Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company.  (31)
  • [Erscheinungsort nicht ermittelbar] : IBM Redbooks  (31)
  • Electronic books  (31)
  • BUSINESS & ECONOMICS ; General
  • Ordinateurs
  • Zeitschriften zur Ethnologie
Datasource
Material
Language
Keywords
  • Electronic books  (31)
  • BUSINESS & ECONOMICS ; General
  • Ordinateurs
  • Zeitschriften zur Ethnologie
  • Electronic books ; local  (450)
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460345
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The document describes the configuration and end-to-end architecture for configuring the logical air-gap solution for cyber resiliency using IBM® Spectrum Virtualize for Public Cloud (SV4PC) on Azure, IBM Spectrum® Virtualize Safeguarded Copy, and IBM FlashSystem®. This blueprint guide provides the following information: • A solutions architecture and related solution configuration workflows, with the following essential software and hardware components: – IBM FlashSystem – IBM Spectrum Virtualize for Public Cloud on Azure – IBM Copy Services Manager • Detailed technical configuration steps for building the cyber resiliency solutions This technical report does not provide performance analysis from a user perspective or replace any official IBM manuals or documents. This technical paper assumes that the reader is familiar with the following areas: • Basic kowledge of IBM FlashSystem • Azure Cloud fundamentals • Hybrid Cloud network connectivity • IBM Copy Services Manager
    Note: Online resource; Title from title page (viewed January 31, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780738460277
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: With Remote Direct Memory Access (RDMA), you can make a subset of a host's memory directly available to a remote host. RDMA is available on standard Ethernet-based networks by using the RDMA over Converged Ethernet (RoCE) interface. The RoCE network protocol is an industry-standard initiative by the InfiniBand Trade Association. This IBM® Redpaper publication describes how to set up RoCE to use within an IBM Spectrum® Scale cluster and IBM Elastic Storage® Systems (ESSs). This book is targeted at technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) who are responsible for delivering cost-effective storage solutions with IBM Spectrum Scale and IBM ESSs.
    Note: Online resource; Title from title page (viewed February 7, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780738460031
    Language: English
    Pages: 1 online resource (268 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes—security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers.
    Note: Online resource; Title from title page (viewed January 4, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780738460314
    Language: English
    Pages: 1 online resource (638 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem® products that are powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed February 2, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780738460291
    Language: English
    Pages: 1 online resource (640 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM SAN Volume Controller powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed January 17, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780738460215
    Language: English
    Pages: 1 online resource (452 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The next-generation IBM® c-type Directors and switches for IBM Storage Networking provides high-speed Fibre Channel (FC) and IBM Fibre Connection (IBM FICON®) connectivity from the IBM Z® platform to the storage area network (SAN) core. It enables enterprises to rapidly deploy high-density virtualized servers with the dual benefit of higher bandwidth and consolidation. This IBM Redpaper Redbooks publication helps administrators understand how to implement or migrate to an IBM c-type SAN environment. It provides an overview of the key hardware and software products, and it explains how to install, configure, monitor, tune, and troubleshoot your SAN environment.
    Note: Online resource; Title from title page (viewed January 11, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780738460253
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper® publication describes best practices for deploying and using advanced Broadcom Fabric Operating System (FOS) features to identify, monitor, and protect Fibre Channel (FC) SANs from problematic devices and media behavior. Note that this paper primarily focuses on the FOS command options and features that are available since version 8.2 with some coverage of new features that were introduced in 9.0. This paper covers the following recent changes: SANnav Fabric Performance Impact Notification
    Note: Online resource; Title from title page (viewed January 5, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780738460017
    Language: English
    Pages: 1 online resource (68 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration.
