Tools for Managing Big Data Analytics on z/os
|
|
- Elinor Owen
- 8 years ago
- Views:
Transcription
1 Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID Test link:
2 Introduction Heterogeneous Analysis Addressing the process of packaging and transferring z/os based information to an off-board analytic platform in an Effective, Cost-efficient and Secure manner. What are some major hurdles that exploitation of advanced System z facilities can overcome in this venue? 2
3 Introduction Heterogeneous Analysis Data Transformation Code page differences (EBCDIC/ASCII) Data Structures (Binary, Endian mode numerics, Parsing) Portability between dissimilar file system formats Data Packaging (multiple discrete components) Data Protection Data Volume Total raw size Number of exchanges 3
4 4 Finding the Sweet Spot
5 5 What is the business impact of selected designs and facilities?
6 Focus on experiences with System z Facilities that help address two areas Data Transformation Code page differences (EBCDIC/ASCII) Data Structures (Binary, Endian numerics, Parsing) Portability between dissimilar file system formats Data Packaging (multiple discrete components) Data Protection - Encryption Data Volume Hardware Assisted Compression Total raw size Number of exchanges 6
7 Data Protection Data-Centric Encryption using ICSF Machine z10- EC 2097 z10- BC 2098 z z zec zbc Algorithm Supported DES 3DES DES 3DES DES 3DES DES 3DES DES 3DES DES 3DES AES128, 192, 256 AES128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 Crypto Hardware CPACF CEX2C CPACF CEX2C CPACF CEX3C CPACF CEX3C CPACF CEX3C CPACF CEX3C CEX3C CEX3C CEX4C CEX4C 7
8 Application Design Cryptographic Design Influences Data Exchange Format Collection with associative constructs Data Transport (Container Format) In-flight and at rest security Authentication and decryption service availability Cryptographic Identity and Associated Key Management Dynamic vs. Static Keys Inter-system Key Coordination Data Recovery (Contingency Keys) Resource Capacity Timeliness of service 8
9 9 Key Exposures The need for Key Management
10 Crypto Facilities ICSF CKDS & PKDS RACF/ACF2/Top Secret Proprietary Certificate Store OpenPGP Keyrings Application Services LDAP Administration Certificate Cryptographic CEXnC / CPACF / Software Crypto X.509 Certificates Public Certificate Authority Native X.509 Certificates 10
11 Data-Centric Encryption ICSF Data Encipherment Algorithms RSA PKi Encryption Losing ground for longevity due to high cost of processing increased key lengths Symmetric Clear Key DES class, AES ( bit key strength) May be employed with passphrase-generated key or CKDS stored key Symmetric Protected Key (SYMCPACFWRAP) CKDS Secure Key 11
12 Symmetric Key Operational Comparison Clear Fast, but Risky Protected Fast & Secure Secure Slow o o ICSF Software -or- System z CPACF o System z CPACF o Cryptographic Card o o Passphrase Value -or- ICSF CKDS Registered (clear) o ICSF CKDS Registered (encrypted) o ICSF CKDS Registered (encrypted) 12
13 13 Leverage ICSF CKDS to Protect Passphrase Derived Keys
14 14 Illustrate Registered ICSF CKDS Key Set
15 15 CKDS Policy Control Duplicate Key Value Protection
16 RACF key ring/certificate with PKDS Label:MSTEBNERSHARETEST ç RACF Label (r_datalib API access) Certificate ID:2QPVweLV4uPFwtXF2fLw8P1A Status:TRUST Start Date:2013/12/17 19:00:25 End Date: 2014/01/18 19:00:24 Serial Number:10F0F1FF3C718DEE4D24BBEDA47A49D0 Issuer's Name:CN=UTN-USERFirst-Client Authentication and .OU=http: // USERTRUST Network.L=Salt Lake City.SP=UT.C=US Subject's Stebner.OU=Corporate Secure .OU=Issued through PKWARE E-PKI Manager.O=PKWARE.648 N PL ANKINTON AVE.L=MILWAUKEE.SP=WI C=US Key Usage:HANDSHAKE Key Type:RSA Key Size:2048 Private Key:YES PKDS Label:SHARE2014MSTEBNER ç ICSF PKDS Label (implied access) 16
17 17 What is the business impact of selected designs and facilities?
