IBM Z Redbooks

 

Enterprise IT Infrastructure for cognitive business

 
test

August 16, 2022

Update: Virtualization Cookbook for IBM Z Volume 5: KVM

This IBM® Redbooks® updated publication provides a broad explanation of the kernel-based virtual machine (KVM) on IBM Z® and how it can use the z/Architecture®. It focuses on the planning of the …

Read now
test

August 10, 2022

Building a Red Hat OpenShift Environment on IBM Z

Cybersecurity is the most important arm of defense against cyberattacks. With the recent increase in cyberattacks, corporations must focus on how they are combating these new high-tech threats. When …

Read now
test

August 03, 2022

Transitioning to Quantum-Safe Cryptography on IBM Z

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, …

Read now


Update: Virtualization Cookbook for IBM Z Volume 5: KVM

August 16, 2022, Draft Redbooks

This IBM® Redbooks® updated publication provides a broad explanation of the kernel-based virtual machine (KVM) on IBM Z® and how it can use the z/Architecture®. It focuses on the planning of the environment and provides installation and configuration definitions that are necessary to build, manage, and monitor a KVM on Z environment. This publication applies to the supported Linux on Z ...


Building a Red Hat OpenShift Environment on IBM Z

August 10, 2022, Redbooks

Cybersecurity is the most important arm of defense against cyberattacks. With the recent increase in cyberattacks, corporations must focus on how they are combating these new high-tech threats. When establishing best practices, a corporation must focus on employees’ access to specific workspaces and information. IBM Z® focuses on allowing high processing virtual environments while maintaining a ...


Transitioning to Quantum-Safe Cryptography on IBM Z

August 03, 2022, Redbooks

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start ...


Become Data Driven with IBM Z Infused Data Fabric

August 02, 2022, Redpaper

The expansion of digital transformation initiatives resulted in the exponential rise of data generation. It is now apparent that for organizations to meet their rapidly changing business needs, they must use their most current data to fuel their insights. However, how to do so efficiently and effectively is still a challenge for most organizations that are trying to solve today’s complex ...


What AI Can Do for You: Use Cases for AI on IBM Z

August 02, 2022, Redpaper

Artificial intelligence (AI) and machine learning (ML) are talked about as though they are in a distant future. That future is here. We live in a world where technology is fully integrated with how we live. People own smartphones, smart wearables, smart TVs, and so on. With the integration of technology into almost every aspect of our everyday lives, there is an ever-growing, massive amount of ...


IBM z16 (3931) Technical Guide

August 01, 2022, Draft Redbooks

This IBM® Redbooks® publication describes the features and functions the latest member of the IBM Z® platform, built with the IBM Telum processor, the IBM z16™ (machine type 3931). It includes information about the IBM z16 processor design, I/O innovations, security features, and supported operating systems. The IBM Z platform is recognized for its security, resiliency, performance, and scale, ...


IBM DS8000 Thin Provisioning (Updated for Release 9.3)

July 15, 2022, Redpaper

Ever-increasing storage demands have a negative effect on an organization’s IT budget and complicate the overall storage infrastructure and management. Companies are looking at ways to use their storage resources more efficiently. Thin provisioning can help by reducing the amount of unused storage that is typically allocated to applications or users. Available for the IBM DS8000 for Fixed Block ...


IBM z15 (8561) Technical Guide

July 13, 2022, Redbooks

This IBM® Redbooks® publication describes the features and functions the latest member of the IBM Z® platform, the IBM z15™ (machine type 8561). It includes information about the IBM z15 processor design, I/O innovations, security features, and supported operating systems. The z15 is a state-of-the-art data and transaction system that delivers advanced capabilities, which are vital to any ...


IBM TS7700 Release 5.2.2 Guide

July 07, 2022, Redbooks

This IBM® Redbooks® publication covers IBM TS7700 R5.2. The IBM TS7700 is part of a family of IBM Enterprise tape products. This book is intended for system architects and storage administrators who want to integrate their storage systems for optimal operation. Building on 25 years of experience, the R5.2 release includes many features that enable improved performance, usability, and security. ...


IBM Db2 13 for z/OS and More

June 20, 2022, Redbooks

IBM® Db2® 13 for z/OS® delivers a host of major new advancements for using, maintaining, and administering this enterprise-critical database platform. In parallel with the development of the IBM z16 hardware and the z/OS 2.5 operating system, Db2 13 leverages the latest transformative innovations on the IBM Z® platform to improve database performance, availability, scalability, reliability, and ...

 
1–10 of 138 items
of 14 pages
 

Learn more