Starter Kit for the IBM ISeries & AS/400

Starter Kit for the IBM ISeries & AS/400
Title Starter Kit for the IBM ISeries & AS/400 PDF eBook
Author Gary Guthrie
Publisher 29th Street Press
Pages 578
Release 2001
Genre Computers
ISBN 9781583040843

Download Starter Kit for the IBM ISeries & AS/400 Book in PDF, Epub and Kindle

IBM i 6.1 Independent ASPs: A Guide to Quick Implementation of Independent ASPs

IBM i 6.1 Independent ASPs: A Guide to Quick Implementation of Independent ASPs
Title IBM i 6.1 Independent ASPs: A Guide to Quick Implementation of Independent ASPs PDF eBook
Author Scott Vetter
Publisher IBM Redbooks
Pages 268
Release 2009-12-10
Genre Computers
ISBN 0738433683

Download IBM i 6.1 Independent ASPs: A Guide to Quick Implementation of Independent ASPs Book in PDF, Epub and Kindle

This IBM® Redbooks® publication explains how to configure and manage independent disk pool (IASP) functionality of IBM i 6.1. It is designed to help IBM technical professionals, business partners, and customers understand and implement independent disk pools in the IBM i 6.1. In addition, this publication provides the background information that is necessary to plan, implement, and customize this functionality to your particular environment. It provides guidance on running user applications with either application data or most application objects residing in an independent disk pool. Considering that you can also use independent disk pools in a cluster environment, this publication shows you the basic steps to make your independent disk pool switchable between two Power SystemsTM servers or a single server with multiple LPARs. Independent auxiliary storage pools have many business and technical advantages for Power Systems using IBM i. Not only are independent auxiliary storage pools (IASPs) easy to create and maintain, most applications can use them by simple work management changes. IASPs can provide immediate benefits to your enterprise.

Understanding AS/400 System Operations

Understanding AS/400 System Operations
Title Understanding AS/400 System Operations PDF eBook
Author Mike Dawson
Publisher MC Press
Pages 812
Release 2000-05
Genre IBM AS/400 (Computer)
ISBN 9781583470152

Download Understanding AS/400 System Operations Book in PDF, Epub and Kindle

Tis guide is intended for students learning computer operations and administration on the AS/400 computer system. Offering a unique approach to learning AS/400 operations with extensive hands-on labs, self-tests, and review questions, this book uses real-world situations to enable users to be productive with AS/400 operations. This book also covers the requirements of the two IBM AS/400 certification exams: AS/400 Associate System Operator Certification (test 052) and AS/400 Professional System Operator Certification (test 053). The primary goal of this book is to teach users how to perform day-to-day operations on an AS/400 computer system, including IPL, starting and stopping the system, backup and recovery, and system cleanup. Procedures covered include creating and maintaining user environments, device configuration and management, security implementation, work and data management, and TCP/IP configuration. Console operations discussed include jobs, message handling, and working with spool files and peripheral devices. Functions of Operations Navigator are covered, and Electronic Customer Support (ECS) and PTF upgrades are also introduced.

Mastering IBM I

Mastering IBM I
Title Mastering IBM I PDF eBook
Author Jim Buck
Publisher Mc PressLlc
Pages 937
Release 2011-05
Genre Computers
ISBN 9781583473566

Download Mastering IBM I Book in PDF, Epub and Kindle

A comprehensive introduction to IBM i—the operating system that runs on IBM's midrange computer systems (System i, iSeries, AS/400)—and its facilities, this in-depth resource uses step-by-step exercises, review questions, and chapter labs to teach new programmers the latest system concepts and tools. Reflecting system changes that have occurred since 2000, topics include Rational Developer for Power (RDP), RDP Screen Designer and Report Designer, IBM i Access for Windows, IBM i Access for Web, IBM DB2 Web Query for i, and Remote System Explorer (RSE).

Fortress Rochester

Fortress Rochester
Title Fortress Rochester PDF eBook
Author Frank G. Soltis
Publisher System iNetwork
Pages 444
Release 2001
Genre Computers
ISBN 9781583040836

Download Fortress Rochester Book in PDF, Epub and Kindle

IBM i 7.2 Technical Overview with Technology Refresh Updates

IBM i 7.2 Technical Overview with Technology Refresh Updates
Title IBM i 7.2 Technical Overview with Technology Refresh Updates PDF eBook
Author Ryan Cooper
Publisher IBM Redbooks
Pages 520
Release 2016-11-02
Genre Computers
ISBN 0738442070

Download IBM i 7.2 Technical Overview with Technology Refresh Updates Book in PDF, Epub and Kindle

This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.

IBM System i Security: Protecting i5/OS Data with Encryption

IBM System i Security: Protecting i5/OS Data with Encryption
Title IBM System i Security: Protecting i5/OS Data with Encryption PDF eBook
Author Yessong Johng
Publisher IBM Redbooks
Pages 308
Release 2008-07-24
Genre Computers
ISBN 0738485373

Download IBM System i Security: Protecting i5/OS Data with Encryption Book in PDF, Epub and Kindle

Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.