Think 2019 / 6734 / February 14, 2019 / © 2019 IBM Corporation Please Note

Total Page:16

File Type:pdf, Size:1020Kb

Think 2019 / 6734 / February 14, 2019 / © 2019 IBM Corporation Please Note QRadar 7.3.2 Feature Discussion - Matthew Carle QRadar Offering Management & Jonathan Pechta QRadar Support Content Lead Think 2019 / 6734 / February 14, 2019 / © 2019 IBM Corporation Please note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice and at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2 Notices and disclaimers © 2019 International Business Machines Corporation. No part of this Performance data contained herein was generally obtained in a document may be reproduced or transmitted in any form without controlled, isolated environments. Customer examples are presented as written permission from IBM. illustrations of how those U.S. Government Users Restricted Rights — use, duplication or customers have used IBM products and the results they may have disclosure restricted by GSA ADP Schedule Contract with IBM. achieved. Actual performance, cost, savings or other results in other Information in these presentations (including information relating to operating environments may vary. products that have not yet been announced by IBM) has been reviewed References in this document to IBM products, programs, or services for accuracy as of the date of initial publication and could include does not imply that IBM intends to make such products, programs or unintentional technical or typographical errors. IBM shall have no services available in all countries in which IBM operates or does responsibility to update this information. This document is distributed business. “as is” without any warranty, either express or implied. In no event, Workshops, sessions and associated materials may have been prepared shall IBM be liable for any damage arising from the use of this by independent session speakers, and do not necessarily reflect the information, including but not limited to, loss of data, business views of IBM. All materials and discussions are provided for interruption, loss of profit or loss of opportunity. IBM products and informational purposes only, and are neither intended to, nor shall services are warranted per the terms and conditions of the agreements constitute legal or other guidance or advice to any individual participant under which they are provided. or their specific situation. IBM products are manufactured from new parts or new and used parts. It is the customer’s responsibility to insure its own compliance In some cases, a product may not be new and may have been previously with legal requirements and to obtain advice of competent legal counsel installed. Regardless, our warranty terms apply.” as to the identification and interpretation of any relevant laws and Any statements regarding IBM's future direction, intent or product regulatory requirements that may affect the customer’s business and plans are subject to change or withdrawal without notice. any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer follows any law. Think 2019 / 6734 / February 13, 2019 / © 2019 IBM Corporation 3 Notices and disclaimers continued Information concerning non-IBM products was obtained from the IBM, the IBM logo, ibm.com and [names of other referenced IBM suppliers of those products, their published announcements or other products and services used in the presentation] are trademarks of publicly available sources. IBM has not tested those products about this International Business Machines Corporation, registered in many publication and cannot confirm the accuracy of performance, jurisdictions worldwide. Other product and service names might compatibility or any other claims related to non-IBM be trademarks of IBM or other companies. A current list of IBM products. Questions on the capabilities of non-IBM products should be trademarks is available on the Web at "Copyright and trademark addressed to the suppliers of those products. IBM does not warrant the information" at: www.ibm.com/legal/copytrade.shtml. quality of any third-party products, or the ability of any such third-party . products to interoperate with IBM’s products. IBM expressly disclaims all warranties, expressed or implied, including but not limited to, the implied warranties of merchantability and fitness for a purpose. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. Think 2019 / 6734 / February 13, 2019 / © 2019 IBM Corporation 4 Contents Part 1: Platform Updates 06 Part 2: Usability Enhancements 20 Introducing App Hosts 07 Admin Tab as a Favorite 21 Security Assertion Markup Language (SAML) 2.0 10 Rule Performance Visualization 22 Disconnected Log Collector (DLC) 11 Report Exports in CSV Format 25 Data Obfuscation for Multi-tenant Environments 12 Saved Search ‘Show AQL’ Option 26 VLAN Segmentation Multi-tenant Environments 13 Improved Management for Backup Files 27 Enhanced Clarity into MPLS Flows for IPFIX 14 User Management Facelift 28 Content Extension Enhancements 15 Reference Data Expiration Messages 30 Incremental Licensing 16 Additional Platform Updates 31 DrQ Health Check Framework 17 Installation and Virtual Machine Updates 19 Part 3: Data Ingestion 32 Traffic Analysis for Custom Log Sources 33 Traffic Analysis for Custom Log Sources 34 New structured data types - LEEF and CEF 35 Part 4: APIs 36 Selectable API versions interface 37 APIs in QRadar 7.3.2 38 Think 2019 / 6734 / February 13, 2019 / © 2019 IBM Corporation 5 Part 1 Platform Updates in QRadar 7.3.2 Think 2019 / 6734 / February 14, 2019 / © 2019 IBM Corporation 6 App Hosts (formerly QRadar App Nodes) 7.3.1 Deployments 7.3.2 Deployments Console Console What is the same? MH 1 From an architecture perspective, the App Host is MH 1 identical to the functionalist of an App Node. MH 2 • App Hosts be physical, virtual, or software. Installs MH 2 are completed with the QRadar 7.3.2 ISO file. • Purpose built to hosts all apps in the deployment App Host and remove processing load from the Console. App Node (appliance ID = 4000). App Node What is different? • App Nodes are no longer supported from 7.3.2 App Host has been rebuilt from the ground up to and forward. If an App Node is present during stabilize the whole process of running apps in QRadar. the 7.3.2 upgrade, users will be instructed to • Fully managed and patched as part of QRadar replace it with an App Host. Apps can be software update process. migrated after the App Host is installed. • Admins are no longer required to manage the OS. • A new 80% memory limitation is in place when • Supports standard deployment capabilities, such you migrate to an App Host. Available memory as backup & restore and High Availability. utilization was previously 100% for App Nodes. • Entitlement for App Nodes comes from Q1PD. Think 2019 / 6734 / February 13, 2019 / © 2019 IBM Corporation 7 Introducing App Host (formerly QRadar App Node) Where are app migrations managed? Admin > System and License Management Think 2019 / 6734 / February 13, 2019 / © 2019 IBM Corporation 8 Introducing App Host (continued) Apps that are migrated to the app host are moved and updated without impact to customer data. Apps that are being migrated to the App Host appliance cannot be used until the migration is complete. A progress bar indicates the current status of the app migration. NOTE: App Hosts have the same minimum system requirements as App Nodes. Think 2019 / 6734 / February 13, 2019 / © 2019 IBM Corporation 9 Security Assertion Markup Language (SAML) 2.0 What’s new? • QRadar starts supporting SAML 2.0 single sign on authentication (WEB SSO profile) from 7.3.2. • Easy to integrate with organization-wise single sign on solution in a standard way. • SAML 2.0 SSO web profile requires no direct server to server connection. • Fully support QRadar initiated or identity provider initiated single sign on/sign off. Why? Enterprise Single Sign-On, two/multi-factor authentication, CAC Cards. These are all solutions administrators look to in order to secure and manage authentication to enterprise infrastructure. QRadar 7.3.2 introduces support for SAML 2.0 to allow administrators to choose the best of breed technology for identity management and apply those same technologies to govern authentication and authorization within the QRadar platform. Think 2019 / 6734 / February 14, 2019 / © 2019 IBM Corporation New - Disconnected Log Collector (DLC) In the 7.3.2 timeframe we introduce the QRadar DLC, which mirrors a number of powerful What is in store for 2019? capabilities of our 15XX Event Collector and • Continuous delivery of protocols removes deployment restrictions. No longer does an administrator need full virtual infrastructure or • Configuration entirely from within QRadar even stand alone, purpose build appliance. A simple RPM install on existing RHEL or CentOS • Disconnected Log Collector (DLC) Chaining infrastructure can provide almost all of QRadar’s event collection capabilities. Uses a Universal DSM and the ‘IBM QRadar DLC Protocol’ when you configure log sources.
