ; Military ; Aviation ; Criminology, Penology & Juvenile Delinquency ; Social Welfare & Social Work ; Social Sciences ; Electronic books
    Abstract: "Sexual assault continues to be a pervasive problem, both for society in general and within the military community. To assist the Air Force in its continued efforts to combat sexual assault within its ranks, we reviewed the existing empirical literature on the characteristics and behaviors of adult perpetrators who commit sexual assault against other adults. Our search was not limited to studies of military populations. While a vast majority of the existing literature has focused on sole male perpetrators who assault female victims, we identified some research on other types of perpetrators, including female sexual assault perpetrators, men who perpetrate assault against other men, and perpetrators who participate in group sexual assault. This body of research indicates that adult perpetrators are diverse in terms of their demographics, background characteristics, and motivations. Moreover, research indicates that sexual assault perpetration is likely influenced by a combination of factors, including an individual's developmental and family history; his or her personality, including attitudes/cognitions; and environmental factors, including peer attitudes and alcohol consumption. The complexity of factors that influence sexual assault perpetration and the multiple pathways that lead to an attack make it difficult to predict whether an individual is prone to commit sexual assault. While predicting sexual assault perpetration is problematic, we identified a number of factors related to perpetration that may be relevant for intervention efforts and offer recommendations for the Air Force"--Publisher's web site
    Abstract: "Sexual assault continues to be a pervasive problem, both for society in general and within the military community. To assist the Air Force in its continued efforts to combat sexual assault within its ranks, we reviewed the existing empirical literature on the characteristics and behaviors of adult perpetrators who commit sexual assault against other adults. Our search was not limited to studies of military populations. While a vast majority of the existing literature has focused on sole male perpetrators who assault female victims, we identified some research on other types of perpetrators, including female sexual assault perpetrators, men who perpetrate assault against other men, and perpetrators who participate in group sexual assault. This body of research indicates that adult perpetrators are diverse in terms of their demographics, background characteristics, and motivations. Moreover, research indicates that sexual assault perpetration is likely influenced by a combination of factors, including an individual's developmental and family history; his or her personality, including attitudes/cognitions; and environmental factors, including peer attitudes and alcohol consumption. The complexity of factors that influence sexual assault perpetration and the multiple pathways that lead to an attack make it difficult to predict whether an individual is prone to commit sexual assault. While predicting sexual assault perpetration is problematic, we identified a number of factors related to perpetration that may be relevant for intervention efforts and offer recommendations for the Air Force"--Publisher's web site
    Note: "RAND Project Air Force , Includes bibliographical references (pages 59-76)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 182
    ISBN: 9780833090669 , 0833093193 , 0833090666 , 9780833093196
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: [Research report] RR-720-EPA
    Parallel Title: Print version
    Keywords: National Water Program (U.S.) ; National Water Program (U.S.) ; Water quality Decision making ; Water quality management Decision making ; Water quality ; Water quality management ; Engineering & Applied Sciences ; United States ; HISTORY ; United States ; State & Local ; Midwest (IA, IL, IN, KS, MI, MN, MO, ND, NE, OH, SD, WI) ; Water quality management ; Decision making ; National Water Program (U.S.) ; Environmental Engineering ; Civil & Environmental Engineering ; Electronic book
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 183
    ISBN: 9780833090973 , 0833093258 , 0833090976 , 9780833093257
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: [Research report] RR-871-DHURDGP
    Parallel Title: Print version
    Keywords: Sustainable development ; Quality of life ; Sustainable development ; Quality of life ; Social conditions ; Sustainable development ; China ; Pearl River Delta ; Social Conditions ; Sociology & Social History ; TRANSPORTATION ; Automotive ; General ; Social Sciences ; Quality of life ; Economic history ; Pearl River Delta (China) Economic conditions 21st century ; Pearl River Delta (China) Social conditions 21st century ; Pearl River Delta (China) ; Pearl River Delta (China) ; Electronic book
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 184
    ISBN: 9780833091765 , 0833093983 , 083309176X , 9780833093981
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: [Research Report] RR-1239-CFAT
    Parallel Title: Print version
    DDC: 370.11
    Keywords: State universities and colleges ; Education, Higher ; Competency-based education ; State universities and colleges ; Education, Higher ; Competency-based education ; Texas ; Social Sciences ; Competency-based education ; Education ; Education, Higher ; State universities and colleges ; Education, Special Topics ; Electronic books
