Mainframe and Mobile – Are Your Back End Apps Ready?

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Mainframe and Mobile – Are your back end apps ready? Rosalind Radcliffe Distinguished Engineer, IBM Academy of Technology Member [email protected] .com © 2013 IBM Corporation Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. BladeCenter* DB2* IMS Rational* zEnterprise* CICS* HiperSockets Maximo* System z* z/OS* Cognos* IBM* OMEGAMON* Tivoli* DataPower* IBM logo* RACF* WebSphere* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Windows Server and the Windows logo are trademarks of the Microsoft group of countries. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries. * Other product and service names might be trademarks of IBM or other companies. Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. This information provides only general descriptions of the types and portions of workloads that are eligible for execution on Specialty Engines (e.g, zIIPs, zAAPs, and IFLs) ("SEs"). IBM authorizes customers to use IBM SE only to execute the processing of Eligible Workloads of specific Programs expressly authorized by IBM as specified in the “Authorized Use Table for IBM Machines” provided at www.ibm.com/systems/support/ machine_warranties/machine_code/aut.html (“AUT”). No other workload processing is authorized for execution on an SE. IBM offers SE at a lower price than General Processors/Central Processors because customers are authorized to use SEs only to process certain types and/or amounts of workloads as specified by IBM in the AUT. 2 © 2013 IBM Corporation Mobile is the next evolution for connecting to the Data Center 91% 75% 96% 90% 900% Mobile users keep Mobile shoppers Year to year Users use multiple Increase of global their device within take action after increase in mobile screens as machine-to-machine arm’s reach 100% receiving a location cyber Monday sales channels come connections by 2022 of the time based message between 2012 together to (2 billion in 2011 to and 2011 create integrated 18 billion at the experiences end of 2022) 3 © 2013 IBM Corporation Mobile is changing the way information is used Information developed and controlled by users Information developed for mobile devices using multiple platforms and transformed into web services Information restricted and developed in the data center JAVA 4 © 2013 IBM Corporation System z bridges Systems of Record and Systems of Engagement Systems of Engagement Systems of Record Mobile Apps Finance Corporate Data Ware- house Accounting Order Fulfillment Siloed Dept. Apps Systems of Engagement are Systems of Record cloud-based, Linux on are well integrated, ® z/OS® Cloud decentralized, IBM System z trusted repositories. APIs support rapid app development. 5 © 2013 IBM Corporation Client drivers for mobile solutions span all industries Finance & Banking Construction & Manufacturing Manage their investment Manage complex projects portfolios and accounts from and operations on site anywhere for complete bank and streamline survey transactions and work order processes Insurance Retail File, process and Engage shoppers in new manage claims and ways and intelligently target document damages personalized and location sensitive marketing offers Travel & Transportation Cross-Industry CIO’s Office Provide up to date Empower employees with information specific to their anytime, anyplace access to itineraries and location and dashboards and critical enable customer self-service information 6 © 2013 IBM Corporation Consider the typical business traveler today… Electronic boarding pass Seating map real time Flight status real time Traveler views boarding pass Traveler views current Traveler views for potential prior to leaving, at the airport, seat, potential upgrades, flight delays, airport and at boarding capacity of plane information, connecting flights, notifications pushed to device All information on the mobile device is connected to the back end and consistent with what airline personnel see 7 © 2013 IBM Corporation IBM has been building up our mobile enterprise capabilities 10 125+ Doubling 200+ Leader Acquisitions to Patents for 2013 investment in IBM Software apps In app design and strengthen our wireless inventions mobile solutions available in managed services position in mobile in 2012, bringing app stores; by Forrester and since 2006 the total to 270 ~ 1M downloads Gartner 8 © 2013 IBM Corporation IBM MobileFirst Platform is shaping enterprise mobility 1 2 3 The Broadest The Deepest Set New Industry Partnerships Portfolio of of Services Expertise and Resources for Mobile Solutions Developers Native, web, or hybrid app development Tools to build & test high quality apps for many devices Management, security, continuous delivery & distribution of apps Easy connectivity to existing data & services for mobile usage On-premises or managed service delivery 9 © 2013 IBM Corporation But mobile also brings business and IT challenges Mobile devices Mobile devices Mobile devices Mobile devices Mobile devices are shared have multiple are diverse are used in prioritize more often personas more locations the user • Personal phones • Work tool with • OS immaturity for • A single location • Conflicts with and tablets shared BYOD enterprise mgmt could offer public, user experience with family private, and cell not tolerated • Entertainment • BYOD dictates connections • Enterprise tablet device multiple OSs • OS architecture shared with • Anywhere, anytime puts the user in • Personal • Vendor / carriers co-workers control organization dictates multiple • Increasing reliance • Social norms of OS versions on enterprise WiFi • Difficult to • Security profile mobile apps vs. enforce policy, per persona file systems app lists 10 © 2013 IBM Corporation And even more challenges for the data center 18M 41% 90% people use mobile devices IT budget is spent for of the phones in Africa for bank transactions mobile computing are mobile with deposit making up 8% of of money to mobile bank transactions devices anywhere • Inconsistent peaks 24/7 are common Peaks of data can occur any time of day as well as exploding micro
Recommended publications
  • Fortran Reference Guide

    Fortran Reference Guide

    FORTRAN REFERENCE GUIDE Version 2018 TABLE OF CONTENTS Preface............................................................................................................ xv Audience Description......................................................................................... xv Compatibility and Conformance to Standards............................................................ xv Organization................................................................................................... xvi Hardware and Software Constraints...................................................................... xvii Conventions................................................................................................... xvii Related Publications........................................................................................ xviii Chapter 1. Language Overview............................................................................... 1 1.1. Elements of a Fortran Program Unit.................................................................. 1 1.1.1. Fortran Statements................................................................................. 1 1.1.2. Free and Fixed Source............................................................................. 2 1.1.3. Statement Ordering................................................................................. 2 1.2. The Fortran Character Set.............................................................................. 3 1.3. Free Form Formatting..................................................................................
  • Introduction to Linux on System Z

    Introduction to Linux on System Z

    IBM Linux and Technology Center Introduction to Linux on System z Mario Held IBM Lab Boeblingen, Germany © 2009 IBM Corporation IBM Linux and Technology Center Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: *, AS/400®, e business(logo)®, DBE, ESCO, eServer, FICON, IBM®, IBM (logo)®, iSeries®, MVS, OS/390®, pSeries®, RS/6000®, S/30, VM/ESA®, VSE/ESA, WebSphere®, xSeries®, z/OS®, zSeries®, z/VM®, System i, System i5, System p, System p5, System x, System z, System z9®, BladeCenter® The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
  • AIX Migration to Cloud with IBM Power Virtual Server

    AIX Migration to Cloud with IBM Power Virtual Server

    AIX Migration to Cloud with IBM Power Virtual Server An IBM Systems Lab Services Tutorial Aaron Bolding Berjis Patel Vess Natchev [email protected] TABLE OF CONTENTS CHAPTER 1: SOLUTION OVERVIEW............................. 1 Introduction ................................................................................ 1 Use Cases .................................................................................. 1 Migration via PowerVC OVA ..................................................... 1 Transfer System Backup Using the Public Internet ..................... 2 Transfer System Backup Using Cloud Object Storage ................. 2 Solution Components and Requirements ........................................ 2 Components .......................................................................... 2 Migration via PowerVC OVA ..................................................... 2 Transfer System Backup Using the Public Internet ..................... 2 Transfer System Backup Using Cloud Object Storage ................. 2 Requirements ........................................................................ 3 Solution Diagrams ....................................................................... 3 Transfer System Backup Using the Public Internet ..................... 3 Transfer System Backup Using Cloud Object Storage ................. 4 CHAPTER 2: IMPLEMENTATION .................................. 5 Migration via PowerVC OVA .......................................................... 5 Procedure to Configure IBM Cloud Object Storage .....................
  • RACF Command Tips

    RACF Command Tips

    RACF Command Tips SHARE ‐ March 2015 Session 18875 RSH Consulting ‐ Robert S. Hansel RSH Consulting, Inc. is an IT security professional services firm established in 1992 and dedicated to helping clients strengthen their IBM z/OS mainframe access controls by fully exploiting all the capabilities and latest innovations in RACF. RSH's services include RACF security reviews and audits, initial implementation of new controls, enhancement and remediation of existing controls, and training. • www.rshconsulting.com • 617‐969‐9050 Robert S. Hansel is Lead RACF Specialist and founder of RSH Consulting, Inc. He began working with RACF in 1986 and has been a RACF administrator, manager, auditor, instructor, developer, and consultant. Mr. Hansel is especially skilled at redesigning and refining large‐scale implementations of RACF using role‐based access control concepts. He is a leading expert in securing z/OS Unix using RACF. Mr. Hansel has created elaborate automated tools to assist clients with RACF administration, database merging, identity management, and quality assurance. • 617‐969‐8211 • [email protected] • www.linkedin.com/in/roberthansel • http://twitter.com/RSH_RACF RACF Command Tips SHARE 2 © 2016 RSH Consulting, Inc. All Rights Reserved. March 2016 Topics . User Commands . Group Commands . Dataset Command . General Resource Commands . PERMIT Command . Generic Profile Refresh . List Commands . SEARCH Command . Console Command Entry . Building Commands with Microsoft Excel RACF and z/OS are Trademarks of the International Business Machines Corporation RACF Command Tips SHARE 3 © 2016 RSH Consulting, Inc. All Rights Reserved. March 2016 User Commands . ADDUSER Defaults: • OWNER ‐ Creator's ID • DFLTGRP ‐ Creator's Current Connect Group • PASSWORD ‐ Pre‐z/OS 2.2: Default Group z/OS 2.2: NOPASSWORD • Always specify when creating new ID .
  • Implementing Nfsv4 in the Enterprise: Planning and Migration Strategies

