Author: IBM Redbooks
Publisher: IBM
ISBN: 9780738492131
Category : Computers
Languages : en
Pages : 262
Book Description
Modernizing IBM Eserver ISeries Application Data Access
Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between
Author: Nadir K. Amra
Publisher: IBM Redbooks
ISBN: 073843986X
Category : Computers
Languages : en
Pages : 712
Book Description
This IBM® Redbooks® publication is focused on melding industry preferred practices with the unique needs of the IBM i community and providing a holistic view of modernization. This book covers key trends for application structure, user interface, data access, and the database. Modernization is a broad term when applied to applications. It is more than a single event. It is a sequence of actions. But even more, it is a process of rethinking how to approach the creation and maintenance of applications. There are tangible deliveries when it comes to modernization, the most notable being a modern user interface (UI), such as a web browser or being able to access applications from a mobile device. The UI, however, is only the beginning. There are many more aspects to modernization. Using modern tools and methodologies can significantly improve productivity and reduce long-term cost while positioning applications for the next decade. It is time to put the past away. Tools and methodologies have undergone significant transformation, improving functionality, usability, and productivity. This is true of the plethora of IBM tools and the wealth of tools available from many Independent Solution Providers (ISVs). This publication is the result of work that was done by IBM, industry experts, and by representatives from many of the ISV Tool Providers. Some of their tools are referenced in the book. In addition to reviewing technologies based on context, there is an explanation of why modernization is important and a description of the business benefits of investing in modernization. This critical information is key for line-of-business executives who want to understand the benefits of a modernization project. This book is appropriate for CIOs, architects, developers, and business leaders. Related information Making the Case for Modernization, IBM Systems Magazine
Publisher: IBM Redbooks
ISBN: 073843986X
Category : Computers
Languages : en
Pages : 712
Book Description
This IBM® Redbooks® publication is focused on melding industry preferred practices with the unique needs of the IBM i community and providing a holistic view of modernization. This book covers key trends for application structure, user interface, data access, and the database. Modernization is a broad term when applied to applications. It is more than a single event. It is a sequence of actions. But even more, it is a process of rethinking how to approach the creation and maintenance of applications. There are tangible deliveries when it comes to modernization, the most notable being a modern user interface (UI), such as a web browser or being able to access applications from a mobile device. The UI, however, is only the beginning. There are many more aspects to modernization. Using modern tools and methodologies can significantly improve productivity and reduce long-term cost while positioning applications for the next decade. It is time to put the past away. Tools and methodologies have undergone significant transformation, improving functionality, usability, and productivity. This is true of the plethora of IBM tools and the wealth of tools available from many Independent Solution Providers (ISVs). This publication is the result of work that was done by IBM, industry experts, and by representatives from many of the ISV Tool Providers. Some of their tools are referenced in the book. In addition to reviewing technologies based on context, there is an explanation of why modernization is important and a description of the business benefits of investing in modernization. This critical information is key for line-of-business executives who want to understand the benefits of a modernization project. This book is appropriate for CIOs, architects, developers, and business leaders. Related information Making the Case for Modernization, IBM Systems Magazine
IBM System i Security: Protecting i5/OS Data with Encryption
Author: Yessong Johng
Publisher: IBM Redbooks
ISBN: 0738485373
Category : Computers
Languages : en
Pages : 308
Book Description
Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.
Publisher: IBM Redbooks
ISBN: 0738485373
Category : Computers
Languages : en
Pages : 308
Book Description
Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.
Who Knew You Could Do That with RPG IV? Modern RPG for the Modern Programmer
Author: Rich Diedrich
Publisher: IBM Redbooks
ISBN: 0738442100
Category : Computers
Languages : en
Pages : 412
Book Description
Application development is a key part of IBM® i businesses. The IBM i operating system is a modern, robust platform to create and develop applications. The RPG language has been around for a long time, but is still being transformed into a modern business language. This IBM Redbooks® publication is focused on helping the IBM i development community understand the modern RPG language. The world of application development has been rapidly changing over the past years. The good news is that IBM i has been changing right along with it, and has made significant changes to the RPG language. This book is intended to help developers understand what modern RPG looks like and how to move from older versions of RPG to a newer, modern version. Additionally, it covers the basics of Integrated Language Environment® (ILE), interfacing with many other languages, and the best tools for doing development on IBM i. Using modern tools, methodologies, and languages are key to continuing to stay relevant in today's world. Being able to find the right talent for your company is key to your continued success. Using the guidelines and principles in this book can help set you up to find that talent today and into the future. This publication is the result of work that was done by IBM, industry experts, business partners, and some of the original authors of the first edition of this book. This information is important not only for developers, but also business decision makers (CIO for example) to understand that the IBM i is not an 'old' system. IBM i has modern languages and tools. It is a matter of what you choose to do with the IBM i that defines its age.
