Introduction and Planning Guide

Total Page:16

File Type:pdf, Size:1020Kb

Introduction and Planning Guide Content Manager OnDemand for Multiplatforms Introduction and Planning Guide Version 9 Release 0 SC19-3351-00 Content Manager OnDemand for Multiplatforms Introduction and Planning Guide Version 9 Release 0 SC19-3351-00 Note Before using this information and the product it supports, read the information in “Notices” on page 101. This edition applies to Version 9, release 0 of IBM Content Manager OnDemand for Multiplatforms (program number 5724-J33) and to all subsequent releases and modifications until otherwise indicated in new editions. This product includes software developed by the Apache Software Foundation (http://www.apache.org/). © Copyright IBM Corporation 2007, 2012. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............v Deleting application groups ........32 Tables ...............vii Chapter 4. System requirements....33 Disk storage ..............33 About this publication ........ix Overview ..............33 Disk storage devices on a UNIX server ....33 Who should use this publication .......ix Disk storage devices on a Windows server . 35 How this publication is organized .......ix Data storage and protection ........36 ibm.com and related resources ........x Support and assistance ..........x Information Center ...........x Chapter 5. Planning information ....39 PDF publications ............x Reports and other data ..........39 Accessibility information for OnDemand ....x Collecting requirements .........39 How to send your comments ........xi Input data formats ...........40 || What's new in Version 9.0..........xi Indexing data.............41 Chapter 1. Introduction ........1 Chapter 6. Content Manager About Content Manager OnDemand ......1 OnDemand objects .........49 Overview ..............1 Overview ...............49 System overview ............2 Folders ................50 Concepts ..............3 Cabinets ...............51 Indexing methods ...........5 Holds ................51 Documents ..............6 Application groups ............51 Servers ...............6 Applications ..............53 Remote library server ..........12 Users and groups ............54 Content Manager OnDemand Web Enablement Permissions ..............54 Kit................12 Overview ..............54 IBM Content Manager OnDemand Report Folder permissions ...........55 Distribution for Multiplatforms .......14 Application group permissions .......56 Naming rules..............56 Chapter 2. Preparing for Content Data types and field types .........59 Manager Content Manager OnDemand . 19 Administrative roles and responsibilities.....20 Chapter 7. Storage requirements . 63 Application programming interfaces ......22 Overview ...............63 Client customization ..........22 Storage hierarchy ............65 Server programs ............22 Data compression ............66 Server logging ............23 Estimating disk storage requirements ......67 Security user exit ...........24 System software ............67 Retrieval preview user exit ........25 Download ..............67 Download user exit...........25 Temporary space for indexing .......67 Report Specifications Archive Definition exit . 25 Cache storage ............68 Table space creation exit .........26 Content Manager OnDemand database storage 69 User exit programming .........26 Estimating the size of rollback segments ....73 License information............26 Database log file storage .........74 Archive storage manager database and recovery Chapter 3. Content Manager log................77 OnDemand and Tivoli Storage Manager 27 Server print storage space ........77 Temporary space for importing index data . 78 Introduction ..............27 Estimating archive storage requirements .....78 Content Manager OnDemand storage objects . 27 Report storage space ..........78 Overview of Tivoli Storage Manager ......28 Storage for database backup images .....79 Storage policy ............29 Database archived log storage .......80 Storage devices and media ........29 Migrated index storage space .......82 Defining the storage configuration.......30 Storage volumes and libraries .......82 Operational considerations .........31 Storage sizing examples ..........83 64-bit operating systems .........31 © Copyright IBM Corp. 2007, 2012 iii Report that contains logical items ......83 Using Tivoli Storage Manager to maintain DB2 Report that contains transaction data .....84 archived log files ...........94 Storage sizing worksheets .........86 Database recovery ...........95 Report that contains logical items ......86 Tivoli Storage Manager database .......95 Report that contains transaction data .....87 Recovery log .............97 Storage volume history .........97 Chapter 8. Backup and recovery....91 Device configuration history........98 Overview ...............91 Database recovery ...........98 Server software .............91 Server information ............91 Chapter 9. Reports .........99 Content Manager OnDemand database .....92 Cache storage .............99 Database table spaces ..........92 Archive storage .............99 Database backup ...........93 Database backup in Windows .......93 Notices ..............101 Using Tivoli Storage Manager to maintain Trademarks ..............103 backup image files ...........94 Glossary ...............103 Database logging ...........94 iv Introduction and Planning Figures 1. Content Manager OnDemand system ....2 14. Calculating temporary space for indexing 68 2. Folders, application groups, and applications 15. Calculating