Today, organizations face tremendous challenges with data explosion and information governance. InfoSphere™ Optim™ solutions solve the data growth problem at the source by managing the enterprise application data. The Optim Data Growth solutions are consistent, scalable solutions that include comprehensive capabilities for managing enterprise application data across applications, databases, operating systems, and hardware platforms. You can align the management of your enterprise application data with your business objectives to improve application service levels, lower costs, and mitigate risk.
In this IBM® Redbooks® publication, we describe the IBM InfoSphere Optim Data Growth solutions and a methodology that provides implementation guidance from requirements analysis through deployment and administration planning. We also discuss various implementation topics including system architecture design, sizing, scalability, security, performance, and automation.
This book is intended to provide various systems development professionals, Data Solution Architects, Data Administrators, Modelers, Data Analysts, Data Integrators, or anyone who has to analyze or integrate data structures, a broad understanding about IBM InfoSphere Optim Data Growth solutions. By being used in conjunction with the product manuals and online help, this book provides guidance about implementing an optimal solution for managing your enterprise application data.
Table of contents
Chapter 1. Introduction to IBM InfoSphere Optim
Chapter 2. Project planning and considerations
Chapter 3. Understanding the IBM InfoSphere Optim Data Growth solutions and software
Chapter 4. Developing an InfoSphere Optim Data Growth Solution architecture
Chapter 5. Sizing the Optim infrastructure
Chapter 6. Data sources
Chapter 7. Accessing and viewing archived data
Chapter 8. Design and configuration
Chapter 9. Deployment and operational considerations
Chapter 10. Optim performance considerations
Chapter 11. Security
Chapter 12. Troubleshooting
Appendix A. Data model
Appendix B. Functions and actions access permissions by roles