IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment

23 Feb 2024, Redbooks ... Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely ...

Securing Your Cloud: Assessing z/VM and Linux on IBM Z Security

21 Dec 2023, Draft Redbooks ... The cloud has become an integral part of the business technological landscape. As more and more workloads are being offloaded to IBM® Z based cloud environments, it is important to ensure that these workloads and environments are ...

Red Hat OpenShift on IBM Z and LinuxONE Cookbook

16 Nov 2023, Draft Redpapers ... Whether you need to run mission-critical workloads, handle massive data volumes or support high-demand applications, Red Hat OpenShift Container Platform on IBM® Z or IBM LinuxONE can give you the tools you need to build, deploy and manage ...

IBM Cloud Pak for Data on IBM Z

11 Jul 2023, Redguides ... Most industries are susceptible to fraud, which poses a risk to both businesses and consumers. According to The National Health Care Anti-Fraud Association, health care fraud alone causes the nation around $68 billion annually. This ...

Leveraging LinuxONE to Maximize Your Data Serving Capabilities

24 May 2022, Redbooks ... Data modernization enables organizations to access enterprise data and extend the business value of core data that has been collected over many years. Data modernization is any initiative or process that results in more relevant and ...

Securing Your Critical Workloads with IBM Hyper Protect Services

22 Feb 2022, Redbooks ... Many organizations must protect their mission-critical applications in production, but security threats also can surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the ...

The Virtualization Cookbook for IBM Z Volume 2: Red Hat Enterprise Linux 8.2

19 Oct 2021, Redbooks ... This IBM® Redbooks® publication is Volume 2 of a five-volume series of books entitled The Virtualization Cookbook for IBM Z®. This volume includes the following chapters: Chapter 1, “Installing Red Hat Enterprise Linux on ...

The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2

15 Jul 2021, Redbooks ... This IBM® Redbooks® publication is volume one of five in a series of books entitled The Virtualization Cookbook for IBM Z. The series includes the following volumes: The Virtualization Cookbook for IBM z Systems® Volume 1: ...

Consolidation Planning Workbook: Practical Migration from x86 to IBM LinuxONE

10 Dec 2020, Redpapers ... IBM® LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It is designed to run more transactions faster and with more security and reliability specifically for the open community. It ...

Maximizing Security with LinuxONE

10 Aug 2020, Redpapers ... LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of ...

Securing Your Cloud: IBM Security for LinuxONE

1 Aug 2019, Redbooks ... As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your ...

Getting Started with Linux on Z Encryption for Data At-Rest

8 Apr 2019, Redbooks ... This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and ...

Scale up for Linux on IBM Z

12 Dec 2017, Redpapers ... This book was written by IBM® IT specialists who have experience implementing IBM Z® solutions, especially Linux on IBM LinuxONE™ (LinuxONE) or IBM Z servers. Therefore, the content of this book follows the guidelines from Linux and IBM ...

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE

19 Oct 2016, Redbooks ... As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your ...

Security for Linux on System z: Securing Your Network

22 Feb 2013, Web Doc ... The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies ...

Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones

17 Feb 2011, Archived Redguides ... Many customers wanting to do Linux® server consolidation and deployment to IBM® System z® experience challenges in balancing the security of a physical “air gap” with the low cost of consolidation on a single box: It goes against their ...

IBM Smart Analytics Cloud

30 Sep 2010, Archived Redbooks ... This IBM Redbooks® publication presents a Smart Analytics Cloud. The IBM Smart Analytics Cloud is an IBM offering to enable delivery of business intelligence and analytics at the customer location in a private cloud deployment. The ...

Experiences with Oracle Solutions on Linux for IBM System z

28 May 2009, Archived Redbooks ... Linux® for System z® offers many advantages to customers who rely upon the IBM® mainframe systems to run their businesses. Linux for System z takes advantage of the qualities of service in the System z hardware and in z/VM® , making it a ...

Fibre Channel Protocol for Linux and z/VM on IBM System z

11 Jan 2008, Archived Redbooks ... This IBM® Redbooks® publication builds upon the existing Linux on zSeries: Fibre Channel Protocol Implementation Guide, SG24-6344, to produce a System z™ book that includes (among other things): - A general introduction to Fibre Channel ...

