System Programmer's Guide to Z/OS System Logger


Book Description

The z/OS System Logger is a function provided by the operating system to exploiters running on z/OS. The number of exploiters of this component is increasing, as is its importance in relation to system performance and availability. This IBM Redbooks document provides system programmers with a solid understanding of the System Logger component and guidance about how it should be set up for optimum performance with each of the exploiters. System Logger is an MVS component that provides a logging facility for applications running in a single-system or multi-system sysplex. The advantage of using System Logger is that the responsibility for tasks such as saving the log data (with the requested persistence), retrieving the data (potentially from any system in the sysplex), archiving the data, and expiring the data is removed from the creator of the log records. In addition, Logger provides the ability to have a single, merged, log, containing log data from multiple instances of an application within the sysplex.




IBM System Storage Business Continuity: Part 1 Planning Guide


Book Description

A disruption to your critical business processes could leave the entire business exposed. Today's organizations face ever-escalating customer demands and expectations. There is no room for downtime. You need to provide your customers with continuous service because your customers have a lot of choices. Your competitors are standing ready to take your place. As you work hard to grow your business, you face the challenge of keeping your business running without a glitch. To remain competitive, you need a resilient IT infrastructure. This IBM Redbooks publication introduces the importance of Business Continuity in today's IT environments. It provides a comprehensive guide to planning for IT Business Continuity and can help you design and select an IT Business Continuity solution that is right for your business environment. We discuss the concepts, procedures, and solution selection for Business Continuity in detail, including the essential set of IT Business Continuity requirements that you need to identify a solution. We also present a rigorous Business Continuity Solution Selection Methodology that includes a sample Business Continuity workshop with step-by-step instructions in defining requirements. This book is meant as a central resource book for IT Business Continuity planning and design. The companion title to this book, IBM System Storage Business Continuity: Part 2 Solutions Guide, SG24-6548, describes detailed product solutions in the System Storage Resiliency Portfolio.




IBM HiperSockets Implementation Guide


Book Description

This IBM® Redbooks® publication provides information about the IBM System z® HiperSocketsTM function. It offers a broad description of the architecture, functions, and operating systems support. This publication will help you plan and implement HiperSockets. It provides information about the definitions needed to configure HiperSockets for the supported operating systems. This book is intended for system programmers, network planners, and systems engineers who want to plan and install HiperSockets. A solid background in network and Transmission Control Protocol/Internet Protocol (TCP/IP) is assumed.




PC Mag


Book Description

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.




IBM PowerVC Version 2.0 Introduction and Configuration


Book Description

IBM® Power Virtualization Center (IBM® PowerVCTM) is an advanced enterprise virtualization management offering for IBM Power Systems. This IBM Redbooks® publication introduces IBM PowerVC and helps you understand its functions, planning, installation, and setup. It also shows how IBM PowerVC can integrate with systems management tools such as Ansible or Terraform and that it also integrates well into a OpenShift container environment. IBM PowerVC Version 2.0.0 supports both large and small deployments, either by managing IBM PowerVM® that is controlled by the Hardware Management Console (HMC), or by IBM PowerVM NovaLink. With this capability, IBM PowerVC can manage IBM AIX®, IBM i, and Linux workloads that run on IBM POWER® hardware. IBM PowerVC is available as a Standard Edition, or as a Private Cloud Edition. IBM PowerVC includes the following features and benefits: Virtual image capture, import, export, deployment, and management Policy-based virtual machine (VM) placement to improve server usage Snapshots and cloning of VMs or volumes for backup or testing purposes Support of advanced storage capabilities such as IBM SVC vdisk mirroring of IBM Global Mirror Management of real-time optimization and VM resilience to increase productivity VM Mobility with placement policies to reduce the burden on IT staff in a simple-to-install and easy-to-use graphical user interface (GUI) Automated Simplified Remote Restart for improved availability of VMs ifor when a host is down Role-based security policies to ensure a secure environment for common tasks The ability to enable an administrator to enable Dynamic Resource Optimization on a schedule IBM PowerVC Private Cloud Edition includes all of the IBM PowerVC Standard Edition features and enhancements: A self-service portal that allows the provisioning of new VMs without direct system administrator intervention. There is an option for policy approvals for the requests that are received from the self-service portal. Pre-built deploy templates that are set up by the cloud administrator that simplify the deployment of VMs by the cloud user. Cloud management policies that simplify management of cloud deployments. Metering data that can be used for chargeback. This publication is for experienced users of IBM PowerVM and other virtualization solutions who want to understand and implement the next generation of enterprise virtualization management for Power Systems. Unless stated otherwise, the content of this publication refers to IBM PowerVC Version 2.0.0.







Catalog of Copyright Entries. Third Series


Book Description

Includes Part 1, Number 1: Books and Pamphlets, Including Serials and Contributions to Periodicals (January - June)




Cumulative Book Index


Book Description

A world list of books in the English language.




IBM Business Process Manager V8.5 Performance Tuning and Best Practices


Book Description

This IBM® Redbooks® publication provides performance tuning tips and best practices for IBM Business Process Manager (IBM BPM) V8.5.5 (all editions) and IBM Business Monitor V8.5.5. These products represent an integrated development and runtime environment based on a key set of service-oriented architecture (SOA) and business process management (BPM) technologies. Such technologies include Service Component Architecture (SCA), Service Data Object (SDO), Business Process Execution Language (BPEL) for web services, and Business Processing Modeling Notation (BPMN). Both IBM Business Process Manager and Business Monitor build on the core capabilities of the IBM WebSphere® Application Server infrastructure. As a result, Business Process Manager solutions benefit from tuning, configuration, and best practices information for WebSphere Application Server and the corresponding platform Java virtual machines (JVMs). This book targets a wide variety of groups, both within IBM (development, services, technical sales, and others) and customers. For customers who are either considering or are in the early stages of implementing a solution incorporating Business Process Manager and Business Monitor, this document proves a useful reference. The book is useful both in terms of best practices during application development and deployment and as a reference for setup, tuning, and configuration information. This book talks about many issues that can influence performance of each product and can serve as a guide for making rational first choices in terms of configuration and performance settings. Similarly, customers who already implemented a solution with these products can use the information presented here to gain insight into how their overall integrated solution performance can be improved.




Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security and Defense Operations


Book Description

This book provides multifaceted components and full practical perspectives of systems engineering and risk management in security and defense operations with a focus on infrastructure and manpower control systems, missile design, space technology, satellites, intercontinental ballistic missiles, and space security. While there are many existing selections of systems engineering and risk management textbooks, there is no existing work that connects systems engineering and risk management concepts to solidify its usability in the entire security and defense actions. With this book Dr. Anna M. Doro-on rectifies the current imbalance. She provides a comprehensive overview of systems engineering and risk management before moving to deeper practical engineering principles integrated with newly developed concepts and examples based on industry and government methodologies. The chapters also cover related points including design principles for defeating and deactivating improvised explosive devices and land mines and security measures against kinds of threats. The book is designed for systems engineers in practice, political risk professionals, managers, policy makers, engineers in other engineering fields, scientists, decision makers in industry and government and to serve as a reference work in systems engineering and risk management courses with focus on security and defense operations.