18 Inherited OpenPGP Data Flow Encryption Layer Compression Layer Literal Data Layer 18
19 Consider the Basic Data Flow Simple copies from phase to phase 19
20 20 Understand OpenPGP Internal Stream Formatting (RFC 2440 or 4880)
21 OpenPGP Data Flow Overhead Additional data manipulation logic from phase to phase 21
22 Illustration of Container Format Influence on Encipherment Facilities Symmetric Keys X.509 Certificates OpenPGP RACF/ACF/CA-TSS ICSF PKDS ICSF CKDS FIPS GOOD WORK REQUIRED NOT AVAILABLE 22
23 Compression Why is it important? Data acquisition APPLICATION SERVICES GCP/ ziip/zedc Result: Compressed & Encrypted Data on Target Platform Data is offloaded, encrypted, and compressed. 23
24 What Compression Facilities are Available on System z? Software-based General CP (e.g. gzip, OpenPGP, PKZIP, zlib) Any viable cross-platform compatible algorithm chosen for implementation Deflate (RFC1951) is a commonly used algorithm that combines LZ77 sliding dictionary compression with Huffman coding. Software using ziip offload Execute software routines on a System z9 or later Requires APF authorization to run SRB enclave scheduling Provides economic compression, but may not improve latency performance. 24
25 What Compression Facilities are Available on System z? Hardware-based System z CMPSC Static Dictionary hardware compression Available since the early 1990 s Static dictionary LZ77 Limited applicability outside of z/os System z Enterprise Data Compression hardware New with zec12 and zbc12 systems PCIE adapter card Implements Deflate algorithm 25
26 Compression Facility Functional Comparison Software General CP Software on ziip CMPSC Static Dictionary zedc Portable Generalized Compression Requirements General CP Capacity System z9 ziip Capacity (APF) Pre-defined data structures zec12/zbc12 z/os 2.1 zedc Card GOOD WORK REQUIRED NOT AVAILABLE 26
27 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (I) IBM Announcement; Document Number: ZSB03059USEN Implements RFC 1951 Deflate compression When zlib uses zedc, there can be up to 118X reduction in CPU and up to 24X throughput improvement One or more PCIE cards servicing multiple partitions (15) Currently supported only under a native z/os LPAR Check IBM statements of direction Optimized for larger amounts of data Has configurable minimum size limits (4k floor) PTFs available for z/os 1.12 and 1.13 to inflate Also see SMP/E FIXCAT(IBM.Function.ZEDC) 27
28 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (III) System Use Cases SMF Phased Roll-out intentions BSAM/QSAM (infrastructure layer) DFSMSdss /DFSMShsm backup/restore z/os Java Technology Edition, Version 7 Detailed SHARE sessions 15209: Experiences with IBM zaware and zedc 15099: zenterprise Data Compression: What is it and How Do I Use it? (Wed. 4:30 PM) 15080: z/os zenterprise Data Compression Usage and Configuration 28
29 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (IV) z/os V2R1.0 MVS Callable Services for HLL (Ch ) Deflate stream compatible with GZIP, PKZIP, OpenPGP Hardware availability checks to determine availability IBM-provided compatible C library functions APF Authorized API for single-block compress/inflate Unauthorized zlib interface (streaming data) 29
30 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (V) z/os V2R1.0 MVS Callable Services for HLL (Ch ) Unauthorized zlib interface (streaming data) Uses zlib.net z_stream programming interface (subset) Raw Deflate Stream or GZIP modes (CRC32 with GZIP) libzz.a include wrapper Controlled by SAF-protected FACILITY class resource FPZ.ACCELERATOR.COMPRESSION z/os UNIX _HZC_COMPRESSION_METHOD environment control variable May fall back to zlib software routines depending on zedc requirements, including size limitations PARMLIB IQPPRMxx DEFMINREQSIZE (4K) and INFMINREQSIZE (16K) 30
31 IBM zenterprise Data Compression PKWARE Early Test Program Experience Objective Assess compression using software GCP, ziip and zedc zec12 5 General CPs, 2 ziips, 1 zedc Workloads Single system (no LPAR sharing of zedc) Large (1gb+) linear with multiple parallel (80 concurrent) Small (256k) high volume Metrics Elapsed Time Processor time 31
32 zedc Operations Console Display General PCIE Status 32
33 zedc Operations Display zedc PCIE Adapter Status 33
34 34 zedc Operational Monitoring (II)
35 zedc Processing Characteristics Multi-tasking with the zlib API is available zlib API may not run on the zedc hardware (per design) Different minimum buffer size thresholds for deflate & inflate Only one level of zedc Deflate compression 9 levels available in zlib software Internal implementations of RFC 1951 Deflate may differ May experience varying compression ratios (based on level) right around the minimum buffer size restriction. 35
36 IBM zenterprise Data Compression PKWARE Early Test Program Experience Initial Results Overview (I) zedc sustained 1gb+ per second of raw compression zedc capacity exceeded application resource constraints The affects of I/O and application processing prevented saturation of zedc Under appropriate conditions, ziip met or exceeded application performance when compared to zedc. Optimized zlib C routines showed benefits over the libzz.a wrapper code under some conditions. Small files under the minimum buffer size Inflation 36
37 IBM zenterprise Data Compression PKWARE Early Test Program Experience Initial Results Overview (II) ETP limitations of first implementation identified Buffer allocation issues Buffer release Rejected concurrent requests for the same size buffer Compression ratio (77% vs. 89% for software implementations) 37
38 38 Effect of Resource Availability zedc vs. ziip
39 39 Incorporate Design with Facility Transactional Example (1.5mb each)
40 Summary Slide The Mainframe is typically the source of record for critical business data Data needs to move off the mainframe quickly, efficiently and securely. Numerous facilities on z/os exist to make this quick, efficient and secure ziip, CryptoExpress4S, CPACF, zedc Proper Transformation is critical to reduce hardware dependencies and facilitate long term viability 40
Sharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
More informationA guide for creating a more secure, efficient managed file transfer methodology
Sterling Connect:Direct & SecureZIP A guide for creating a more secure, efficient managed file transfer methodology JOE STURONAS CHIEF TECHNOLOGY OFFICER, PKWARE FORREST RATLIFF SOLUTIONS ENGINEER, PKWARE
More informationSecuring Data At Rest And Data In Motion - Strategic Data-Centric Security. 9 th March 2012
Securing Data At Rest And Data In Motion - Strategic Data-Centric Security 9 th March 2012 PKWARE Main Benefits Setting The Scene Project Management Triangle Scope Time Cost Security Triangle Security
More informationConfiguring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies info@dovetail.com dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
More informationCrypto and Disaster Recovery. Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com
Crypto and Disaster Recovery Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com October 2014 Agenda Crypto and Disaster Recovery How Do You Do DR? Technology Hardware Domains Master Keys Restoring
More informationSystem z Batch Network Analyzer Tool (zbna) - Because Batch is Back!
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the
More informationEncryption Facility for z/os Version 1.10
Front cover Encryption Facility for z/os Version 1.10 Principles of operations and options explained Examples of setup and use of all the features Expert considerations and recommendations Patrick Kappeler
More informationz/os Cryptographic Services - ICSF Best Practices
z/os Cryptographic Services - ICSF Best Practices Steven R. Hart, CISSP IBM Thursday, August 7, 2014: 8:30 AM-9:30 AM Session Number 15775 Insert Custom Session QR if Desired. Topics Cryptography Basics
More informationPKI Services: The Best Kept Secret in z/os
PKI Services: The Best Kept Secret in z/os Wai Choi, CISSP IBM Corporation August 7th, 2014 Session: 15773 Trademarks The following are trademarks of the International Business Machines Corporation in
More informationThe Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005
IBM eserver The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005 Wai Choi IBM Corporation RACF Development Poughkeepsie, NY Phone: (845) 435-7623 e-mail: wchoi@us.ibm.com
More informationEnd-to-End Enterprise Encryption:
End-to-End Enterprise Encryption: A Look at SecureZIP Technology T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents SecureZIP Executive Summary SecureZIP: The Next Generation of ZIP PKZIP:
More informationUnderstanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: wchoi@us.ibm.com 1 Trademarks
More informationPKZIP /SecureZIP for z/os
PKZIP /SecureZIP for z/os System Administrator s Guide SZZSA- V111R0002 PKWARE Inc. PKWARE, Inc. 648 N Plankinton Avenue, Suite 220 Milwaukee, WI 53203 Main office: 888-4PKWARE (888-475-9273) Sales: 937-847-2374
More informationMainframe. Large Computing Systems. Supercomputer Systems. Mainframe
1 Large Computing Systems Server Farm Networked cluster of interchangeable file/application servers Provides load balancing for availability and reliability Blade Server Server farm in a single cabinet
More information10195 Crypto And Disaster Recovery
Crypto And Disaster Recovery Greg Boyd (boydg@us.ibm.com) Atlanta, GA Permission is granted to SHARE to publish this presentation in the SHARE Proceedings. IBM retains its right to distribute copies of
More informationCS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
More informationDOAG 2014. 18.November 2014. Hintergrund. Oracle Mainframe Datanbanken für extreme Anforderungen
DOAG 2014 18.November 2014 Hintergrund zu Oracle Mainframe Datanbanken für extreme Anforderungen Dr. Manfred Gnirss Senior IT Specialist IBM Client Center, IBM Germany Lab gnirss@de.ibm.com Die folgenden
More informationDeploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Patrick Townsend Software Diversified Services/Townsend Security August 9, 2011 Session Number 9347 PGP
More informationSecure Database Backups with SecureZIP
Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the
More informationAlliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
More informationUnderstanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011
Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: wchoi@us.ibm.com 1 Trademarks
More informationZIP/390 : Application Programming Interface. MVS et VSE
Avec les APIs ZIP/390, tout programmeur se retrouvera aisément dans les exemples ci-après. Quelques exemples en Assembleur, COBOL et CICS Compression en ASSEMBLER MVS et VSE ACTION=ZIP Compression «ZIP390.FILE1.TXT»
More informationBenefits of Unifying Enterprise Storage, Management and Replication for Mainframe DASD, Virtual Tape, and Open Systems Data
Benefits of Unifying Enterprise Storage, Management and Replication for Mainframe DASD, Virtual Tape, and Open Systems Data Joe Sturonas, Mike Stebner PKWARE, Inc. March 12, 2014 14875 Test link: www.share.org
More informationDigital Certificates Demystified
Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: comera@us.ibm.com February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The
More informationLicensed Programming Specifications
Licensed Programming Specifications IBM DB2 10 for z/os Program number 5605-DB2 IBM DB2 10 for z/os is a relational database management system licensed program for the z/os environment. In this document,
More informationProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
More informationz/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationCICS Transactions Measurement with no Pain
CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS
More informationGPU File System Encryption Kartik Kulkarni and Eugene Linkov
GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through
More informationSecurity Intelligence, Audit and Compliance for the Mainframe
Security Intelligence, Audit and Compliance for the Mainframe Rich Skinner, CISSP Brinqa Director of Risk Analytics & Big Data rskinner@brinqa.com August 15, 2013 Session: 13722 Agenda Today s Security
More informationz/os Communications Server Security Using Policy Agent
z/os Communications Server Security Using Policy Agent Session 17787 Thursday 8/13 Southern Hemisphere 5 at 3:15pm Insert Custom Session QR if Desired Linda Harrison lharriso@us.ibm.com Trademarks The
More informationBig Data Storage in the Cloud
Big Data Storage in the Cloud Russell Witt Scott Arnett CA Technologies Tuesday, March 11 Session Number 15288 Tuesday, March 11Tuesday, March 11 Abstract Need to reduce the cost of managing storage while
More informationForecasting Performance Metrics using the IBM Tivoli Performance Analyzer
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Session 11523 August 8, 2012 Mike Bonett IBM Corporation, IBM Advanced Technical Skills bonett@us.ibm.com 1 Corporation Trademarks
More informationCA Big Data Management: It s here, but what can it do for your business?