Publisher: IBM Redbooks
ISBN: 0738442100
Category : Computers
Languages : en
Pages : 412
Book Description
Application development is a key part of IBM® i businesses. The IBM i operating system is a modern, robust platform to create and develop applications. The RPG language has been around for a long time, but is still being transformed into a modern business language. This IBM Redbooks® publication is focused on helping the IBM i development community understand the modern RPG language. The world of application development has been rapidly changing over the past years. The good news is that IBM i has been changing right along with it, and has made significant changes to the RPG language. This book is intended to help developers understand what modern RPG looks like and how to move from older versions of RPG to a newer, modern version. Additionally, it covers the basics of Integrated Language Environment® (ILE), interfacing with many other languages, and the best tools for doing development on IBM i. Using modern tools, methodologies, and languages are key to continuing to stay relevant in today's world. Being able to find the right talent for your company is key to your continued success. Using the guidelines and principles in this book can help set you up to find that talent today and into the future. This publication is the result of work that was done by IBM, industry experts, business partners, and some of the original authors of the first edition of this book. This information is important not only for developers, but also business decision makers (CIO for example) to understand that the IBM i is not an 'old' system. IBM i has modern languages and tools. It is a matter of what you choose to do with the IBM i that defines its age.
Smarter Business: Dynamic Information with IBM InfoSphere Data Replication CDC
Author: Chuck Ballard
Publisher: IBM Redbooks
ISBN: 0738436372
Category : Computers
Languages : en
Pages : 484
Book Description
To make better informed business decisions, better serve clients, and increase operational efficiencies, you must be aware of changes to key data as they occur. In addition, you must enable the immediate delivery of this information to the people and processes that need to act upon it. This ability to sense and respond to data changes is fundamental to dynamic warehousing, master data management, and many other key initiatives. A major challenge in providing this type of environment is determining how to tie all the independent systems together and process the immense data flow requirements. IBM® InfoSphere® Change Data Capture (InfoSphere CDC) can respond to that challenge, providing programming-free data integration, and eliminating redundant data transfer, to minimize the impact on production systems. In this IBM Redbooks® publication, we show you examples of how InfoSphere CDC can be used to implement integrated systems, to keep those systems updated immediately as changes occur, and to use your existing infrastructure and scale up as your workload grows. InfoSphere CDC can also enhance your investment in other software, such as IBM DataStage® and IBM QualityStage®, IBM InfoSphere Warehouse, and IBM InfoSphere Master Data Management Server, enabling real-time and event-driven processes. Enable the integration of your critical data and make it immediately available as your business needs it.
Publisher: IBM Redbooks
ISBN: 0738436372
Category : Computers
Languages : en
Pages : 484
Book Description
To make better informed business decisions, better serve clients, and increase operational efficiencies, you must be aware of changes to key data as they occur. In addition, you must enable the immediate delivery of this information to the people and processes that need to act upon it. This ability to sense and respond to data changes is fundamental to dynamic warehousing, master data management, and many other key initiatives. A major challenge in providing this type of environment is determining how to tie all the independent systems together and process the immense data flow requirements. IBM® InfoSphere® Change Data Capture (InfoSphere CDC) can respond to that challenge, providing programming-free data integration, and eliminating redundant data transfer, to minimize the impact on production systems. In this IBM Redbooks® publication, we show you examples of how InfoSphere CDC can be used to implement integrated systems, to keep those systems updated immediately as changes occur, and to use your existing infrastructure and scale up as your workload grows. InfoSphere CDC can also enhance your investment in other software, such as IBM DataStage® and IBM QualityStage®, IBM InfoSphere Warehouse, and IBM InfoSphere Master Data Management Server, enabling real-time and event-driven processes. Enable the integration of your critical data and make it immediately available as your business needs it.