SSL Server Implementation for z/VM 5.2

18 Oct 2007, Archived Redpapers ... This IBM Redpaper publication gives a broad understanding of how to set up and configure the SSL server of z/VM 5.2 in a short time frame. It also provides an easy method to protect the communication to z/VM server, especially for ...

Running Linux on IBM System z9 and zSeries under z/VM

21 Feb 2006, Archived Redbooks ... This IBM Redbooks publication discusses running Linux under z/VM on IBM System z9 and zSeries platforms. We describe enhancements available in z/VM Version 5.1. The intended audience for this book is IT administrators responsible for ...

Running Linux Guest in less than CP Privilege Class G

11 Jun 2004, Archived Redpapers ... This paper provides guidance for hardening a z/VM system running Linux virtual machines in a hostile environment. Access to specific CP commands and resources is granted to a VM user based on the privilege classes assigned to the user. ...

Creating a User Home directory when you use LDAP Authentication

25 May 2004, Archived Web Doc ... Lightweight Directory Access Protocol (LDAP) allows a system administrator to centrally define and manage Linux users. Using LDAP, an administrator can define a user to many Linux systems. User information,such as the user password and ...

Linux on IBM eServer zSeries and S/390: System Management

12 Mar 2003, Archived Redbooks ... This IBM Redbooks publication describes system management for Linux on IBM eServer zSeries and S/390. It will help you understand the primary management processes for a set of Linux images on zSeries and S/390, and how to identify ...

Linux for S/390

21 Mar 2002, Archived Redbooks ... The strengths of S/390 are well known: rock-solid reliability, the ability to run multiple diverse workloads, and highly scalable technology make S/390 an ideal choice for hosting key e-business applications. Now Linux has joined the S/390 ...

Linux on IBM eServer zSeries and S/390: ISP/ASP Solutions

20 Dec 2001, Archived Redbooks ... This IBM Redbooks publication describes how Linux can be combined with z/VM on zSeries and S/390 hardware - the mainframe. This combination of hardware and operating systems enables Internet Service Providers (ISP) and Application Service ...


Search Tips



To perform a simple search, type one or more terms in the search box and click the Search button. The search function returns a list of Web pages that contains your terms. During this process, search finds singular and plural forms of many words and corrects minor misspellings.The search function is not case sensitive.

The most relevant pages display at the top of your results list. Alternatively, you can sort results "by Publish Date."

Take the following actions to make your search more effective:

  • Be specific. Try using terms that are unique or try adding descriptive terms. For example, a search for DB2 might return too many results. If you are really looking for DB2 UDB, enter db2 udb or db2 udb linux.
  • Try using synonyms. If you get too few results or do not find what you are looking for, try synonyms for your original terms.
  • Check your spelling. A single misspelled or mistyped term can change your results.
  • Learn from your results. Your search might not return exactly what you are looking for, but scanning the results can help you see the words that were found and give you ideas for other searches.

Improving your search terms

Most of the time, a simple search finds relevant results. The following search operators help you to refine your search.

Exact phrase searches

Add double quotation marks (" ") around specific phrases to focus your search on the exact phrase. A phrase search can greatly reduce the number of results. For example, enter:

"hybrid cloud"

The results contain pages that have the exact phrase hybrid cloud in them.

Adding double quotation marks around your search words also prevents spelling corrections.


Excluding terms

Include a minus sign (-) at the beginning of a term to exclude all the pages with that term. Do not leave any space between the minus sign and the term, but leave a space between search terms. For example, enter:

POWER8 -virtualization

The results contain pages with POWER8 but not the word virtualization.


Exact terms

The IBM search function automatically searches for synonyms of many terms. Include a plus sign (+) at the beginning of a term to require that the results match the term precisely. Do not leave any space between the plus sign and the term, but leave a space between search terms. For example, if you want to search for z/OS workshop and not z/OS training, enter:

z/OS +workshop

The results contain pages with z/OS and workshop, and synonyms for workshop are not used.


Expanding your search with the OR operator

Use the OR operator between terms to indicate that you want the results to contain either one of several terms. You must type OR in capital letters. For example, enter:

storwize v7000 OR v3500

The results contain pages that have storwize v7000 or storwize v3500.

IBM Redbooks Badges
Redbooks Author Digital Badge

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks