IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z

IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z PDF Author: Bertrand Dufrasne
Publisher: IBM Redbooks
ISBN: 073845835X
Category : Computers
Languages : en
Pages : 116

Get Book Here

Book Description
This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.

IBM TS7700 Series DS8000 Object Store User's Guide Version 2.0

IBM TS7700 Series DS8000 Object Store User's Guide Version 2.0 PDF Author: Lourie Goodall
Publisher: IBM Redbooks
ISBN: 0738459542
Category : Computers
Languages : en
Pages : 36

Get Book Here

Book Description
The IBM® TS7700 features a functional enhancement that allows for the TS7700 to act as an object store for transparent cloud tiering with IBM DS8000® (DS8K), DFSMShsm (HSM), and native DFSMSdss (DSS). This function can be used to move data sets directly from DS8000 to TS7700. This IBM Redpaper publication describes the client value, and how DFSMS, DS8000, and TS7700 are set up to enable and use the function.

IBM DS8000 Easy Tier (Updated for DS8000 R9.0)

IBM DS8000 Easy Tier (Updated for DS8000 R9.0) PDF Author: Bertrand Dufrasne
Publisher: IBM Redbooks
ISBN: 0738457159
Category : Computers
Languages : en
Pages : 154

Get Book Here

Book Description
This IBM® RedpaperTM publication describes the concepts and functions of IBM System Storage® Easy Tier®, and explains its practical use with the IBM DS8000® series and License Machine Code 7.9.0.xxx (also known as R9.0).. Easy Tier is designed to automate data placement throughout the storage system disks pool. It enables the system to (automatically and without disruption to applications) relocate data (at the extent level) across up to three drive tiers. The process is fully automated. Easy Tier also automatically rebalances extents among ranks within the same tier, removing workload skew between ranks, even within homogeneous and single-tier extent pools. Easy Tier supports a Manual Mode that enables you to relocate full volumes. Manual Mode also enables you to merge extent pools and offers a rank depopulation function. Easy Tier fully supports thin-provisioned Extent Space Efficient fixed block (FB) and count key data (CKD) volumes in Manual Mode and Automatic Mode. Easy Tier also supports extent pools with small extents (16 MiB extents for FB pools and 21 cylinders extents for CKD pools). Easy Tier also supports high-performance and high-capacity flash drives in the High-performance flash enclosure, and it enables additional user controls at the pool and volume levels. This paper is aimed at those professionals who want to understand the Easy Tier concept and its underlying design. It also provides guidance and practical illustrations for users who want to use the Easy Tier Manual Mode capabilities. Easy Tier includes additional capabilities to further enhance your storage performance automatically: Easy Tier Application, and Easy Tier Heat Map Transfer.

IBM DS8000 Copy Services: Updated for IBM DS8000 Release 9.1

IBM DS8000 Copy Services: Updated for IBM DS8000 Release 9.1 PDF Author: Bertrand Dufrasne
Publisher: IBM Redbooks
ISBN: 0738459577
Category : Computers
Languages : en
Pages : 626

Get Book Here

Book Description
This IBM® Redbooks® publication helps you plan, install, configure, and manage Copy Services on the IBM DS8000® operating in an IBM Z® or Open Systems environment. This book helps you design and implement a new Copy Services installation or migrate from an existing installation. It includes hints and tips to maximize the effectiveness of your installation, and information about tools and products to automate Copy Services functions. It is intended for anyone who needs a detailed and practical understanding of the DS8000 Copy Services. This edition is an update for the DS8900 Release 9.1. Note that the Safeguarded Copy feature is covered in IBM DS8000 Safeguarded Copy, REDP-5506.

IBM DS8880 Product Guide (Release 8.51)

IBM DS8880 Product Guide (Release 8.51) PDF Author: Bert Dufrasne
Publisher: IBM Redbooks
ISBN: 0738457361
Category : Computers
Languages : en
Pages : 50

Get Book Here

Book Description
This IBM Redbooks® Product Guide gives an overview of the features and functions that are available with the IBM DS8880 models running microcode Release 8.51 (DS8000 License Machine Code 8.8.51.xx.xx). The IBM DS8880 architecture relies on powerful IBM POWER8® processor-based servers that manage the cache to streamline disk input/output (I/O), maximizing performance and throughput. These capabilities are further enhanced with the availability of the second generation of high-performance flash enclosures (HPFE Gen-2). The IBM DS8888, DS8886, and DS8884 models excel at supporting the IBM Z Enterprise server and IBM Power server environments, offering many synergy features.

