Eliminating Data Silos, Connecting All Data for AI

Total Page:16

File Type:pdf, Size:1020Kb

Eliminating Data Silos, Connecting All Data for AI Modernes Datenmanagement als Basis künstlicher Intelligenz — Overcome Data Siloes through Data Virtualization on IBM Cloud Pak for Data — Claus Huempel <[email protected]> Technical Sales, Hybrid Data Management IBM Deutschland GmbH DOAG 2019 Konferenz und Austellung, Nuernberg Slides courtesy of: Sam Lightstone Chief Technology Officer for Data IBM Fellow & Master Inventor Mukta Singh Program Director, Data & AI Product Management DOAG 2019 Konferenz und Austellung, Nuernberg / © 2019 IBM Corporation Please note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice and at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. IBM Cloud / © 2019 IBM Corporation What if you could tap into all of your critical data assets no matter where they physically are? What if you could query 2 or 2,000 data systems with a single query? The AI Ladder INFUSE – Operationalize AI throughout the business ANALYZE – Build & scale AI with trust and transparency MODERNIZE ORGANIZE - Create a business-ready analytics foundation Make your data ready for an AI and hybrid cloud world COLLECT - Make data simple and accessible One Platform, Any Cloud Data of every type - your critical data assets no matter where they physically are 3 © 2019 IBMCorporation Eliminating data silos will be transformative: To your team + your business Smart decisions On-Demand DataDriven Speed time to insight to make better Reduce IT/ Operational Technology Cost; Trusted, Real-timeData decisions Increase Agility Connected Experience Trusted Connectivity and access anywhere on any Innovative Workforce Security andprivacy device Workplace Transformation IBM Data Virtualization Unified data asset Unified access catalog, lineage and control and security provenance policies Data Virtualization [+ caching layer] Data Big Data Warehouses (Hadoop) & Marts Relational Spreadsheets Databases & No SQL Text files Locations: Private and public clouds, standalone systems, worldwide. Alternative: Physically centralize data (serious cost, complexity, latency, security risk, and GDPR blocker) • Risk to data security • No longer viable to move all data (using extract, transform, load • Data inconsistency ETL) • Rigid, limits business agility • High latency • Complexity & costly Data Lake or ETL Warehouse Server IBM Data Virtualization Query across multiple data sources: Rich application capabilities • Oracle, Db2, SQLServer, Informix, Netezza, • Connect to Data Virtualization with your favorite MySQL, PostgreSQL, Big SQL, Apache Hive, SQL apps and tools HDP Hive, Cloudera Impala and more! • RStudio, Jupyter Notebook, Cognos, Tableau, Microstrategy Scale! 1 or 1,000 at once Secure! • More than 10x better for several important • Strict access controls use cases • Fully encrypted communications. Schema discovery and folding Deeply integrated w Cloud Pak for Data • Automatically find and match tables across • Enterprise Data Catalog, governance and systems so you can query them as a single security. e.g. Automatic publishing of virtual table. virtualized data into the data catalog. • Immediate access via Cognos and Watson Studio ▪ Db2 family for HDM ▪ Excel, CSV, Text ▪ Big SQL ▪ Db2 for iSeries Broad support ▪ IIAS, PDA (Netezza) ▪ Db2 for z/OS for common ▪ Informix ▪ Requires DB2 Connect License data source ▪ Derby ▪ Teradata types ▪ Oracle ▪ Requires separately licensed ▪ SQL Server JDBC driver More to beadded ▪ MySQL ▪ in the future. ▪ PostgreSQL Coming soon ▪ Data Virtualization Manager for ▪ Apache Hive, HDP other Z sources Hive ▪ Snowflake ▪ BigQuery ▪ Cloudera Impala ▪ MapR (Hive) ▪ Mongo ▪ Apache Drill Schema Folding: Simplify your data • Common or similar schemas appear in multiple databases. • E.g. branch database for a bank or retailer. Folded Schema Database #1 Database #2 simplifies access Real System test growing a Constellation • Video of constellation growing to 349 Nodes. • Network stays compact. • 2 and 10 links between nodes • No manual configuration. • Latency aware connection between nodes • Which nodes connect to which others? • Fastest reply strategy • Diameter of the constellation (i.e. the number of hops between the two furthest nodes) grows logarithmically. Small diameter is ideal for communications. Actual system test performed by Emerging Technology Services, IBM Hursley, United