Starter Kit for the IBM ISeries & AS/400
Title | Starter Kit for the IBM ISeries & AS/400 PDF eBook |
Author | Gary Guthrie |
Publisher | 29th Street Press |
Pages | 578 |
Release | 2001 |
Genre | Computers |
ISBN | 9781583040843 |
IBM i 6.1 Independent ASPs: A Guide to Quick Implementation of Independent ASPs
Title | IBM i 6.1 Independent ASPs: A Guide to Quick Implementation of Independent ASPs PDF eBook |
Author | Scott Vetter |
Publisher | IBM Redbooks |
Pages | 268 |
Release | 2009-12-10 |
Genre | Computers |
ISBN | 0738433683 |
This IBM® Redbooks® publication explains how to configure and manage independent disk pool (IASP) functionality of IBM i 6.1. It is designed to help IBM technical professionals, business partners, and customers understand and implement independent disk pools in the IBM i 6.1. In addition, this publication provides the background information that is necessary to plan, implement, and customize this functionality to your particular environment. It provides guidance on running user applications with either application data or most application objects residing in an independent disk pool. Considering that you can also use independent disk pools in a cluster environment, this publication shows you the basic steps to make your independent disk pool switchable between two Power SystemsTM servers or a single server with multiple LPARs. Independent auxiliary storage pools have many business and technical advantages for Power Systems using IBM i. Not only are independent auxiliary storage pools (IASPs) easy to create and maintain, most applications can use them by simple work management changes. IASPs can provide immediate benefits to your enterprise.
Understanding AS/400 System Operations
Title | Understanding AS/400 System Operations PDF eBook |
Author | Mike Dawson |
Publisher | MC Press |
Pages | 812 |
Release | 2000-05 |
Genre | IBM AS/400 (Computer) |
ISBN | 9781583470152 |
Tis guide is intended for students learning computer operations and administration on the AS/400 computer system. Offering a unique approach to learning AS/400 operations with extensive hands-on labs, self-tests, and review questions, this book uses real-world situations to enable users to be productive with AS/400 operations. This book also covers the requirements of the two IBM AS/400 certification exams: AS/400 Associate System Operator Certification (test 052) and AS/400 Professional System Operator Certification (test 053). The primary goal of this book is to teach users how to perform day-to-day operations on an AS/400 computer system, including IPL, starting and stopping the system, backup and recovery, and system cleanup. Procedures covered include creating and maintaining user environments, device configuration and management, security implementation, work and data management, and TCP/IP configuration. Console operations discussed include jobs, message handling, and working with spool files and peripheral devices. Functions of Operations Navigator are covered, and Electronic Customer Support (ECS) and PTF upgrades are also introduced.
Mastering IBM I
Title | Mastering IBM I PDF eBook |
Author | Jim Buck |
Publisher | Mc PressLlc |
Pages | 937 |
Release | 2011-05 |
Genre | Computers |
ISBN | 9781583473566 |
A comprehensive introduction to IBM i—the operating system that runs on IBM's midrange computer systems (System i, iSeries, AS/400)—and its facilities, this in-depth resource uses step-by-step exercises, review questions, and chapter labs to teach new programmers the latest system concepts and tools. Reflecting system changes that have occurred since 2000, topics include Rational Developer for Power (RDP), RDP Screen Designer and Report Designer, IBM i Access for Windows, IBM i Access for Web, IBM DB2 Web Query for i, and Remote System Explorer (RSE).
Fortress Rochester
Title | Fortress Rochester PDF eBook |
Author | Frank G. Soltis |
Publisher | System iNetwork |
Pages | 444 |
Release | 2001 |
Genre | Computers |
ISBN | 9781583040836 |
IBM i 7.2 Technical Overview with Technology Refresh Updates
Title | IBM i 7.2 Technical Overview with Technology Refresh Updates PDF eBook |
Author | Ryan Cooper |
Publisher | IBM Redbooks |
Pages | 520 |
Release | 2016-11-02 |
Genre | Computers |
ISBN | 0738442070 |
This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.
IBM System i Security: Protecting i5/OS Data with Encryption
Title | IBM System i Security: Protecting i5/OS Data with Encryption PDF eBook |
Author | Yessong Johng |
Publisher | IBM Redbooks |
Pages | 308 |
Release | 2008-07-24 |
Genre | Computers |
ISBN | 0738485373 |
Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.