DFSMShsm Fast Replication Technical Guide

DFSMShsm Fast Replication Technical Guide PDF Author: Keith Winnard
Publisher: IBM Redbooks
ISBN: 0738440647
Category : Computers
Languages : en
Pages : 286

Get Book Here

Book Description
DFSMShsm fast replication provides DFSMShsm management for the use of volume-level fast replication. Fast replication is made possible by using the FlashCopy® capability of storage servers. With this capability, a set of storage groups can be defined as a copy pool. The volumes in this pool are processed collectively creating, by fast replication, backup versions that are managed by DFSMShsm. Recovery can be performed at the volume or copy pool level. This capability is designed to work specifically with DB2® Version 8 or later. With DFSMShsm fast replication, the backup and recovery of DB2 copy pools can be managed by DFSMShsm. DFSMShsm fast replication provides a quick, easy-to-use backup and recovery solution. This IBM® Redbooks® publication consists of a technical overview of the DFSMShsm fast replication function in z/OS® V1R12 Data Facility Storage Management Subsystem (DFSMS). It provides you with the information that you need to understand and evaluate the function, with practical implementation hints and tips. This book is written for storage professionals, database administrators, and system programmers who have experience with the components of DFSMS. It provides sufficient information for you to implement the DFSMShsm fast replication function in your storage environment.

IBM DS8900F and IBM Z Synergy DS8900F: Release 9.3 and z/OS 2.5

IBM DS8900F and IBM Z Synergy DS8900F: Release 9.3 and z/OS 2.5 PDF Author: Peterl Kimmel
Publisher: IBM Redbooks
ISBN: 0738460656
Category : Computers
Languages : en
Pages : 140

Get Book Here

Book Description
IBM Z® has a close and unique relationship to its storage. Over the years, improvements to the IBM zSystems® processors and storage software, the disk storage systems, and their communication architecture consistently reinforced this synergy. This IBM® RedpaperTM publication summarizes and highlights the various aspects, advanced functions, and technologies that are often pioneered by IBM and make IBM Z and IBM DS8000® products an ideal combination. This paper is intended for users who have some familiarity with IBM Z and the IBM DS8000 series and want a condensed but comprehensive overview of the synergy items up to the IBM z16 server with IBM z/OS® V2.5 and the IBM DS8900 Release 9.3 firmware.

IBM z13s Technical Guide

IBM z13s Technical Guide PDF Author: Octavian Lascu
Publisher: IBM Redbooks
ISBN: 0738441678
Category : Computers
Languages : en
Pages : 588

Get Book Here

Book Description
Digital business has been driving the transformation of underlying information technology (IT) infrastructure to be more efficient, secure, adaptive, and integrated. IT must be able to handle the explosive growth of mobile clients and employees. It also must be able to process enormous amounts of data to provide deep and real-time insights to help achieve the greatest business impact. This IBM® Redbooks® publication addresses the new IBM z SystemsTM single frame, the IBM z13s server. IBM z Systems servers are the trusted enterprise platform for integrating data, transactions, and insight. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. It needs to be an integrated infrastructure that can support new applications. It also needs to have integrated capabilities that can provide new mobile capabilities with real-time analytics delivered by a secure cloud infrastructure. IBM z13s servers are designed with improved scalability, performance, security, resiliency, availability, and virtualization. The superscalar design allows z13s servers to deliver a record level of capacity over the prior single frame z Systems server. In its maximum configuration, the z13s server is powered by up to 20 client characterizable microprocessors (cores) running at 4.3 GHz. This configuration can run more than 18,000 millions of instructions per second (MIPS) and up to 4 TB of client memory. The IBM z13s Model N20 is estimated to provide up to 100% more total system capacity than the IBM zEnterprise® BC12 Model H13. This book provides information about the IBM z13s server and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. It is intended for systems engineers, consultants, planners, and anyone who wants to understand the IBM z SystemsTM functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM z Systems technology and terminology.

IBM z14 Model ZR1 Technical Introduction

IBM z14 Model ZR1 Technical Introduction PDF Author: Octavian Lascu
Publisher: IBM Redbooks
ISBN: 0738457183
Category : Computers
Languages : en
Pages : 112

Get Book Here

Book Description
This IBM® Redbooks® publication introduces the latest member of the IBM Z platform, the IBM z14 Model ZR1 (Machine Type 3907). It includes information about the Z environment and how it helps integrate data and transactions more securely, and provides insight for faster and more accurate business decisions. The z14 ZR1 is a state-of-the-art data and transaction system that delivers advanced capabilities, which are vital to any digital transformation. The z14 ZR1 is designed for enhanced modularity, which is in an industry standard footprint. This system excels at the following tasks: Securing data with pervasive encryption Transforming a transactional platform into a data powerhouse Getting more out of the platform with IT Operational Analytics Providing resilience towards zero downtime Accelerating digital transformation with agile service delivery Revolutionizing business processes Mixing open source and Z technologies This book explains how this system uses new innovations and traditional Z strengths to satisfy growing demand for cloud, analytics, and open source technologies. With the z14 ZR1 as the base, applications can run in a trusted, reliable, and secure environment that improves operations and lessens business risk.

Getting Started with z/OS Data Set Encryption

Getting Started with z/OS Data Set Encryption PDF Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738460222
Category : Computers
Languages : en
Pages : 274

Get Book Here

Book Description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.