    Abstract: "This report aims to describe existing competency-based degrees and certificate prgorams in Texas; to summarize the national landscape for competency based programs, including the perceived benefits and limitations; and to suggest some potential areas for focus as the state of Texas and higher-education institutions explore the possibility of further expanding these programs"-- Preface
    Abstract: "This report aims to describe existing competency-based degrees and certificate prgorams in Texas; to summarize the national landscape for competency based programs, including the perceived benefits and limitations; and to suggest some potential areas for focus as the state of Texas and higher-education institutions explore the possibility of further expanding these programs"-- Preface
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 185
    ISBN: 9780833091499 , 0833093398 , 0833091492 , 9780833093394
    Language: English
    Pages: 1 Online-Ressource (xxxvii, 234 pages)
    Series Statement: Research report RR-1008-OSD
    Keywords: United States ; Armed Forces ; Personnel management ; BUSINESS & ECONOMICS ; Human Resources & Personnel Management ; Armed Forces ; Minorities ; Armed Forces ; Women ; United States Armed Forces ; Minorities ; United States Armed Forces ; Personnel management ; United States Armed Forces ; Women ; United States ; United States ; United States ; Electronic books
    Abstract: In January 2012, the Department of Defense (DoD) announced plans for a large-scale reduction, or drawdown, of its military force. The last drawdown to affect all four DoD services occurred in the 1990s, after the end of the Cold War. During that period, the military shrank by almost 37 percent, from about 2.17 million in FY 1987 to 1.37 million by FY 2000. Despite having a variety of goals and strategies for the 1990s and mid-2000s drawdowns, the services had few, if any, explicit diversity goals or strategies related to the drawdowns. Based on our discussions with force management experts, demographic diversity is also not part of their recent drawdown goals and strategies. However, the drawdown could have unintended consequences for demographic diversity even when diversity is not part of drawdown decisionmaking. To address the issue of unintended consequences of drawdowns on diversity, the Office of Diversity Management and Equal Opportunity (ODMEO) in the Office of the Under Secretary of Defense (Personnel and Readiness) asked RAND to analyze how force reductions could affect the demographic diversity of the DoD workforce. Our study focuses on gender and race/ethnicity, although we include other individual differences, such as education, in some analyses
    Abstract: In January 2012, the Department of Defense (DoD) announced plans for a large-scale reduction, or drawdown, of its military force. The last drawdown to affect all four DoD services occurred in the 1990s, after the end of the Cold War. During that period, the military shrank by almost 37 percent, from about 2.17 million in FY 1987 to 1.37 million by FY 2000. Despite having a variety of goals and strategies for the 1990s and mid-2000s drawdowns, the services had few, if any, explicit diversity goals or strategies related to the drawdowns. Based on our discussions with force management experts, demographic diversity is also not part of their recent drawdown goals and strategies. However, the drawdown could have unintended consequences for demographic diversity even when diversity is not part of drawdown decisionmaking. To address the issue of unintended consequences of drawdowns on diversity, the Office of Diversity Management and Equal Opportunity (ODMEO) in the Office of the Under Secretary of Defense (Personnel and Readiness) asked RAND to analyze how force reductions could affect the demographic diversity of the DoD workforce. Our study focuses on gender and race/ethnicity, although we include other individual differences, such as education, in some analyses
    Note: "October 26, 2015"--Table of contents page , Includes bibliographical references (pages 215-234)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 186
    ISBN: 9780833089007 , 083309338X , 0833089005 , 9780833093387
    Language: English
    Pages: 1 Online-Ressource (xi, 62 pages)
    Series Statement: Research reports RR-1007-AF
    Parallel Title: Erscheint auch als Snyder, Don, 1962- Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles
    Keywords: United States Rules and practice ; United States ; Computer networks Security measures ; Cyberspace Security measures ; Cyberinfrastructure Security measures ; Evaluation ; Risk assessment ; Cyberterrorism Prevention 21st century ; National security 21st century ; Computer networks ; Cyberspace ; Cyberinfrastructure ; Risk assessment ; Cyberterrorism ; National security ; HISTORY ; Military ; Aviation ; Computer networks ; Security measures ; Cyberterrorism ; Prevention ; National security ; Risk assessment ; Telecommunications ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; United States ; United States ; Rules ; Electronic books
    Abstract: "There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Summary -- Acknowledgments -- 1. Cybersecurity Management: Introduction -- What Should Cybersecurity in Acquisition Achieve? -- Managing Cybersecurity Risk -- Challenges for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Summary -- 2. Cybersecurity Laws and Policies -- Introduction -- Legislation and Federal Cybersecurity Policy -- Department of Defense Cybersecurity Policy -- Cybersecurity and Air Force Life-Cycle Management -- Conclusion -- 3. Findings and Recommendations: Findings -- Discussion -- Recommendations -- Closing Remarks -- Abbreviations -- References.
    Note: "October 27, 2015"--Table of contents page
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 187
    ISBN: 9780833090751 , 0833093150 , 0833090755 , 9780833093158
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Rand Project Air Force series on resiliency
    Series Statement: [Research report] RR-106-AF
    Parallel Title: Erscheint auch als
    DDC: 355.0019
    Keywords: United States Airmen ; Mental health ; United States Airmen ; Health and hygiene ; United States ; United States ; Families of military personnel Health and hygiene ; Stress (Psychology) ; Psychology, Military ; Resilience (Personality trait) ; Families of military personnel Mental health ; Families of military personnel ; Stress (Psychology) ; Psychology, Military ; Resilience (Personality trait) ; Families of military personnel ; Stress (Psychology) ; United States ; Psychology, Military ; United States ; Resilience (Personality trait) ; Electronic books
    Abstract: This final report in a series is designed to help the Air Force promote mental and physical resilience among its Airmen, civilian employees, and Air Force families and thus improve overall health and well-being. The report reviews the concepts and measures of resilience, resilience factors, hardiness and flourishing. It highlights the eight fitness domain companion reports and types of Air Force data that could be used to track resilience
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 188
    ISBN: 9780833089168 , 0833089161
    Language: English
    Pages: 1 Online-Ressource (9 pages)
    DDC: 362.1/0425
    Keywords: United States ; United States ; Health Care Reform legislation & jurisprudence ; Insurance, Health economics ; Health Insurance Exchanges legislation & jurisprudence ; Patient Protection and Affordable Care Act (United States) ; Electronic book
    Abstract: This report assesses expected changes in enrollment and premiums in the ACA-compliant individual market in FFM states if the Supreme Court eliminates subsidies in those states
    Note: Includes bibliographical references , Title from title screen (viewed on February 24, 2015) , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 189
    ISBN: 9780833089205 , 083308920X
    Language: English
    Pages: 1 Online-Ressource (xvii, 56 pages)
    Series Statement: Research reports RR-957-TSF
    DDC: 358.1754
    Keywords: Ballistic missile defenses ; Ballistic missile defenses ; Russia (Federation) ; United States ; Military policy ; Iran ; Ballistic missile defenses ; Diplomatic relations ; Russia Foreign relations ; United States Military policy ; United States Foreign relations ; United States Foreign relations ; Iran Foreign relations ; Russia ; United States ; United States ; United States ; Iran ; Electronic books
    Abstract: The United States developed the European Phased Adaptive Approach (EPAA) missile defense system to defend against a variety of current and future Iranian missile threats. Russia has expressed dissatisfaction with the system, protesting that it presented a significant threat to Russia's nuclear deterrent. U.S. officials have repeatedly stated that the EPAA does not pose a threat to Russia's missile forces, arguing that the system is designed for ballistic missile threats from outside the Euro-Atlantic area and can neither negate nor undermine Russia's strategic deterrent capabilities. Nevertheless, in 2013, the Obama administration canceled Phase 4 of the system. This report demonstrates that the restructured EPAA system is able to defend against a range of current and future Iranian missile threats and does not pose a threat to Russian intercontinental ballistic missiles. Canceling Phase 4 of the EPAA system has opened a window for the United States and Russia to come together on additional bilateral nuclear arms reduction measures and missile defense cooperation
    Abstract: The United States developed the European Phased Adaptive Approach (EPAA) missile defense system to defend against a variety of current and future Iranian missile threats. Russia has expressed dissatisfaction with the system, protesting that it presented a significant threat to Russia's nuclear deterrent. U.S. officials have repeatedly stated that the EPAA does not pose a threat to Russia's missile forces, arguing that the system is designed for ballistic missile threats from outside the Euro-Atlantic area and can neither negate nor undermine Russia's strategic deterrent capabilities. Nevertheless, in 2013, the Obama administration canceled Phase 4 of the system. This report demonstrates that the restructured EPAA system is able to defend against a range of current and future Iranian missile threats and does not pose a threat to Russian intercontinental ballistic missiles. Canceling Phase 4 of the EPAA system has opened a window for the United States and Russia to come together on additional bilateral nuclear arms reduction measures and missile defense cooperation
    Note: "Supported by the Stanton Foundation , Includes bibliographical references (pages 51-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 190
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corporation
    ISBN: 9780833088802 , 0833089293 , 0833088807 , 9780833089298
    Language: English
    Pages: 1 Online-Ressource (xx, 56 pages)
    Parallel Title: Print version Oak, Gillian S Building the Guatemalan interagency task force Tecún Umán