IBM i 7.2 Technical Overview with Technology Refresh Updates
Author: Ryan Cooper
Publisher: IBM Redbooks
ISBN: 0738442070
Category : Computers
Languages : en
Pages : 520
Book Description
This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.
Publisher: IBM Redbooks
ISBN: 0738442070
Category : Computers
Languages : en
Pages : 520
Book Description
This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.
Security Guide for IBM i V6.1
Author: Jim Cook
Publisher: IBM Redbooks
ISBN: 0738432865
Category : Computers
Languages : en
Pages : 426
Book Description
The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security auditors and consultants who are in charge of implementing corporate security policies in an organization. In many cases, they are not familiar with the IBM i operating system, but must understand the security services that are available. This IBM Redbooks® publication guides you through the broad range of native security features that are available within IBM i Version and release level 6.1. This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM. The focus in this publication is the integration of IBM 6.1 enhancements into the range of security facilities available within IBM i up through Version release level 6.1. IBM i 6.1 security enhancements include: - Extended IBM i password rules and closer affinity between normal user IBM i operating system user profiles and IBM service tools user profiles - Encrypted disk data within a user Auxiliary Storage Pool (ASP) - Tape data save and restore encryption under control of the Backup Recovery and Media Services for i5/OS (BRMS) product, 5761-BR1 - Networking security enhancements including additional control of Secure Sockets Layer (SSL) encryption rules and greatly expanded IP intrusion detection protection and actions. DB2® for i5/OS built-in column encryption expanded to include support of the Advanced Encryption Standard (AES) encryption algorithm to the already available Rivest Cipher 2 (RC2) and Triple DES (Data Encryption Standard) (TDES) encryption algorithms. The IBM i V5R4 level IBM Redbooks publication IBM System i Security Guide for IBM i5/OS Version 5 Release 4, SG24-6668, remains available.
Publisher: IBM Redbooks
ISBN: 0738432865
Category : Computers
Languages : en
Pages : 426
Book Description
The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security auditors and consultants who are in charge of implementing corporate security policies in an organization. In many cases, they are not familiar with the IBM i operating system, but must understand the security services that are available. This IBM Redbooks® publication guides you through the broad range of native security features that are available within IBM i Version and release level 6.1. This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM. The focus in this publication is the integration of IBM 6.1 enhancements into the range of security facilities available within IBM i up through Version release level 6.1. IBM i 6.1 security enhancements include: - Extended IBM i password rules and closer affinity between normal user IBM i operating system user profiles and IBM service tools user profiles - Encrypted disk data within a user Auxiliary Storage Pool (ASP) - Tape data save and restore encryption under control of the Backup Recovery and Media Services for i5/OS (BRMS) product, 5761-BR1 - Networking security enhancements including additional control of Secure Sockets Layer (SSL) encryption rules and greatly expanded IP intrusion detection protection and actions. DB2® for i5/OS built-in column encryption expanded to include support of the Advanced Encryption Standard (AES) encryption algorithm to the already available Rivest Cipher 2 (RC2) and Triple DES (Data Encryption Standard) (TDES) encryption algorithms. The IBM i V5R4 level IBM Redbooks publication IBM System i Security Guide for IBM i5/OS Version 5 Release 4, SG24-6668, remains available.
IBM Cloud Private Application Developer's Guide
Author: Ahmed Azraq
Publisher: IBM Redbooks
ISBN: 0738457620
Category : Computers
Languages : en
Pages : 162
Book Description
IBM® Cloud Private is an application platform for developing and managing containerized applications across hybrid cloud environments, on-premises and public clouds. It is an integrated environment for managing containers that includes the container orchestrator Kubernetes, a private image registry, a management console, and monitoring frameworks. This IBM Redbooks® publication covers tasks that are performed by IBM CloudTM Private application developers, such as deploying applications, application packaging with helm, application automation with DevOps, using Microclimate, and managing your service mesh with Istio. The authors team has many years of experience in implementing IBM Cloud Private and other cloud solutions in production environments. Throughout this book, we used the approach of providing you the recommended practices in those areas. As part of this project, we also developed several code examples, which can be downloaded from the Redbooks GitHub web page. If you are an IBM Cloud Private application developer, this book is for you. If you are an IBM Cloud Private systems administrator, you can see the IBM Redbooks publication IBM Private Cloud Systems Administrator's Guide, SG248440.