    Implementing Nfsv4 in the Enterprise: Planning and Migration Strategies

    Front cover Implementing NFSv4 in the Enterprise: Planning and Migration Strategies Planning and implementation examples for AFS and DFS migrations NFSv3 to NFSv4 migration examples NFSv4 updates in AIX 5L Version 5.3 with 5300-03 Recommended Maintenance Package Gene Curylo Richard Joltes Trishali Nayar Bob Oesterlin Aniket Patel ibm.com/redbooks International Technical Support Organization Implementing NFSv4 in the Enterprise: Planning and Migration Strategies December 2005 SG24-6657-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (December 2005) This edition applies to Version 5, Release 3, of IBM AIX 5L (product number 5765-G03). © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii The team that wrote this redbook. xiv Acknowledgments . xv Become a published author . xvi Comments welcome. xvii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 Overview of enterprise file systems. 4 1.2 The migration landscape today . 5 1.3 Strategic and business context . 6 1.4 Why NFSv4? . 7 1.5 The rest of this book . 8 Chapter 2. Shared file system concepts and history. 11 2.1 Characteristics of enterprise file systems . 12 2.1.1 Replication . 12 2.1.2 Migration . 12 2.1.3 Federated namespace . 13 2.1.4 Caching . 13 2.2 Enterprise file system technologies. 13 2.2.1 Sun Network File System (NFS) . 13 2.2.2 Andrew File System (AFS) .
  • IBM SPSS Decision Trees Business Analytics

    IBM SPSS Decision Trees Business Analytics

    IBM Software IBM SPSS Decision Trees Business Analytics IBM SPSS Decision Trees Easily identify groups and predict outcomes IBM® SPSS® Decision Trees creates classification and decision trees to Highlights help you better identify groups, discover relationships between groups and predict future events. • Identify groups, segments, and patterns in a highly visual manner with classification trees. You can use classification and decision trees for: • Choose from CHAID, Exhaustive • Segmentation CHAID, C&RT and QUEST to find the • Stratification best fit for your data. • Prediction • Present results in an intuitive manner— • Data reduction and variable screening perfect for non-technical audiences. • Interaction identification • Save information from trees as new • Category merging variables in data (information such as • Discretizing continuous variables terminal node number, predicted value and predicted probabilities). Highly visual diagrams enable you to present categorical results in an intuitive manner—so you can more clearly explain the results to non-technical audiences. These trees enable you to explore your results and visually determine how your model flows. Visual results can help you find specific subgroups and relationships that you might not uncover using more traditional statistics. Because classification trees break the data down into branches and nodes, you can easily see where a group splits and terminates. IBM Software IBM SPSS Decision Trees Business Analytics Use SPSS Decision Trees in a variety of applications, • Marketing
  • Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — Pocs Poised to Enter Full-Blown Production

    Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — Pocs Poised to Enter Full-Blown Production

    Market Share Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — POCs Poised to Enter Full-Blown Production Ritu Jyoti Peter Rutten Natalya Yezhkova Ali Zaidi THIS IDC MARKET SHARE EXCERPT FEATURES IBM IDC MARKET SHARE FIGURE FIGURE 1 Worldwide Artificial Intelligence 2018 Share Snapshot Note: 2018 Share (%), Revenue ($M), and Growth (%) Source: IDC, 2019 July 2019, IDC #US45334719e IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market Share: Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — POCs Poised to Enter Full-Blown Production (Doc # US45334719). All or parts of the following sections are included in this excerpt: Executive Summary, Market Share, Who Shaped the Year, Market Context, Appendix and Learn More. Also included is Figure 1, Table 1 and 2. EXECUTIVE SUMMARY The artificial intelligence (AI) market experienced steady growth in 2018, growing 35.6% to $28.1 billion. As per IDC's Artificial Intelligence Global Adoption Trends and Strategies Survey of 2,473 organizations of various sizes across industries worldwide by those that are using artificial intelligence (AI) solutions, either developing them in-house, using COTS, or a combination of both: 18% had AI models in production, 16% were in the proof-of-concept (POC) stage, and 15% were experimenting with AI. While automation, business agility, and customer satisfaction are the primary drivers for AI initiatives, cost of the solution, lack of skilled personnel, and bias in data have held organizations from implementing AI broadly. In the past 12 months, organizations worldwide have used AI in IT operations, customer service and support, finance and accounting, and ecommerce with major redesign to their business processes to maximize the ROI of AI.
  • CIFS SMB2 SMB3 Meets Linux a Year in Review

    CIFS SMB2 SMB3 Meets Linux a Year in Review

    The Future of File Protocols: CIFS SMB2 SMB3 Meets Linux A Year in Review Steve French Senior Engineer – File System Architect IBM Linux Technology Center 1 IBM, Linux, and Building a Smarter Planet © 2012 IBM Corporation Legal Statement – This work represents the views of the author(s) and does not necessarily reflect the views of IBM Corporation – A full list of U.S. trademarks owned by IBM may be found at http://www.ibm.com/legal/copytrade.shtml. – Linux is a registered trademark of Linus Torvalds. – Other company, product, and service names may be trademarks or service marks of others. 2 © 2012 IBM Corporation Who am I? – Steve French ([email protected] or [email protected]) – Author and maintainer of Linux cifs vfs (for accessing Samba, Windows and various SMB/CIFS based NAS appliances) – Wrote initial SMB2 kernel client prototype – Member of the Samba team, coauthor of SNIA CIFS Technical Reference and former SNIA CIFS Working Group chair – Architect: File Systems/NFS/Samba for IBM Linux Technology Center © 2012 IBM Corporation SMB3: Great Feature Set, Broad Deployment, Amazing Performance ● Introduction of new storage features in Windows 8 causing one of most dramatic shifts in storage industry as companies rapidly move to support “SMB3” (aka SMB2.2) ● “SMB2.2 (CIFS) screams over InfiniBand” (Storage CH Blog) • Is (traditional) SAN use going to die? – “Market trends show virtualization workloads moving to NAS” (Dennis Chapman, Technical Director NetApp, SNIA SDC 2011) – “Unstructured data (file-based) storage is growing faster than structured data” (Thomas Pfenning, Microsoft GM, SNIA SDC 2011) – Customers prefer “file” • SMB2/CIFS market share is MUCH larger than NFS.
  • Parallel Programming in Fortran 95 Using Openmp

    Parallel Programming in Fortran 95 Using Openmp

    Parallel Programming in Fortran 95 using OpenMP Miguel Hermanns School of Aeronautical Engineering Departamento de Motopropulsi´on y Termofluidodin´amica Universidad Polit´ecnica de Madrid Spain email: [email protected] 19th of April 2002 Contents 1 OpenMP Fortran Application Program Interface 1 1.1Introduction................................... 1 1.1.1 Historicalremarks........................... 2 1.1.2 Whoisparticipating.......................... 2 1.1.3 Aboutthisdocument.......................... 3 1.2Thebasics.................................... 4 1.2.1 The sentinels for OpenMP directives and conditional compilation . 4 1.2.2 Theparallelregionconstructor.................... 5 2 OpenMP constructs 9 2.1Work-sharingconstructs............................ 9 2.1.1 !$OMP DO/!$OMP END DO ........................ 10 2.1.2 !$OMP SECTIONS/!$OMP END SECTIONS ................ 15 2.1.3 !$OMP SINGLE/!$OMP END SINGLE .................. 16 2.1.4 !$OMP WORKSHARE/!$OMP END WORKSHARE .............. 17 2.2Combinedparallelwork-sharingconstructs.................. 20 2.2.1 !$OMP PARALLEL DO/!$OMP END PARALLEL DO ............ 21 2.2.2 !$OMP PARALLEL SECTIONS/!$OMP END PARALLEL SECTIONS .... 21 2.2.3 !$OMP PARALLEL WORKSHARE/!$OMP END PARALLEL WORKSHARE .. 21 2.3Synchronizationconstructs........................... 22 2.3.1 !$OMP MASTER/!$OMP END MASTER .................. 22 2.3.2 !$OMP CRITICAL/!$OMP END CRITICAL ................ 22 2.3.3 !$OMP BARRIER ............................. 24 2.3.4 !$OMP ATOMIC .............................. 26 2.3.5 !$OMP FLUSH .............................. 27 2.3.6 !$OMP ORDERED/!$OMP END ORDERED ................. 30 2.4Dataenvironmentconstructs.......................... 32 2.4.1 !$OMP THREADPRIVATE (list) .................... 32 3 PRIVATE, SHARED & Co. 37 3.1 Data scope attribute clauses . 37 3.1.1 PRIVATE(list) ............................. 37 3.1.2 SHARED(list) .............................. 38 3.1.3 DEFAULT( PRIVATE | SHARED | NONE ) ............... 39 i ii CONTENTS 3.1.4 FIRSTPRIVATE(list) .........................
  • Open Source Software: What Business Lawyers, Entrepreneurs and IT Professionals Should Know

    Open Source Software: What Business Lawyers, Entrepreneurs and IT Professionals Should Know

    Open Source Software: What Business Lawyers, Entrepreneurs and IT Professionals Should Know Stuart R. Hemphill Partner Minneapolis P: (612) 340-2734 F: (612) 340-8856 [email protected] © 2016 Dorsey & Whitney LLP Source vs. Object Source Code Object Code Programmer readable statements in Machine readable Binary: a computer language, such as C, C++, Cobol, Fortran, Java, Perl, 000010100010001010 PHP 110001010000010100 000100101010001011 // Create a button and add it to the applet. // Also, set the button's colors clear_button = new Button("Clear"); Or Hexadecimal clear_button.setForeground(Color.black); clear_button.setBackground(Color.lightGray); 3F7A this.add(clear_button); (translates to the following binary number: 0011 1111 0111 1010) 2 History of Open Source Software . Term coined in February 1998 by Silicon Valley insiders in anticipation of Netscape’s announcement that it would release the source code for its browser software . This meant software coders could understand the browser’s working details and potentially modify them . 1998 was a momentous time for open source movement given mainstream adoption of internet . But concept significantly pre-dates coining of term 3 Free Software Foundation . Free Software Foundation (FSF), created in 1983 by Richard Stallman of MIT with goal of developing free version of UNIX operating system; everyone could share and change this version . According to FSF, “‘Free software’ is a matter of liberty, not price … think of ‘free’ as in ‘free speech,’ not as in ‘free beer.’” . Stallman wrote a license leveraging copyright in base code and intended to keep derivatives of base software “free” by requiring source code disclosure . Non-negotiable terms; accept by use .
  • Sharing Page Tables in the Linux Kernel

    Sharing Page Tables in the Linux Kernel

    Sharing Page Tables in the Linux Kernel Dave McCracken IBM Linux Technology Center Austin, TX [email protected] Abstract ever possible. The MM subsystem currently does not, however, make any attempt to share An ongoing barrier to scalability has been the the lowest layer of the page tables, even though amount of memory taken by page tables, es- these may also be identical between address pecially when large numbers of tasks are map- spaces. ping the same shared region. A solution for this Detecting when these page tables may be problem is for those tasks to share a common shared, and setting up sharing for them is fairly set of page tables for those regions. straightforward. In the following sections the An additional benefit to implementing shared current MM data structures are described, fol- page tables is the ability to share all the page lowed by an explanation of how and when the tables during fork in a copy-on-write fashion. page tables would be shared. Finally some is- This sharing speeds up fork immensely for sues in the implementation and some perfor- large processes, especially given the increased mance results are described. overhead introduced by rmap. 2 Major Data Structures This paper discusses my implementation of shared page tables. It covers the areas that are improved by sharing as well as its limitations. To understand the issues addressed by shared I will also cover the highlights of how shared page tables it is helpful to understand the struc- page tables was implemented and discuss some tures that make up the Linux MM.
  • Planning Your Upgrade to HCL Notes and Domino V11.0.1

    Planning Your Upgrade to HCL Notes and Domino V11.0.1

    Planning your Upgrade to HCL Notes and Domino V11.0.1 Document V1.0.6 – December 8, 2020 Written By: Kendra Bowker ([email protected]), Natalie Mezzina ([email protected]), John Paganetti ([email protected]) Edited By: Casey Toole ([email protected]), Brian Arnold ([email protected]) 1-1 Table of Contents Introducing Notes and Domino V11.0.1.................................................................................... 1-5 What’s been removed? .......................................................................................................................... 1-5 Domino Versions Supported for Upgrade to V11.0.1 ............................................................................ 1-6 Security Considerations Prior to Performing Upgrades ............................................................ 2-7 Notes IDs ................................................................................................................................................ 2-7 ID Vault – Maintaining ID file Synchronization ...................................................................................... 2-7 SAML and Federated Login .................................................................................................................... 2-7 Database Encryption .............................................................................................................................. 2-7 Whitelist Active Content Filter (ACF) for iNotes and Verse ..................................................................