cache storage ........68 (part 1 of 2) .............4 16. Calculating database storage space for DB2 71 3. Folders, application groups, and applications 17. Calculating database storage space for Oracle 71 (part 2 of 2) .............4 18. Calculating database storage space for SQL 4. Cabinets are used to organize folders ....5 Server ..............72 5. Applications and documents .......6 19. Formula for Estimating the Size of the 6. Data preparation, indexing, and loading (part Rollback Segment ..........74 1of2)..............10 20. Example of Estimating the Size of the Rollback 7. Data preparation, indexing, and loading (part 2 Segment .............74 of2)...............11 21. Calculating primary log storage space....75 8. Accessing data stored in Content Manager 22. Calculating primary log storage space....76 OnDemand using ODWEK .......13 23. Calculating archived log storage space . 77 9. Content Manager OnDemand storage objects 27 24. Calculating archive storage manager database 10. Tivoli Storage Manager storage objects . 29 storage space ............77 11. Document indexing method .......42 25. Calculating archive storage space .....78 12. Report indexing method ........43 26. Calculating database archived log file storage 81 13. Calculating report download disk storage 27. Calculating migrated index storage space 82 space...............67 © Copyright IBM Corp. 2007, 2012 v vi Introduction and Planning Tables 1. Disk storage groups for a large organization 34 17. Report that contains transaction data. Part 2 of 2. Disk storage groups for a small workgroup 34 4. Report Profile. ...........85 3. Disk storage groups for a large organization 35 18. Report that contains transaction data. Part 3 of 4. Disk storage groups for a small workgroup 36 4. Disk Storage Requirements in Bytes. 85 5. RAID implementations.........36 19. Report that contains transaction data. Part 4 of 6. Group permissions ..........55 4. Archive Storage Requirements in Bytes. 85 7. Application group and folder field types 60 20. Report that contains logical items. Part 1 of 4. 8. Additional folder field types .......60 Database Columns. ..........86 9. Index field types and sizes .......69 21. Report that contains logical items. Part 2 of 4. 10. Database storage for a report that contains Report Profile. ...........86 logical items ............72 22. Report that contains logical items. Part 3 of 4. 11. Database storage for a report that contains a Disk Storage Requirements in Bytes. ....87 sorted transaction value ........73 23. Report that contains logical items. Part 4 of 4. 12. Report that contains logical items. Part 1 of 4. Archive Storage Requirements in Bytes . 87 Database Columns. ..........83 24. Report that contains transaction data. Part 1 of 13. Report that contains logical items. Part 2 of 4. 4. Database Columns. .........87 Report Profile. ...........83 25. Report that contains transaction data. Part 2 of 14. Report that contains logical items. Part 3 of 4. 4. Report Profile. ...........88 Disk Storage Requirements in Bytes. ....84 26. Report that contains transaction data. Part 3 of 15. Report that contains logical items. Part 4 of 4. 4. Disk Storage Requirements in Bytes. 88 Archive Storage Requirements in Bytes . 84 27. Report that contains transaction data. Part 4 of 16. Report that contains transaction data. Part 1 of 4. Archive Storage Requirements in Bytes. 88 4. Database Columns. .........84 © Copyright IBM Corp. 2007, 2012 vii viii Introduction and Planning About this publication This book contains information about IBM® Content Manager OnDemand for Multiplatforms Version 8 Release 5 (Content Manager OnDemand). The Content Manager OnDemand system requires a database management product, such as IBM DB2 Universal Database™ (DB2®). If you plan to copy or backup data to optical or tape storage volumes, Content Manager OnDemand requires an archive storage manager, such as IBM Tivoli® Storage Manager. If you plan to use the Content Manager OnDemand
Recommended publications
  • 1- BRUNEL: Welcome to Another Episode of Getting the Most
    BRUNEL: Welcome to another episode of Getting the Most Out of IBM U2. I'm Kenny Brunel, and I'm your host for today's episode, and today we're going to talk about IBM U2's latest technology, U2.NET. First of all, what is .NET? So I'm going to turn my attention, first of all, to a guest that I have in the studio with me today in Denver, Dave Peters. Dave is the product manager for the U2 data servers and the client tools, and Dave has been with IBM for over 12 years. What can you tell us about U2.NET? But first of all could you give us a brief rundown or a description of what .NET is itself. PETERS: Sure, Kenny. .NET is really a development framework architected by Microsoft. This is the framework that Microsoft hopes that will be the development choice for any new development on Windows. It consists of user-defined interfaces, data access, database connectivity, cryptography, Web application development and communications. IBM has three options for U2 developers that want to access the U2 data servers using .NET. The first I'll mention is [UniObjects] for .NET or UO.NET. UO.NET is a MultiValue API for use in the .NET applications. It's very familiar within -1- the constructs and was introduced to help Basic programmers get to .NET very easily. And one good thing is it's simple to get. UO .NET is available on the client CD that comes with either UniVerse or UniData. The second option is, the long name is IBM database add-ins for Visual Studio or as we refer to it as IBM .NET.