Recommended publications
  • Think Journey Business and AI Campus
    Think Journey Business and AI Campus March 19–March 22 Mandalay Bay Convention Center Las Vegas Think is the flagship IBM® conference built to help enhance or jumpstart your journey to AI and the cloud. Forty-thousand of the world’s most inspiring innovators, leaders and thinkers will be in attendance; gathering to learn how AI can solve business challenges, and to discuss the current state of the art and the future possibilities of AI. Think is IBM’s only conference in 2018, and it will be your last chance until Think 2019 to learn how to make the most of AI for your business. 1 Table of Contents Top seven things to know about AI, Watson™ and Think 2018 03 Access to Watson expertise and leadership 03 Think week at-a-glance 04 Watson clients and partners 04 Entertainment at Think 04 Watson Primer 05 Watson at Work Activations 06 Future of the Call Center in Augmented Reality 07 With Watson Studio 08 The eight sessions everyone should attend 09 Watson tech talks for beginners to experts 11 Client sessions not to be missed 13 Think Campus Map 20 Watson Campus Map 20 IBM Events mobile app 21 Transportation 21 Think Journey | Business and AI Campus 2 Top seven things to know about AI, Watson and Think 2018 1. Be the first to hear about the newest Watson AI products and solutions to be unveiled at Think 2. Attend one of 50+ client-led sessions to learn about projects with Watson 3. Develop or evolve your AI strategy and business case in hands-on sessions with IBM AI experts 4.
    [Show full text]
  • Building the Cognitive Enterprise: Nine Action Areas Deep Dive
    Research Insights Building the Cognitive Enterprise: Nine Action Areas Deep Dive This Deep Dive document is the in- depth version. For an abridged version, please read, “Building the Cognitive Enterprise: Nine Action Areas, Core Concepts.” Building the Cognitive Enterprise | 1 Mark Foster Senior Vice President IBM Services and Global Business Services Introduction A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social, and regulatory forces. As artificial intelligence, blockchain, automation, Internet of Things, 5G, and edge computing become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise™. 2 | Building the Cognitive Enterprise Table of contents Executive summary 3 Introduction to the Cognitive Enterprise 4 Chapter 1 Market-making Business Platforms 11 – Double down on “Big Bets” 15 – Create a new business blueprint 19 – Orchestrate compelling change 22 – Action guide 25 Chapter 2 Intelligent Workflows 26 – Embed exponential technologies 31 – Drive value from data 37 – Deploy through hybrid multicloud 39 – Action guide 42 Chapter 3 Enterprise Experience and Humanity 43 – Elevate human-technology partnerships 47 – Cultivate smart leadership, skills, and culture 51 – Perform with purposeful agility 55 – Action guide 58 Chapter 4 New way of building: Garage 59 Conclusion A new way to grow, a new way to compete 64 Related IBM Institute for Business Value studies 65 Notes and sources 66 Executive summary | 3 Executive summary The impact of the convergence of multiple exponential ever-clearer strategic bets that they are placing.
    [Show full text]
  • Changeman ZMF Administrator's Guide
    ChangeManZMF Administrator’s Guide © Copyright 2001-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contains Confidential Information. Except as specifically indicated otherwise, a valid license is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Product version: 8.2 Patch 2 Publication date: September 2019 Table of Contents Welcome to ChangeMan® ZMF. 9 Guide to ChangeMan ZMF Documentation. 9 ChangeMan ZMF Documentation Suite . 9 Using the Manuals . 11 Searching the ChangeMan ZMF Documentation Suite. 11 Using the ISPF Interface . 13 Description of the ISPF Interface. 13 Using Online Help . 13 Typographical Conventions . 14 Notes . 14 Chapter 1 Introduction . 15 Global Administrator . 16 Application Administrator . 16 Security Administrator . 16 ChangeMan ZMF Monitor . 17 General Administrator . 17 Chapter 2 What is ChangeMan ZMF? . 19 Change Package . 20 Impact Analysis . 20 Checkout . 20 Staging. 21 Audit . 21 Recompile and Relink . 22 Freeze . 22 Promotion . 23 Approval . 23 Production Installation . 23 Baseline Libraries and Delta Decks. 24 Backout Management Facilities . 24 Emergency Changes. 24 ChangeMan ZMF Life Cycle . 24 Chapter 3 Pre-Implementation Decisions .
    [Show full text]
  • PART I: People & Strategy
    By Ken Luskin [email protected] October 28, 2014 PART I: People & Strategy The Brilliance of Steve Jobs was in building a team of geniuses Virtually everyone in the world knows that Steve Jobs was the driving force behind the success of Apple. Unfortunately, few of them understand that without the team of technical gurus Jobs assembled, his visions would not have become reality. Without a Microprocessor Brain, the iPhone would not exist Inside every “smart” computing device is a microprocessor, considered the brains of the device. When Jobs was creating what is now known as the iPhone, he needed a special microprocessor, which could make it through the day without draining the battery. Jobs first approached Intel, the company that was supplying the microprocessors for the entire MAC line. Intel was not interested in supplying a relatively low cost mobile chip, because the bean counters and FAB guys had no vision. So, Jobs built a team of top mobile microproprocessor engineers, licensed the ARM architecture, and created a chip that became the brains of the iPhone and iPad. Apple buys P.A. Semiconductor in 2008 to keep Apple’s microprocessors on the cutting edge With this acquisition Apple received a group of highly innovative engineers, including ex AMD employee Jim Keller. From a VentureBeat article: “Keller spearheaded the development of Apple’s custom mobile processors — including the A4 in the iPhone 4, the A5 in the iPhone 4S and iPad 2, and the A5X in the new iPad — all of which have managed to keep Apple’s mobile devices on the cutting edge.
    [Show full text]
  • Understanding the Motivations for Business to Create Shared Value 18 Case Studies 3
    3 Understanding the Motivations for Business to Create Shared Value 18 Case Studies 3 Understanding the Motivations for Business to Create Shared Value 18 Case Studies Introduction - a Mix of Motivations for All but Organised in the Primary In this section, there are 18 case studies listing companies from Hong Kong and around the world who are embracing business for good. This is a snapshot of different types of activities, not a comprehensive analysis. The write-ups are based on interviews that the Consulting Team conducted mainly in the third and fourth quarter of 2019. Since this study is interested in what motivates businesses to do good, this section has been organised around three broad categories, based on our research and the interviews. The three categories are 1) New business opportunities 2) Leadership and 3) External influence. In reality,there are a variety of drivers that are driving these companies to behave differently, not just one. We have clustered the cases around the primary driver to do good. This categorisation should not be viewed in a strict sense - rather the motivations are interlinked and not mutually exclusive. New Business Opportunities Whilst Transforming Society This section lists companies who are primarily motivated by finding a new business opportunity, at the same time as tackling a societal challenge. 53 Hong Kong Broadband Network Purposeful Profits HKSAR “Under the goal of Making Hong Kong a Better Place to Live, HKBNers share a strong collective alignment of interest, and are extra passionate to deliver products, services and outcomes that are always great for our stakeholders and Hong Kong’s communities.
    [Show full text]
  • POV – Watson Privacy, Compliance, & Security
    POV – Watson Privacy, Compliance, & Security “Every organization that develops or uses AI, or hosts or processes data, must do so responsibly and transparently. Companies are being judged not just by how we use data, but by whether we are trusted stewards of other people’s data. Society will decide which companies it trusts.” -Ginni Rometty, IBM Chairman, President, and CEO Table of contents: • Scope • Introduction • Data privacy: What is it and how to do it • Compliance & regulations • Security • Frequently asked questions Scope The scope of this document is the IBM Watson services running on IBM Cloud. The document does not address other IBM or client offerings with Watson in their names (e.g., Watson Health), or services that are not in the AI part of the IBM Cloud catalog. Nor does it address any third-party services showing up under AI in the IBM Catalog. Introduction The ability of artificial intelligence (AI) to transform vast amounts of complex, ambiguous information into insights has the potential to reveal long-held secrets and solve some of the world’s most enduring problems. It can help doctors treat disease, predict the weather, and manage the global economy. It is an undeniably powerful tool. And like all powerful tools, great care must be taken in its development and deployment. To reap the societal benefits of artificial intelligence, we will first need to trust it. We have created a system of best practices that guide the management of Watson; a system that includes contracts and disclosures that help foster full transparency; a strategy that reflects our compliance efforts with existing legislation and policy; third-party certifications and security testing by third parties to validate the best practices; and a framework that provides for privacy and personal data protection.
    [Show full text]
  • Quintessential Quotes (PDF, 118KB)
    QUINTESSENTIAL QUOTES The IBM Corporate Archives contains among its holdings many of the preserved words -- and, by extension, the philosophy and wisdom -- of the company’s chairmen and chief executives. As this body of work is both very large and widely distributed among several collections, it is not feasible to make all of it available to researchers at one time and in one place. Instead, we offer in the pages that follow just a small sampling of statements and comments which personify some of the people who have led IBM since 1914. An index on pages 21 and 22 lists authors and subjects. 2412QQ02 2 Thomas J. Watson, Sr. ! What every business needs is more people who think. ! A man is known by the company he keeps; a company is known by the men it keeps. ! The IBM spirit, the IBM heart and the IBM language were the same in all tongues and in all countries. ! It is better to aim at perfection and miss it than to aim at imperfection and hit it. ! Good management means good organization. ! A manager should regard his position as one that gives him a splendid opportunity to render assistance. ! Every manager’s first duty is to help the men under his direction. ! Knowledge creates enthusiasm. ! Teaching is of no value unless somebody learns what is being taught. ! The forces that produce success are manpower and brain-power. ! Education is the foundation of our progress. ! Your success will be determined by the manner in which you use the tools you have been given to work with.
    [Show full text]
  • Making the World Work Better
    Copyrighted Material makIng The World Work Better The Ideas ThaT shaped a CenTury and a Company Kevin Maney • Steve Hamm • Jeffrey M. O’Brien Foreword by Samuel J. Palmisano Copyrighted Material Copyrighted Material The authors and publisher have taken care in the The following terms are trademarks of contents Foreword: Of Change and Progress 6 preparation of this book, but make no expressed International Business Machines Corporation or implied warranty of any kind and assume no in many jurisdictions worldwide: IBM, IBM Press, responsibility for errors or omissions. No liability is THINK, Blue Gene, CICS, Deep Blue, Lotus, assumed for incidental or consequential damages PROFS, InnovationJam, Cognos, ILOG, Maximo, pioneering the science in connection with or arising out of the use of the Smarter Planet, Global Business Services, World information or programs contained herein. Community Grid, On Demand Community, Many of Information 14 Eyes, DB2 and Blue Gene/L. A current list of IBM © Copyright 2011 trademarks is available on the web at “Copyright Sensing 20 by International Business Machines Corporation. and trademark information” at www.ibm.com/ Memory 36 Cover and interior design: legal/copytrade.shtml. Processing 52 VSA Partners, Inc. Intel and Pentium are trademarks or registered Logic 68 Editor: trademarks of Intel Corporation or its subsidiaries Connecting 88 Mike Wing in the United States and other countries. Architecture 102 Copy editor: UNIX is a registered trademark of The Open Group Pennie Rossini in the United States and other countries. Fact checker: Linux is a registered trademark of Linus Torvalds Janet Byrne in the United States, other countries, or both.
    [Show full text]
  • The Control Editor 15.0
    The Control Editor 15.0 The Control Editor, operating within or outside the z/OS Integrity Controls Environment (ICE), detects, records and reports on events that change z/OS LPAR configurations. The Control Editor 15.0 Getting Started Contact us for additional information: NewEra Software Technical Support 800-421-5035 or 408-201-7000 Or text support requests to 669-888-5061 [email protected] www.newera.com Rev: 2019-6-24 1 NewEra Software, Inc. - Integrity Controls Environment (ICE) Applications The Control Editor 15.0 1 Foreword 1.1 Copyright, Trademark and Legal Notices 1.1.1 Copyrights This User Guide and the related Software Product(s) are protected under a Copyright dated 2017 by NewEra Software, Inc. All rights are reserved. 1.1.2 License Agreement This User Guide describes the installation and operation of The Control Editor, its environment and applications. It is made available only under the terms of a license agreement between the licensee and NewEra Software, Inc. No part of this Guide or the related Software Product(s) may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of NewEra Software, Inc. 1.1.3 Trademarks and Copyrights of Others The following products and/or registered trademarks of International Business Machines Corporation (IBM) are referenced in this document: MVS, VM, RACF, z/OS, SYSPLEX, JES, VTAM, TSO, ISPF, ICKDSF, DFSMSdss, and DF/DSS. Other company, product or service names may be trademarks or service marks of IBM or other organizations.