    Keywords: Military assistance, American ; Drug control ; Military assistance, American ; Drug control ; Military assistance, American ; Guatemala ; POLITICAL SCIENCE ; International Relations ; Treaties ; Drug control ; Electronic books
    Abstract: Guatemala is a major transit point for drugs bound for the United States and the recipient of U.S. counternarcotics aid and technical assistance, much of which is provided through U.S. Southern Command (USSOUTHCOM) and U.S. Army South. As a first step by Guatemala in putting this aid to work toward developing its own counternarcotics capacity, the president of Guatemala established the Interagency Task Force (IATF) Tecún Umán. USSOUTHCOM has expressed the intent to apply the IATF as a model to other similarly porous border regions in the area. Thus, documenting and using lessons from the IATF Tecún Umán will help in the development of new and similar units. This report is intended to support that lessons-learned function, demonstrate how these preliminary lessons are being applied to future IATF development, and provide recommendations on how to resolve remaining IATF challenges. Lessons learned include the importance of establishing the interagency legal framework early, clearly defining the interagency relationships, developing an intelligence capability organic to the task force, implementing police authority and leadership, identifying measures of success, communicating the IATF's purpose and success to the public, and maintaining equipment. Remaining tasks include resolving the duality-of-command issue, improving operational planning capability, addressing corruption problems, and addressing IATF Tecún Umán issues before refocusing efforts to IATF Chortí. The United States has played a key role in supporting Guatemala's efforts to overcome these challenges. By investing in the IATF and building capacity, the United States will contribute to the Guatemalans' ability to sustain the IATF themselves
    Abstract: Guatemala is a major transit point for drugs bound for the United States and the recipient of U.S. counternarcotics aid and technical assistance, much of which is provided through U.S. Southern Command (USSOUTHCOM) and U.S. Army South. As a first step by Guatemala in putting this aid to work toward developing its own counternarcotics capacity, the president of Guatemala established the Interagency Task Force (IATF) Tecún Umán. USSOUTHCOM has expressed the intent to apply the IATF as a model to other similarly porous border regions in the area. Thus, documenting and using lessons from the IATF Tecún Umán will help in the development of new and similar units. This report is intended to support that lessons-learned function, demonstrate how these preliminary lessons are being applied to future IATF development, and provide recommendations on how to resolve remaining IATF challenges. Lessons learned include the importance of establishing the interagency legal framework early, clearly defining the interagency relationships, developing an intelligence capability organic to the task force, implementing police authority and leadership, identifying measures of success, communicating the IATF's purpose and success to the public, and maintaining equipment. Remaining tasks include resolving the duality-of-command issue, improving operational planning capability, addressing corruption problems, and addressing IATF Tecún Umán issues before refocusing efforts to IATF Chortí. The United States has played a key role in supporting Guatemala's efforts to overcome these challenges. By investing in the IATF and building capacity, the United States will contribute to the Guatemalans' ability to sustain the IATF themselves
    Note: "RR-885-OSD"--Page 4 of cover , Includes bibliographical references (pages 55-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 191
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corporation
    ISBN: 9780833092199 , 0833093908 , 0833092197 , 9780833093905
    Language: English
    Pages: 1 Online-Ressource (xix, 57 pages)
    Series Statement: Rand Corporation research report series RR-1301-OSD
    Parallel Title: Erscheint auch als McNerney, Michael J. (Michael Joseph) Improving DoD support to FEMA's all-hazards plans
    Keywords: United States Rules and practice ; United States Rules and practice ; United States ; United States ; Interagency coordination ; Civil-military relations ; Emergency management ; Interagency coordination ; Civil-military relations ; Emergency management ; Armed Forces ; Civic action ; Civil-military relations ; Emergency management ; Interagency coordination ; Social Welfare & Social Work - General ; Social Welfare & Social Work ; Social Sciences ; United States ; United States ; United States ; Rules ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; United States Armed Forces ; Civic action ; United States ; Electronic book
