SAS/ASSIST Software System Administrator's Guide, Version 8


Book Description

Keep your SAS/ASSIST software users happy and productive! This book describes how you, as a system administrator responsible for SAS/ASSIST software, can set up the software for maximum user efficiency. Use Master and Group profiles to customize your site's SAS/ASSIST software behavior. Set up printing options for text and graphics. Define Query Managers to use with SAS/ASSIST software's powerful Query and Reporting facility. And more!




SAS 9.1.3 Intelligence Platform


Book Description

Explains how to administer the SAS Web applications that run in the middle tier of the SAS Intelligence Platform. The Web applications include the SAS Information Delivery Portal, SAS Web Report Studio, and SAS Web OLAP Viewer for Java.This guide describes the middle-tier environment, provides sample deployment scenarios, and explains how to configure the Web applications for optimal performance. The guide contains instructions for common administrative tasks, such as configuring trusted Web authentication, as well as instructions for administering the individual Web applications. For example, the guide explains how to add content to the SAS Information Delivery Portal and how to control access to that content. This title is also available online.




SAS For Dummies


Book Description

The fun and easy way to learn to use this leading business intelligence tool Written by an author team who is directly involved with SAS, this easy-to-follow guide is fully updated for the latest release of SAS and covers just what you need to put this popular software to work in your business. SAS allows any business or enterprise to improve data delivery, analysis, reporting, movement across a company, data mining, forecasting, statistical analysis, and more. SAS For Dummies, 2nd Edition gives you the necessary background on what SAS can do for you and explains how to use the Enterprise Guide. SAS provides statistical and data analysis tools to help you deal with all kinds of data: operational, financial, performance, and more Places special emphasis on Enterprise Guide and other analytical tools, covering all commonly used features Covers all commonly used features and shows you the practical applications you can put to work in your business Explores how to get various types of data into the software and how to work with databases Covers producing reports and Web reporting tools, analytics, macros, and working with your data In the easy-to-follow, no-nonsense For Dummies format, SAS For Dummies gives you the knowledge and the confidence to get SAS working for your organization. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.




The Little SAS Enterprise Guide Book


Book Description

Learning to use SAS Enterprise Guide has never been easier! Whether you are using SAS Enterprise Guide for the first time, or are looking to expand your skills, this is the book for you! With The Little SAS Enterprise Guide Book, award-winning authors Susan Slaughter and Lora Delwiche help you quickly become productive in the SAS Enterprise Guide point-and-click environment. A series of carefully designed tutorials help you master the basics of the tasks you'll want to do most frequently. The reference section of the book expands on the tutorial topics, covering specific features in more depth. This edition has been completely rewritten, and updated with new features in SAS Enterprise Guide.




The Little SAS Book


Book Description

A classic that just keeps getting better, The Little SAS Book is essential for anyone learning SAS programming. Lora Delwiche and Susan Slaughter offer a user-friendly approach so that readers can quickly and easily learn the most commonly used features of the SAS language. Each topic is presented in a self-contained, two-page layout complete with examples and graphics. Nearly every section has been revised to ensure that the sixth edition is fully up-to-date. This edition is also interface-independent, written for all SAS programmers whether they use SAS Studio, SAS Enterprise Guide, or the SAS windowing environment. New sections have been added covering PROC SQL, iterative DO loops, DO WHILE and DO UNTIL statements, %DO statements, using variable names with special characters, the ODS EXCEL destination, and the XLSX LIBNAME engine. This title belongs on every SAS programmer's bookshelf. It's a resource not just to get you started, but one you will return to as you continue to improve your programming skills. Learn more about the updates to The Little SAS Book, Sixth Edition here. Reviews for The Little SAS Book, Sixth Edition can be read here.




Time Management for System Administrators


Book Description

Provides advice for system administrators on time management, covering such topics as keeping an effective calendar, eliminating time wasters, setting priorities, automating processes, and managing interruptions.




SSH, The Secure Shell


Book Description

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.