    [Show full text]
  • Introduction to Managing Mobile Devices Using Linux on System Z
    Introduction to Managing Mobile Devices using Linux on System z SHARE Pittsburgh – Session 15692 Romney White ([email protected]) System z Architecture and Technology © 2014 IBM Corporation Mobile devices are 80% of devices sold to access the Internet Worldwide Shipment of Internet Access Devices 2013 2017 PC (Desktop & Notebook) PC (Ultrabook) Tablet Phone Worldwide Devices Shipments by Segment (Thousands of Units) Device Type 2012 2013 2014 2017 PC (Desk-Based and Notebook) 341,263 315,229 302,315 271,612 PC (Ultrabooks) 9,822 23,592 38,687 96,350 Tablet 116,113 197,202 265,731 467,951 Mobile Phone 1,746,176 1,875,774 1,949,722 2,128,871 Total 2,213,373 2,411,796 2,556,455 2,964,783 2 Source: Gartner (April 2013) © 2014 IBM Corporation Mobile Internet users will surpass PC internet users by 2015 The number of people accessing the Internet from smartphones, tablets and other mobile devices will surpass the number of users connecting from a home or office computer by 2015, according to a September 2013 study by market analyst firm IDC. PC is the new Legacy! 3 © 2014 IBM Corporation Five mobile trends with significant implications for the enterprise Mobile enables the Mobile is primary Internet of Things Mobile is primary 91% of mobile users keep Global Machine-to-machine 91% of mobile users keep their device within arm’s connections will increase their device within arm’s reach 100% of the time from 2 billion in 2011 to 18 reach 100% of the time billion at the end of 2022 Mobile must create a continuous brand Insights from mobile experience
    [Show full text]
  • System Tools Reference Manual for Filenet Image Services
    IBM FileNet Image Services Version 4.2 System Tools Reference Manual SC19-3326-00 IBM FileNet Image Services Version 4.2 System Tools Reference Manual SC19-3326-00 Note Before using this information and the product it supports, read the information in “Notices” on page 1439. This edition applies to version 4.2 of IBM FileNet Image Services (product number 5724-R95) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1984, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this manual 17 Manual Organization 18 Document revision history 18 What to Read First 19 Related Documents 19 Accessing IBM FileNet Documentation 20 IBM FileNet Education 20 Feedback 20 Documentation feedback 20 Product consumability feedback 21 Introduction 22 Tools Overview 22 Subsection Descriptions 35 Description 35 Use 35 Syntax 35 Flags and Options 35 Commands 35 Examples or Sample Output 36 Checklist 36 Procedure 36 May 2011 FileNet Image Services System Tools Reference Manual, Version 4.2 5 Contents Related Topics 36 Running Image Services Tools Remotely 37 How an Image Services Server can hang 37 Best Practices 37 Why an intermediate server works 38 Cross Reference 39 Backup Preparation and Analysis 39 Batches 39 Cache 40 Configuration 41 Core Files 41 Databases 42 Data Dictionary 43 Document Committal 43 Document Deletion 43 Document Services 44 Document Retrieval 44 Enterprise Backup/Restore (EBR)
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 108 CONGRESS, SECOND SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 108 CONGRESS, SECOND SESSION Vol. 150 WASHINGTON, WEDNESDAY, DECEMBER 8, 2004 No. 139 House of Representatives The House was not in session today. Its next meeting will be held on Tuesday, January 4, 2005, at 12 noon. Senate WEDNESDAY, DECEMBER 8, 2004 The Senate met at 9:30 a.m. and was generations. Thank You for Your pro- ple with issues and wisdom to seek called to order by the President pro tection. You make wars to cease, de- Your guidance. tempore (Mr. STEVENS). stroying the weapons of those who Bless and strengthen the many staff- fight against Your purposes. Today, ers who provide the wind beneath the PRAYER guide our lawmakers with Your justice wings of our leaders. Bring to them a The Chaplain, Dr. Barry C. Black, of- and keep them as the apple of Your bountiful harvest for their many fered the following prayer: eye. Instruct them in Your wisdom and months of faithful toil. Let us pray. hide them under the shadow of Your Bless all who mourn the loss of Stan Faithful God, who stretches out the wings. Help them to find light in Your Kimmitt. He will be greatly missed. Earth above the waters, Your Name is laws and knowledge in Your instruc- We pray this in Your holy Name. great and Your goodness extends to all tions. Give them patience as they grap- Amen. NOTICE If the 108th Congress, 2d Session, adjourns sine die on or before December 10, 2004, a final issue of the Congres- sional Record for the 108th Congress, 2d Session, will be published on Monday, December 20, 2004, in order to permit Members to revise and extend their remarks.