CA Big Data Management: It s here, but what can it do for your business? Mike Harer CA Technologies August 7, 2014 Session Number: 16256 Insert Custom Session QR if Desired. Test link: www.share.org Big
More informationOracle Database 11g Comparison Chart
Key Feature Summary Express 10g Standard One Standard Enterprise Maximum 1 CPU 2 Sockets 4 Sockets No Limit RAM 1GB OS Max OS Max OS Max Database Size 4GB No Limit No Limit No Limit Windows Linux Unix
More informationIBM Security Key Lifecycle Manager for z/os: Deployment and Migration Considerations
Redpaper IBM Security Key Lifecycle Manager for z/os: Deployment and Migration Considerations Axel Buecker William C. Johnston Overview This IBM Redpaper publication discusses IBM Security Key Lifecycle
More informationAktuelles aus z/vm, z/vse, Linux on System z
Dr. Klaus Goebel IBM Research & Development, Böblingen, kgoebel@de.ibm.com Aktuelles aus z/vm, z/vse, Linux on System z z/vse z/vm Frühjahrstagung 2014, Frankfurt, 7.-9. April 2014 Trademarks The following
More informationVirtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
More informationHow-to Access RACF From Distributed Platforms
How-to Access RACF From Distributed Platforms Saheem Granados IBM Wednesday, February 6, 2013 12538 sgranado@us.ibm.com Trademarks The following are trademarks of the International Business Machines Corporation
More informationSecure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user.
Secure your data. Wherever it is, Wherever it goes, However it gets there......on all major platforms. For every user. SecureZIP Product Family SecureZIP products are designed as enterprise-class, data-centric
More informationCA TPX Session Management r5.3
PRODUCT SHEET CA TPX Session Management CA TPX Session Management r5.3 CA TPX Session Management (CA TPX) helps you manage user menus for accessing VTAM applications on the mainframe while offering end
More informationGetting Started with Digital Certificates Part II (RACDCERT)
Getting Started with Digital Certificates Part II (RACDCERT) 1 This presentation will guide you through the RACF s world of Digital Certificates. We will attempt to explain how they can be used and how
More informationKarmjeet Kahlon Director Global z Systems Software Sales
Karmjeet Kahlon Director Global z Systems Software Sales The market is moving, forcing businesses to transform Explosion in transaction growth driven by mobility and the Internet of Things Analytics is
More informationz/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket
z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket Gary Henderson ASG (Allen Systems Group) 1 March 2011, 9:30 AM-10:30 AM Session Number 8695 Installation and Maintenance Installation and
More informationSkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
More informationNew CICS support for Secure Sockets Layer
New CICS support for Secure Sockets Layer Peter Havercan, Senior CICS Developer CICS Transaction Server has had support for Secure Sockets Layer (SSL) since Version 1 Release 3, but the support has been
More informationERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
More informationMainframe alternative Solution Brief. MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA)
Mainframe alternative Solution Brief MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA) Mainframe alternative Solution Brief MFA Sizing Study for a
More informationCA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible
PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able
More informationERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
More informationIBM z13 Software Pricing Announcements
IBM z13 Software Pricing Announcements - IBM Collocated Application Pricing (ICAP) - Country Multiplex Pricing - Technology Update Pricing for z13 January 14, 2015 IBM z13 Software Pricing Announcements
More informationINTRODUCTION to CRYPTOGRAPHY & CRYPTOGRAPHIC SERVICES on Z/OS BOSTON UNIVERSITY SECURITY CAMP MARCH 14, 2003
INTRODUCTION to CRYPTOGRAPHY & CRYPTOGRAPHIC SERVICES on Z/OS BOSTON UNIVERSITY SECURITY CAMP MARCH 14, 2003 History of Cryptography The concept of securing messages through cryptography has a long history.
More informationFrequently Asked Questions (FAQs) United Computer Group, Inc. VAULT400 System i (AS/400) Agent
Frequently sked uestions (Fs) United Computer Group, Inc. VULT400 System i (S/400) gent Revised September 2013 VULT400 System i (S/400) gent F What are the key benefits of VULT400 ISeries gent when compared
More informationReal Vision Imaging. Use a Proxy Server to Connect Your IBM i to the Web. IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries
January 2013 YOUR DOCUMENT MANAGEMENT SOLUTION Real Vision Imaging Use a Proxy Server to Connect Your IBM i to the Web Real Vision Software, Inc. P.O. Box 12958 Alexandria, LA 71315-2958 3700 Jackson Street
More informationIntroduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
More informationzpcr Capacity Sizing Lab Part 2 Hands-on Lab
Advanced Technical Skills (ATS) North America zpcr Capacity Sizing Lab Part 2 Hands-on Lab SHARE - Session 9667 August 11, 2011 John Burg Brad Snyder Materials created by John Fitch and Jim Shaw IBM 50
More informationFDRSOS (Safeguard Open Storage)
Introducing FDRSOS (Safeguard Open Storage) FDRSOS (Safeguard Open Storage) provides high-speed, reliable backups of Open Systems (SCSI) data to an MVS or OS/390 System. FDRSOS and the SYMMETRIX 3000 and
More informationEmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
More informationImplementing SSL Security on a PowerExchange 9.1.0 Network
Implementing SSL Security on a PowerExchange 9.1.0 Network 2012 Informatica Abstract This article describes how to implement SSL security on a PowerExchange network. To implement SSL security, configure
More informationCA Integrated Agent Services
CA Integrated Agent Services Implementation Guide Version 12.0.00 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred
More informationCryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
More informationIBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.
IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse. Presented by Richard Marko, Manager of Technical Services Sponsored by Midland Information Systems,
More informationCA s Cloud Storage for System z
CA s Cloud Storage for System z Michael Melillo Sr. User Experience Architect Cloud Solutions for System z April 15 th, 2014 2013 CA. All rights reserved. Disclaimer Certain information in this presentation
More informationIBM Software Group. Lotus Domino 6.5 Server Enablement
IBM Software Group Lotus Domino 6.5 Server Enablement Agenda Delivery Strategy Themes Domino 6.5 Server Domino 6.0 SmartUpgrade Questions IBM Lotus Notes/Domino Delivery Strategy 6.0.x MRs every 4 months
More informationExperiences with Using IBM zec12 Flash Memory
Experiences with Using IBM zec12 Flash Memory Session 14119 August 13, 2013 Mary Astley ATS - IBM Corporation 2013 IBM Corporation Trademarks The following are trademarks of the International Business
More informationz/tpf FTP Client Support
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Fall 2006 z/tpf FTP Client Support Name: Jason Keenaghan Venue: Main Tent AIM
More informationVirtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
More informationz/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
More informationThe Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage
The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage The IBM zenterprise EC12 (zec12) server introduces the Flash Express feature (FC 0402) that provides a new PCIe
More informationEncryption? Yeah, We Do That. Encryption facilities, challenges, and choices on System z
Encryption? Yeah, We Do That Encryption facilities, challenges, and choices on System z Agenda Tour System z encryption facilities Survey available IBM products Briefly discuss third-party technologies
More informationChapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
More informationGNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos
GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute
More informationVersion 14.0. Overview. Business value
PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing
More informationAn Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
More informationCisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
More informationIBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
More informationA REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM
A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information
More informationOverview. Business value
PRODUCT SHEET CA VM:Backup for z/vm CA VM:Backup for z/vm CA VM:Backup for z/vm (CA VM:Backup) provides an efficient and reliable means of backing up CMS and non-cms data in z/vm and mainframe Linux systems.
More informationCA Insight Database Performance Monitor for DB2 for z/os
PRODUCT SHEET CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os (CA Insight DPM)
More informationNorthrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
More informationEMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
More informationRELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
More informationManaged Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
More informationContingency Access to Enterprise Encrypted Data
T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents No option to escrow Passphrase protection zseries example Incorporating contingency key in zseries Windows command line example Incorporating
More informationRunning Oracle Databases in a z Systems Cloud environment
Running Oracle Databases in a z Systems Cloud environment Sam Amsavelu samvelu@us.ibm.com ISV & Channels Technical Sales - Oracle IBM Advanced Technical Skills (ATS), America Technical University/Symposia
More informationCRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
More informationThe Truth Behind IBM AIX LPAR Performance
The Truth Behind IBM AIX LPAR Performance Yann Guernion, VP Technology EMEA HEADQUARTERS AMERICAS HEADQUARTERS Tour Franklin 92042 Paris La Défense Cedex France +33 [0] 1 47 73 12 12 info@orsyp.com www.orsyp.com
More informationMaximizing Hadoop Performance and Storage Capacity with AltraHD TM
Maximizing Hadoop Performance and Storage Capacity with AltraHD TM Executive Summary The explosion of internet data, driven in large part by the growth of more and more powerful mobile devices, has created
More informationFIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)
FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:
More informationPGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
More informationRedbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei
Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database
More informationDigital Certificate Goody Bags on z/os
Digital Certificate Goody Bags on z/os Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 6 th, 2012 Session 11623 Agenda What is a Digital Certificate?
More informationECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03
ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03 Comodo CA, Ltd. ECC Certificate Addendum to Comodo EV CPS v. 1.03 6 March 2008 3rd Floor, Office Village, Exchange Quay,
More informationDriving force. What future software needs. Potential research topics
Improving Software Robustness and Efficiency Driving force Processor core clock speed reach practical limit ~4GHz (power issue) Percentage of sustainable # of active transistors decrease; Increase in #
More informationIBM Mainframe Services. 10 April 2014. G-Cloud. service definitions
IBM Mainframe Services 10 April 2014 G-Cloud service definitions TABLE OF CONTENTS Definitions and Interpretation... 4 The Services... 6 Core Services... 6 Optional Services... 8 Additional Services...
More informationMemory Resource Management in VMware ESX Server
Memory Resource Management in VMware ESX Server Carl Waldspurger OSDI 02 Presentation December 10, 2002 Overview Context Memory virtualization Reclamation Sharing Allocation policies Conclusions 2 2 Motivation
More informationCA MICS Resource Management r12.7
PRODUCT SHEET agility made possible CA MICS Resource Management r12.7 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information
More informationCross-Platform Access
Virtualize Cross-Platform Access to Protect Linux on System z Data Copyright 2010 INNOVATION Data Processing. All rights reserved. 1 Purpose This session will offer through interactive discussion the opportunity
More informationDB2 Security and PCI Compliance
DB2 Security and PCI Compliance A BEST PRACTICES GUIDE Ulf T. Mattsson, Chief Technology Officer, Protegrity Corporation. INTRODUCTION THE PAYMENT CARD INDUSTRY (PCI) DATA SECURITY STANDARD PCI is a set
More information