    Note: Online resource; Title from title page (viewed September 13, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780738460048
    Language: English
    Pages: 1 online resource (198 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication is a guide to IBM Power Systems Private Cloud with Shared Utility Capacity featuring Power Enterprise Pools (PEP) 2.0. This technology enables multiple servers in an to share base processor and memory resources and draw on pre-paid credits when the base is exceeded. Previously, the Shared Utility Capacity feature supported IBM Power E950 (9040-MR9) and IBM Power E980 (9080-M9S). The feature was extended in August 2020 to include the scale-out IBM Power servers that were announced on 14 July 2020, and it received dedicated processor support later in the year. The IBM Power S922 (9009-22G), and IBM Power S924 (9009-42G) servers, which use the latest IBM POWER9™ processor-based technology and support the IBM AIX®, IBM i, and Linux operating systems (OSs), are now supported. The previous scale-out models of Power S922 (9009-22A), and Power S924 (9009-42A) servers cannot be added to an enterprise pool. With the availability of the IBM Power E1080 (9080-HEX) in September 2021, support for this system as part of a Shared Utility Pool has become available. The goal of this book is to provide an overview of the solution's environment and guidance for planning a deployment of it. The book also covers how to configure IBM Power Systems Private Cloud with Shared Utility Capacity. There are also chapters about migrating from PEP 1.0 to PEP 2.0 and various use cases. This publication is for professionals who want to acquire a better understanding of IBM Power Systems Private Cloud, and Shared Utility Capacity. The intended audience includes: Clients Sales and marketing professionals Technical support professionals IBM Business Partners This book expands the set of IBM Power documentation by providing a desktop reference that offers a detailed technical description of IBM Power Systems Private Cloud with Shared Utility Capacity.
    Note: Online resource; Title from title page (viewed September 29, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459998
    Language: English
    Pages: 1 online resource (34 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® Storage as a Service (STaaS) extends your hybrid cloud experience with a new flexible consumption model enabled for both your on-premises and hybrid cloud infrastructure needs, giving you the agility, cash flow efficiency, and services of cloud storage with the flexibility to dynamically scale up or down and only pay for what you use beyond the minimal capacity. This IBM Redpaper provides a detailed introduction to the IBM STaaS service. The paper is targeted for data center managers and storage administrators.
    Note: Online resource; Title from title page (viewed October 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780738460222
    Language: English
    Pages: 1 online resource (252 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
    Note: Online resource; Title from title page (viewed December 10, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780738460093
    Language: English
    Pages: 1 online resource (106 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper® publication describes configuration guidelines and best practices when IBM Spectrum® Scale Container Native Storage Access is used as a storage provider for IBM Cloud® Pak for Data on Red Hat OpenShift Container Platform. It also provides the steps to install IBM Db2® and several assemblies within IBM Cloud Pak® for Data, including Watson Knowledge Catalog, Watson Studio, IBM DataStage®, Db2 Warehouse, Watson Machine Learning, Watson OpenScale, Data Virtualization, Data Management Console, and Apache Spark. This IBM Redpaper publication was written for IT architects, IT specialists, developers, and others who are interested in installing IBM Cloud Pak for Data with IBM Spectrum Scale Container Native.
    Note: Online resource; Title from title page (viewed December 17, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780738459707
    Language: English
    Pages: 1 online resource (592 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem products. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage® Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller (SVC), and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed May 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780738459837
    Language: English
    Pages: 1 online resource (88 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Artificial intelligence (AI) enables computers and machines to mimic the perception, learning, problem-solving, and decision-making capabilities of the human mind. AI development is made possible by the availability of large amounts of data and the corresponding development and wide availability of computer systems that can process all that data faster and more accurately than humans can. What happens if you infuse AI with a world-class database management system, such as IBM Db2®? IBM® has done just that with Db2 AI for z/OS (Db2ZAI). Db2ZAI is built to infuse AI and data science to assist businesses in the use of AI to develop applications more easily. With Db2ZAI, the following benefits are realized: Data science functionality Better built applications Improved database performance (and DBA's time and efforts are saved) through simplification and automation of error reporting and routine tasks Machine learning (ML) optimizer to improve query access paths and reduce the need for manual tuning and query optimization Integrated data access that makes data available from various vendors including private cloud providers. This IBM Redpaper® publication helps to simplify your installation by tailoring and configuration of Db2 AI for z/OS®. It was written for system programmers, system administrators, and database administrators.
    Note: Online resource; Title from title page (viewed July 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459851
    Language: English
    Pages: 1 online resource (129 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery, replication, retention management, and reuse for virtual machines, databases, and application backups in hybrid multicloud environments. This IBM Redpaper publication focuses on protecting database applications. IBM Spectrum® Protect Plus supports backup, restore, and data reuse for multiple databases, such as Oracle, IBM Db2®, MongoDB, Microsoft Exchange, and Microsoft SQL Server. Although other IBM Spectrum Protect Plus features focus on virtual environments, the database and application support of IBM Spectrum Protect Plus includes databases on virtual physical servers.
    Note: Online resource; Title from title page (viewed July 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459875
    Language: English
    Pages: 1 online resource (52 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The focus of this document is to demonstrate an early threat detection by using IBM® QRadar® and the Safeguarded Copy feature that is available as part of IBM FlashSystem® and IBM SAN Volume Controller. Such early detection protects and quickly recovers the data if a cyberattack occurs. This document describes integrating IBM FlashSystem audit logs with IBM QRadar, and the configuration steps for IBM FlashSystem and IBM QRadar. It also explains how to use the IBM QRadar's device support module (DSM) editor to normalize events and assign IBM QRadar identifier (QID) map to the events. Post IBM QRadar configuration, we review configuring Safeguarded Copy on the application volumes by using volume groups and applying Safeguarded backup polices on the volume group. Finally, we demonstrate the use of orchestration software IBM Copy Services Manager to start a recovery, restore operations for data restoration on online volumes, and start a backup of data volumes.
    Note: Online resource; Title from title page (viewed August 17, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780738460024
    Language: English
    Pages: 1 online resource (20 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper chapterexplains how to take a backup of your data by using either of two methods, and it explains how to recover your data if there is a disaster. This paper addresses topics for IT architects, IT specialists, developers, sellers, and anyone looking to implement and manage backups in the cloud. Moreover, this publication provides documentation to transfer the how-to-skills to the technical teams and solution guidance to the sales team. This book complements the documentation that is available at IBM Documentation and aligns with the educational materials that are provided by IBM Garage™ for Systems Technical Education.
    Note: Online resource; Title from title page (viewed September 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460062
    Language: English
    Pages: 1 online resource (262 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication is Volume 2 of a five-volume series of books entitled The Virtualization Cookbook for IBM Z®. This volume includes the following chapters: Chapter 1, "Installing Red Hat Enterprise Linux on LNXADMIN" on page 3, describes how to install and configure Red Hat Enterprise Linux onto the Linux Administration server, which performs the cloning and other tasks. Chapter 2, "Automated Red Hat Enterprise Linux installations by using Kickstart" on page 37, describes how to use Red Hat's kickstart tool to create Linux systems. This tool is fundamentally different from cloning in that an automated installation is implemented. You can try kickstart and cloning. Understand that these applications attempt to accomplish the same goal of quickly getting Linux systems up and running, and that you do not need to use both. Chapter 3, "Working with subscription-manager, yum, and DaNdiFied" on page 47, describes how the Red Hat Network works. It provides centralized management and provisioning for multiple Red Hat Enterprise Linux systems. Kickstart is an easy and fast way to provision your Linux guests in any supported Linux platform. It re-creates the operating system from the beginning by using the kickstart profile configuration file that installs the new operating system unattended. It also sets up the new guest according to the definition that was set up in the kickstart file. Usually, Linux is administered by the same team that manages Linux on all platforms. By using kickstart, you can create a basic profile that can be used in all supported platforms and customize Linux profiles, as needed. Cloning requires a better understanding of the z/VM environment and z/VM skills. It is a fast process if you enable the IBM FlashCopy® feature in advance. It clones the disks from a golden image to new disks that are used by the new Linux guest. The process can be automated by using the cloning scripts that are supplied with this book. It is recommended that you start with The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2, SG24-8147 of this series because the IBM® z/VM hypervisor is the foundation (or base "layer") for installing Linux on IBM Z.
    Note: Online resource; Title from title page (viewed October 19, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780738459592
    Language: English
    Pages: 1 online resource (572 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This IBM® Redbooks® publication describes several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM SAN Volume Controller powered by IBM Spectrum® Virtualize V8.4. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools, and managed disks, volumes, Remote Copy services, and hosts. Then, it provides performance guidelines for IBM SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting IBM SAN Volume Controller. This book is intended for experienced storage, SAN, and IBM SAN Volume Controller administrators and technicians. Understanding this book requires advanced knowledge of the IBM SAN Volume Controller, IBM FlashSystem, and SAN environments.