    [Show full text]
  • DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2
    Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 DB2 10.5 with BLU Acceleration 00-FM.indd 1 9/17/13 2:26 PM Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 00-FM.indd 2 9/17/13 2:26 PM Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 DB2 10.5 with BLU Acceleration Paul Zikopoulos Sam Lightstone Matt Huras Aamer Sachedina George Baklarz New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto 00-FM.indd 3 9/17/13 2:26 PM Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 McGraw-Hill Education books are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative, please visit the Contact Us pages at www.mhprofessional.com. DB2 10.5 with BLU Acceleration: New Dynamic In-Memory Analytics for the Era of Big Data Copyright © 2014 by McGraw-Hill Education. All rights reserved. Printed in the Unit- ed States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of pub- lisher, with the exception that the program listings may be entered, stored, and exe- cuted in a computer system, but they may not be reproduced for publication. All trademarks or copyrights mentioned herein are the possession of their respective owners and McGraw-Hill Education makes no claim of ownership by the mention of products that contain these marks.
    [Show full text]
  • Cloud Computing Reference Architecture Ccra
    Cloud Computing Reference Architecture Ccra Sacroiliac Micah disorientates sleeplessly or slaved hypostatically when Rajeev is cerebrovascular. Pondering Meredeth outmoves obsequiously. Beforehand Hunter scoop very herpetologically while Ewan remains exarchal and sloping. Changing the security for the latest editions and computing reference architecture and components of cookies and reduce complexity by user data in hard anchor is offered by the That cloud computing reference architecture ccra bring flexibility in any cloud computing, private and ccra saves your email tools that includes enterprise. Build azure security best practices to look for services integrated with relevant papers in this request mated basis for next evolutionary step towards achieving higher and cloud. Dbms handle and ccra bring flexibility the client is the end up your. We log you should be realized by reference architecture describes an environment that cloud computing reference architecture ccra. We litter a sharing community. Cloud Computing Reference Architecture ITBusinessEdgecom. It costs and ccra and solution that cloud computing reference architecture ccra. Hybrid cloud infrastructure services will confirm a reference for developing in. Plan in order to permit the data center solution including more workloads quickly realize greater flexibility. The ccra and evaluated first to this was the provisioning of cloud computing reference architecture ccra and allow information describes a result of the cost advantage both. Another effort had made was simple improve the consumability of the RA. ICT Industry uses the NIST US National Institute of Standards Cloud Computing Reference Architecture CCRA 4 5 to sale the decision making process. ISOIEC 17792014 iTeh Standards. Request PDF CCRA Cloud Computing Reference Architecture As Cloud Computing has got more transparent more popular various Cloud.
    [Show full text]
  • Interoperability and the Need for Intelligent Software
    Sponsored by the Office of Naval Research (ONR) ONR Decision-Support Workshop Series Interoperability hosted by the Collaborative Agent Design Research Center (CADRC) Cal Poly State University, San Luis Obispo, CA Proceedings of Workshop held on September 8-9, 2004 at The Clubs at Quantico, Quantico Marine Base Quantico, VA November 2004 Interoperability and the Need for Intelligent Software Jens Pohl, Ph.D. Executive Director Collaborative Agent Design Research Center (CADRC) California Polytechnic State University (Cal Poly) San Luis Obispo, California In my introduction to this year’s conference I will address six questions that I believe come to the core of our conference theme of interoperability. Do we human beings resist change? Is it in fact a human problem and not a technical problem that we are dealing with? Can non-human intelligence exist? Do we even have a need for intelligent software? How did software, particularly intelligent software (i.e., if we accept that there is such a thing) evolve over the past several decades, and what is all this talk about a Semantic Web environment? And, finally, what does the future hold in the next five to ten years? Fig.1: “…it was the best of times…” Fig.2: “…it was the worst of times…” I would like to start by paraphrasing one of my favorite authors, Charles Dickens. Many of you will recall that in The Tale of Two Cities, he started off the entire book with a long paragraph that began with the words: "...it was the best of times, it was the worst of times..." These are words that I believe apply very much today.
