System Programmer's Guide to Z/OS System Logger


Book Description

The z/OS System Logger is a function provided by the operating system to exploiters running on z/OS. The number of exploiters of this component is increasing, as is its importance in relation to system performance and availability. This IBM Redbooks document provides system programmers with a solid understanding of the System Logger component and guidance about how it should be set up for optimum performance with each of the exploiters. System Logger is an MVS component that provides a logging facility for applications running in a single-system or multi-system sysplex. The advantage of using System Logger is that the responsibility for tasks such as saving the log data (with the requested persistence), retrieving the data (potentially from any system in the sysplex), archiving the data, and expiring the data is removed from the creator of the log records. In addition, Logger provides the ability to have a single, merged, log, containing log data from multiple instances of an application within the sysplex.




IBM System Storage Business Continuity: Part 1 Planning Guide


Book Description

A disruption to your critical business processes could leave the entire business exposed. Today's organizations face ever-escalating customer demands and expectations. There is no room for downtime. You need to provide your customers with continuous service because your customers have a lot of choices. Your competitors are standing ready to take your place. As you work hard to grow your business, you face the challenge of keeping your business running without a glitch. To remain competitive, you need a resilient IT infrastructure. This IBM Redbooks publication introduces the importance of Business Continuity in today's IT environments. It provides a comprehensive guide to planning for IT Business Continuity and can help you design and select an IT Business Continuity solution that is right for your business environment. We discuss the concepts, procedures, and solution selection for Business Continuity in detail, including the essential set of IT Business Continuity requirements that you need to identify a solution. We also present a rigorous Business Continuity Solution Selection Methodology that includes a sample Business Continuity workshop with step-by-step instructions in defining requirements. This book is meant as a central resource book for IT Business Continuity planning and design. The companion title to this book, IBM System Storage Business Continuity: Part 2 Solutions Guide, SG24-6548, describes detailed product solutions in the System Storage Resiliency Portfolio.




IBM HiperSockets Implementation Guide


Book Description

This IBM® Redbooks® publication provides information about the IBM System z® HiperSocketsTM function. It offers a broad description of the architecture, functions, and operating systems support. This publication will help you plan and implement HiperSockets. It provides information about the definitions needed to configure HiperSockets for the supported operating systems. This book is intended for system programmers, network planners, and systems engineers who want to plan and install HiperSockets. A solid background in network and Transmission Control Protocol/Internet Protocol (TCP/IP) is assumed.




PC Mag


Book Description

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.







Catalog of Copyright Entries. Third Series


Book Description

Includes Part 1, Number 1: Books and Pamphlets, Including Serials and Contributions to Periodicals (January - June)




Cumulative Book Index


Book Description

A world list of books in the English language.




Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security and Defense Operations


Book Description

This book provides multifaceted components and full practical perspectives of systems engineering and risk management in security and defense operations with a focus on infrastructure and manpower control systems, missile design, space technology, satellites, intercontinental ballistic missiles, and space security. While there are many existing selections of systems engineering and risk management textbooks, there is no existing work that connects systems engineering and risk management concepts to solidify its usability in the entire security and defense actions. With this book Dr. Anna M. Doro-on rectifies the current imbalance. She provides a comprehensive overview of systems engineering and risk management before moving to deeper practical engineering principles integrated with newly developed concepts and examples based on industry and government methodologies. The chapters also cover related points including design principles for defeating and deactivating improvised explosive devices and land mines and security measures against kinds of threats. The book is designed for systems engineers in practice, political risk professionals, managers, policy makers, engineers in other engineering fields, scientists, decision makers in industry and government and to serve as a reference work in systems engineering and risk management courses with focus on security and defense operations.







DB2 Universal Database V8 Handbook for Windows, Unix, and Linux


Book Description

IBM DB2 Universal Database V8 offers breakthrough availability, manageability, performance, and scalability. Now, straight from IBM, there's a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows. This definitive reference covers every aspect of deploying and managing DB2 Universal Database V8, including database design for optimal performance, availability, and recoverability; day-to-day administration and backup; comparing, selecting, and using appropriate DB2 programming techniques; deploying networked and Internet-centered database applications; migrating to DB2 UDB from other databases or earlier versions of DB2; and much more. Using real-world examples, this book shows how to take full advantage of DB2 V8's most powerful enhancements. Philip K. Gunning brings together IBM's best tips and techniques for saving time and money in every facet of database design, development, deployment, and administration. Coverage includes: bull; Leveraging DB2 V8's new Wizards, Advisors, and other automation/self-management features Using the enhanced DB2 XML Extender to build next-generation B2B applications Quickly creating Stored Procedures and UDFs with the new Development Center Exploiting multidimensional clustering, prefetching, materialized query tables, Java threading, and other performance improvements Using the DB2 improved monitoring and logging facilities Maximizing availability via online table and index reorganization and dynamic configuration Understanding the latest changes in the DB2 product family