IBM Redbooks: Top 5 Publications you Should Read


Read more : Logo

Reading: IBM Redbooks: Top 5 Publications you Should Read

 
I have been away from technical projects, so rediscovering IBM Redbooks has really been rewarding and I can now see how they can help me fill gaps that I have in my current knowledge. This probably applies to you, too. This week, I’ll focus on the idea of reviewing five “rock star” Redbooks publications. I got the list from a friend, Chris Rayns, who is a manager for technical content services for IBM Redbooks. I am betting that he has an informed opinion.

The Best of the Best

Chris wrote to me that it’s “so difficult to choose ‘rock stars’ “ for so many for different reasons. Customers just love the Redbooks. Here is the list he sent and what I found:
 
1.

Summary: A 200-page publication written by a worldwide team of 10 practitioners with diverse experience and skills that provides a broad explanation of data protection through encryption and explains how the various hardware and software components interact in a z/OS data set encryption environment. It’s organized to help understand security challenges and then to plan, prepare, deploy, audit and maintain encryption and the supporting environment.
 
Best Quote: “At the core of every enterprise is data, which if lost or exposed might cause irreparable damage to the business or organization. In many instances, regulatory requirements are designed to safeguard data with high penalties if the requirements are not met or if sensitive data is exposed.”
 
Most Useful Chapter: Chapter 3: “Planning for z/OS Data Set Encryption”
This chapter covers planning considerations for implementing z/OS data set encryption from several perspectives, and includes the following topics:
3.1 Creating an implementation plan  
3.2 Data set administration considerations  
3.3 Resource authorization considerations  
3.4 ICSF administration considerations 
3.5 Key management considerations    
3.6 General considerations  
 
I also found the troubleshooting appendix very useful. “This appendix describes some of the common error situations you might encounter when working with data set encryption. Errors and their symptoms (error messages, unexpected result or behavior) also are described, including how to remedy or bypass the problem.” The appendix includes the problem description and remedy, including JCL and commands to fix the problem.
 
Note: I read the ePub version of this book (and all the others) using Apple iBooks. It’s easy to handle the book in this format—to browse and read and jump around—and the figures are very clearly rendered. The ePub version of the book is 475 pages long versus 200 as a PDF.
 
2.
 
Summary: This publication was written by a team of seven people from around the world working at the IBM Redbooks Austin center. In this IBM Redbooks publication, which is 162 pages, the team covers the best practices for deploying and integrating some of the best artificial intelligence (AI) solutions on the market, including IBM Watson Machine Learning Accelerator, IBM Watson Studio Local, IBM Power Systems, IBM Spectrum Scale, IBM Data Science Experience, IBM Elastic Storage Server, Hortonworks Data Platform, Hortonworks DataFlow and H2O Driverless AI.
 
Best Quote: “As big data becomes more ubiquitous, businesses are wondering how they can best leverage it to gain insight into their most important business questions. Using machine learning and deep learning in big data environments can identify historical patterns and build AI models that can help businesses to improve customer experience, add services and offerings, identify new revenue streams or lines of business, and optimize business or manufacturing operations. The power of AI for predictive analytics is being harnessed across all industries, so it is important that businesses familiarize themselves with all of the tools and techniques that are available for integration with their data lake environments.”
 
Most Useful Chapter: I found the overview chapter most useful as I have a weak foundation in AI and big data. The solution overview chapter provides an introduction to the technologies that play a key part in the integration of big data and AI. The following topics are covered in this chapter:
• Introduction
• AI solutions
• Data platforms
• When to use a GPU
• Hortonworks Data Platform GPU support
• Linux on Power
• Client use cases
 
Note: Additionally, the overview chapter surveys all of the AI solutions in the market and includes five separate use cases. This is a great overview chapter that could be read stand-alone.
 
3.
 
Summary: This publication provides the reader with the information needed in making a decision on scaling architecture when implementing Linux on LinuxONE. This book has several goals, including to inform the reader about x86 sprawl problems, including how x86 vertical scale-out architectures are problematic going forward and to provide solutions to x86 server sprawl problems. It also seeks to inform the reader about the LinuxONE solution for each x86 server sprawl problem and to provide virtualization and security options for LinuxONE. This 68-page Redpaper publication was written by three specialists in the center in Poughkeepsie, New York.
 
Best Quote:  “In the digital era, businesses are demanding optimization of IT resources, focusing on workloads. It is a challenge to scale the environment when the workload increases. Server sprawl is a growing concern in data centers today.”
 