    [Show full text]
  • CONSUMABILITY ANALYSIS of BATCH PROCESSING SYSTEMS FLAVIO FRATTINI Tesi Di Dottorato Di Ricerca
    UNIVERSITÀ DEGLI STUDI DI NAPOLI FEDERICO II Dottorato di Ricerca in Ingegneria Informatica ed Automatica Comunità Europea A. D. MCCXXIV Fondo Sociale Europeo CONSUMABILITY ANALYSIS OF BATCH PROCESSING SYSTEMS FLAVIO FRATTINI Tesi di Dottorato di Ricerca (XXVI Ciclo) Marzo 2014 Il Tutore Il Coordinatore del Dottorato Prof. Stefano Russo Prof. Francesco Garofalo Dipartimento di Ingegneria Elettrica e delle Tecnologie dell’Informazione + Via Claudio, 21 - 80125 Napoli - ([+39] 081 76 83813 - 4 [+39] 081 76 83816 CONSUMABILITY ANALYSIS OF BATCH PROCESSING SYSTEMS By Flavio Frattini SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY AT FEDERICO II UNIVERSITY OF NAPLES VIA CLAUDIO 21, 80125 { NAPOLI, ITALY MARCH 2014 c Copyright by Flavio Frattini, 2014 Per aspera ad astra. Abstract The use of large scale processing systems has exploded during the last decade and now they are indicated for significantly contributing to the world energy consumption and, in turn, environmental pollution. Processing systems are no more evaluated only for their performance, but also for how much they consume to perform at a certain level. Those evaluations aim at quantifying the energy efficiency conceived as the relation between a performance metric and a power consumption metric, disregarding the malfunction that commonly happens. The study of a real 500-nodes batch system shows that 9% of its power consumption is ascribable to failures compromising the execution of the jobs. Also fault tolerance techniques, commonly adopted for reducing the frequency of failure occurrences, have a cost in terms of energy consumption. This dissertation introduces the concept of consumability for processing systems, en- compassing performance, consumption and dependability aspects.
    [Show full text]
  • DB2 Administration Solution Pack for Z/OS Streamlining DB2 for Z/OS Database Administration
    IBM® Information Management Software Front cover DB2 Administration Solution Pack for z/OS Streamlining DB2 for z/OS Database Administration Understand how to simplify the database administration functions Learn to adapt your data with the new change capabilities See how to monitor database client/server configurations Paolo Bruni Tom Crocker Elaine Morelli Richard Schaufuss ibm.com/redbooks International Technical Support Organization DB2 Administration Solution Pack for z/OS: Streamlining DB2 for z/OS Database Administration August 2013 SG24-8148-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xvii. First Edition (August 2013) This edition applies to Version 1.1 of IBM DB2 Administration Solution Pack for z/OS (program number 5697-DAM). © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . xiii Examples . .xv Notices . xvii Trademarks . xviii Preface . xix Authors . xix Now you can become a published author, too! . .xx Comments welcome. .xx Stay connected to IBM Redbooks . xxi Part 1. DB2 Tools Solution Packs . 1 Chapter 1. The DB2 Tools Solution Packs . 3 1.1 DB2 Tools Solution Packs. 4 1.2 Overview of the IBM Tools Customizer. 6 1.2.1 Installing the base for solution packs . 10 Chapter 2. The Tools Customizer . 13 2.1 Component selection . 14 2.2 Installation discovery. 15 2.3 DB2 entries and association . 16 2.4 Component customization. 19 2.5 Generation of customization jobs .