    [Show full text]
  • ISPF User's Guide Volume I
    z/OS Version 2 Release 3 ISPF User's Guide Volume I IBM SC19-3627-30 Note Before using this information and the product it supports, read the information in “Notices” on page 213. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-06-21 © Copyright International Business Machines Corporation 1980, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. xi Tables..................................................................................................................xv Preface..............................................................................................................xvii About this document................................................................................................................................ xvii Who should use this document................................................................................................................xvii What is in this document?........................................................................................................................ xvii How to read the syntax diagrams............................................................................................................xviii z/OS information...............................................................................................xxiii
    [Show full text]
  • I IBM's Watson Supercomputer Recommended 'Unsafe and Incorrect' Cancer Treatments, Internal Documents Show Ntern
    IBM’s Watson supercomputer recommended ‘unsafe and incorrect’ cancer treatments, internal documents show By Casey Ross @caseymross and Ike Swetlitz @ikeswetlitz July 25, 2018 Alex Hogan/STAT Internal IBM documents show that its Watson supercomputer often spit out erroneous cancer treatment advice and that company medical specialists and customers identified “multiple examples of unsafe and incorrect treatment recommendations” as IBM was promoting the product to hospitals and physicians around the world. The documents — slide decks presented last summer by IBM Watson Health’s deputy chief health officer — largely blame the problems on the training of Watson by IBM engineers and doctors at the renowned Memorial Sloan Kettering Cancer Center. The software was drilled with a small number of “synthetic” cancer cases, or hypothetical patients, rather than real patient data. Recommendations were based on the expertise of a few specialists for each cancer type, the documents say, instead of “guidelines or evidence.” STAT has seen portions of the two presentations, from June and July of 2017. At the time, they were shared widely with the management of IBM’s Watson Health division. The documents contain scathing assessments of the Watson for Oncology product by customers and conclude that the “often inaccurate” recommendations raise “serious questions about the process for building content and the underlying technology.” IBM has not publicly acknowledged the shortcomings of the software, which uses artificial intelligence algorithms to recommend treatments for individual patients. To the contrary, top company executives told customers and others that Watson for Oncology’s advice for physicians is based on data from real patients, and that it had won nearly universal praise from doctors around the world.
    [Show full text]
  • IBM Netvista Thin Clients
    The IBM NetVista Thin Client Family From a technical point of view IBM PSG, Nordic Thin Clients IBM NetVista Thin Client Family - From a technical point of view This presentation will give you an introduction to the IBM Thin Client Family. The presentation has a strong technical bias, but will try to explain the details so everyone can understand. 1 Topics Ø Why thin clients? Ø NT/Terminal Server, Windows 2000, Citrix Metaframe Ø IBM's thin client family overview Ø IBM NetVista N2200w - the Windows-based Terminal Ø IBM NetVista N2200 & N2800 with Thin Client Manager Ø Other IBM thin client offerings (TCM Express, Linux) Ø Positioning the IBM thin client offerings IBM NetVista Thin Client Family - From a technical point of view 2 The evolution... Personal Computing Client Server Network Computing Network Computer “thin client” Web Server Database Applications Server Server Pervasive Computing Smart Digital Networked Personal digital Thin client Screen mobile set-top box vehicle assistant (NC) phone Connectivity* to Web Server Database Applications Server Server Sources: IBM; The Economist *To convert web applications for each device IBM NetVista Thin Client Family - From a technical point of view This picture is taken from an article (written by IBM) in The Economist, September 1998. It shows where we stand today and where we are heading in the very near future. Today, in the Personal Computing paradigm, most companies use a client-server computing model with fat PC clients and a wide range of servers (NT, Unix, mainframes etc.). In most of these companies, the PC clients are doing most of the work - and therefore has a huge amount of code installed locally - while the servers are merely database servers.
    [Show full text]