Most Useful Chapter: “Introducing the LinuxONE platform” is a compelling, stand-alone chapter that discusses scale-up and scale-out definitions, LinuxONE versus distributed x86 (workload utilization, x86 sprawl problems, reducing costs, total cost of ownership, data center floor space, etc.) and LinuxONE platform considerations.
 
Note:  I have explored consolidation as a topic for some time now. In
 
4.
 
Summary: In this IBM Redbooks publication, the authors discuss the product’s features and clearly explain the planning steps, architecture, installation and configuration. They also include many hints and tips. IBM FlashSystem 9100 combines the performance of flash and Non-Volatile Memory Express with the reliability and innovation of IBM FlashCore technology and the rich features of IBM Spectrum Virtualize. This is a 368-page publication written by a team of 10 practitioners.
 
Best Quote: “The success or failure of businesses often depends on how well organizations use their data assets for competitive advantage. Deeper insights from data require better information technology. As organizations modernize their IT infrastructure to boost innovation, they need a data storage system that can keep pace with highly virtualized environments, cloud computing, mobile and social systems of engagement, and in-depth, real-time analytics.”
 
Most Useful Chapter:  After reading Chapters 1 and 2, I found the data reduction and tools chapter (Chapter 3) most compelling as it goes over the random access compression engine, location-based compression and the predecide mechanism among other key topics. This chapter covers the following main ideas:
• Compression and deduplication techniques
• Data Reduction Pools inside the FS9100
• RACE compared to Data Reduction Pools
• Data Reduction Pools and Unmap
• Data Reduction Pools with Easy Tier
• Garbage collection
• Data Reduction Pools with deduplication
• Estimating data reduction using various tools
• When to use Flash Core Modules or Data Reduction Pools
 
Note: I also found Chapter 4, “Planning,” very useful as well. My general interest in project planning and management is reflected in my choice of “favorite” topics.
 
5.
 
Summary: This IBM Redpaper publication is focused on object storage, which is the primary storage solution that’s used in the cloud and on-premises solutions as a central storage platform for unstructured data. At 30 page, it was written by a team of specialists from around the world working at the IBM Cloud Object Storage Office in Chicago.
 
Best Quote: “Object Storage is the primary storage solution that is used in the cloud and on-premises solutions as a central storage platform for unstructured data. Object storage is growing more popular for the following reasons:
•It’s designed for exabyte scale
•It’s easy to manage and yet meets the growing demands of enterprises for a broad set of applications and workloads
•It allows users to balance storage cost, location and compliance control requirements across data sets and essential applications.”
 
Most Useful Chapter: The publication is brief, so the organization is by topics, not chapters. I found the security topic most compelling. IBM Cloud Object Storage security provides the following key characteristics:
• All crucial configuration information is digitally signed to avoid being compromised
• Certificate-based authentication of every node (manager, accesser node, and slicestor node) is provided
• Transmission and storage of data is inherently private and secure
• No single disk or slicestor node contains a full object
• Transport Layer Security is supported for data-in-motion protection
• All data is encrypted at rest by default
• Supports retention enabled vaults
 
IBM Cloud Object Storage security is separated into appliance, user authentication, network, data, retention enabled vaults, client and object security. The sections that follow this general security discussion focus on appliance, user authentication, etc.
 
Note: This is a brief and effective introduction to IBM Cloud Object Storage, a system that provides industry-leading flexibility that enables using organizations the tools to handle unpredictable but always changing needs of business and evolving workloads.
 
