Running Mainframe z on Distributed Platforms

Running Mainframe z on Distributed Platforms
Title Running Mainframe z on Distributed Platforms PDF eBook
Author Kenneth Barrett
Publisher Apress
Pages 276
Release 2014-03-18
Genre Computers
ISBN 1430264314

Download Running Mainframe z on Distributed Platforms Book in PDF, Epub and Kindle

"Running Mainframe z on Distributed Platforms is particularly suitable for a more detailed discussion." Bill Ogden, IBM zPDT Redbook, April 2015 "The authors offer very well-reasoned solutions accompanied by case studies, which will be useful to specialists. The book is made even more useful as the System z mainframe-based solutions offer an advanced systems management environment for significant segments of data within large companies." Eugen Petac, Computing Reviews, Oct. 8, 2014 "Should you choose to implement zPDT, RDz UT, or RD&T in your team's arsenal, you will find Barrett and Norris’s insights, genius, and hard work illuminating as to how to rationally and economically manage the environment." —Scott Fagen, Chief Architect—System z Business, CA Technologies "A must-read for anyone interested in successfully deploying cost-efficient zPDT environments with agility in an enterprise that requires simple or complex configurations. The case-study-based exposition of the content allows for its easy consumption and use. Excellent!" —Mahendra Durai, SVP & Information Technology Officer, CA Running Mainframe z on Distributed Platforms reveals alternative techniques not covered by IBM for creatively adapting and enhancing multi-user IBM zPDT environments so that they are more friendly, stable, and reusable than those envisaged by IBM. The enhancement processes and methodologies taught in this book yield multiple layers for system recovery, 24x7 availability, and superior ease of updating and upgrading operating systems and subsystems without having to rebuild environments from scratch. Most of the techniques and processes covered in this book are not new to either the mainframe or distributed platforms. What is new in this book are the authors’ innovative methods for taking distributed environments running mainframe virtual machine (VM) and multiple virtual storage (MVS) and making them look and feel like other MVS systems. The authors’ combined expertise involves every aspect of the implementation of IBM zPDT technology to create virtualized mainframe environments by which the mainframe operations on a z series server can be transitioned to distributed platforms. All of the enhancement methods consecutively laid out in this book have been architected and developed by the authors for the CA Technologies distributed platform. Barrett and Norris impart these techniques and processes to CIOs and CTOs across the mainframe and distributed fields, to zPDT and RDz UT implementers, and to IBM’s independent software vendors and customers.

Introduction to the New Mainframe: z/VM Basics

Introduction to the New Mainframe: z/VM Basics
Title Introduction to the New Mainframe: z/VM Basics PDF eBook
Author Lydia Parziale
Publisher IBM Redbooks
Pages 468
Release 2008-01-10
Genre Computers
ISBN 0738488550

Download Introduction to the New Mainframe: z/VM Basics Book in PDF, Epub and Kindle

This textbook provides students with the background knowledge and skills necessary to begin using the basic functions and features of z/VM Version 5, Release 3. It is part of a series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to be literate in personal computing and have some computer science or information systems background. Others who will benefit from this textbook include z/OS professionals who would like to expand their knowledge of other aspects of the mainframe computing environment. This course can be used as a prerequisite to understanding Linux on System z. After reading this textbook and working through the exercises, the student will have received a basic understanding of the following topics: The Series z Hardware concept and the history of the mainframe Virtualization technology in general and how it is exploited by z/VM Operating systems that can run as guest systems under z/VM z/VM components The z/VM control program and commands The interactive environment under z/VM, CMS and its commands z/VM planning and administration Implementing the networking capabilities of z/VM Tools to monitor the performance of z/VM systems and guest operating systems The REXX programming language and CMS pipelines Security issues when running z/VM

The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2

The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2
Title The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2 PDF eBook
Author Lydia Parziale
Publisher IBM Redbooks
Pages 546
Release 2021-07-15
Genre Computers
ISBN 0738459720

Download The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2 Book in PDF, Epub and Kindle

This IBM® Redbooks® publication is volume one of five in a series of books entitled The Virtualization Cookbook for IBM Z. The series includes the following volumes: The Virtualization Cookbook for IBM z Systems® Volume 1: IBM z/VM® 7.2, SG24-8147 The Virtualization Cookbook for IBM Z Volume 2: Red Hat Enterprise Linux 8.2 Servers, SG24-8303 The Virtualization Cookbook for IBM z Systems Volume 3: SUSE Linux Enterprise Server 12, SG24-8890 The Virtualization Cookbook for IBM z Systems Volume 4: Ubuntu Server 16.04, SG24-8354 Virtualization Cookbook for IBM Z Volume 5: KVM, SG24-8463 It is recommended that you start with Volume 1 of this series because the IBM z/VM hypervisor is the foundation (or base "layer") for installing Linux on IBM Z®. This book series assumes that you are generally familiar with IBM Z technology and terminology. It does not assume an in-depth understanding of z/VM or Linux. It is written for individuals who want to start quickly with z/VM and Linux, and get virtual servers up and running in a short time (days, not weeks or months). Volume 1 starts with a solution orientation, discusses planning and security, and then, describes z/VM installation methods, configuration, hardening, automation, servicing, networking, optional features, and more. It adopts a "cookbook-style" format that provides a concise, repeatable set of procedures for installing, configuring, administering, and maintaining z/VM. This volume also includes a chapter on monitoring z/VM and the Linux virtual servers that are hosted. Volumes 2, 3, and 4 assume that you completed all of the steps that are described in Volume 1. From that common foundation, these volumes describe how to create your own Linux virtual servers on IBM Z hardware under IBM z/VM. The cookbook format continues with installing and customizing Linux. Volume 5 provides an explanation of the kernel-based virtual machine (KVM) on IBM Z and how it can use the z/Architecture®. It focuses on the planning of the environment and provides installation and configuration definitions that are necessary to build, manage, and monitor a KVM on Z environment. This publication applies to the supported Linux on Z distributions (Red Hat, SUSE, and Ubuntu).

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
Title Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security PDF eBook
Author Axel Buecker
Publisher IBM Redbooks
Pages 332
Release 2016-03-22
Genre Computers
ISBN 0738440108

Download Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Book in PDF, Epub and Kindle

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the Security Server and Communication Server components. This book describes z/OS and other operating systems and additional software that leverage the building blocks of System z hardware to provide solutions to business security needs. This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

Security on z/VM

Security on z/VM
Title Security on z/VM PDF eBook
Author Paola Bari
Publisher IBM Redbooks
Pages 348
Release 2007-12-05
Genre Computers
ISBN 0738488542

Download Security on z/VM Book in PDF, Epub and Kindle

Discussions about server sprawl, rising software costs, going green, or moving data centers to reduce the cost of business are held in many meetings or conference calls in many organizations throughout the world. And many organizations are starting to turn toward System zTM and z/VM® after such discussions. The virtual machine operating system has over 40 years of experience as a hosting platform for servers, from the days of VM/SP, VM/XA, VM/ESA® and especially now with z/VM. With the consolidation of servers and conservative estimates that approximately seventy percent of all critical corporate data reside on System z, we find ourselves needing a highly secure environment for the support of this infrastructure. This document was written to assist z/VM support and security personnel in providing the enterprise with a safe, secure and manageable environment. This IBM® Redbooks® publication provides an overview of security and integrity provided by z/VM and the processes for the implementation and configuration of z/VM Security Server, z/VM LDAP Server, IBM Tivoli® Directory Server for z/OS®, and Linux® on System z with PAM for LDAP authentication. Sample scenarios with RACF® database sharing between z/VM and z/OS, or through Tivoli Directory Integrator to synchronize LDAP databases, are also discussed in this book. This book provides information about configuration and usage of Linux on System z with the System z Cryptographic features documenting their hardware and software configuration. The Consul zSecure Pro Suite is also part of this document: this product helps to control and audit security not only on one system, but can be used as a single point of enterprise wide security control. This document covers the installation and configuration of this product and detailed information is presented on how z/Consul can be used to collect and analyze z/VM security data and how it can be helpful in the administration of your audit data.

Considerations for Transitioning Highly Available Applications to System z

Considerations for Transitioning Highly Available Applications to System z
Title Considerations for Transitioning Highly Available Applications to System z PDF eBook
Author Alex Louwe Kooijmans
Publisher IBM Redbooks
Pages 258
Release 2011-10-14
Genre Computers
ISBN 0738435856

Download Considerations for Transitioning Highly Available Applications to System z Book in PDF, Epub and Kindle

You may have several triggers to investigate the feasibility of moving a workload or set of workloads to the IBM® System z® platform. These triggers could be concerns about operational cost, manageability, or delivering the agreed service levels, among others. Investigating the feasibility of a possible migration or transition to any other platform, including System z, requires a number of basic steps. These steps usually start with an understanding of the current workload and its pain points, and end with a business case to move the workload. It is important to find out how easy a migration is going to be and how much risk will be involved. In this IBM Redbooks® publication we offer thoughts on how to move through these steps. We also include a chapter with a System z technology summary to help you understand how a migrated workload may fit on the platform. Our focus in this book is on workloads that are mission-critical and require a high level of availability, including disaster recovery.

Handbook of Network and System Administration

Handbook of Network and System Administration
Title Handbook of Network and System Administration PDF eBook
Author Jan Bergstra
Publisher Elsevier
Pages 1027
Release 2011-08-11
Genre Computers
ISBN 0080553583

Download Handbook of Network and System Administration Book in PDF, Epub and Kindle

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.- Covers data center planning and design- Discusses configuration management- Illustrates business modeling and system administration- Provides the latest theoretical developments