Results per page:
Introduction to the New Mainframe: Security
IBM Z
Redbooks, published 3 Apr 2007, last updated 26 Apr 2007
This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user ... [more]
Implementing an ESB using IBM WebSphere Message Broker V6 and WebSphere ESB V6 on z/OS
Application Integration
Redbooks, published 18 Apr 2007
This IBM Redbooks publication is designed for IT architects and IT specialists that are dealing with IBM WebSphere Message Broker and IBM WebSphere Enterprise Service Bus (ESB) solutions. This book illustrates how to configure an ESB using either IBM WebSphere Message Broker V6 for IBM z/OS or IBM WebSphere Enterprise Service Bus V6. It makes various traditional z/OS transactions and data available as a Web service through the broker, including IBM DB2 data, batch programs, and IBM CICS/IMS transactions. In this book, there is more focus on WebSphere Enterprise Service Bus installation and ... [more]
Enterprise Extender Implementation Guide
IBM Z
Redbooks, published 18 Apr 2007
This IBM Redbooks publication will help you to tailor and configure Communications Server for z/OS (CS z/OS) to make full use of Enterprise Extender (EE) capabilities. It focuses on the migration of your Advanced Peer-to-Peer Networking (APPN) environment to Enterprise Extender, while offering easy-to-understand, step-by-step guidance. Sample scenarios are provided that discuss Enterprise Extender connections between multiple z/OS systems as well as between z/OS and non-mainframe systems. The non-mainframe platforms in our examples include IBM Communications Server for AIX (CS/AIX), IBM ... [more]
Clustering Solutions Overview: Parallel Sysplex and Other Platforms
IBM Z
Redpaper, published 9 Apr 2007
This IBM® Redpaper will help you do an informed comparison of Parallel Sysplex® against clustering implementations on other platforms. We start by describing the basic components of Parallel Sysplex data sharing, using DB2® as a sample implementation of the capabilities provided by Parallel Sysplex. Using this as a base, we then describe how each of the components are implemented on other platforms. This Redpaper does not attempt to discuss all of the very many flavors of clustering or even a majority of them. We are concentrating on clustering solutions suitable for commercial online ... [more]
Performance Monitoring and Best Practices for WebSphere on z/OS
Middleware
Redbooks, published 7 Apr 2007
Implementing a WebSphere Application Server environment on z/OS and deploying applications to it in a manner that delivers the best performance is not a trivial task. There are many parameters that can be influenced and applications can be written in many different ways. This IBM Redbooks publication will give you a structure you can use to set up an environment that is tuned to meet best performance and at the same can be monitored to catch eventual performance bottlenecks. We also pay attention to workload testing using a variety of tools and best practices in writing and deploying ... [more]
Securing DB2 and Implementing MLS on z/OS
IBM Z
Redbooks, published 4 Apr 2007
Today's computing environment is subject to increasing regulatory pressures and potentially malicious attacks. Regulatory compliance, security, and audit are in the daily headlines and growing more prominent.The security of the information to which you have been entrusted has never been more critical. The reality of compliance is too complex. Compliance demands that you work carefully to set up a strong, comprehensive set of policies and controls. That means controls that consider operational data, financial data, unstructured data, spreadsheets, e-mail, and business intelligence data. We ... [more]
SOA Transition Scenarios for the IBM z/OS Platform
IBM Z Software
Redbooks, published 14 Mar 2007
This IBM Redbooks publication focuses on the process of transitioning from an existing IT landscape on z/OS to an SOA-enabled landscape. So if you are a system architect or solution designer and you need to make decisions about SOA enablement or transitioning on the z/OS platform, this book offers an excellent starting point. It describes patterns, transition approaches, migration scenarios, and the features and functions of the available technology options. And specialists who are interested in technical details of the solutions will also find plenty of useful information. Service Oriented ... [more]
Customizing and Using IBM OMEGAMON z/OS Management Console 4.1.0
IBM Z
Redpaper, published 9 Mar 2007
This IBM Redpaper provides a description of the monitoring functions of the IBM OMEGMON z/OS Management Console and provides an understanding of its integration with the other z/OS currently available functions. The IBM Redpaper also covers the IBM OMEGMON z/OS Management Console customization and provides sample scenarios to show the benefits that an installation can gain by using it.
