Open Source and Linux on the Mainframe

Total Page:16

File Type:pdf, Size:1020Kb

Open Source and Linux on the Mainframe Evy M. Torres - [email protected] IBM SWG, Linux Integration Center Open Source and Linux on the Mainframe 21. Jun 2010 © 2010 IBM Corporation Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: *, AS/400®, e business(logo)®, DBE, ESCO, eServer, FICON, IBM®, IBM (logo)®, iSeries®, MVS, OS/390®, pSeries®, RS/6000®, S/30, VM/ESA®, VSE/ESA, WebSphere®, xSeries®, z/OS®, zSeries®, z/VM®, System i, System i5, System p, System p5, System x, System z, System z9®, BladeCenter® The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency, which is now part of the Office of Government Commerce. * All other products may be trademarks or registered trademarks of their respective companies. Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. 2 © 2010 IBM Corporation Agenda ■ Open Source and Open Standards ■ Linux on System z ■ Linux Distribution ■ Open Source Software beyond Linux Distributions ■ Linux Distributions for Linux on System z ■ OSS & Middleware Integration ■ Strategy and Outlook 3 © 2010 IBM Corporation Open Source Software (OSS) ■ The basic idea behind open source is quite simple: When programmers can read, redistribute, and modify the source code for a piece of software, the software evolves People improve it, people adapt it, people fix bugs And this can happen at a speed that, if one is used to the slow pace of conventional software development, seems astonishing ■ What is Open Source? Community develops, debugs, maintains “Survival of the fittest” – peer review Generally high quality, high performance software Superior security – on par with other UNIX, superior to Windows Open Source Initiative, OSI: www.opensource.org 4 © 2010 IBM Corporation Beginning of Open Source Software ■ Free software has been available on the mainframe since the early days ■ But at that time the wording was different, not Open Source ■ Starting at IBM 704 / 705 days – magnetic tapes, the first movable electronic data storage mediums that could be easily reproduced, were introduced ■ Code was mainly exchanged on tapes, but also before on card decks ■ Tapes were shared at conferences and maintained by a few individuals ■ Large collections are still available http://www.cbttape.org/histmods.htm ■ Today large packages for VM/370, MVS, OS/390 and z/OS Forare me available the Open as Source Open movement Source started in the 90th with a upcoming operating system... 5 2007-05-23 System z Software & Solutions Continuum © 2010 IBM Corporation Open Source Software for the Mainframe except Linux ■ Open Source Software for z/OS and OS/390 UNIX Redbook, by M. MacIsaac, S. Bárány, et al http://www-03.ibm.com/servers/eserver/zseries/zos/unix/redbook/index.html Apache, PHP, Emacs, GNU Tools, Samba, MySQL, and more (bin & src) ■ z/OS UNIX tools http://www-03.ibm.com/servers/eserver/zseries/zos/unix/bpxa1ty2.html ■ Tools and toys (external project links) http://www-03.ibm.com/servers/eserver/zseries/zos/unix/bpxa1toy.html ■ IBM Ported Tools for z/OS http://www-03.ibm.com/servers/eserver/zseries/zos/unix/port_tools.html http://www-03.ibm.com/servers/eserver/zseries/zos/unix/bpxa1ty1.html ■ OS/390 and z/OS Freeware by Lionel B. Dyck http://www.lbdsoftware.com/ http://www.lbdsoftware.com/Packaging_zOS_Open_Source_Software_For_Distribution.pdf ■ To some extent part of the Unix System Services (former OpenEdition) ■ And much more... 6 2007-05-23 System z Software & Solutions Continuum © 2010 IBM Corporation Linux and Open Source are part of Open Computing Open standards Open Computing – Improving information sharing by simplifying integration of disparate technologies Open standards – Promoting interoperability by using open published specifications Open source Community – Promoting innovation by leveraging community development Innovation – Accelerating open standards adoption Open architecture Open Open architecture source – Increasing collaboration by easily extending business processes – e.g. SOA – Innovating on top of common hardware specifications 7 © 2010 IBM Corporation Open Source Maturity and Customer Adoption Mature Web Servers Operating Web Systems Browsers Office Editors Development Tools Application Servers Services Collaboration Databases Applications Search Virtualization I n c Systems r e a Grid / Cloud