Showing documents 21 to 30 of 701  Previous  Next

Results per page: 5 | 10 | 20


cover image

IBM CICS and Liberty: What You Need to Know
z Systems Software

Redbooks, published 15 Jan 2016, last updated 15 Mar 2017

This IBM® Redbooks® publication, intended for architects, application developers, and system programmers, describes how to design and implement Java web-based applications in an IBM CICS® Liberty JVM server. This book is based on IBM CICS Transaction Server V5.3 (CICS TS) using the embedded IBM WebSphere® Application Server Liberty V8.5.5 technology. Liberty is an asset to your organization, whether you intend to extend existing enterprise services hosted in CICS, or develop new web-based applications supporting new lines of business. Fundamentally, Liberty is a composable, dynamic profile ... [more]


cover image

IBM z Systems Integration Guide for the Hybrid Cloud and API Economy
Mobile

Redpaper, published 27 Feb 2017

Today, organizations are responding to market demands and regulatory requirements faster than ever by extending their applications and data to new digital applications. This drive to deliver new functions at speed paved the way for a huge growth in cloud applications, such as those applications hosted in IBM® Bluemix®. One of the most common ways to integrate cloud applications with enterprise application logic and business data is the use of application programming interfaces (APIs). By extending enterprise applications to form a hybrid cloud environment, you can capitalize on investments ... [more]


cover image

Benefits of Configuring More Memory in the IBM z/OS Software Stack
z Systems

Redpaper, published 21 Jan 2017, last updated 18 Feb 2017

Significant performance benefits can be realized by increasing the amount of memory that is assigned to various functions in the IBM® z/OS® software stack, operating system, and middleware products. IBM DB2® and IBM MQ buffer pools, dump services, and large page usage are just a few of the functions whose ease of use and performance can be improved when more memory is made available to them. The following benefits can realized:
- Reduced I/O operations
- Reduced CPU usage
- Improved transaction response time
- Potential cost reductions
Although the magnitude ... [more]


cover image

IBM Service Management Suite for z/OS with Service Management Unite
IT Service Management

Solution Guide, published 1 Feb 2017

IBM® Service Management Suite for z/OS provides operators a transparent view of the IBM z Systems® compute landscape, including central electronic complexes (CECs), LPARs, and Sysplexes with key performance indicators for improved problem isolation, analysis, and diagnosis. This IBM Redbooks® Solution Guide describes Service Management Suite for z/OS and its new user interface, IBM Service Management Unite, and includes high-level architectures (for each solution) with their key components. The guide also explains the integration of Service Management Unite with Service Management Suite for ... [more]


cover image

z/OS PKI Services: Quick Set-up for Multiple CAs
Security

Redbooks, published 20 Sep 2016, last updated 20 Jan 2017

If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 ... [more]


cover image

IBM z/OS V2R2: Operations
z Systems

Redbooks, published 17 Dec 2015, last updated 10 Jan 2017

This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Operations areas with IBM z/OS® V2R2. This book includes the following chapters: - Chapter 1, “SMFLIMxx parmlib member” on page 1 describes how to set up job cancel decisions and region and MEMLIMIT values, based on the job and its environment. - Chapter 2, “REGIONX” on page 5 describes the new REGIONX JCL keyword that supports two storage specifications and with which the user can specify values for their below-the-line storage and above-the-line storage needs. - ... [more]


cover image

IBM z13 and IBM z13s Technical Introduction
z Systems

Redbooks, published 8 Mar 2016, last updated 10 Jan 2017

This IBM® Redbooks® publication introduces the latest IBM z Systems™ platforms, the IBM z13™ and IBM z13s. It includes information about the z Systems environment and how it can help integrate data, transactions, and insight for faster and more accurate business decisions. The z13 and z13s are state-of-the-art data and transaction systems that deliver advanced capabilities that are vital to modern IT infrastructures. These capabilities include:
- Accelerated data and transaction serving
- Integrated analytics
- Access to the API economy
- Agile development and ... [more]


cover image

ABCs of z/OS System Programming Volume 10
z Systems Software

Redbooks, published 20 Mar 2012, last updated 30 Dec 2016

The ABCs of z/OS System Programming is an 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection will serve as a powerful technical tool. The contents of the volumes are as follows: ... [more]


cover image

IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support
Security

Redpaper, published 23 Dec 2016

What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger print or retinal scan. Something that you have, such as a hard token (for example, a key fob or soft token), which is software-based).
This IBM Redpaper™ publication helps you install, customize, and configure IBM MFA for z/OS® V1.1.0. It also provides information that is based on our experience in a controlled ... [more]


cover image

Mainframe from Scratch: Hardware Configuration and z/OS Build
z Systems

Redbooks, published 22 Dec 2016

This IBM® Redbooks® publication helps you install, customize, and configure an IBM z13® and build z/OS® environments. This book is intended for those readers who are new to the platform and are faced with the task of installing a mainframe for the first time. By the term mainframe in this instance, we refer to the hardware and the system software. The intention is to show you how this installation can be done. Volume 1 shows you how we set up a mainframe and installed z/OS V2R2 and IBM DB2® V11. The starting point is a basic hardware configuration of an IBM z13 and DS8000® as shipped ... [more]


The above is a list of IBM Redbooks and Redpapers on z Systems, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



IBM Redbooks Mobile App
Redbooks mobile app

The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


Follow IBM Redbooks

Follow IBM Redbooks