    Abstract: "Disaster preparedness and response is a national priority, in which the U.S. Department of Defense (DoD) plays a supporting -- but potentially crucial -- role. In the ten years since Hurricane Katrina, the Federal Emergency Management Agency (FEMA) has taken steps to strengthen its ability to plan and coordinate the U.S. government's response to disasters, while the U.S. Department of Defense (DoD) has worked to improve its support to FEMA. This research reviews and analyzes how DoD and FEMA work together to plan and execute disaster response activities, and recommends areas for improvement. The study team (1) analyzed FEMA plans and DoD policies for Defense Support of Civil Authorities (DSCA); (2) analyzed how DoD provides DSCA support to FEMA, including key stakeholder perceptions, in order to identify potential capability gaps that DoD could fill; and (3) developed recommendations for how DoD can improve its support -- in terms of planning, coordination, and providing requested capabilities -- to FEMA"--Publisher's web site
    Abstract: "Disaster preparedness and response is a national priority, in which the U.S. Department of Defense (DoD) plays a supporting -- but potentially crucial -- role. In the ten years since Hurricane Katrina, the Federal Emergency Management Agency (FEMA) has taken steps to strengthen its ability to plan and coordinate the U.S. government's response to disasters, while the U.S. Department of Defense (DoD) has worked to improve its support to FEMA. This research reviews and analyzes how DoD and FEMA work together to plan and execute disaster response activities, and recommends areas for improvement. The study team (1) analyzed FEMA plans and DoD policies for Defense Support of Civil Authorities (DSCA); (2) analyzed how DoD provides DSCA support to FEMA, including key stakeholder perceptions, in order to identify potential capability gaps that DoD could fill; and (3) developed recommendations for how DoD can improve its support -- in terms of planning, coordination, and providing requested capabilities -- to FEMA"--Publisher's web site
    Note: "RAND National Defense Research Institute , Includes bibliographical references (pages 53-57) , Series from web site
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 192
    ISBN: 9780833091666 , 083309355X , 0833091662 , 9780833093554
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: RR 1116-TFA
    Parallel Title: Erscheint auch als
    Keywords: Teach for America (Project) Evaluation ; Teach for America (Project) ; Educational equalization ; School principals Statistics Attitudes ; Educational equalization ; School principals ; Educational equalization ; Statistics ; Evaluation ; Teach for America (Project) ; School principals ; Attitudes ; EDUCATION ; General ; United States ; Electronic books
    Abstract: The results of the 2015 National Principal Survey show the context in which Teach For America (TFA) corps members work, how principals perceive corps members, and how principals perceive their interactions with TFA. These findings can help TFA staff provide more-tailored supports to corps members, inform professional development, and continue to build relationships with the principals of schools in which corps members serve
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 193
    ISBN: 9780833090997 , 0833093142 , 0833090992 , 9780833093141
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: RAND Project Air Force Series on Resiliency
    Series Statement: Research report (Rand Corporation) RR-101-AF
    Parallel Title: Erscheint auch als
    Keywords: United States Civilian employees ; Health ; United States Airmen ; Health ; United States ; United States ; Resilience (Personality trait) ; Medicine, Military ; Resilience (Personality trait) ; Medicine, Military ; Health & Biological Sciences ; Military & Naval Medicine ; Medicine ; United States ; HISTORY ; Military ; Aviation ; Medicine, Military ; United States ; Resilience (Personality trait) ; Electronic book
    Abstract: Machine generated contents note: 1.Introduction: The Context of This Report -- 2.Environmental Stressors -- Temperature -- Noise -- Altitude -- Chemicals -- Hazardous Workplace Environments -- Summary -- 3.Key Resilience Factors: Prevention -- Safety Culture and Climate -- Safety Training and Education -- Financial Incentives for Injury Prevention -- Compliance with Safety and Health Standards: OSHA Enforcement -- Summary -- 4.Key Resilience Factors: Protection -- Personal Protective Equipment -- Respiratory-Protective Equipment -- Noise Reduction -- Acclimatization and Tolerance -- Temperature -- Altitude -- Ergonomics -- Summary -- 5.Interventions to Promote Environmental Fitness: The Role of Personal Protective Equipment -- 6.Conclusion.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 194
    ISBN: 9780833088659 , 0833089463 , 0833088653 , 9780833089465
    Language: English
    Pages: 1 Online-Ressource (xxi, 68 pages)
    Parallel Title: Print version Friedman, Esther M., 1976- Advancing the careers of military spouses
    Keywords: Military spouses Training of ; Military spouses Services for ; Military spouses Employment ; Military spouses Education (Continuing education) ; Military spouses ; Military spouses ; Military spouses ; Military spouses ; TECHNOLOGY & ENGINEERING ; Military Science ; Military Administration ; Military & Naval Science ; Law, Politics & Government ; United States ; HISTORY ; Military ; Other ; Electronic books