    [Show full text]
  • IBM Z14 Model ZR1 (M/T 3907) Technical Leadership Library
    IBM z14 Model ZR1 (M/T 3907) Technical Leadership Library April 10, 2018 Announcement John McLemore, z Client Architect [email protected] 214-679-8484 IBM Z (M/T 3907) TLLB1 © 2017, 2018 IBM Corporation Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a more complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: *BladeCenter®, CICS®, DataPower®, Db2®, e business(logo)®, ESCON, eServer, FICON®, IBM®, IBM (logo)®, IMS, MVS, OS/390®, POWER6®, POWER6+, POWER7®, Power Architecture®, PowerVM®, PureFlex, PureSystems, S/390®, ServerProven®, Sysplex Timer®, System p®, System p5, System x®, z Systems®, System z9®, System z10®, WebSphere®, X-Architecture®, z13™, z13s™, z14 ™, z14 Model ZR1™, z Systems™, z9®, z10, z/Architecture®, z/OS®, z/VM®, z/VSE®, zEnterprise®, zSeries®, IBM Z ® The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc.
    [Show full text]
  • Rome Software Development Lab Technology and Customer Value
    ® IBM Software Group RRoommee SSooffttwwaarree DDeevveellooppmmeenntt LLaabb TTeecchhnnoollooggyy aanndd ccuussttoommeerr vvaalluuee:: tthhee ppaatthh ttoo ooppeenn iinnnnoovvaattiioonn Giovanni Lanfranchi © 2008 IBM Corporation IBM Confidential IBM Software Group | Tivoli software The Rome SWG Lab at a glance London (UK) Galway, Cork (Ire) Krakow (Pol) Rome (ITA) Toronto (CAN) San Jose (CA) Raleigh (NC) Los Angeles (CA) Austin (TX) ~350 Developers ~70 Sales Enablers team s ° Developing mission critical applications ° Executive Briefing Center ° Full WW development ownership of the ° Pre and Post Sales support scheduling offering ° ° Strengthen linkages with SMB market Leader in process development ° BP enablement events methodology Dev, 350 ° SMB demo environment ° Development of customized solutions ° ENEL - Automated Meter Management ° Repubblica – NICA ° Tivoli Telecom Italia - Security ~150 SW G Services Support, ° Key linkages with the Italian market SWG 70 ~40 Tivoli Support ° Consultancy in key project at all the Services, Solutions 150 major Italian Companies Lab, 40 ° WW support for key Tivoli products ° Sogei – “Portale delle Entrate” ° Recognized as the best client facing team ° Senato – Intranet site ° Covering all SWG brands IBM Confidential 2 IBM Software Group | Tivoli software Rome SWG Lab: continuous innovation Customer Intimacy TWS 8.3 Productivity Rate Leader in 60.00 56.00 IT 1 IT 2 IT 3 IT 4 IT 5 IT 6 Beta software 52.00 48.00 development 44.00 methodologies 40.00 36.00 32.00 Operational 28.00 model based on 24.00
    [Show full text]
  • Securing Your Critical Workloads with IBM Hyper Protect Services
    Front cover Securing Your Critical Workloads with IBM Hyper Protect Services Barry Silliman Sandeep Sarkar Diana Henderson Sarath Chandra Mekala Elton de Souza Vasfi Gucer Jin VanStee Qi Ye Jordan Cartwright Madhuri Gangireddy Matt Mondics Matthew Arnold Ravi Kumar Gullapalli Sandeep Ambekar Redbooks IBM Redbooks Securing Your Critical Workloads with IBM Hyper Protect Services March 2020 SG24-8469-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (March 2020) This edition applies to IBM Hyper Protect Virtual Servers V1.2.0, IBM Hyper Protect Crypto Services V1.0.0 and IBM Hyper Protect DBaaS V1.0.0 © Copyright International Business Machines Corporation 2020. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. .x Now you can become a published author, too! . xiii Comments welcome. xiii Stay connected to IBM Redbooks . xiv Chapter 1. Introduction to IBM Hyper Protect Services . 1 1.1 Industry and IBM Hyper Protect Services portfolio overview . 2 1.2 Hyper Protect Crypto Services . 2 1.3 Hyper Protect Database as a Service . 3 1.4 Hyper Protect Virtual Servers . 4 1.5 Hyper Protect Virtual Servers (on-premises). 5 1.5.1 Building images with integrity: Securing continuous integration and continuous delivery . 6 1.5.2 Managing infrastructure with least privilege access to applications and data. 6 1.5.3 Deploying images with trusted provenance . 6 1.6 Security features . 6 1.6.1 Cryptography .
    [Show full text]