IBM Power Systems SR-IOV: Technical Overview and Introduction


Book Description

This IBM® RedpaperTM publication describes the adapter-based virtualization capabilities that are being deployed in high-end IBM POWER7+TM processor-based servers. Peripheral Component Interconnect Express (PCIe) single root I/O virtualization (SR-IOV) is a virtualization technology on IBM Power Systems servers. SR-IOV allows multiple logical partitions (LPARs) to share a PCIe adapter with little or no run time involvement of a hypervisor or other virtualization intermediary. SR-IOV does not replace the existing virtualization capabilities that are offered as part of the IBM PowerVM® offerings. Rather, SR-IOV compliments them with additional capabilities. This paper describes many aspects of the SR-IOV technology, including: A comparison of SR-IOV with standard virtualization technology Overall benefits of SR-IOV Architectural overview of SR-IOV Planning requirements SR-IOV deployment models that use standard I/O virtualization Configuring the adapter for dedicated or shared modes Tips for maintaining and troubleshooting your system Scenarios for configuring your system This paper is directed to clients, IBM Business Partners, and system administrators who are involved with planning, deploying, configuring, and maintaining key virtualization technologies.




Learning SAS by Example


Book Description

Learn to program SAS by example! Learning SAS by Example, A Programmer’s Guide, Second Edition, teaches SAS programming from very basic concepts to more advanced topics. Because most programmers prefer examples rather than reference-type syntax, this book uses short examples to explain each topic. The second edition has brought this classic book on SAS programming up to the latest SAS version, with new chapters that cover topics such as PROC SGPLOT and Perl regular expressions. This book belongs on the shelf (or e-book reader) of anyone who programs in SAS, from those with little programming experience who want to learn SAS to intermediate and even advanced SAS programmers who want to learn new techniques or identify new ways to accomplish existing tasks. In an instructive and conversational tone, author Ron Cody clearly explains each programming technique and then illustrates it with one or more real-life examples, followed by a detailed description of how the program works. The text is divided into four major sections: Getting Started, DATA Step Processing, Presenting and Summarizing Your Data, and Advanced Topics. Subjects addressed include Reading data from external sources Learning details of DATA step programming Subsetting and combining SAS data sets Understanding SAS functions and working with arrays Creating reports with PROC REPORT and PROC TABULATE Getting started with the SAS macro language Leveraging PROC SQL Generating high-quality graphics Using advanced features of user-defined formats and informats Restructuring SAS data sets Working with multiple observations per subject Getting started with Perl regular expressions You can test your knowledge and hone your skills by solving the problems at the end of each chapter.




IBM FlashSystem 5200 Product Guide


Book Description

This IBM® Redbooks® Product Guide publication describes the IBM FlashSystem® 5200 solution, which is a next-generation IBM FlashSystem control enclosure. It is an NVMe end-to-end platform that is targeted at the entry and midrange market and delivers the full capabilities of IBM FlashCore® technology. It also provides a rich set of software-defined storage (SDS) features that are delivered by IBM Spectrum® Virtualize, including the following features: Data reduction and deduplication Dynamic tiering Thin provisioning Snapshots Cloning Replication Data copy services Transparent Cloud Tiering IBM HyperSwap® including 3-site replication for high availability (HA) Scale-out and scale-up configurations further enhance capacity and throughput for better availability. The IBM FlashSystem 5200 is a high-performance storage solution that is based on a revolutionary 1U form factor. It consists of 12 NVMe Flash Devices in a 1U storage enclosure drawer with full redundant canister components and no single point of failure. It is designed for businesses of all sizes, including small, remote, branch offices and regional clients. It is a smarter, self-optimizing solution that requires less management, which enables organizations to overcome their storage challenges. Flash has come of age and price point reductions mean that lower parts of the storage market are seeing the value of moving over to flash and NVMe--based solutions. The IBM FlashSystem 5200 advances this transition by providing incredibly dense tiers of flash in a more affordable package. With the benefit of IBM FlashCore Module compression and new QLC flash-based technology becoming available, a compelling argument exists to move away from Nearline SAS storage and on to NVMe. With the release of IBM FlashSystem 5200 Software V8.4, extra functions and features are available, including support for new Distributed RAID1 (DRAID1) features, GUI enhancements, Redirect-on-write for Data Reduction Pool (DRP) snapshots, and 3-site replication capabilities. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators.