DFSMS Basics: How SMS Volume Selection Works
|
|
|
- Shon Black
- 10 years ago
- Views:
Transcription
1 DFSMS Basics: How SMS Volume Selection Works Steve Huber IBM Corporation March 3, 2011 Session 9012
2 Volume Classification Category Primary //DD1 DD DSN=DATA.SET,DISP=(NEW z/os BCP SMS Storage Storage Group 1 Group 2 Allocation Automatic Class Selection SG Routine Secondary Tertiary Rejected Storage Group 3 Storage Group 4 Selected Volume 2
3 The Primary List Meet data set separation requirement SMS storage group and volume statuses are enabled MVS status is online IART requirement is met Number of volumes in storage group >= volume count Accessibility requested can be met Availability requested can be met Meets the guaranteed space requirement Can perform the allocation & stay below high threshold For MSR=999, volume is non-cached Data class extended format request can be met 3
4 The Secondary List ABEND X37 prevention - the most available space Meet data set separation requirement Meet volume count requirement Can perform the allocation without going more than 20% over high threshold SMS storage group and volume status Honors tiering of storage groups Spill/Overflow volumes Volume characteristics Availability Accessibility Extended format Guaranteed space Mount time performance 4
5 The Tertiary List Only used for: Non-guaranteed space requests Non-VSAM data sets Consists of volumes in storage groups that do not meet the volume count requested 5
6 Conventional Volume Selection Used for all non-striped data sets Used for all data sets with zero or blank SDR Uses a preference sequence to sort volumes in the candidate storage groups into: Primary Secondary Tertiary Rejected 6
7 Volume Selection Evaluation Process Criteria PCU Separation Extent Pool Separation Volume Separation Volume Count Primary Threshold Secondary Threshold Preferences Volume not on same PCU as data set from which it is separated. Volume not in same extent pool as data set from which it is separated. Volume does not contain a data set from which this data set should be separated. Volume is in a storage group that can satisfy the volume count. Volume has sufficient space in target addressing space without exceeding high threshold Volume has sufficient space without exceeding high threshold 7
8 Volume Selection Evaluation Process Criteria SMS Status Multi-tiered Storage Group EOV Extend Non-Overflow IART Fast Replication Extended Attribute Preferences Volume and its storage group are both enabled. Volume resides in a storage group that is elected in order of specification For EOV Extend, volume does not reside in extend storage group. Volume resides in a non-overflow storage group. Volume is mountable and IART specified is non-zero. Volume is eligible for fast replication request Volume has extended attributes (EAV) 8
9 Volume Selection Evaluation Process Criteria Accessibility Parallel Access Volume Preferences Controller for volume supports accessibility & value is PREF or controller does not support it & value is STANDARD Volume supports PAV Availability Controller for volume supports availability & value is PREF or controller does not support it & value is STANDARD. 9
10 Volume Selection Evaluation Process Extended Format Criteria Millisecond Response (MSR) Preferences Volume is on a control unit that supports extended format and IF EXT is PREF. Volume provides the requested response time specified in direct/sequential MSR or Volume provides a faster response time than requested in the direct or sequential MSR. 10
11 Volume Selection Evaluation Process PCU Separation Extent Pool Separation Volume Separation Volume Count Primary Threshold Secondary Threshold SMS Status Multi-tiered Storage Group EOV Extend Non-Overflow IART Fast Replication Extended Attribute Accessibility PAV Availability Extended Format MSR
12 Example Volume A Preference Volume and storage group enabled Non-overflow Pos 11 8 Volume PCU supports accessibility & PREF 4 Total Preference Value = 2320 Volume B Volume has sufficient space 12 Volume and storage group enabled 11 Total Preference Value =
13 Data Set Separation Allows you to designate groups of data sets which are to be physically separated by PCU or volume SMS attempts to allocate the data sets behind different control units or volumes A data set separation profile must be provided Indicates separation by PCU or volume The name of the data set containing the profile must be specified in the SMS base configuration Cannot be used with non-sms-managed data sets or with full volume copy utilities such as PPRC 13
14 Recommended Use of Separation Use only for a small set of mission-critical data sets Volume rejection because of separation may drastically reduce the number of eligible volumes Data set separation can affect system performance The number of data sets should be small as SMS must scan them all The use of wildcards characters in separation data set names The number of eligible volumes Take care when using separation with striping May require constant updating if used with GDSs 14
15 Specifying Separation SEPARATIONGROUP SEP (PCU {VOLUME VOL}) TYPE ({REQUIRED REQ R} {PERFERRED PREF P}) DSNLIST DSNS DSN (data set name[, data set name,...]); Examples: SEPARATIONGROUP(VOL) TYPE(PREF)- DSNLIST(SMS.PROD.SCDS, SMS.PROD.ACDS, SMS.PROD.COMMDS); SEP(PCU) TYPE(REQ)- DSNS(SYS1.JESCKPT1,- /*PRIMARY*/ SYS1.JESCKPT2,- /*SECONDARY*/ SYS1.JESCKPT3); /*TERTIARY*/ SEPARATIONGROUP(VOL) TYPE(PREF)- DSNLIST (DB2.DATA.LIB.V%%%%.**) 15
16 Multiple Separation Profiles You can create multiple separation profiles in different data sets or PDS members You can only specify one separation profile in the configuration base If you have multiple configurations, they can all share the same profile Or they can all have separate profiles Profile is read when SMS initializes or restarts and whenever a new configuration is activated 16
17 17 When Separation Does Not Work The allocation is not SMS-managed. The separation profile cannot be accessed. The separation profile is invalid. The allocation uses a temporary data set name. Two data sets are allocated on different systems. A volume is varied online during allocation. An IODF change occurs during allocation. A data set name not in the profile is specified during HSM recover. The profile was modified after configuration activation. SMS does not perform separation during: Rename. HSM migration to level 1 or 2. Full volume image copy.
18 MSR and Bias MSR (Millisecond Response) Uses only the stored MSR; cached if cache is active, native otherwise Devices close to the requested MSR are placed on the primary list Devices not close to the requested MSR are placed on the secondary list Bias Determines which volumes MSR performance numbers (read, write, or both) to consider during volume selection. If you leave all MSR and bias fields blank (direct and sequential), SMS ignores device performance during volume selection 18
19 Sustained Data Rate (SDR) SDR > zero Causes striping volume selection to be used May cause MSR, availability, accessibility, and free space criteria to be ignored Considers controllers over volume attributes 19
20 Initial Access Response Time (IART) Object access: Specifies the desired response time (in seconds) required for locating, mounting, and preparing a piece of media for data transfer. OAM uses this value to interpret the storage level, that is, to place an object at an appropriate level in the object storage hierarchy. For objects, both the IART and the sustained data rate (SDR) are applicable. OAM uses IART as follows: If the IART value is 0, OAM writes to DASD. If the IART value is , OAM selects removable media, either optical or tape. DASD Data set access: SMS allows the system resources manager (SRM) to select a DASD volume from the primary volume list if the IART value is 0 or unspecified. SRM volume selection is ideally suited for batch jobs. VTS (Virtual Tape Server) cache management: An initial access response time (IART) of 100 or greater means the volume has least preference in the cache means the volume has most preference. 20
21 Availability Specifies whether data set access should continue in the event of a single device failure. CONTINUOUS Specify an availability of CONTINUOUS if you do not want a device failure to affect processing. Only duplexed and RAID volumes are eligible for this setting. If CONTINUOUS availability is specified, data is placed on a device that can guarantee that it can still access the data in the event of a single device failure. This option can be met by A dual copy volume An array DASD PREFERRED Array DASD volumes are preferred over nonduplexed volumes. Dual Copy volumes are not candidates for selection. STANDARD If data sets do not require such a high level of availability, specify STANDARD availability, which represents normal storage needs. Specify an availability of STANDARD to cause processing of a data set to stop after a device failure. Simplex volumes are preferred over array DASD. SMS selects only volumes that are not dual copy. This attribute does not apply to objects. Array DASD are acceptable candidates for both STANDARD and CONTINUOUS availability requests. NOPREF Simplex and array DASD are equally considered for volume selection. NOPREF is the default. Dual copy volumes are not candidates for selection. 21
22 Accessibility Defines the function of the hardware supporting the point-in-time copy using Using either concurrent copy Virtual concurrent copy FlashCopy Options are; CONTINUOUS (C) Only point-in-time copy volumes are selected. CONTINUOUS PREFERRED (P) Point-in-time copy volumes are preferred over non-point-in-time copy volumes. STANDARD (S) Non-point-in-time copy volumes are preferred over point-in-time copy volumes. NOPREF (N) Point-in-time copy capability is ignored during volume selection (default) 22
23 Multi-Tiered Storage Groups Specify Multi-Tiered SG Y in the storage class Example: SET &STORGRP = 'SG1', 'SG2', 'SG3' Result: SMS selects volumes from SG1 before SG2 or SG3 If all enabled volumes in SG1 are over threshold, then SMS selects from SG2 If all enabled volumes in SG2 are over threshold, then SMS selects from SG3 If all volumes are over threshold, then SMS selects from the quiesced volumes in the same order 23
24 Parallel Access Volumes Feature of the Enterprise Storage Server (ESS) Available only when the PAV option is enabled Use the Parallel Access Volume Storage Class attribute: Required: Only volumes with the PAV feature are selected Preferred: Only volumes with the PAV feature are primary Standard: Only volumes without the PAV feature are primary Nopreference: All volumes, PAV and non-pav are treated equally 24
25 Striping Volume Selection Used only for: Initial allocation of extended format preferred or required data sets with SDR > 0 Recall/Recover of multi-stripe data sets Not used for Recall/Recover of single-striped multivolume data sets Similar to conventional volume selection Eligible volumes classified as primary and secondary For each controller, primary meets all requested preferences and is selected randomly Secondary is all other volumes on the same controller Assigned a volume preference weight based on preference table 25
26 Striping Volume Selection (cont) SMS calculates an average preference based on all volumes in an SG SMS selects the SG that has enough primary volumes to meet the stripe count and the highest average weight If no SGs meet this criteria, the one with the largest amount of primary volumes is selected If the largest amount of primary volumes is the same for multiple SGs, the SG with the highest weight is chosen If there are multiple SGs that meet the criteria, one is chosen at random 26
27 Striping Volume Selection (cont) No SGs with mixed device types Number of volumes computed from SDR Temporary data sets with volume count > 1 treated as non-striped Volume must be able to satisfy primary space requested 27
28 Striped Data Sets (general information) Maximum stripes for non-vsam = 59 Maximum stripes for VSAM= 16 Maximum extents/space alloc = 5 Non-VSAM max extents/stripe = 123 For VSAM max extents/stripe: Per volume = 123 Per stripe = 255 Per data component = 4080 VSAM extent constraint removal in data class, if set to Y, 59x123 VSAM stripes can extend to new volumes Minimum alloc = 1 track/stripe 28
29 Extents Per Volume Non-VSAM, non-extended format: Up to 16 on the volume Non-VSAM, extended format: Up to 123 PDSE and HFS: Up to 123 on the volume VSAM: Up to 255 per component, but only 123 per volume per component Striped VSAM: Up to 4080 per data component VSAM extent constraint removal in data class, if set to Y, 59x123 or
30 Extending Striped Data Sets All stripes must be able to satisfy secondary space/number of stripes Secondary space is divided by number of stripes and rounded up for each volume Non-VSAM striped data sets cannot extend to additional volumes VSAM striped data sets can extend to additional volumes Volume fragmentation may result in striping volume reselection 30
31 31 Requirements for Striping Volumes behind one of the following controllers: ESCON-attached controller that supports concurrent copy controllers controllers with Extended Platform that are ESCONattached controllers with RAMAC support-level microcode 9394 controllers 9343 controllers with cache IBM RAMAC Virtual Array IBM Enterprise Storage Server Volumes must be ENABLED or QUIESCED and varied ONLINE
32 Why Isn't My Volume Primary? Volume was rejected Allocation would exceed high threshold Volume/SG quiesced VTOC IX disabled MSR not met Non-zero IART Controller IML d while online to MVS Accessibility value Availability value Extended format value Insufficient number of volumes in SG 32
33 Why Was My Volume Rejected? Volume not in selected SG or SGs Not online to MVS Bad volume of SG status Insufficient free space Insufficient space in VTOC or IX Not init d as SMS volume On exclude list Does not support extended format Not on include list 33
34 Why Was My Volume Rejected (cont)? Volume does not meet Availability Accessibility IART UCB type unusable Allocation attempted, but failed Too fragmented SG has insufficient volumes Geometry incorrect SG contains mixed SDRs Does not support Flashcopy 34
35 Wrong Volume Selected? Check construct assignments Check channel path utilization Check storage group/volume utilization No volumes in primary volume list Expected volume was on tertiary list Expected volume was rejected Products which hook into system code (such as SRM) can create unexpected results 35
36 If All Else Fails... Data class contains two values which can be used to influence volume selection: Space Constraint Relief Reduce Space Up To (%) If you specify the second, the first must be Y 36
37 If You Use Space Constraint Relief... Very large allocations may succeed with large enough volume count. Existing data sets may end up with less space than requested on extents. New data sets may be smaller than requested. Fewer extents may be available when the data set extends. May result in more than 5 primary extents X37 abends should occur less frequently. 37
38 The Retry Process... If the volume count is 1: SMS retries the allocation after reducing the requested space as indicated SMS removes the 5 extent limit If the volume count is greater than 1: First, SMS uses best-fit volume selection If this fails, SMS reduces the space quantity and removes the 5 extent limit 38
39 Requesting Assistance Use VOLSELMSG with JOBNAME, STEPNAME, ASID and/or DSNAME to get detailed volume selection analysis messages Turn SMS tracing on: SETSMS TRACE(ON),TYPE(ALL),SIZE(100M),DESELECT(ALL), SELECT(MSG,VTOCC,VTOCA,MSG,MODULE),JOBNAME(jobname) Run the job Turn SMS tracing off SETSMS TRACE(OFF) Make note of the dump data set name Take a dump of the SMS address space DUMP COMM=(any dump title you desire) R #,JOBNAME=SMS,CONT R #,SDATA=(LPA,CSA,ALLNUC,GRSQ,LSQA,SWA,PSA,SQA,TRT,RGN,SUM) 39
40 Requesting Assistance... Activate IPCS from a TSO session. Set the defaults (dump data set name) using option 0 Go to the IPCS COMMAND option (IPCS option 6) Issue: VERBX SMSDATA 'TRACE' If possible, use IPCS PRINT to create a hard copy of the trace 40
41 References: APARs II reasons for volume selection failure II reasons why wrong volume selected II volume selection and DCME settings II striping volume selection information II continuation of II
42 References: Publications z/os DFSMSdfp Storage Administration Reference (SC ) z/os DFSMS: Implementing System-Managed Storage (SC ) MVS/ESA SML: Managing Storage Groups (SC ) z/os DFSMShsm Storage Administration Reference (SC ) z/os DFSMShsm Storage Administration Guide (SC ) z/os DFSMSdss Storage Administration Reference (SC ) z/os DFSMSdss Storage Administration Guide (SC ) z/os DFSMS Advanced Copy Services (SC ) 42
43 Legal Disclaimer NOTICES AND DISCLAIMERS Copyright 2010 by International Business Machines Corporation. No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. This information could include technical inaccuracies or typographical errors. IBM may make improvements and/or changes in the product(s) and/or programs(s) at any time without notice. Any statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Any reference to an IBM Program Product in this document is not intended to state or imply that only that program product may be used. Any functionally equivalent program, that does not infringe IBM s intellectually property rights, may be used instead. It is the user s responsibility to evaluate and verify the operation of any non-ibm product, program or service. 43
44 Legal Disclaimer The information provided in this document is distributed "AS IS" without any warranty, either express or implied. IBM EXPRESSLY DISCLAIMS any warranties of merchantability, fitness for a particular purpose OR NONINFRINGEMENT. IBM shall have no responsibility to update this information. IBM products are warranted according to the terms and conditions of the agreements (e.g., IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. IBM is not responsible for the performance or interoperability of any non- IBM products discussed herein. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents or copyrights. Inquiries regarding patent or copyright licenses should be made, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY U.S.A. 44
45 Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a complete list of IBM Trademarks, see *, AS/400, e business(logo), DBE, ESCO, eserver, FICON, IBM, IBM (logo), iseries, MVS, OS/390, pseries, RS/6000, S/30, VM/ESA, VSE/ESA, WebSphere, xseries, z/os, zseries, z/vm, System i, System i5, System p, System p5, System x, System z, System z9, BladeCenter The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency, which is now part of the Office of Government Commerce. * All other products may be trademarks or registered trademarks of their respective companies. Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-ibm products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. 45
IBM Systems and Technology Group Technical Conference
IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the
Session Title: Cloud Computing 101 What every z Person must know
2009 System z Expo October 5 9, 2009 Orlando, FL Session Title: Cloud Computing 101 What every z Person must know Session ID: ZDI08 Frank J. De Gilio - [email protected] 2 3 View of Cloud Computing Application
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management [email protected]
IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management [email protected] Why Snapshots Are Useful for Backup Faster backups without taking applications
Cloud Computing with xcat on z/vm 6.3
IBM System z Cloud Computing with xcat on z/vm 6.3 Thang Pham z/vm Development Lab [email protected] Trademarks The following are trademarks of the International Business Machines Corporation in the
Lisa Gundy IBM Corporation. Wednesday, March 12, 2014: [email protected]. 11:00 AM 12:00 PM Session 15077
Continuing the understanding of IBM Copy Services: Peer-to-Peer-Remote-Copy (PPRC) and Point in Time Copy (FlashCopy) for High Availability (HA) and Disaster Recovery (DR) Lisa Gundy IBM Corporation [email protected]
Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014.
North America ATS Storage Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014 Thomas Fiege 1 2014 2014 IBM IBM Corporation
SMP/E V3.5 Hands-on Lab: Learning to use SMP/E FIXCATs
Session 9707: SMP/E V3.5 Hands-on Lab: Learning to use SMP/E FIXCATs Kurt Quackenbush IBM, SMP/E Development [email protected] Page 1 of 32 Using SMP/E Advanced Functions: Hands-on Lab SMP/E V3.5 became
The Consolidation Process
The Consolidation Process an overview Washington System Center IBM US Gaithersburg SIG User Group April 2009 Trademarks The following are trademarks of the International Business Machines Corporation in
DFSMS Object Support Overview: Data Archiving with OAM Session: 17809
DFSMS Object Support Overview: Data Archiving with OAM Session: 17809 Erika Dawson z/os DFSMS Product Architect (OAM and SMStape) IBM Corporation Agenda What is OAM s Object Support? Who uses OAM s Object
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02
Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,
How to Deliver Measurable Business Value with the Enterprise CMDB
How to Deliver Measurable Business Value with the Enterprise CMDB James Moore [email protected] Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB
Java Application Performance Analysis and Tuning on IBM System i
IBM Systems & Technology Group Technical Conference 14 18 April, 2008, Sevilla, Spain Java Application Performance Analysis and Tuning on IBM System i iap02 Gottfried Schimunek Gottfried Schimunek Senior
Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide
Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,
The zevent Mobile Application
Harald Bender [email protected] IBM DE Session 508 The zevent Mobile Application Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries,
z/osmf Software Deployment Application- User Experience Enhancement Update
z/osmf Software Deployment Application- User Experience Enhancement Update Greg Daynes IBM Corporation August 8, 2012 Session Number 11697 Agenda Recent Enhancements Support for unmounted z/os UNIX file
IBM Tivoli Web Response Monitor
IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,
CS z/os Network Security Configuration Assistant GUI
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network
Tip and Technique on creating adhoc reports in IBM Cognos Controller
Tip or Technique Tip and Technique on creating adhoc reports in IBM Cognos Product(s): IBM Cognos Area of Interest: Financial Management 2 Copyright and Trademarks Licensed Materials - Property of IBM.
How To Manage Energy At An Energy Efficient Cost
Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions
Energy Management in a Cloud Computing Environment
Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions
Installing on Windows
Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,
IBM WebSphere Data Interchange V3.3
IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic
Long-Distance Configurations for MSCS with IBM Enterprise Storage Server
Long-Distance Configurations for MSCS with IBM Enterprise Storage Server Torsten Rothenwaldt IBM Germany Presentation 2E06 Agenda Cluster problems to resolve in long-distance configurations Stretched MSCS
IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready
Agenda Key: Session Number: 35CA 540195 IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer
Communications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
z/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
Database lifecycle management
Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand
New!! - Higher performance for Windows and UNIX environments
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
Performance and scalability of a large OLTP workload
Performance and scalability of a large OLTP workload ii Performance and scalability of a large OLTP workload Contents Performance and scalability of a large OLTP workload with DB2 9 for System z on Linux..............
Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version 5.0.1. First Edition (December 7, 2007)
IBM Tivoli Identity Manager Version 5.0.1 First Edition (December 7, 2007) This edition applies to version 5.0 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise
Java auf IBM z13 Ein Performance Update
Java auf IBM z13 Ein Performance Update Marc Beyerle ([email protected]) IBM Mainframe Specialist, Senior Java Performance Engineer 15. 18. September @ "Zeit für z" - z/os Kundentag und GSE z/os
Title. Click to edit Master text styles Second level Third level
Title Click to edit Master text styles Second level Third level IBM s Vision For The New Enterprise Data Center Subram Natarajan Senior Consultant, STG Asia Pacific [email protected] Multiple
Data Transfer Tips and Techniques
Agenda Key: Session Number: System i Access for Windows: Data Transfer Tips and Techniques 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer to products that are not currently
New SMTP client for sending Internet mail
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server New SMTP client for sending Internet mail z/os Communications Server Development, Raleigh, North Carolina This presentation
Arwed Tschoeke, Systems Architect [email protected] IBM Systems and Technology Group
Virtualization in a Nutshell Arwed Tschoeke, Systems Architect [email protected] and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,
DataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Session 11523 August 8, 2012 Mike Bonett IBM Corporation, IBM Advanced Technical Skills [email protected] 1 Corporation Trademarks
Monitoring Linux Guests and Processes with Linux Tools
Monitoring Linux Guests and Processes with Linux Tools Martin Schwidefsky ([email protected]) Linux on System z Development IBM Lab Boeblingen, Germany Session 9266 Agenda CP Time Accounting z/vm
Patch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
IBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
IBM Software Services for Collaboration
An introduction to: IBM Collaboration Services for ProjExec ProjExec is easy to use professional project management software that is combined with innovative social features to provide project teams a
WebSphere Process Server v6.2 WebSphere Enterprise Service Bus v6.2 WebSphere Integration Developer v6.2
IBM Software Group WebSphere Process Server v6.2 WebSphere Enterprise Service Bus v6.2 WebSphere Integration Developer v6.2 Mediation Policy and Service Gateway Brian Hulse; WESB Development Updated March
DB2 Database Demonstration Program Version 9.7 Installation and Quick Reference Guide
DB2 Database Demonstration Program Version 9.7 Installation and Quick Reference Guide George Baklarz DB2 Worldwide Technical Sales Support IBM Toronto Laboratory DB2 Demonstration Program Version 9.7 Usage
IBM Lotus Enterprise Integrator (LEI) for Domino. Version 8.5.2. August 17, 2010
IBM Lotus Enterprise Integrator (LEI) for Domino Version 8.5.2 August 17, 2010 A) What's new in LEI V8.5.2 B) System requirements C) Installation considerations D) Operational considerations E) What's
WebSphere Commerce V7.0
IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version
Endpoint Manager for Mobile Devices Setup Guide
Endpoint Manager for Mobile Devices Setup Guide ii Endpoint Manager for Mobile Devices Setup Guide Contents Endpoint Manager for Mobile Devices Setup Guide............. 1 Components.............. 1 Architecture..............
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server Resolver DNS cache z/os Communications Server Development, Raleigh, North Carolina This presentation describes enhancements
IBM Endpoint Manager. Security and Compliance Analytics Setup Guide
IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 Note Before using this information and the
IBM i Network Install using Network File System
IBM i Network Install using Network File System IBM i Virtual Media Rochester, Minnesota Version 1.5 February 22, 2013-1 - Table of Contents 1 Introduction... 3 1.1 What is IBM i Network Install?... 3
Maximo Business Intelligence Reporting Roadmap Washington DC Users Group
Maximo Business Intelligence Reporting Roadmap Washington DC Users Group Pam Denny, IBM Email: [email protected] Twitter: andbflo_denny May 2014 Please note IBM s statements regarding its plans, directions,
Budget Control by Cost Center
SAP Business One Budget Control by Cost Center Ecosystem & Channels Readiness July 2011 Allows a precise follow up of costs booked using the cost accounting dimensions functionality as introduced in SAP
Backups in the Cloud Ron McCracken IBM Business Environment
Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.
z/vm Capacity Planning Overview
z/vm Capacity Planning Overview Bill Bitner z/vm Development Lab Customer Focus and Care [email protected] 2012, 2013 IBM Corporation Trademarks The following are trademarks of the International Business
Effective Backups: Selecting the Right Backup Mechanism to Match the Business Requirement
Effective Backups: Selecting the Right Backup Mechanism to Match the Business Requirement Session 16723 Chris Taylor, IBM Corporation [email protected] Insert Custom Session QR if Desired. Session Abstract
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and
Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum
Tivoli Security Compliance Manager Version 5.1 April, 2006 Collector and Message Reference Addendum Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users
Oracle on System z Linux- High Availability Options Session ID 252
Oracle on System z Linux- High Availability Options Session ID 252 Sam Amsavelu IBM Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or
What s the best disk storage for my i5/os workload?
What s the best disk storage for my i5/os workload? Sue Baker IBM System i Advanced Technical Support Agenda Storage management styles Storage technologies for i5/os Considerations for implementing and
SuSE Linux High Availability Extensions Hands-on Workshop
SHARE Orlando August 2011 SuSE Linux High Availability Extensions Hands-on Workshop Richard F. Lewis IBM Corp [email protected] Trademarks The following are trademarks of the International Business Machines
FICON Extended Distance Solution (FEDS)
IBM ^ zseries Extended Distance Solution (FEDS) The Optimal Transport Solution for Backup and Recovery in a Metropolitan Network Author: Brian Fallon [email protected] FEDS: The Optimal Transport Solution
Active Directory Synchronization with Lotus ADSync
Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,
Tivoli Endpoint Manager for Security and Compliance Analytics
Tivoli Endpoint Manager for Security and Compliance Analytics User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM
IBM TRIRIGA Application Platform Version 3.3.2. Reporting: Creating Cross-Tab Reports in BIRT
IBM TRIRIGA Application Platform Version 3.3.2 Reporting: Creating Cross-Tab Reports in BIRT Cheng Yang Application Developer IBM TRIRIGA Copyright International Business Machines Corporation 2013. US
z/os Basics: z/os UNIX Shared File System environment and how it works
z/os Basics: Shared File System environment and how it works Jim Showalter IBM March 1, 2011 Session 9024 Trademarks The following are trademarks of the International Business Machines Corporation in the
IBM Endpoint Manager for Software Use Analysis Version 9.2.0.2. Beta Features Guide
IBM Endpoint Manager for Software Use Analysis Version 9.2.0.2 Beta Features Guide Beta Features Guide This edition applies to IBM BigFix Inventory 9.2 (product number 5725-F57) and to all subsequent releases
Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei
Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database
How To Improve Your Business Process With Sap
Business Process Analytics & Improvement SAP Solution Manager 7.1 SAP AG August, 2011 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase
QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide
QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide The QLogic 4Gb Fibre Channel Expansion Card (CIOv) for BladeCenter enables you to quickly and simply
IBM Cognos Controller Version 10.2.1. New Features Guide
IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies
Positioning the Roadmap for POWER5 iseries and pseries
Positioning the Roadmap for POWER5 iseries and pseries Guy Paradise Larry Amy Ian Jarman Agenda The Case For Common Platforms Diverse Markets: the pseries and iseries Common Platform: the Roadmap for pseries
Managed Services - A Paradigm for Cloud- Based Business Continuity
Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise
IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
Linux. Managing security compliance
Linux Managing security compliance Linux Managing security compliance Note Before using this information and the product it supports, read the information in Notices on page 7. First Edition (December
Migrating LAMP stack from x86 to Power using the Server Consolidation Tool
Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Naveen N. Rao Lucio J.H. Correia IBM Linux Technology Center November 2014 Version 3.0 1 of 24 Table of Contents 1.Introduction...3
Tivoli Endpoint Manager for Configuration Management. User s Guide
Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
IBM i Virtualization and Open Storage. Mike Schambureck IBM Lab Services Rochester, MN
IBM i Virtualization and Open Storage Mike Schambureck IBM Lab Services Rochester, MN Partition Virtualization on POWER IO Virtualization with Dedicated Adapters IO Virtualization with a Hosting Server
Business Resilience for the On Demand World Yvette Ray Practice Executive Business Continuity and Resiliency Services
Business Resilience for the On Demand World Yvette Ray Practice Executive Business Continuity and Resiliency Services What s on the minds of 450 of the world s leading CEOs 2 CEO needs Revenue growth with
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices
IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM
IBM TRIRIGA Version 10 Release 4.2 Inventory Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies to
IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.
How To Write An Architecture For An Bm Security Framework
Security Reference Architecture James (Jimmy) Darwin [email protected] 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified
IBM Replication Solutions for Business Continuity Part 1 of 2 TotalStorage Productivity Center for Replication (TPC-R) FlashCopy Manager/PPRC Manager
IBM Replication Solutions for Business Continuity Part 1 of 2 TotalStorage Productivity Center for Replication (TPC-R) FlashCopy Manager/PPRC Manager Scott Drummond IBM Corporation [email protected] Jeff
SHARE in Pittsburgh Session 15591
Top 10 Things You Should Be Doing On Your HMC But You're NOT You Probably Are Tuesday, August 5th 2014 Jason Stapels HMC Development [email protected] Agenda Setting up HMC for Remote Use Securing User
IBM BigFix Version 9.2. Patch for CentOS User's Guide IBM
IBM BigFix Version 9.2 Patch for CentOS User's Guide IBM IBM BigFix Version 9.2 Patch for CentOS User's Guide IBM Note Before using this information and the product it supports, read the information in
IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2
IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the
Redbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau
Redbooks Redpaper Roland Tretau IBM TotalStorage NAS Advantages of the Windows Powered OS Copyright IBM Corp. 2002. All rights reserved. ibm.com/redbooks 1 What is Network Attached Storage (NAS) Storage
HR400 SAP ERP HCM Payroll Configuration
HR400 SAP ERP HCM Payroll Configuration. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be reproduced
ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide
ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide The ServeRAID H1110 SAS/SATA Controller for IBM System x offers a low-cost enterprise-grade RAID solution for internal
IBM Endpoint Manager Version 9.1. Patch Management for Mac OS X User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Mac OS X User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Mac OS X User's Guide Note Before using this information and the product
Session 1494: IBM Tivoli Storage FlashCopy Manager
Session 1494: IBM Tivoli Storage FlashCopy Manager Protecting your business-critical applications with IBM Tivoli Storage FlashCopy Manager 2011 IBM Corporation Session 1494: IBM Tivoli Storage FlashCopy
Practical Web Services for RPG IBM Integrated Web services for i
Agenda Key: Session Number: 32CG 540191 Practical Web Services for RPG IBM Integrated Web services for i Dan Hiebert IBM [email protected] 8 Copyright IBM Corporation, 2009. All Rights Reserved. This