Kingdom Data and Result Caching Powerful Application SQL • Cache results (common SQL Oracle statements) • Cache data (data or aggregates, etc). • Define refresh rate IBM Data • Monitor usage/effectiveness Virtualizatio n Cluster Under the hood Db2 • Advanced query compiler determines whether to use cached data and results for part or all of a query result. Data & Results Cache Hive Cache creation: 3-step process for Admins to create & define a cache entry with a periodic refresh schedule Cache Storage: Shows the total storage capacity allocated for Caching (100GB in this example) and the storage consumed by active and inactive cache entries Query Responsiveness: Shows a histogram of total queries that have been executed in the past X days against their response (execution) times. Shows the distribution of queries that used/did not use cache. Query History: Dashboard to see history of queries over a period of time along with details such as query text, execution time (with cache if applicable), query owner etc. Governed Data Fabric for Enterprise Use Data Virtualization with Knowledge Catalog Getting your Data ready for Multicloud and AI Journey IBM Cloud / © 2019 IBM Corporation 17 Gartner predicts that by 2020, about 35 percent of enterprises will make Data Virtualization a part of their data integration strategy A modern Information Architecture One data fabric, on a cloud native architecture Data Consumers IBM Cognos Tableau MicroStrategy BI Tools Impact of modernInformation Architecture Plotly R Jupyter − Multiple, global data sources appear as one database Consumer Layer (Interface Provisioning) − Centralized control & governance Governed Enterprise Data Data Catalog Virtualization Layer (Metadata) Virtualization − Reducedata copies and movement Connection Layer (Adaptors) − Sharp reduction in ETL and duplicative storage Existing Data Hadoop Data Data Marts − Enable self-service fordata Warehouses Sources Data Sources Ability to connect to data sources globally For the Data Consumer layer data were inside a single database Cloud Pak for Data – Self-serve ready Foundational “out of the box” multicloud data & AI services Open, Extensible Platform Personalized, Collaborative Platform App Developers Business Partners Data Stewards Data Scientists Business Users & Analytics Ops Data Engineers The Ladder to AI APIs Integrated User Experience Extensible : “add-ons”, accelerators and Solutions Modular: - provision services & scale out when needed Collect & Connect Organize & Integrate Analyze & Infuse o Data Science & Visualization o Data virtualization o Discovery & search o Dashboards & reporting o Provision SQL & NOSQL o Data transformation o AUTO-AI, ML deployments & Databases o Data catalogs, quality & operations o Warehouses & Marts Curation o AI Trust and Transparency - o Event Ingestion & Streaming o Business glossary Explainability & Bias Analytics o Policies, rules & privacy o Distributed compute – detection o MODERNIZE your data estate Apache Spark AI services –Chat, NLU for AI in a multi-cloud world • • • • Core Services Logging Metering Auditing Identity Access Mgmt. • Monitoring • Storage Volumes • Security • Docker Registry , Helm IBM Cloud Hyperconverged System Data Virtualization patterns at clients • Access to organization data remain a bottleneck – Multiple Clients • Realize self-service of Data for business users – Large European Bank • Improve the Data Management Capability with a Virtual Data Fabric that allows for Data Governance, Data Security, Data Quality, Data Lineage of Metadata– Large European Bank • Create Enterprise-grade single Data Fabric, cutting data silos, for the business – Worldwide Mass Media Conglomerate • Rationalize, Standardize and Simplify the data and technology landscape to move away from the current fragmented architecture toward an Enterprise Architecture – South African Bank • Enable enterprise Advanced Analytics on media assets in the organizations’ repository based on some parameters –Large American entertainment company © 2019 IBM Corporation 21 Governed Data Virtualization in Cloud Pak for Data The ability to view, access, manipulate and analyze data without the need to know or understand
Recommended publications
  • Proceedings of the Rexx Symposium for Developers and Users