    Note: Online resource; Title from title page (viewed April 16, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780738460079
    Language: English
    Pages: 1 online resource (66 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM Redpaper publication describes best practices for deploying and using advanced Cisco NX-OS features to identify, monitor, and protect Fibre Channel (FC) Storage Area Networks (SANs) from problematic devices and media behavior. The paper focuses on the IBM c-type SAN switches with firmware Cisco MDS NX-OS Release 8.4(2a).
    Note: Online resource; Title from title page (viewed October 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780738460086
    Language: English
    Pages: 1 online resource (144 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® Z has a close and unique relationship to its storage. Over the years, improvements to the Z processors and storage software, the disk storage systems, and their communication architecture consistently reinforced this synergy. This IBM Redpaper publication summarizes and highlights the various aspects, advanced functions, and technologies that are often pioneered by IBM, and that make the IBM Z® and the IBM DS8000 products an ideal combination. This paper is intended for users who have some familiarity with IBM Z and the IBM DS8000® series and want a condensed but comprehensive overview of the synergy items up to the IBM z15™ server with z/OS v2.5 and the IBM DS8900 Release 9.2 firmware.
    Note: Online resource; Title from title page (viewed October 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780738460055
    Language: English
    Pages: 1 online resource (156 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper® publication provides a broad understanding of a new architecture of the IBM Power® E1080 (also known as the Power E1080) server that supports IBM AIX®, IBM i, and selected distributions of Linux operating systems. The objective of this paper is to introduce the Power E1080, the most powerful and scalable server of the IBM Power portfolio, and its offerings and relevant functions: Designed to support up to four system nodes and up to 240 IBM Power10™ processor cores The Power E1080 can be initially ordered with a single system node or two system nodes configuration, which provides up to 60 Power10 processor cores with a single node configuration or up to 120 Power10 processor cores with a two system nodes configuration. More support for a three or four system nodes configuration is to be added on December 10, 2021, which provides support for up to 240 Power10 processor cores with a full combined four system nodes server. Designed to supports up to 64 TB memory The Power E1080 can be initially ordered with the total memory RAM capacity up to 8 TB. More support is to be added on December 10, 2021 to support up to 64 TB in a full combined four system nodes server. Designed to support up to 32 Peripheral Component Interconnect® (PCIe) Gen 5 slots in a full combined four system nodes server and up to 192 PCIe Gen 3 slots with expansion I/O drawers The Power E1080 supports initially a maximum of two system nodes; therefore, up to 16 PCIe Gen 5 slots, and up to 96 PCIe Gen 3 slots with expansion I/O drawer. More support is to be added on December 10, 2021, to support up to 192 PCIe Gen 3 slots with expansion I/O drawers. Up to over 4,000 directly attached serial-attached SCSI (SAS) disks or solid-state drives (SSDs) Up to 1,000 virtual machines (VMs) with logical partitions (LPARs) per system System control unit, providing redundant system master Flexible Service Processor (FSP) Supports IBM Power System Private Cloud Solution with Dynamic Capacity This publication is for professionals who want to acquire a better understanding of Power servers. The intended audience includes the following roles: Customers Sales and marketing professionals Technical support professionals IBM Business Partners Independent software vendors (ISVs) This paper does not replace the current marketing materials and configuration tools. It is intended as an extra source of information that, together with existing sources, can be used to enhance your knowled...
    Note: Online resource; Title from title page (viewed October 21, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780738460154
    Language: English
    Pages: 1 online resource (171 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Object storage is the primary storage solution that is used in the cloud and on-premises solutions as a central storage platform for unstructured data. IBM® Cloud Object Storage (COS) is a software-defined storage platform that breaks down barriers for storing massive amounts of data by optimizing the placement of data on commodity x86 servers across the enterprise. This IBM Redbooks® publication describes the major features, use case scenarios, deployment options, configuration details, initial customization, performance, and scalability considerations of IBM Cloud® Object Storage on-premises offering. For more information about the IBM Cloud Object Storage architecture and technology that is behind the product, see IBM Cloud Object Storage Concepts and Architecture: System Edition, REDP-5537-02. The target audience for this publication is IBM Cloud Object Storage IT specialists and storage administrators.
    Note: Online resource; Title from title page (viewed November 11, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780738460161
    Language: English
    Pages: 1 online resource (138 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM DFSMS and the IBM DS8000 added functionality to provide elements of serverless data movement, and for IBM z/OS® to communicate with a storage cloud. The function is known as Transparent Cloud Tiering and is composed of the following key elements: A gateway in the DS8000, which allows the movement of data to and from Object Storage by using a network connection, with the option to encrypt data in the Cloud. DFSMShsm enhancements to support Migrate and Recall functions to and from the Object Storage. Other commands were enhanced to monitor and report on the new functionality. DFSMShsm uses the Web Enablement toolkit for z/OS to create and access the metadata for specific clouds, containers, and objects. DFSMSdss enhancements to provide some basic backup and restore functions to and from the cloud. The IBM TS7700 can also be set up to act as if it were cloud storage from the DS8000 perspective. This IBM Redbooks publication is divided into the following parts: Part 1 provides you with an introduction to clouds. Part 2 shows you how we set up the Transparent Cloud Tiering in a controlled laboratory and how the new functions work. We provide points to consider to help you set up your storage cloud and integrate it into your operational environment. Part 3 shows you how we used the new functionality to communicate with the cloud and to send data and retrieve data from it.. This edition applies to DS8900F Release 9.2 and covers more recent features of TCT such as multi-cloud connections. along with additional advice for high availabilty cloud connectivity and DFSMShsm improvements.
    Note: Online resource; Title from title page (viewed December 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460147
    Language: English
    Pages: 1 online resource (48 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Cyberattacks are likely to remain a significant risk for the foreseeable future. Attacks on organizations can be external and internal. Investing in technology and processes to prevent these cyberattacks is the highest priority for these organizations. Organizations need well-designed procedures and processes to recover from attacks. The focus of this document is to demonstrate how the IBM® Unified Data Foundation (UDF) infrastructure plays an important role in delivering the persistence storage (PV) to containerized applications, such as IBM Cloud® Pak for Security (CP4S), with IBM Spectrum® Scale Container Native Storage Access (CNSA) that is deployed with IBM Spectrum scale CSI driver and IBM FlashSystem® storage with IBM Block storage driver with CSI driver. Also demonstrated is how this UDF infrastructure can be used as a preferred storage class to create back-end persistent storage for CP4S deployments. We also highlight how the file I/O events are captured in IBM QRadar® and offenses are generated based on predefined rules. After the offenses are generated, we show how the cases are automatically generated in IBM Cloud Pak® for Security by using the IBM QRadar SOAR Plugin, with a manually automated method to log a case in IBM Cloud Pak for Security. This document also describes the processes that are required for the configuration and integration of the components in this solution, such as: Integration of IBM Spectrum Scale with QRadar QRadar integration with IBM Cloud Pak for Security Integration of the IBM QRadar SOAR Plugin to generate automated cases in CP4S. Finally, this document shows the use of IBM Spectrum Scale CNSA and IBM FlashSystem storage that uses IBM block CSI driver to provision persistent volumes for CP4S deployment. All models of IBM FlashSystem family are supported by this document, including: FlashSystem 9100 and 9200 FlashSystem 7200 and FlashSystem 5000 models FlashSystem 5200 IBM SAN Volume Controller All storage that is running IBM Spectrum Virtualize software
    Note: Online resource; Title from title page (viewed December 20, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460185
    Language: English
    Pages: 1 online resource (16 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: In the midst of global disruptions, every element of IBM® Supply Chain has been affected. the IBM cognitive supply chain is positioned to win the future by using the exponential technologies that are inherent to our supply chains, and with flexibility, resiliency, and end-to-end visibility. The constant commitment of IBM to building smarter supply chains over the past decade has primed IBM to quickly and effectively navigate these disruptions and course-correct by using cognitive innovation. As a result, IBM Supply Chain teams were able to deliver exceptional outcomes without client disruption. In addition, this widespread impact inspired numerous new solutions that include exponential technologies that better prepare IBM for future disruptions in constantly changing markets.