Publisher: IBM Redbooks
ISBN: 0738457620
Category : Computers
Languages : en
Pages : 162
Book Description
IBM® Cloud Private is an application platform for developing and managing containerized applications across hybrid cloud environments, on-premises and public clouds. It is an integrated environment for managing containers that includes the container orchestrator Kubernetes, a private image registry, a management console, and monitoring frameworks. This IBM Redbooks® publication covers tasks that are performed by IBM CloudTM Private application developers, such as deploying applications, application packaging with helm, application automation with DevOps, using Microclimate, and managing your service mesh with Istio. The authors team has many years of experience in implementing IBM Cloud Private and other cloud solutions in production environments. Throughout this book, we used the approach of providing you the recommended practices in those areas. As part of this project, we also developed several code examples, which can be downloaded from the Redbooks GitHub web page. If you are an IBM Cloud Private application developer, this book is for you. If you are an IBM Cloud Private systems administrator, you can see the IBM Redbooks publication IBM Private Cloud Systems Administrator's Guide, SG248440.
Financial Transaction Manager Technical Overview
Author: Craig Bryce
Publisher: IBM Redbooks
ISBN: 0738439118
Category : Computers
Languages : en
Pages : 474
Book Description
Dramatic forces of change continue to sweep the financial services industry. The age of the empowered customer is here and are changing the way financial products are delivered, sold, and serviced, which are making relationships more complex than ever. The explosion of data and intense competition, which is combined with slow or inconsistent economic conditions, makes it imperative for financial institutions to find new and cost effective ways to increase market share, renew customer trust, and drive profitable growth. In this new business environment, the transaction processing arm of the industry is facing increased pressure to reduce float, better manage liquidity, and provide regulators and clients with increased transparency. At the same time, the industry must effectively manage the risks that are associated with introducing customer-focused and regionalized products and services. Financial Transaction Manager enables the management, orchestration, and monitoring of financial transactions during their processing lifecycle. Financial Transaction Manager provides the capability to integrate and unify financial transactions in various industry formats (including ISO 20022, SWIFT, NACHA, EDIFACT, ANSI X12 and others). By using Financial Transaction Manager, financial institutions gain visibility into message processing, balance financial risk, and facilitate effective performance management. This IBM® Redbooks® publication outlines how Financial Transaction Manager is deployed to realize the benefits of transaction transparency, increase business agility, and allow for innovation that is built on a robust and high-performance environment.
Publisher: IBM Redbooks
ISBN: 0738439118
Category : Computers
Languages : en
Pages : 474
Book Description
Dramatic forces of change continue to sweep the financial services industry. The age of the empowered customer is here and are changing the way financial products are delivered, sold, and serviced, which are making relationships more complex than ever. The explosion of data and intense competition, which is combined with slow or inconsistent economic conditions, makes it imperative for financial institutions to find new and cost effective ways to increase market share, renew customer trust, and drive profitable growth. In this new business environment, the transaction processing arm of the industry is facing increased pressure to reduce float, better manage liquidity, and provide regulators and clients with increased transparency. At the same time, the industry must effectively manage the risks that are associated with introducing customer-focused and regionalized products and services. Financial Transaction Manager enables the management, orchestration, and monitoring of financial transactions during their processing lifecycle. Financial Transaction Manager provides the capability to integrate and unify financial transactions in various industry formats (including ISO 20022, SWIFT, NACHA, EDIFACT, ANSI X12 and others). By using Financial Transaction Manager, financial institutions gain visibility into message processing, balance financial risk, and facilitate effective performance management. This IBM® Redbooks® publication outlines how Financial Transaction Manager is deployed to realize the benefits of transaction transparency, increase business agility, and allow for innovation that is built on a robust and high-performance environment.
Getting Started with IBM Tivoli Workload Scheduler V8.3
Author: Pete Soto
Publisher:
ISBN:
Category : Computer network architectures
Languages : en
Pages : 0
Book Description
Publisher:
ISBN:
Category : Computer network architectures
Languages : en
Pages : 0
Book Description