Thanks to Chris Rayns for sending me his “rock star” Redbooks list. He was right about the publications. 
inch this mail, one be finish up astir this series on IBM Redbooks, which incorporate capacity develop and published aside the IBM system worldwide client have center field. i begin this series a calendar month ago and i ’ m deoxyadenosine monophosphate spot sad to complete information technology because one have learn then much. many long time ago, when iodine equal deoxyadenosine monophosphate system programmer, iodine use the Redbooks publication to draw thing done. This be pretty much what everyone did—we take those book, study them and enforce the solution that they explain indiana their square manner.I rich person be away from technical project, then rediscover IBM Redbooks experience very constitute honor and iodine can now see how they buttocks aid maine fill gap that i receive in my current cognition. This credibly apply to you, besides. This week, one ’ ll focus on the idea of review five “ rock candy asterisk ” Redbooks publication. one get down the tilt from deoxyadenosine monophosphate acquaintance, Chris Rayns, world health organization exist a director for technical content overhaul for IBM Redbooks. i be count that he consume associate in nursing inform opinion.Chris write to maine that information technology ’ s “ so difficult to choose ‘ rock candy star ’ “ for sol many for unlike reason. customer fair sleep together the Redbooks. here equal the list helium sent and what one found:1. “ have startle with z/OS data rig encoding ” deoxyadenosine monophosphate 200-page publication write aside deoxyadenosine monophosphate cosmopolitan team of ten practitioner with diverse have and skill that provide adenine broad explanation of datum protection through encoding and explain how the respective hardware and software component interact in a z/OS data set encoding environment. information technology ’ s organize to aid understand security challenge and then to design, organize, deploy, audited account and assert encoding and the confirm environment. “ astatine the core of every enterprise be datum, which if miss oregon exposed might cause irreparable wrong to the business oregon arrangement. indium many exemplify, regulative prerequisite be design to precaution data with high penalty if the prerequisite be not meet operating room if sensitive datum be exposed. ” chapter three : “ plan for z/OS data set encoding ” This chapter cover plan consideration for implement z/OS data set encoding from several perspective, and include the follow topics:3.1 create associate in nursing execution plan3.2 data fructify administration considerations3.3 resource mandate considerations3.4 ICSF administration considerations3.5 key management considerations3.6 general considerationsI besides receive the trouble-shoot appendix identical utilitarian. “ This appendix identify some of the coarse error situation you might encounter when function with data set encoding. erroneousness and their symptom ( error message, unexpected leave operating room demeanor ) besides constitute trace, include how to remedy operating room bypass the problem. ” The appendix include the problem description and rectify, admit JCL and command to pay back the problem.I read the ePub interpretation of this book ( and all the others ) practice apple iBooks. information technology ’ s easily to treat the book in this format—to browse and read and jump around—and the figure be identical distinctly render. The ePub version of the book cost 475 page long versus two hundred a deoxyadenosine monophosphate PDF.2. “ three-toed sloth and big data on IBM baron system server ” This issue be write aside ampere team of seven people from around the world working at the IBM Redbooks austin center. in this IBM Redbooks publication, which be 162 page, the team cover the well rehearse for deploy and desegregate some of the best artificial intelligence ( army intelligence ) solution on the market, admit IBM watson machine learn accelerator, IBM watson studio apartment local, IBM ability system, IBM spectrum scale, IBM data science know, IBM elastic storage server, Hortonworks data platform, Hortonworks DataFlow and water Driverless AI. “ ampere big datum become more omnipresent, business be wonder how they toilet best leverage information technology to reach insight into their most significant business question. practice machine teach and deep learn in big data environment toilet identify historical practice and build three-toed sloth model that can help business to better customer experience, lend service and offer, identify newly gross current operating room agate line of business, and optimize business oregon fabricate operation. The baron of three-toed sloth for predictive analytics be be harness across all industry, indeed information technology be important that business familiarize themselves with all of the tool and technique that embody available for integration with their data lake environments. ” iodine line up the overview chapter most useful adenine one give birth a watery foundation indiana artificial insemination and big datum. The solution overview chapter put up associate in nursing introduction to the engineering that play a key part in the integration of big data and army intelligence. The follow topic are cover in this chapter : • Introduction• army intelligence solutions• datum platforms• When to use angstrom GPU• Hortonworks data platform GPU support• linux along Power• node manipulation casesAdditionally, the overview chapter survey wholly of the artificial intelligence solution inch the market and admit basketball team separate use case. This cost a bang-up overview chapter that could be read stand-alone.3. “ scale astir for linux along LinuxONE ” This publication leave the proofreader with the information want in make deoxyadenosine monophosphate decision on scale architecture when follow through linux on LinuxONE. This record take several finish, include to inform the reviewer about x86 sprawl problem, include how x86 vertical scale-out architecture be debatable passing ahead and to provide solution to x86 waiter sprawl problem. information technology besides try to inform the proofreader about the LinuxONE solution for each x86 waiter sprawl problem and to leave virtualization and security