Management s i n g SOA M a t u Open r i t Hardware Emergingy Increasing Adoption by Customers Source: IBM, December 2007 8 © 2010 IBM8 Corporation IBM Open Standards Accomplishments •1998-2001 •2002-2003 •2004-2005 •2006 •2007 •2008-2009 .Java, XML •WS-I, OMA and .Web Services .Web Services .SOA / Open Standards .Business process / ● Co-led XML4J, W3C WS-Security ● Chair WS-I Basic Reliability ● WS* stds approved: WS- Web 2.0 DOM, XSL ● Founder WS-I.org Profile 1.1 ● WS-I initiated two BPEL, WS-Policy, WS- ● EBPMN 2.0 submission ● Led Apache XML ● Founder OMA ● Co-chair OASIS WS- Profiles based on Trust, WS-Secure to OMG projects Xalan, ● Co-author BPEL, WS- Notification TC IBM RAMP Profile Conversation, WS- ● WS-I Profiles attain Xerces, SOAP TX, WS-TC ● Co-chair WS- ● OASIS ODF cmte Transactions, WS-Reliable ISO Status ● Founder XML.org ● Co-author WS-Security Resource formed Messaging, WS- ● Web Services Test ● Co-author WSDL, ● Co-chair UDDI TC Framework TC ● Co-chair of WS- SecurityPolicy Forum (WSTF) SOAP 1.1 ● Linux contributions to ● OASIS ODF V1.0 Policy WG ● SCA/SDO OASIS TC's ● W3C HTML5 WG chair ● Cofounder UDDI.org scalability Approved ● DITA XML.org ● BPEL4People submitted to ● Joined CESI ● Author UDDI ● Co-Chair OASIS WS- ● Chair OASIS DITA formed OASIS, chair ● WS-Remote Portlet 2 specification Security 1.0 ● Submitted WS- ● WS-Security 1.1 ● Service Modeling Language approved ● Founder Eclipse.org ● Co-chair OASIS WS- Addressing to W3C becomes OASIS submitted
Recommended publications
  • Oldschool E-Mail Setup Eine Freakshow
    Oldschool E-mail Setup Eine Freakshow [email protected] Chemnitzer Linuxtage, 2016 (Screenshot GMX vor >15 Jahren: Waybackmachine zu www.gmx.net) (Screenshot GMX heute) (Screenshot Gmail heute) Lösungen? ● Claws ● Mutt ● Eudora ● Netscape Navigator ● Evolution ● Opera M2 ● GMX ● Outlook ● Gnus ● SquirrelMail ● Hotmail ● The Bat! ● Hushmail ● Thunderbird ● KMail ● … Flußgrafik Email Netz MTA MRA MDA MUA MSA MTA Netz Hipster! ● KISS ● YAGNI ● DRY ● NIH ● Divide And Conquer ● Everything is a file ● No vendor lock-in ● Mißtraue Autoritäten – fördere Dezentralisierung Netz Netz Emails Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh tmp 1439306571.1269_0.elvis ~/Post/Technik/Wikitech new 1448267819.5940_0.spencer ... 1457079728.2000_0.spencer:2, cur 1456839383.9873_0.nepomuk:2,SR 1457166567.23654_0.spencer:2,S ... Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header fetchmail getmail mpop ..
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Design Document
    SPEC OSG Mailserver Subcommittee SPECmail2009 Benchmark Architecture White Paper Revision: v1.0 Date: 22 December 2008 Copyright © 2001-2009 Standard Performance Evaluation Corporation. All Rights Reserved. 1. Introduction 1.1 Overview SPECmail2009 is a software benchmark designed to measure a system's ability to act as an enterprise mail server servicing email requests, based on the Internet standard protocols SMTP and IMAP4. The benchmark concentrates on the workload encountered by corporate mail servers, with an overall user count in the range of 150 to 10,000 (or more) users. It models IMAP business users accessing IMAP servers over fast local area networks (LAN) instead of broadband, WAN or dialup access speeds. Two separate metrics measure e-mail servers with and without secure network connections (SSL). SPECmail2009 has been developed by the Standard Performance Evaluation Corporation (SPEC), a non-profit group of computer vendors, system integrators, universities, research organizations, publishers, and consultants. This paper discusses the benchmark principles and architecture, and the rationale behind the key design decisions. It also outlines the workload used in the benchmark, and the general steps needed to run a benchmark. However those aspects are covered in more detail in other documents. 1.2 Organization of this Paper Chapter 2 discusses the basic goals and non-goals of the benchmark. Chapter 3 introduces the two performance metrics for SPECmail2009 – IMAP sessions per hour - and how it relates to the transaction mix imposed on the system under test.. Chapter 4 explains the benchmark workload - how it was derived, how it translates into configuration parameters for the benchmark tool and size calculations for planning a benchmark, and how it relates to the benchmark metric.