    SLAC-R-95-464 CONF-9505198-- PROCEEDINGS OF THE REXX SYMPOSIUM FOR DEVELOPERS AND USERS May 1-3,1995 Stanford, California Convened by STANFORD LINEAR ACCELERATOR CENTER STANFORD UNIVERSITY, STANFORD, CALIFORNIA 94309 Program Committee Cathie Dager of SLAC, Convener Forrest Garnett of IBM Pam Taylor of The Workstation Group James Weissman Prepared for the Department of Energy under Contract number DE-AC03-76SF00515 Printed in the United States of America. Available from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Road, Springfield, Virginia 22161. DISTRIBUTION OF THIS DOCUMENT IS UNLIMITED ;--. i*-„r> ->&• DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, make any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. DISCLAIMER Portions
    [Show full text]
  • Z/OS Resilience Enhancements
    17118: z/OS Resilience Enhancements Harry Yudenfriend IBM Fellow, Storage Development March 3, 2015 Insert Custom Session QR if Desired. Agenda • Review strategy for improving SAN resilience • Details of z/OS 1.13 Enhancements • Enhancements for 2014 Session 16896: IBM z13 and DS8870 I/O Innovations for z Systems for additional information on z/OS resilience enhancements. © 2015 IBM Corporation 3 SAN Resilience Strategy • Clients should consider exploiting technologies to improve SAN resilience – Quick detection of errors – First failure data capture – Automatically identify route cause and failing component – Minimize impact on production work by fencing the failing resources quickly – Prevent errors from impacting production work by identifying problem links © 2015 IBM Corporation 4 FICON Enterprise QoS • Tight timeouts for quicker recognition of lost frames and more responsive recovery • Differentiate between lost frames and congestion • Explicit notification of SAN fabric issues • End-to-End Data integrity checking transparent to applications and middleware • In-band instrumentation to enable – SAN health checks – Smart channel path selection – Work Load Management – Autonomic identification of faulty SAN components with Purge-Path-Extended – Capacity planning – Problem determination – Identification of Single Points of Failure – Real time configuration checking with reset event and self description • No partially updated records in the presence of a failure • Proactive identification of faulty links via Link Incident Reporting • Integrated management software for safe switching for z/OS and storage • High Integrity, High Security Fabric © 2015 IBM Corporation 5 System z Technology Summary • Pre-2013 Items a) IOS Recovery option: RECOVERY,LIMITED_RECTIME b) z/OS 1.13 I/O error thresholds and recovery aggregation c) z/OS message to identify failing link based on LESB data d) HCD Generation of CONFIGxx member with D M=CONFIG(xx) e) Purge Path Extended (LESB data to SYS1.LOGREC) f) zHPF Read Exchange Concise g) CMR time to differentiate between congestion vs.
    [Show full text]
  • John Backus (1924–2007) Inventor of Science’S Most Widespread Programming Language, Fortran
    NEWS & VIEWS NATURE|Vol 446|26 April 2007 OBITUARY John Backus (1924–2007) Inventor of science’s most widespread programming language, Fortran. John Backus, who died on 17 March, was developed elsewhere around the same time, a pioneer in the early development of however, Speedcoding produced programs IBM/AP computer programming languages, and was that were uneconomically slow. subsequently a leading researcher in so- Backus proposed to his manager the called functional programming. He spent his development of a system he called the entire career with IBM. Formula Translator — later contracted to Backus was born on 3 December 1924 in Fortran — in autumn 1953 for the model Philadelphia, and was raised in Wilmington, 704 computer, which was soon to be Delaware. His father had been trained as a launched. The unique feature of Fortran was chemist, but changed careers to become a that it would produce programs that were partner in a brokerage house, and the family 90% as good as those written by a human became wealthy and socially prominent. As a programmer. Backus got the go-ahead, and child, Backus enjoyed mechanical tinkering was allocated a team of ten programmers and loved his chemistry set, but showed for six months. Designing a translator that little scholastic interest or aptitude. He was produced efficient programs turned out to be sent to The Hill School, an exclusive private a huge challenge, and, by the time the system high school in Pottstown, Pennsylvania. was launched in April 1957, six months had His academic performance was so poor that become three years.
    [Show full text]
  • Speaker Bios
    SPEAKER BIOS Speaker: Nilanjan Banerjee, Associate Professor, Computer Science & Electrical Engineering, UMBC Topic: Internet of Things/Cyber-Physical Systems Nilanjan Banerjee is an Associate Professor at University of Maryland, Baltimore County. He is an expert in mobile and sensor systems with focus on designing end-to-end cyber-physical systems with applications to physical rehabilitation, physiological monitoring, and home energy management systems. He holds a Ph.D. and a M.S. in Computer Science from the University of Massachusetts Amherst and a BTech. (Hons.) from Indian Institute of Technology, Kharagpur. Speaker: Keith Bowman, Dean, College of Engineering & Information Technology (COEIT), UMBC Topics: Welcoming Remarks and Farewell and Wrap Keith J. Bowman has begun his tenure as the new dean of UMBC’s College of Engineering and Information Technology (COEIT). He joined UMBC on August 1, 2017, from San Francisco State University in California, where he served as dean of the College of Science and Engineering since 2015. Bowman holds a Ph.D. in materials science from the University of Michigan, and B.S. and M.S. degrees in materials science from Case Western Reserve University. Prior to his role at SFSU, he held various positions at the Illinois Institute of Technology and Purdue University. At the Illinois Institute of Technology, he was the Duchossois Leadership Professor and chair of mechanical, materials, and aerospace engineering. In Purdue University’s School of Materials Engineering, he served as a professor and head of the school. He also held visiting professorships at the Technical University of Darmstadt in Germany and at the University of New South Wales in Australia.
    [Show full text]
  • 2 9215FQ14 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources
    2 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources 21-22 Legal 23-25 Marketing 26 Personal Names (Individuals) 27 Predecessor Companies 28-29 Products & Services 30-89 Public Relations 90 Research 91-97 April 10, 2007 9215FQ14 3 Facilities & Buildings Q. When did IBM first open its offices in my town? A. While it is not possible for us to provide such information for each and every office facility throughout the world, the following listing provides the date IBM offices were established in more than 300 U.S. and international locations: Adelaide, Australia 1914 Akron, Ohio 1917 Albany, New York 1919 Albuquerque, New Mexico 1940 Alexandria, Egypt 1934 Algiers, Algeria 1932 Altoona, Pennsylvania 1915 Amsterdam, Netherlands 1914 Anchorage, Alaska 1947 Ankara, Turkey 1935 Asheville, North Carolina 1946 Asuncion, Paraguay 1941 Athens, Greece 1935 Atlanta, Georgia 1914 Aurora, Illinois 1946 Austin, Texas 1937 Baghdad, Iraq 1947 Baltimore, Maryland 1915 Bangor, Maine 1946 Barcelona, Spain 1923 Barranquilla, Colombia 1946 Baton Rouge, Louisiana 1938 Beaumont, Texas 1946 Belgrade, Yugoslavia 1926 Belo Horizonte, Brazil 1934 Bergen, Norway 1946 Berlin, Germany 1914 (prior to) Bethlehem, Pennsylvania 1938 Beyrouth, Lebanon 1947 Bilbao, Spain 1946 Birmingham, Alabama 1919 Birmingham, England 1930 Bogota, Colombia 1931 Boise, Idaho 1948 Bordeaux, France 1932 Boston, Massachusetts 1914 Brantford, Ontario 1947 Bremen, Germany 1938 9215FQ14 4 Bridgeport, Connecticut 1919 Brisbane, Australia
    [Show full text]
  • Modern Database Systems: Newsql, Nosql and Modernized Classic Systems
    NetApp 7th Annual University Day NetApp HQ, Sunnyvale, CA, USA 17 February 2014 Modern Database Systems: NewSQL, NoSQL and Modernized Classic Systems C. Mohan IBM Fellow and Former IBM India Chief Scientist IBM Almaden Research Center, San Jose, CA 95120, USA [email protected] http://bit.ly/CMohan Talk Version of Tutorial Presented First at 39th International Conference on Very Large Data Bases (VLDB) Riva del Garda, Italy, 29 August 2013 Links to Revised Tutorial Slides and Bibliography at http://bit.ly/CMnMDS Background + Warnings § My personal opinions, NOT necessarily IBM’s positions/opinions § Lots of hype on NoSQL (lesser on NewSQL) in industry, academia & VC world – this Kool-Aid has intoxicated many J § Been a details oriented, hard core DB person for > 3 decades – I go beyond hype, am not easily swayed by the latest fashion! § Not a relational bigot – most of my results on systems topics have applied to all sorts of persistent, distributed information systems § Have dissected many IBM and non-IBM systems’ internals (including pre- and post-relational ones) § Don’t claim to have all the answers or make definitive assertions § Aim: not exhaustive survey of modern systems or details of too many specific systems – broad brush analysis of good (sensible) and bad (nonsenSQL) of NoSQL/NewSQL, warn of pitfalls – time to pause and introspect. Give a few systems’ interesting details. § NOT against NoSQL but unhappy with choices on internals, design justifications (“anything goes”), and not learning enough from the past C. Mohan, MDS Tutorial,
    [Show full text]
  • Application Servers and Associated Technologies
    ACM SIGMOD International Conference on Management of Data (SIGMOD'02), Madison, USA, June 2002 Tutorial: Application Servers and Associated Technologies C. MOHAN IBM Fellow [email protected] http://www.almaden.ibm.com/u/mohan/ IBM Almaden Research Center 650 Harry Road, K01/B1 San Jose, CA 95120 USA These slides are available at http://www.almaden.ibm.com/u/mohan/AppServersTutorial_SIGMOD2002_Slides.pdf App Servers, Mohan 1 SIGMOD2002, Madison, 6/2002 About the Speaker Dr. C. Mohan joined the IBM Almaden Research Center as a Research Staff Member in 1981. In 1997, he was named an IBM Fellow for being recognized worldwide as a leading innovator in transaction management. He received the ACM SIGMOD Innovations Award in 1996 in recognition of his innovative contributions to the development and use of database systems. At VLDB99, he was honored with the 10 Year Best Paper Award for the impact of his work on the ARIES family of algorithms. In 1992, he was elected to the IBM Academy of Technology. Mohan is a core member of IBM's Application Integration Middleware (AIM) Architecture Board. Currently, he is working on data caching and next generation messaging in the context of WebSphere and DB2. He was the founding leader of the Dominotes project which resulted in the enhancement of Domino/Notes's scalability by the introduction of transactional recovery in R5. Prior to that, Mohan led the Exotica project which was focussed on the workflow product FlowMark (now called MQSeries Workflow), the messaging product MQSeries and the groupware product Lotus Notes. Mohan was a designer/implementer of the R* distributed DBMS, the Starburst extensible DBMS and DB2.
    [Show full text]
  • The Business Value of DB2 UDB for Z/OS
    Front cover The Business Value of DB2 UDB for z/OS Learn about the synergy of DB2 with IBM Eserver zSeries and z/OS Discover how you can benefit from the richness in function Be ready for On Demand Business Paolo Bruni Paul Bartak Rick Butler Sreeni Janaki John Pashley ibm.com/redbooks International Technical Support Organization The Business Value of DB2 UDB for z/OS June 2005 SG24-6763-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (June 2005) This edition applies to IBM DB2 Universal Database for z/OS Version 8 (program number 5625-DB2). © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this redbook. xii Become a published author . xiv Comments welcome. xiv Chapter 1. Evolution of the mainframe . 1 1.1 The evolution of z/Architecture . 2 1.1.1 Lower cost of entry to mainframes . 2 1.1.2 More options in pricing and performance . 2 1.1.3 Leveraging investment in existing applications . 3 1.2 Hardware. 4 1.3 Operating systems . 10 1.3.1 Value of z/OS . 10 1.3.2 Evolution of z/OS . 16 1.3.3 Other mainframe operating systems . 17 1.4 Processor . 18 1.5 Management . 19 1.6 Preparing new mainframers . 20 1.7 2000 through 2005: The era of on demand.
    [Show full text]
  • John Warner Backus
    John Warner Backus Born December 3, 1924, Philadelphia, Pa.; leader of the IBM team that created the programming language Fortran; inventor of the metalanguage BNF, known variously as Backus-Normal or Backus-Naur Form; currently Proponent of improved methods of programming such as the functional approach. Education: BS, mathematics, Columbia University, 1949; AM, mathematics, Columbia University, 1950. Professional Experience: IBM Corp.: programmer, Pure and Applied Science Departments, 1950-1953, manager, Programming Research Department, 1954-1958, IBM Research Staff, 1958-1963, IBM fellow, 1963-1991; adjunct professor of information sciences, University of California, Santa Cruz, 1974; visiting professor, University of California, Berkeley, 1980,1985. Honors and Awards: IBM fellow, 1963; W.W. McDowell Award, IEEE, 1967; National Medal of Science, 1975; ACM Turing Award, 1977; IEEE Computer Society Pioneer Award, 1980; member, National Academy of Sciences; member, National Academy of Engineers; Charles Stark Draper Award, National Academy of Engineering (NAE), 1993. John Backus was employed by IBM as a programmer for the Selective Sequence Electronic Calculator (SSEC) in 1950, after receiving his Master's degree in mathematics from Columbia University.1 Later he headed the development of the Speedcoding interpretive system for the IBM 701. He also took part in the design of the IBM 704, and was the original advocate for its built-in floating-point operations. From early 1954 until late 1958, he was manager of the programming research group (later department) in IBM during its development of Fortran. While Backus was a member of the committees that designed Algol 58 and Algol 60, he joined IBM Research. In the course of efforts to define Algol 58 more precisely, he employed the syntax description technique known as BNF; this technique was improved and used by Peter Naur to describe the syntax of Algol 60 in the Algol Report.
    [Show full text]
  • A Selective Chronology of IBM Women in Technology
    A Selective Chronology Of IBM Women In Technology 1890s 1899 The Computing Scale Company, one of three companies that will form the Computing - Tabulating - Recording Company (C-T-R) in 1911, hires Richard MacGregor, a Black employee, as well as Lilly J. Philp, Nettie A. Moore and Emma K. Manske. This occurs 10 years before the National Association for the Advancement of Colored People (NAACP) was founded, 36 years after President Lincoln signed the Emancipation Proclamation and 20 years before women won the right to vote. In 1924, these four employees help inaugurate IBM’s first Quarter Century Club. 1910s 1918 Clara Doring, Virginia Kempton, Rugh L. Schiele and Miriam R. Shott -- employees of an IBM predecessor company -- attend the Tabulating Machine School to learn about the mechanics and applications of punched card technology. 1920s 1924 Women join IBM’s first Quarter Century Club, created to honor employees with 25 years of service. 1929 Virginia L. Linkenhoker organizes IBM’s first customer training school. 1930s 1935 IBM hires its first professional women, 25 college seniors recruited for Systems Service They are graduates of IBM’s first women’s systems service class at Endicott, N.Y., in 1935. 1935 Thomas J. Watson, Sr. champions the introduction of women into IBM’s professional ranks, as the company holds its first systems service class for women. These pioneering women are the first wave of IBM female employees to take on customer contact positions traditionally filled by men. 1935 Virginia L. Linkenhoker becomes IBM’s first full-time system service woman. She is soon followed by the graduates of IBM’s first systems service class for women.
    [Show full text]
  • Jump Start Next Generation Applications with IBM Linuxone Leverage Open Technology Solutions to Meet the Demands of the New Application Economy
    IBM Systems Jump start next generation applications with IBM LinuxONE Leverage open technology solutions to meet the demands of the new application economy Introduction Meet the demand for a new application economy Mobile applications are truly becoming the primary face of many compa- nies. If an organization’s mobile app is unreliable, or the user has a bad experience, it will have a direct impact on the overall perception of that company in the customer’s mind. For example, in 2015, there are more than 7 billion mobile cellular subscriptions worldwide.1 Leading companies are seizing the opportunity to build, integrate and support the next generation of applications. They’re using mobile, cloud and big data analytics in new, more effective ways to drive better business outcomes and competitive differentiation. To support these strategic efforts, companies need a flexible and cost-efficient IT architecture to gain the highest levels of reliability, security and performance. Although many organizations have already made large investments in IT systems to meet this demand, they can not afford to continually add new servers and software licenses to keep pace with growth. Right now, C-level IT leaders, infrastructure and operations executives, enterprise and solution architects, developers, and more are exploring better ways to strike the right balance between controlling cost, complexity and risk while ensuring they have the agility to proactively deliver innovative applications and services that drive competitive advantage and market- place
    [Show full text]
  • DB2 Best Practices
    ® IBM® Data Servers Best Practices IBM Data Server Security Walid Rjaibi Senior Technical Staff Member Security Architect for DB2 LUW James Pickel Senior Technical Staff Member Security Architect for DB2 for z/OS Jonathan Leffler Senior Technical Staff Member Security Architect for IDS Belal Tassi DB2 Technical Evangelist Last updated: October 2010 IBM Data Server Security Page 2 Introduction .......................................................................................................... 4 Security threats and countermeasures roadmap....................................... 4 Security outside the database....................................................................... 5 Assessing your security needs ........................................................................... 6 Threats ................................................................................................................... 8 Data Threats.................................................................................................... 9 Configuration Threats ................................................................................. 12 Audit Threats................................................................................................ 12 Executable Threats ....................................................................................... 13 Recommended countermeasures..................................................................... 14 Data Threats.................................................................................................
    [Show full text]