    Abstract: Since the move to an all-volunteer force, the U.S. military has increasingly provided an array of programs, services, and facilities to support military families, including programs to assist spouses in pursuing their educational and employment goals. These programs are particularly important, given that military spouses face challenges related to military life that can make it difficult for them to maintain and develop careers. One program designed to help spouses of junior military personnel meet their educational and employment objectives is the My Career Advancement Account (MyCAA) scholarship. This report analyzes data collected from November 2012 to March 2013 on the 2012 Active Duty Spouse Survey to examine MyCAA scholarship use in the previous year and educational and employment goals and barriers faced by recent MyCAA users and nonusers. The survey showed that nearly one in five eligible spouses used MyCAA in the previous year, and more than half of nonusers were unaware of the scholarship. Key reasons for not using the scholarship among those who were aware of it include perceived program ineligibility and lack of time for education. Reported barriers to achieving educational and employment goals were remarkably similar for recent MyCAA users and nonusers. Cost was the key reason spouses reported for not pursuing higher education. Barriers to both education and employment among interested spouses included competing family responsibilities and difficulties with child care. The authors conclude with recommendations for improving and complementing the existing MyCAA scholarship to help military spouses achieve their educational and career objectives
    Abstract: Since the move to an all-volunteer force, the U.S. military has increasingly provided an array of programs, services, and facilities to support military families, including programs to assist spouses in pursuing their educational and employment goals. These programs are particularly important, given that military spouses face challenges related to military life that can make it difficult for them to maintain and develop careers. One program designed to help spouses of junior military personnel meet their educational and employment objectives is the My Career Advancement Account (MyCAA) scholarship. This report analyzes data collected from November 2012 to March 2013 on the 2012 Active Duty Spouse Survey to examine MyCAA scholarship use in the previous year and educational and employment goals and barriers faced by recent MyCAA users and nonusers. The survey showed that nearly one in five eligible spouses used MyCAA in the previous year, and more than half of nonusers were unaware of the scholarship. Key reasons for not using the scholarship among those who were aware of it include perceived program ineligibility and lack of time for education. Reported barriers to achieving educational and employment goals were remarkably similar for recent MyCAA users and nonusers. Cost was the key reason spouses reported for not pursuing higher education. Barriers to both education and employment among interested spouses included competing family responsibilities and difficulties with child care. The authors conclude with recommendations for improving and complementing the existing MyCAA scholarship to help military spouses achieve their educational and career objectives
    Note: "RR-784-OSD , "Prepared for the Office of the Secretary of Defense , "National Defense Research Institute , Includes bibliographical references (pages 65-68)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 195
    ISBN: 9780833089229 , 0833089226
    Language: English
    Pages: 1 Online-Ressource
    DDC: 362.20973
    Keywords: Teachers Training of ; Child mental health services ; Mental health education ; Mental health policy ; Teachers ; Child mental health services ; Mental health education ; Mental health policy ; California ; Child mental health services ; Mental health education ; Mental health policy ; Teachers ; Training of ; Electronic book
    Note: Caption title , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 196
    ISBN: 9780833089151 , 0833089153
    Language: English
    Pages: 1 Online-Ressource
    DDC: 331.12/509768
    Keywords: Postsecondary education ; Labor supply ; Postsecondary education ; Labor supply ; Texas ; Postsecondary education ; Labor supply ; Electronic books
    Note: "Prepared for the Texas Higher Education Coordinating Board"--Page 1 of cover , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 197
    ISBN: 9780833088772 , 0833088777
    Language: English
    Pages: 1 Online-Ressource (xxii, 196 pages)
    Series Statement: Research report RR-864
    Parallel Title: Print version Caulkins, Jonathan P Considering Marijuana Legalization : Insights for Vermont and Other Jurisdictions
    Keywords: Drug legalization ; Marijuana Government policy ; Marijuana abuse ; Marijuana Government policy ; Marijuana abuse ; Drug legalization ; Marijuana Taxation ; Marijuana Taxation ; Drug legalization ; Marijuana ; Marijuana abuse ; Marijuana ; Marijuana abuse ; Drug legalization ; Marijuana ; Marijuana ; Cannabis ; Marijuana Abuse ; United States ; Vermont ; POLITICAL SCIENCE ; Public Policy ; Social Security ; POLITICAL SCIENCE ; Public Policy ; Social Services & Welfare ; Drug legalization ; Marijuana abuse ; Marijuana ; Government policy ; Marijuana ; Taxation ; United States ; Vermont ; Electronic books
    Abstract: Cover; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; A Brief Overview of Marijuana Policy; Report Overview; Chapter Two: The Marijuana Landscape in Vermont; Introduction; Marijuana Laws in Vermont; Marijuana Prevention and Treatment in Vermont; Indicators of Marijuana Use in Vermont; Estimating the Size of the Marijuana Market in Vermont in 2014; Criminal Justice Costs Associated with Marijuana Prohibition in Vermont; Concluding Thoughts; Chapter Three: Consequences of Marijuana Use; Introduction; Limitations of Existing Studies; Consequences of Marijuana Consumption on Health; Consequences of Marijuana Consumption on Other Outcomes; Consequences of Marijuana Prohibition; Substitution for or Complementarity with Other Substances; Concluding Thoughts; Chapter Four: Supply Architectures; Introduction; The Commonly Discussed Options; The Middle-Ground Options; The Extreme Options; Concluding Thoughts; Chapter Five: Taxation and Other Sources of Revenue; Introduction; Bases for Taxing Marijuana; Collection Point; Mechanisms for Changing the Tax Burden.; Fees and Auctions; Other Revenue Considerations; Concluding Thoughts; Chapter Six: Regulation; Introduction; A Regulatory Checklist; A Closer Examination of Eight Regulatory Decisions for Legal Marijuana; Concluding Thoughts; Chapter Seven: How Legalization in Vermont Could Influence Tax Revenue, Consumption, and Public Budgets; Introduction; Potential Revenue from Taxing Vermonters' Marijuana Consumption When the Only Competition Comes from the Black Market; Sales to Marijuana Tourists and Exports; Threats to Tax-Revenue Collection in the Longer Run; Cost of Regulation; Concluding Thoughts; Chapter Eight: Closing Remarks: Introduction; Uncertainty; Weighing Policy Options; Final Thoughts for Vermont; Appendixes; A. Evidence Concerning Substitution and Complementarity; B. Business Deductions and U.S. Code Title 26 Section 280E; References
    Abstract: Cover; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; A Brief Overview of Marijuana Policy; Report Overview; Chapter Two: The Marijuana Landscape in Vermont; Introduction; Marijuana Laws in Vermont; Marijuana Prevention and Treatment in Vermont; Indicators of Marijuana Use in Vermont; Estimating the Size of the Marijuana Market in Vermont in 2014; Criminal Justice Costs Associated with Marijuana Prohibition in Vermont; Concluding Thoughts; Chapter Three: Consequences of Marijuana Use; Introduction; Limitations of Existing Studies; Consequences of Marijuana Consumption on Health; Consequences of Marijuana Consumption on Other Outcomes; Consequences of Marijuana Prohibition; Substitution for or Complementarity with Other Substances; Concluding Thoughts; Chapter Four: Supply Architectures; Introduction; The Commonly Discussed Options; The Middle-Ground Options; The Extreme Options; Concluding Thoughts; Chapter Five: Taxation and Other Sources of Revenue; Introduction; Bases for Taxing Marijuana; Collection Point; Mechanisms for Changing the Tax Burden.; Fees and Auctions; Other Revenue Considerations; Concluding Thoughts; Chapter Six: Regulation; Introduction; A Regulatory Checklist; A Closer Examination of Eight Regulatory Decisions for Legal Marijuana; Concluding Thoughts; Chapter Seven: How Legalization in Vermont Could Influence Tax Revenue, Consumption, and Public Budgets; Introduction; Potential Revenue from Taxing Vermonters' Marijuana Consumption When the Only Competition Comes from the Black Market; Sales to Marijuana Tourists and Exports; Threats to Tax-Revenue Collection in the Longer Run; Cost of Regulation; Concluding Thoughts; Chapter Eight: Closing Remarks: Introduction; Uncertainty; Weighing Policy Options; Final Thoughts for Vermont; Appendixes; A. Evidence Concerning Substitution and Complementarity; B. Business Deductions and U.S. Code Title 26 Section 280E; References
    Abstract: "Marijuana legalization is a controversial and multifaceted issue that is now the subject of serious debate. Since 2012, four U.S. states have passed ballot initiatives to remove prohibition and legalize a for-profit commercial marijuana industry. Voters in Washington, D.C., took the more limited step of passing an initiative to legalize home production and personal possession. In December 2013, Uruguay became the first country to experiment with legalization nationwide. In May 2014, Vermont Governor Peter Shumlin signed a bill into law that required the Secretary of Administration to provide a report about the consequences of legalizing marijuana. This report was produced for the Secretary of Administration in response to that legislation. The report does not make a recommendation about whether Vermont should change its marijuana laws. The goal is to inform, not sway, discussions about the future of marijuana policy in Vermont and other jurisdictions considering alternatives to traditional marijuana prohibition. The principal message of the report is that marijuana policy should not be viewed as a binary choice between prohibition and the for-profit commercial model we see in Colorado and Washington. Legalization encompasses a wide range of possible regimes, distinguished along at least four dimensions: the kinds of organizations that are allowed to provide the drug, the regulations under which those organizations operate, the nature of the products that can be distributed, and price. These choices could have profound consequences for health and social well-being, as well as job creation and government revenue"--Publisher's description
    Note: Includes bibliographical references (pages 167-196)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 198
    ISBN: 9780833091321 , 0833091328