    [Show full text]
  • Cyrus Mail Server 2 Table of Contents
    Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction ........................................................................................................................ 4 2. Installation ......................................................................................................................... 5 3. Management of the mail server data ....................................................................................... 6 3.1. Management of mail domains ..................................................................................... 6 3.2. Assignment of e-mail addresses to users ........................................................................ 6 3.3. Management of mailing lists ....................................................................................... 7 3.4. Management of mail groups ........................................................................................ 7 3.5. Management of shared IMAP folders ........................................................................... 8 3.6. Mail quota ............................................................................................................... 9 4. Spam detection and filtering ................................................................................................ 10 5. Identification of viruses and malware .................................................................................... 11 6. Identification of Spam sources with DNS-based Blackhole Lists (DNSBL) ...................................
    [Show full text]
  • Symantec White Paper
    QUARTERLY REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: QUARTERLY Symantec Intelligence Quarterly July - September, 2009 Published October 2009 Technical Brief: Symantec Enterprise Security Symantec Intelligence Quarterly July - September, 2009 Contents Introduction . 1 Highlights . 2 Metrics. 2 Meeting the Challenge of Sophisticated Attacks . 8 Timeline of a zero-day event . 8 How secure are security protocols?. 11 Why attackers use packers. 14 Protection and Mitigation . 16 Appendix A—Best Practices . 18 Appendix B—Methodologies. 20 Credits . 24 Symantec Intelligence Quarterly July - September, 2009 Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network. More than 240,000 sensors in over 200 countries monitor attack activity through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services and Norton™ consumer products, as well as additional third-party data sources. Symantec also gathers malicious code intelligence from more than 130 million client, server, and gateway systems that have deployed its antivirus products. Additionally, the Symantec distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods. Spam data is captured through the Symantec probe network, a system of more than 2.5 million decoy email accounts, Symantec MessageLabs™ Intelligence, and other Symantec technologies in more than 86 countries from around the globe. Over 8 billion email messages, as well as over 1 billion Web requests, are scanned per day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors, and more than 50 million consumers.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half- duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full- duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number /etc/services, a service name range being unassigned. The Stream Control Transmission Protocol database file on Unix-like operating (SCTP) and the Datagram Congestion Control Protocol (DCCP) also systems.[1][2][3][4] use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[5] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Official: Port is registered with IANA for the application.[5] Unofficial: Port is not registered with IANA for the application. Multiple use: Multiple applications are known to use this port. Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network services.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • REXX Portability and Tips Share Session 1570, Boston August, 2010
    IBM Software REXX Portability and Tips Share Session 1570, Boston August, 2010 W. David Ashley [email protected] © 2010 IBM Corporation IBM Software Important REXX Compiler Disclaimer The information contained in this presentation is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided “as is”, without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other documentation. Nothing contained in this presentation is intended to, or shall have the effect of: • creating any warranty or representation from IBM (or its affiliates or its or their suppliers and/or licensors); or • Altering the terms and conditions of the applicable license agreement governing the use of IBM software. 2 REXX Portability and tips, Share Boston, August 2010 © 2003 IBM Corporation IBM Software Agenda o REXX Compiler o ooRexx o REXX Hints and Tips • Variable Names • Style Tips • Execution Optimization 3 REXX Portability and tips, Share Boston, August 2010 © 2003 IBM Corporation IBM Software REXX History . Rexx (Restructured eXtended eXecutor) . 1979mar29 Mike Cowlishaw (IBM Fellow) publishes initial specification . Late 1979 first implementation internal to IBM on VM/CMS. Available to the general public in 1983 VM (3rd release) – 25 years ago, Winter 1983 Share (San Francisco), Mike Cowlishaw and Rich McGuire demonstrated Rexx to the public.
    [Show full text]
  • Kmail 2 Be Released?
    Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? KMail 2 The Road to Akonadi Thomas McGuire July 5th 2009 Thomas McGuire – KMail 2 – 1/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? Outline 1 Why do we need Akonadi in KMail? 2 What is Akonadi? 3 How will KMail be ported? 4 When will KMail 2 be released? Thomas McGuire – KMail 2 – 2/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? About Me About Me Student of computer science at the University of Siegen KDE developer since 2007 KMail Maintainer since 2008 KDAB employee Thomas McGuire – KMail 2 – 3/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? Outline 1 Why do we need Akonadi in KMail? 2 What is Akonadi? 3 How will KMail be ported? 4 When will KMail 2 be released? Thomas McGuire – KMail 2 – 4/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? About KMail About KMail Official KDE Mail Client, part of Kontact Now over 12 years old Geared towards power users Second highest bug count on bugs.kde.org High Bug Count? Many bugs caused by the aging storage layer Bug count also reflects popularity KMail works OK except for corner cases Thomas McGuire – KMail 2 – 5/23 Why do we need Akonadi in KMail? What is Akonadi? How will KMail be ported? When will KMail 2 be released? History of KMail A look into
    [Show full text]
  • Bradley K. Simonin's Resume
    B R A D L E Y K. S I M O N I N 5063 Calle Pastura, Las Cruces, NM 88012, USA Cellular Phone: 575.496.1398 E-mail: brad . simonin @ gmail . com OBJECTIVE A position in Information Technology as a Red Hat Enterprise Linux System Engineer/Linux System Administrator. TECHNICAL SKILLS PROFILE Certifications: Red Hat Certified System Administrator (RHCSA) for Red Hat Enterprise Linux 6. Currently studying for certification as a Red Hat Certified Engineer (RHCE) and Red Hat Certified Virtualization Administrator (RHCVA). Target date for RHCE exam Fall 2011. To verify certifications go to the following website: https :// www . redhat . com / wapps / training / certification / verify . html ? certNumber =100-192-962 Future Career Goals: Future Red Hat Certification career goals include becoming a Red Hat Certified Datacenter Specialist. Operating Systems: Linux (Red Hat Enterprise Linux 6.0/5.5; including Virtualization through KVM, Scientific Linux 6.0, CentOS Enterprise Linux 5.5, Fedora Project 14, SUSE Linux Enterprise 11, openSUSE 11, Slackware), UNIX/Solaris 10, Windows 7/Vista/2008 Server, IBM z/VM, IBM MVS/TSO, and IBM VSE. Computer Languages: Linux/UNIX related: Python, MySQL-python (MySQLdb), Python/PyGTK/GTK+/Glade3, PHP/MySQL, Object Rexx for Linux, and Bash Shell Scripting. Other platforms: SQL, SQL/DDL, SQL/DML, Java, JDBC/SQL, JSTL, HTML/CSS, XML, Object- Oriented JavaScript, JavaScript/HTML/DOM manipulation, JavaScript Object Notation, Rexx, Rexx/SQL, RXSQL, MS-Transact-SQL, and ODBC/SQL. Database Management Systems: DB2 Server for z/VM, MySQL for Linux, DB2/UDB for Linux, MS-SQL Server 2003, and IBM SQL/DS.
    [Show full text]
  • The Qmail Handbook by Dave Sill ISBN:1893115402 Apress 2002 (492 Pages)
    < Free Open Study > The qmail Handbook by Dave Sill ISBN:1893115402 Apress 2002 (492 pages) This guide begins with a discussion of qmail s history, architecture and features, and then goes into a thorough investigation of the installation and configuration process. Table of Contents The qmail Handbook Introduction Ch apt - Introducing qmail er 1 Ch apt - Installing qmail er 2 Ch apt - Configuring qmail: The Basics er 3 Ch apt - Using qmail er 4 Ch apt - Managing qmail er 5 Ch apt - Troubleshooting qmail er 6 Ch apt - Configuring qmail: Advanced Options er 7 Ch apt - Controlling Junk Mail er 8 Ch apt - Managing Mailing Lists er 9 Ch apt - Serving Mailboxes er 10 Ch apt - Hosting Virtual Domain and Users er 11 Ch apt - Understanding Advanced Topics er 12 Ap pe ndi - How qmail Works x A Ap pe ndi - Related Packages x B Ap pe ndi - How Internet Mail Works x C Ap pe ndi - qmail Features x D Ap pe - Error Messages ndi x E Ap pe - Gotchas ndi x F Index List of Figures List of Tables List of Listings < Free Open Study > < Free Open Study > Back Cover • Provides thorough instruction for installing, configuring, and optimizing qmail • Includes coverage of secure networking, troubleshooting issues, and mailing list administration • Covers what system administrators want to know by concentrating on qmail issues relevant to daily operation • Includes instructions on how to filter spam before it reaches the client The qmail Handbook will guide system and mail administrators of all skill levels through installing, configuring, and maintaining the qmail server.
    [Show full text]