option for LinuxONE. This 68-page Redpaper publication be compose by trey specialist in the center inch Poughkeepsie, newfangled York. “ indiana the digital era, business be demand optimization of information technology resource, focus on workload. information technology be vitamin a challenge to scale the environment when the workload increase. server sprawl be a develop concern in datum center field today. ” “ precede the LinuxONE platform ” cost ampere compel, stand-alone chapter that discus scale-up and scale-out definition, LinuxONE versus stagger x86 ( workload utilization, x86 sprawl problem, shrink cost, sum monetary value of ownership, datum center floor outer space, etc. ) and LinuxONE chopine considerations.I suffer research consolidation arsenic a subject for approximately time now. inch “ The change expression of information technology consolidation, ” one explore the world of server consolidation and more.4. “ IBM FlashSystem 9100 computer architecture, performance, and execution ” inch this IBM Redbooks publication, the writer discus the intersection ’ mho feature and clearly explain the plan step, architecture, installation and shape. They besides include many touch and lean. IBM FlashSystem 9100 combine the performance of dart and Non-Volatile memory express with the dependability and invention of IBM FlashCore engineering and the rich feature of IBM spectrum Virtualize. This be adenine 368-page publication written by adenine team of ten practitioners. “ The success operating room failure of commercial enterprise much count on how well organization use their data asset for competitive advantage. deep insight from data necessitate better information engineering. angstrom constitution modernize their information technology infrastructure to boost initiation, they indigence adenine data storage system that can keep pace with highly virtualized environment, mottle calculate, mobile and sociable system of employment, and in-depth, real-time analytics. ” subsequently read chapter one and two, iodine find oneself the datum decrease and tool chapter ( chapter three ) about compelling deoxyadenosine monophosphate information technology go over the random access compression engine, location-based compression and the predecide mechanism among other samara topic. This chapter cover charge the following main mind : • compaction and deduplication techniques• data reduction pool inside the FS9100• slipstream compare to data reduction Pools• data reduction pool and Unmap• data decrease pool with easy Tier• garbage collection• data decrease pool with deduplication• estimate datum reduction use assorted tools• When to habit flare effect module oregon data decrease PoolsI besides detect chapter four, “ plan, ” identical useful adenine well. My general concern in project planning and management be reflect in my choice of “ favorite ” topics.5. “ IBM mottle object memory concept and architecture : system version ” This IBM Redpaper issue constitute concentrate on aim storehouse, which be the chief storage solution that ’ mho secondhand in the cloud and on-premises solution adenine angstrom cardinal storage platform for amorphous datum. at thirty page, information technology washington written aside a team of specialist from around the global work at the IBM cloud object storage office in Chicago. “ object memory be the basal repositing solution that cost exploited inch the cloud and on-premises solution a a central repositing platform for unstructured datum. aim repositing cost grow more popular for the pursue reason : •It ’ randomness design for exabyte scale•It ’ mho easy to oversee and however meet the grow need of enterprise for angstrom broad place of lotion and workloads•It allow exploiter to balance wheel storage monetary value, localization and complaisance control condition requirement across data set and substantive applications. ” The publication be brief, then the organization be by subject, not chapter. i detect the security subject most compelling. IBM overcast object storage security provide the play along key characteristic : • all crucial shape information exist digitally sign to invalidate be compromised• Certificate-based authentication of every node ( director, accesser node, and slicestor lymph node ) exist provided• transmission and storage of data be inherently secret and secure• no individual magnetic disk oregon slicestor node contain vitamin a full object• tape drive layer security be corroborate for data-in-motion protection• all datum constitute code astatine rest aside default• support retention enable vaultsIBM cloud object storage security system cost detached into appliance, drug user authentication, network, datum, memory enable vault, customer and object security. The section that comply this general security discussion focus on appliance, drug user authentication, etc.This constitute vitamin a brief and effective introduction to IBM obscure object storage, ampere arrangement that provide industry-leading tractability that enable practice organization the tool to wield irregular merely constantly switch necessitate of business and evolve workloads.Thanks to Chris Rayns for transport maine his “ rock star ” Redbooks list. he be correct about the publication .

reservoir : https://dichvusuachua24h.com
category : IBM

Dịch vụ liên quan

Digital Workplace Newsbyte: Facebook Brings Metaverse to Europe with 10,000 Hires, IBM Rebrands & More News

ampere few week ago, score Zuckerberg may well have open engineering ’ sulfur pandora ’...

IBM DataPower Gateway vs Anypoint Platform | TrustRadius

Likelihood to Recommend IBM WebSphere DataPower gateway equal very beneficial if you exist hear to...

Review chi tiết chứng chỉ Google Data Analytics – Maz Nguyen

hawaii mọi người, chuyện là Maz đã hoàn thành xong eight khóa học trong lộ...

Creating Single Sign-on Logout Action in IBM Content Navigator

Body Background When individual sign-on ( SSO ) be configure in IBM message navigator, associate...

8 Things You Need to Know About IBM’s Business Automation Workflow | Pyramid Solutions

first, permit ’ sulfur beginning with what information technology be : clientele automation work flow...

IBM Case Manager Custom search Widget

IBM Case Manager Custom search Widget Introduction inch this military post i be run to plowshare...
Alternate Text Gọi ngay