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Research report
    DDC: 372.2109751
    Keywords: Delaware Stars for Early Success (Program) ; Delaware Stars for Early Success (Program) ; Early childhood education Standards ; Early childhood education Evaluation ; Early childhood education ; Early childhood education ; Delaware ; Early childhood education ; Evaluation ; Early childhood education ; Standards ; Electronic books
    Note: "Sponsored by the Delaware Office of Early Learning , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 199
    ISBN: 9780833091260 , 0833091263
    Language: English
    Pages: 1 Online-Ressource
    DDC: 616.858445
    Keywords: California Mental Health Services Authority ; California Mental Health Services Authority ; Suicide Prevention ; Suicide ; Suicide ; Prevention ; California ; Electronic book
    Abstract: Estimates the possible reductions in suicide attempts resulting from investment in ASIST and estimates the financial return to Californians from reduced medical costs associated with suicide attempts and increased earnings from each life saved
    Note: "RR-1115-CMHSA"--colophon , Caption title , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 200
    ISBN: 9780833089090 , 0833093355 , 0833089099 , 9780833093356
    Language: English
    Pages: 1 Online-Ressource (xxiii, 99 pages)
    Series Statement: Research report RR-974-AF
    Parallel Title: Erscheint auch als Morgan, Forrest E Confronting Emergent Nuclear-Armed Regional Adversaries
    Keywords: Deterrence (Strategy) ; Conflict management 21st century ; Security, International 21st century ; Military planning 21st century ; Nuclear weapons Government policy 21st century ; Escalation (Military science) ; Nuclear arms control Government policy 21st century ; Deterrence (Strategy) ; Conflict management ; Security, International ; Military planning ; Nuclear weapons ; Escalation (Military science) ; Nuclear arms control ; Deterrence (Strategy) ; Escalation (Military science) ; Military planning ; Military policy ; Nuclear arms control ; Government policy ; Nuclear weapons ; Government policy ; Security, International ; Military Science - General ; Military & Naval Science ; Law, Politics & Government ; HISTORY ; Military ; Aviation ; United States ; Conflict management ; United States Military policy 21st century ; United States ; Electronic book
    Abstract: "Risks are increasing that the United States will find itself in confrontations with nuclear-armed regional adversaries--that is, hostile states with small nuclear arsenals. This research seeks to help the U.S. Air Force understand and prepare for such confrontations. The authors explore circumstances in which the United States might be able to neutralize a regional opponent's nuclear capabilities, and describe how and in what circumstances the United States can manage escalation while defeating nuclear-armed opponents in conventional conflict. The analysis finds that there is probably no case in which U.S. forces could neutralize an opponent's nuclear capabilities with a high enough probability of success that U.S. leaders would let them attempt it. However, U.S. forces should be able to manage escalation in some conventional conflicts, as long as the United States does not threaten the survival of the enemy regime or its nuclear deterrent forces. U.S. leaders must deter the adversary from escalating above critical U.S. thresholds and manage U.S. forces to avoid inadvertent and accidental escalation. The authors recommend that the Air Force continue research and development on methods and capabilities to find, fix, track, target, and assess enemy nuclear weapons capabilities; continue research and development on ballistic and cruise missile defenses; and conduct research on how to rebalance the force to better enable posturing airpower to conduct conventional strike operations from afar, in order to defeat a nuclear-armed regional adversary's conventional forces while operating from bases beyond the range of its conventional and nuclear strike capabilities"--Publisher's description
    Description / Table of Contents: In Memoriam -- Preface -- Figures and Table -- Summary -- Acknowledgments -- 1. An Emerging National Security Challenge: Introduction -- Purpose of This Research -- Research Methodology -- How This Report Is Organized -- 2. Bringing the Challenge into Focus: The Blurred Nuclear Threshold -- Third-Party Considerations -- These Factors Increase Risks of Conflict Escalation -- Dilemmas for U.S. Decisionmakers -- 3. Assessing the Neutralization Options: The Adversary's Range of Options -- Potential Ways to Neutralize an Adversary's Nuclear Capabilities -- Concluding Observations 4. Managing Escalation in Crisis and War -- The Principles of Threshold Management -- Managing Escalation in Three Geostrategic Challenges -- Looking at the Larger Picture -- 5. Meeting the Challenge -- The Regional Nuclear Paradox -- Crafting Strategies for Escalation Management -- Putting These Observations in Today's Geostrategic Context -- Recommendations for the U.S. Air Force -- Appendix A. The Second Nuclear Age -- Appendix B. The Inadequacy of Cold War Concepts -- Abbreviations -- References.
    Note: "October 27, 2015"--Table of contents page , Includes bibliographical references (pages 89-99)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...