    Note: Online resource; Title from title page (viewed November 30, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738457277
    Language: English
    Pages: 1 online resource (110 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® is a Platinum level Partner in the Oracle Partner Network, which delivers the proven combination of industry insight, extensive real-world Oracle applications experience, deep technical skills, and high-performance servers and storage to create a complete business solution with a defined return on investment. From application selection, purchase, and implementation to upgrade and maintenance, we help organizations reduce the total cost of ownership and the complexity of managing their current and future applications environment while building a solid base for business growth. Oracle Database running on Linux is available for deployment on IBM LinuxONE by using Redhat Enterprise Linux (RHEL) or SUSE Linux Enterprise Server (SLES). This enterprise-grade solution is designed to add value to Oracle Database solutions. This IBM Redpaper® publication focuses on accepted good practices for installing and getting started by using Oracle Database, which provides you with an environment that is optimized for performance, scalability, flexibility, and ease-of-management.
    Note: Online resource; Title from title page (viewed June 2, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9780738440491
    Language: English
    Pages: 1 online resource (260 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect against potentially costly exposures of proprietary data that results from a hard disk drive being stolen, misplaced, retired, or redeployed. Self-encrypting drives (SEDs) can satisfy this need by providing the ultimate in security for data-at-rest and can help reduce IT drive retirement costs in the data center. Self-encrypting drives are also an excellent choice if you must comply with government or industry regulations for data privacy and encryption. To effectively manage a large deployment of SEDs in Lenovo® System x® servers, an organization must rely on a centralized key management solution. This IBM Redbooks® publication explains the technology behind SEDs and demonstrates how to deploy a key management solution that uses IBM Security Key Lifecycle Manager and properly setup your System x servers.
    Note: Online resource; Title from title page (viewed March 16, 2015) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    ISBN: 0738436208
    Language: English
    Pages: 1 online resource (422 pages)
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication describes how to build production topologies for IBM Business Process Manager Advanced V7.5. It is aimed at IT Architects and IT Specialists who want to understand and implement these topologies. Use this book to select the appropriate production topologies for a given environment, then follow the step-by-step instructions included in this book to build these topologies. Part one introduces IBM Business Process Manager and provides an overview of basic topology components, and Process Server and Process Center. This part also provides an overview of the production topologies that we describe in this book, including a selection criteria for when to select a given topology. Part two provides a series of step-by-step instructions for creating production topology environments using deployment environment patterns. This includes topologies that incorporate IBM Business Monitor. This part also discusses advanced topology topics.
    Note: Online resource; Title from title page (viewed October 28, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 0738488631
    Language: English
    Pages: 1 online resource (506 pages)
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication was written with the objective to provide a technical description of some of the most important security scenarios available with WebSphere® Application Server Version 6.1 for z/OS®. We chose scenarios that are not really documented elsewhere and that have had significant changes in Version 6.1. In the first two chapters we provide an overview of security with WAS on z/OS for those readers who are unfamiliar with the security landscape on z/OS. From Chapter 3, "Web container security" on page 63, onwards we go into more technical depth.
    Note: Online resource; Title from title page (viewed December 26, 2007) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    ISBN: 0738427411
    Language: English
    Pages: 1 online resource (374 pages)
    Keywords: Electronic books
    Abstract: This IBM Redbooks publication is part of the Patterns for e-business series and examines how Composite patterns can be used when developing e-commerce Web sites using WebSphere Commerce Business Edition. In particular, it describes the Sell-Side Hub composite pattern and how it can assist architects and designers who have been asked to develop an e-Marketplace using WebSphere Commerce Business Edition. This book is intended for architects, designers and developers. It develops a technical architecture based on requirements common to e-Marketplaces that are Sell-Side Hubs. In developing this architecture, the book envisages an imaginary customer with realistic requirements, then follows a representative project development life cycle for this customer. The steps documented in this book include the following. Requirements gathering Understanding the business problem System overview Operational overview Detailed design Implementation Implementation samples
    Note: Online resource; Title from title page (viewed February 28, 2003) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...