Author: Stephen H. Kaisler
Publisher: Cambridge Scholars Publishing
ISBN: 1527522636
Category : Computers
Languages : en
Pages : 220
Book Description
This volume describes several different models of IBM computer systems, characterized by different data representations and instruction sets that strongly influenced computer system architecture in the 1950s and early 1960s. They focused on a common system architecture that allowed peripherals to be used on different systems, albeit with specific adapters. These systems were modular, which made them easy to manufacture, configure, and service. Computing with UNIVAC, they used reliable Williams Tubes for memory, and later introduced magnetic core memory. IBM developed its own magnetic tape drives and magnetic drums that were both faster and more reliable than UNIVAC’s peripherals. The first software systems that could reasonably be called “operating systems” enabled more efficient use of programmer time and system resources. The development of programming languages, notably FORTRAN, and assembly language processors, notably Autocoder, improved the productivity of programmers. In addition, IBM developed one of the finest product marketing, sales and servicing organizations in the world. The legacy of the IBM 700 series is found in their popular successors, the IBM 7000 Series, which will be described in a forthcoming volume.
First Generation Mainframes
Author: Stephen H. Kaisler
Publisher: Cambridge Scholars Publishing
ISBN: 1527522636
Category : Computers
Languages : en
Pages : 220
Book Description
This volume describes several different models of IBM computer systems, characterized by different data representations and instruction sets that strongly influenced computer system architecture in the 1950s and early 1960s. They focused on a common system architecture that allowed peripherals to be used on different systems, albeit with specific adapters. These systems were modular, which made them easy to manufacture, configure, and service. Computing with UNIVAC, they used reliable Williams Tubes for memory, and later introduced magnetic core memory. IBM developed its own magnetic tape drives and magnetic drums that were both faster and more reliable than UNIVAC’s peripherals. The first software systems that could reasonably be called “operating systems” enabled more efficient use of programmer time and system resources. The development of programming languages, notably FORTRAN, and assembly language processors, notably Autocoder, improved the productivity of programmers. In addition, IBM developed one of the finest product marketing, sales and servicing organizations in the world. The legacy of the IBM 700 series is found in their popular successors, the IBM 7000 Series, which will be described in a forthcoming volume.
Publisher: Cambridge Scholars Publishing
ISBN: 1527522636
Category : Computers
Languages : en
Pages : 220
Book Description
This volume describes several different models of IBM computer systems, characterized by different data representations and instruction sets that strongly influenced computer system architecture in the 1950s and early 1960s. They focused on a common system architecture that allowed peripherals to be used on different systems, albeit with specific adapters. These systems were modular, which made them easy to manufacture, configure, and service. Computing with UNIVAC, they used reliable Williams Tubes for memory, and later introduced magnetic core memory. IBM developed its own magnetic tape drives and magnetic drums that were both faster and more reliable than UNIVAC’s peripherals. The first software systems that could reasonably be called “operating systems” enabled more efficient use of programmer time and system resources. The development of programming languages, notably FORTRAN, and assembly language processors, notably Autocoder, improved the productivity of programmers. In addition, IBM developed one of the finest product marketing, sales and servicing organizations in the world. The legacy of the IBM 700 series is found in their popular successors, the IBM 7000 Series, which will be described in a forthcoming volume.
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738441023
Category : Computers
Languages : en
Pages : 200
Book Description
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Publisher: IBM Redbooks
ISBN: 0738441023
Category : Computers
Languages : en
Pages : 200
Book Description
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
IBM Mainframes
Author: Nallur S. Prasad
Publisher: McGraw-Hill Companies
ISBN:
Category : Computers
Languages : en
Pages : 360
Book Description
The definitive reference for 360, 370, and 370/XA architecture, as well as design concepts for the 303X, 4381, 308X, 9370, and 3090 series. Updated to include the latest pertinent information on the new 370/ESA architecture, as well as the new Summit series.
Publisher: McGraw-Hill Companies
ISBN:
Category : Computers
Languages : en
Pages : 360
Book Description
The definitive reference for 360, 370, and 370/XA architecture, as well as design concepts for the 303X, 4381, 308X, 9370, and 3090 series. Updated to include the latest pertinent information on the new 370/ESA architecture, as well as the new Summit series.
What On Earth is a Mainframe?
Author: David Stephens
Publisher: Lulu.com
ISBN: 1409225356
Category : Computers
Languages : en
Pages : 210
Book Description
Confused about zSeries Mainframes? Need to understand the z/OS operating system - and in a hurry? Then you've just found the book you need.Avoiding technical jargon, this book gives you the basic facts in clear, light-hearted, entertaining English. You'll quickly learn what Mainframes are, what they do, what runs on them, and terms and terminology you need to speak Mainframe-ese.But it's not all technical. There's also invaluable information on the people that work on Mainframes, Mainframe management issues, new Mainframe trends, and other facts that don't seem to be written down anywhere else.Programmers, managers, recruitment consultants, and industry commentators will all find this book their new best friend when trying to understand the Mainframe world.
Publisher: Lulu.com
ISBN: 1409225356
Category : Computers
Languages : en
Pages : 210
Book Description
Confused about zSeries Mainframes? Need to understand the z/OS operating system - and in a hurry? Then you've just found the book you need.Avoiding technical jargon, this book gives you the basic facts in clear, light-hearted, entertaining English. You'll quickly learn what Mainframes are, what they do, what runs on them, and terms and terminology you need to speak Mainframe-ese.But it's not all technical. There's also invaluable information on the people that work on Mainframes, Mainframe management issues, new Mainframe trends, and other facts that don't seem to be written down anywhere else.Programmers, managers, recruitment consultants, and industry commentators will all find this book their new best friend when trying to understand the Mainframe world.
Second Generation Mainframes
Author: Stephen H. Kaisler
Publisher: Cambridge Scholars Publishing
ISBN: 1527535428
Category : Computers
Languages : en
Pages : 393
Book Description
Second Generation Mainframes: The IBM 7000 Series describes IBM’s second generation of mainframe computers which introduced new technology, new peripherals and advanced software. These systems were continuations of the instruction sets of the IBM 700 series with significant enhancements, but supported upwards compatibility that preserved customers’ investment in the earlier series. The use of magnetic cores, fast magnetic tapes and disks, and transistors yielded computation speeds that opened new domains for computation. Programming languages continued to be developed and enhanced, and new ones were developed for specific domains, such as SNOBOL, COBOL, and Macro Assemblers. Robust subroutine libraries for mathematical applications appeared. New operating systems provided many capabilities to programmers for data management and file systems, limited multiprocessing, timesharing, programming language support, and better error handling and control of peripherals. Early concepts in persistent file systems on magnetic disks were developed that changed the nature of job processing. The IBM 7000 series led the way in many innovative concepts that helped to establish IBM as the foremost manufacturer of computer systems. However, the diversity of the models put significant strain on IBM’s financial resources and development teams, which ultimately led to OBM’s development of the System/360 family of machines.
Publisher: Cambridge Scholars Publishing
ISBN: 1527535428
Category : Computers
Languages : en
Pages : 393
Book Description
Second Generation Mainframes: The IBM 7000 Series describes IBM’s second generation of mainframe computers which introduced new technology, new peripherals and advanced software. These systems were continuations of the instruction sets of the IBM 700 series with significant enhancements, but supported upwards compatibility that preserved customers’ investment in the earlier series. The use of magnetic cores, fast magnetic tapes and disks, and transistors yielded computation speeds that opened new domains for computation. Programming languages continued to be developed and enhanced, and new ones were developed for specific domains, such as SNOBOL, COBOL, and Macro Assemblers. Robust subroutine libraries for mathematical applications appeared. New operating systems provided many capabilities to programmers for data management and file systems, limited multiprocessing, timesharing, programming language support, and better error handling and control of peripherals. Early concepts in persistent file systems on magnetic disks were developed that changed the nature of job processing. The IBM 7000 series led the way in many innovative concepts that helped to establish IBM as the foremost manufacturer of computer systems. However, the diversity of the models put significant strain on IBM’s financial resources and development teams, which ultimately led to OBM’s development of the System/360 family of machines.
Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security
Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738440949
Category : Computers
Languages : en
Pages : 188
Book Description
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Publisher: IBM Redbooks
ISBN: 0738440949
Category : Computers
Languages : en
Pages : 188
Book Description
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
It Infrastructure Architecture - Infrastructure Building Blocks and Concepts Second Edition
Author: Sjaak Laan
Publisher: Sjaak Laan
ISBN: 1291250794
Category : Computers
Languages : en
Pages : 438
Book Description
For many decades, IT infrastructure has provided the foundation for successful application deployment. Yet, general knowledge of infrastructures is still not widespread. Experience shows that software developers, system administrators, and project managers often have little knowledge of the big influence IT infrastructures have on the performance, availability and security of software applications. This book explains the concepts, history, and implementation of IT infrastructures. Although many of books can be found on individual infrastructure building blocks, this is the first book to describe all of them: datacenters, servers, networks, storage, virtualization, operating systems, and end user devices. Whether you need an introduction to infrastructure technologies, a refresher course, or a study guide for a computer science class, you will find that the presented building blocks and concepts provide a solid foundation for understanding the complexity of today's IT infrastructures.
Publisher: Sjaak Laan
ISBN: 1291250794
Category : Computers
Languages : en
Pages : 438
Book Description
For many decades, IT infrastructure has provided the foundation for successful application deployment. Yet, general knowledge of infrastructures is still not widespread. Experience shows that software developers, system administrators, and project managers often have little knowledge of the big influence IT infrastructures have on the performance, availability and security of software applications. This book explains the concepts, history, and implementation of IT infrastructures. Although many of books can be found on individual infrastructure building blocks, this is the first book to describe all of them: datacenters, servers, networks, storage, virtualization, operating systems, and end user devices. Whether you need an introduction to infrastructure technologies, a refresher course, or a study guide for a computer science class, you will find that the presented building blocks and concepts provide a solid foundation for understanding the complexity of today's IT infrastructures.
Mainframe Basics for Security Professionals
Author: Ori Pomerantz
Publisher: Pearson Education
ISBN: 013270434X
Category : Computers
Languages : en
Pages : 194
Book Description
Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why
Publisher: Pearson Education
ISBN: 013270434X
Category : Computers
Languages : en
Pages : 194
Book Description
Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why
Linux on the Mainframe
Author: John Eilert
Publisher: Prentice Hall Professional
ISBN: 9780131014152
Category : Computers
Languages : en
Pages : 462
Book Description
This is the comprehensive guide to Linux on the mainframe straight from the IBM Linux experts. The book covers virtualization, security, systems management, and more.
Publisher: Prentice Hall Professional
ISBN: 9780131014152
Category : Computers
Languages : en
Pages : 462
Book Description
This is the comprehensive guide to Linux on the mainframe straight from the IBM Linux experts. The book covers virtualization, security, systems management, and more.
Introduction to the New Mainframe
Author: Mike Ebbers
Publisher: IBM.Com/Redbooks
ISBN: 9780738495972
Category : Client/server computing
Languages : en
Pages : 0
Book Description
This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.
Publisher: IBM.Com/Redbooks
ISBN: 9780738495972
Category : Client/server computing
Languages : en
Pages : 0
Book Description
This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.