Using z/VM for Test and Development Environments: A Roundup
IBM Z
Redbooks, published 21 Feb 2007, last updated 27 Feb 2007
This IBM Redbooks publication shows the strengths of z/VM and how you can use these strengths to create a highly flexible test and production environment. Some of the strengths of z/VM that are shown in this book are that you can run Linux on z/VM, you can run a sysplex under z/VM, and you can develop code under z/VM for z/TPF. You can also provision Linux guests under z/VM. A vswitch allows you to connect all of your guests (all operating systems that run under z/VM) easily to the network. You can simulate your production environment on a sysplex. The intention of this book is to show the ... [more]
Experiences with Oracle® 10gR2 Solutions on Linux for IBM System z
IBM Z
Redbooks, published 16 Feb 2007
This IBM Redbooks publication describes experiences gained while installing and testing several Oracle® solutions, such as: - Single Instance of Oracle Database 10gR2 - Including sharing ORACLE_HOME and Cloning Oracle databases - RAC Instance of Oracle Database 10gR2 using raw devices, block devices, or OCFS2 files - Oracle E-Business Suite 11.5.10.2 with a split configuration database on Linux on System z - Oracle AS10g Interested readers include database consultants, installers, administrators, and system programmers. This book is not meant to replace Oracle documentation; it documents our ... [more]
z/OS Version 1 Release 8 RACF Implementation
IBM Z
Redbooks, published 13 Feb 2007
This IBM Redbooks publication describes the implementation of RACF® in z/OS® Version 1 Release 8. This release continues to deliver industry leadership for security. Improvements have been introduced to further enhance the security-rich environment z/OS users rely on. These enhancements include: - RACF support for virtual key rings to treat the collection of all the certificates owned by one user ID, including the SITE and CERTAUTH reserved user IDs, as an independent key ring. The use of the CERTAUTH virtual key ring will help to eliminate the need to manually create multiple real key rings ... [more]
Implementing OMEGAMON XE for Messaging V6.0
IT Service Management
Redbooks, published 8 Feb 2007
IBM Tivoli OMEGAMON XE for Messaging Version 6.0 is a follow-on product to IBM Tivoli for OMEGAMON XE for WebSphere Business Integration. It provides the capability to manage IBM WebSphere MQ, WebSphere Message Broker, and WebSphere InterChange Server environments from a single console. It supports distributed and mainframe systems and provides an end-to-end view across all systems. It analyzes application performance and identifies slowdowns and monitors message rates, brokers, message flows, and subflows. This IBM Redbooks publication describes the installation, configuration, and ... [more]
Systems Programmer's Guide to Resource Recovery Services (RRS)
IBM Z Software
Redbooks, published 29 Nov 2004, last updated 6 Feb 2007
This IBM Redbooks publication gives you a broad understanding of the Resource Recovery Services (RRS) environment. RRS provides a global syncpoint manager that any resource manager on z/OS can exploit. It enables transactions to update protected resources managed by many resource managers. RRS is increasingly becoming a prerequisite for new resource managers, and for new capabilities in existing resource managers. Rather than having to implement their own two-phase commit protocol, these products can use the support provided by RRS. Since older transaction managers like CICS already offered ... [more]
z/OS UNIX Security Fundamentals
IBM Z
Redpaper, published 5 Feb 2007
This IBM Redpaper introduces the z/OS UNIX security model and implementation to MVS knowledgeable and security-minded users. It does not address in detail all the wealth of specific security features available in z/OS UNIX, but rather the base principles of operation and the mechanisms implementation with setup recommendations. We assume that the user already has a knowledge of the most commonly used IBM Resource Access Control Facility (RACF) setups and commands. However, we do not provide detailed procedures and explanations about the use of these ... [more]
Implementing and Managing APPC Protected Conversations
IBM Z Software
Redbooks, published 10 Feb 2005, last updated 5 Feb 2007
APPC Protected Conversation is a function provided by the operating system to exploiters running on z/OS. This function improves data integrity in distributed processing environments by enabling participation in the two-phase commit protocol. This IBM Redbooks publication provides system programmers with a solid understanding of the APPC Protected Conversation environment. It describes how to upgrade your environment to support protected conversations, how to configure protected conversation exploiters, how to operate in this environment, and how to manage resources. Sample scenarios ... [more]
Java Stand-alone Applications on z/OS Volume II
IBM Z
Redbooks, published 18 Dec 2006, last updated 5 Feb 2007
This IBM Redbooks publication is the second book in a series of two about Java stand-alone applications on z/OS. We recommend using this document as a complement to Java stand-alone Applications on z/OS Volume I, SG24-7177. This book explains some topics discussed in Volume 1 in more depth, and also provides information about additional topics. It pays special attention to JZOS, a newly integrated function in the z/OS SDKs that can be used to run Java batch jobs and perform I/O. This document also features other interesting topics, such as the use of Eclipse and WebSphere Developer for ... [more]
Exploiting Parallel Sysplex: A Customer Perspective
IBM Z
Redbooks, published 19 Oct 2006, last updated 29 Jan 2007
IBM System z is well known for its reliability, availability, and serviceability (RAS). So how can your enterprise obtain all this benefit, along with low total cost of ownership (TCO) and excellent centralized administration? And what other benefits can you realize by implementing a Parallel Sysplex configuration? This IBM Redbooks publication answers these questions by documenting the experiences of a real life client that undertook this process. Informatik Zentrum Frankfurt und München (IZB) completed a Parallel Sysplex implementation, and it shares its perspective with you in this ... [more]
Encryption Facility for z/OS Version 1.10
IBM Z
Redbooks, published 23 Jan 2007
This IBM Redbooks publication introduces IBM Encryption Facility for z/OS, Program Product 5655-P97, from the description of its principles of operation to information related to its setup intended for system programmers and security officers. We include recommendations, based on our own experience, in the chapters addressing these topics, including warnings and explanations about problems we discovered during our own trials. This book provides also several examples of the use of the following Encryption Facility for z/OS features:
- Encryption Services
- Encryption Facility ... [more]
Communications Server for z/OS V1R8 TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance
IBM Z Software
Redbooks, published 19 Jan 2007
In this IBM Redbooks publication we begin with a discussion of Virtual IP Addressing (VIPA), a TCP/IP high-availability approach introduced by the z/OS Communications Server. We then proceed to show how VIPA can be used for high availability—both with and without using a dynamic routing protocol. Then we discuss a number of different workload balancing approaches that can be used with the z/OS Communications Server. In this book we use the terms internal and external application workload balancing to refer to approaches where the decision as to which application instance should received a ... [more]
Communications Server for z/OS V1R8 TCP/IP Implementation Volume 4: Policy-Based Network Security
IBM Z Software
Redbooks, published 19 Jan 2007
This Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand step-by-step how-to guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions come from untrusted networks such as the Internet, and from unknown users, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. In addition, there are certain applications ... [more]
The above is a list of IBM Redbooks and Redpapers on IBM Z, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.