• IBM Consulting

    DBA Consulting can help you with IBM BI and Web related work. Also IBM Linux is our portfolio.

  • Oracle Consulting

    For Oracle related consulting and Database work and support and Migration call DBA Consulting.

  • Novell/RedHat Consulting

    For all Novell Suse Linux and SAP on Suse Linux questions releated to OS and BI solutions. And offcourse also for the great RedHat products like RedHat Enterprise Server and JBoss middelware and BI on RedHat.

  • Microsoft Consulting

    For Microsoft Server 2012 onwards, Microsoft Client Windows 7 and higher, Microsoft Cloud Services (Azure,Office 365, etc.) related consulting services.

  • Citrix Consulting

    Citrix VDI in a box, Desktop Vertualizations and Citrix Netscaler security.

  • Web Development

    Web Development (Static Websites, CMS Websites (Drupal 7/8, WordPress, Joomla, Responsive Websites and Adaptive Websites).

31 July 2013

DB2 10.5 New Features




DB2 10.5 New Features


 A short while ago the latest release of IBM’s magnificent DB2 10.5 was released, there are several new features, which are explained in detail at the following link:


The analytics accelerating feature BLU


 IBM DB2 with BLU Acceleration speeds analytics and reporting using dynamic in-memory columnar technologies. In-memory columnar technologies provide an extremely efficient way to scan and find relevant data. Coupled with innovations such as parallel vector processing and actionable compression, it makes your analytic queries far faster and less complex. So you can connect with the information you need at breakthrough speed and volume.


1) Analytics at the speed of thought

DB2 with BLU Acceleration combines advanced, innovative capabilities to accelerate analytic workloads for databases and data warehouses.

DB2 with BLU Acceleration also integrates with IBM Cognos® Business Intelligence to provide reporting and deeper analysis. You can analyze key facts and freely explore information from multiple angles and perspectives to make more informed decisions—all from within DB2.

2) Less data storage required

DB2 with BLU Acceleration dynamically moves data from storage. Database tuning, indexes and aggregates are not needed, which improves storage efficiency and helps lower your storage space requirement. In fact, clients have reported compression rates of 10 times that of un-compressed tables.

The system uses available hardware such as memory, I/O and CPU to help reduce memory latency and processing. Hardware optimization streamlines administration and maintenance, putting less load on resources.

3) Simplicity

BLU Acceleration is fully integrated with DB2. It does not require SQL or schema changes to implement. Just load and go. Enhancements such as automation, optimization and self-tuning help to further simplify overall use.

 

Webinar Replay of DB2 Tech Talk: "Introduction and Technical Tour: DB2 10.5 with BLU Acceleration" with Berni Schiefer

 



 
                             

 

 

  When we compared the performance of column-organized tables in DB2 to our traditional row-organized tables, we found that, on average, our analytic queries were running 74x faster when using BLU Acceleration. ” 

- Kent Collins, Database Solutions Architect, BNSF Railway

 

Advanced Recovery Solutions in DB2 10.5 webinar replay


                               

 

Analytics the real world use of BIG DATA


 Real world warehousing for technical professionals


 The Real-world Use of Big Data


Big Data for Health Care (Video)



 IBM DB2 Real Application clustering with Pure Scale


 Big Data Solution Demo

Join Nicolas Morales of IBM's Big Data Enablement Team as he walks you through a Big Data solution using IBM InfoSphere BigInsights to capture, store, transform and analyze social media data.


 Pure data for operational analytics presentation


 Big Data Opportunities for Marketing

Companies that want to succeed need to deliver the right message, to the right person, at the right time, for the right price. But companies face multiple challenges. Leading marketers are using big data and analytics to deliver greater value and relevance to their customers. Learn how in this video from IBM.



 Some useful blogs

IBM DB2 Community blogs
The DB2 Guys

 

The DB2 IBM website for DB2 10.5 for LUW




 

For more information please contact me at:


Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook
email:          info@dbaconsulting.nl 

30 July 2013

Virtualization should be easy, fast, open, and cost-effective






Virtualization should be easy, fast, open, and cost-effective


 

SaaS, PaaS and IaaS


 



 

This cloud computing video explains SaaS, PaaS and Iaas -- otherwise known as "software as a service", "platform as a service" and "infrastructure as a service". It is produced and presented by Christopher Barnatt, author of ExplainingComputers.com and "A Brief Guide to Cloud Computing" (Robinson, 2010), and Associate Professor of Computing & Future Studies in Nottingham University Business School. For more information on cloud computing please see ExplainingComputers.com/cloud

 



 

IBM and Red Hat: Open solutions for the next era of computing


 

Red Hat provides you with proven, open technologies that deliver leadership in performance, scalability, ease of use and cost, but also to provide customers with flexible technologies that, when combined, can take on a wide range of use cases and deployments.

These technologies are a strategic choice for organizations looking to achieve an open hybrid cloud.

Learn how OpenShift Enterprise, Red Hat Enterprise Virtualization, and Red Hat CloudForms can improve performance, scalability, and reliability for enterprise cloud deployments--without relying on proprietary lock-in or hooks that restrict development and flexibility.

 



 

Jean Staten-Healy, Director of Worldwide Linux Strategy at IBM, discusses how open technologies are making a big impact in computing.

At Red Hat Summit 2012, IBM identified three technologies which would play a major role in the next era of computing - open virtualization, big data and open cloud. Six months later, all three are making a major impact. In this presentation IBM will discuss progress in each of these areas, and how IBM and Red Hat are delivering integrated solutions to solve real world business problems through smarter computing.

 


 



 

PaaS from Redhat


 



 

Your bottom line depends on having a highly available and resilient infrastructure. Not only today—it must be ready to scale to meet future challenges introduced by evolving technology and business demands. virtualization from Redhat Enterprise Linux with KVM is the basis for Redhat PaaS, see for more information this link:  link text "KVM and RedHat and IBM", link:  http://www-03.ibm.com/systems/virtualization/kvm/index.html

 

Link to info graphics:


 



 

RedHat® Enterprise Virtualization —powered by the people behind Red Hat Enterprise Linux®takes you beyond bare metal to an open, agile foundation that's ready to take on the future.

 



 

Red Hat OpenStack: Community-invented, Red Hat-hardened

Learn how Red Hat OpenStack allows you to deploy a supported version of OpenStack on an enterprise-hardened Linux platform to build a massively scalable public-cloud-like platform for managing and deploying cloud-enabled workloads. With Red Hat OpenStack, you can focus resources on building applications that add value to your organization, while Red Hat provides support for OpenStack and the Linux platform it runs on.

 



 

Learn more at: 



Red Hat provides you with proven, open technologies that deliver leadership in performance, scalability, ease of use and cost, but also to provide customers with flexible technologies that, when combined, can take on a wide range of use cases and deployments.
These technologies are a strategic choice for organizations looking to achieve an open hybrid cloud.

Learn how OpenShift Enterprise, Red Hat Enterprise Virtualization, and Red Hat CloudForms can improve performance, scalability, and reliability for enterprise cloud deployments--without relying on proprietary lock-in or hooks that restrict development and flexibility.

Red Hat OpenShift Enterprise OpenShift (PaaS)



Why our customers love Red Hat Enterprise Virtualization


Open: No lock-in with a fully open source solution.
Cross-platform: Great performance for Microsoft Windows and Linux® guests.
Enterprise-ready: Powerful mix of enterprise features and a rich set of partners.
Affordable: Lower total cost of ownership and faster return on investment than an equivalent proprietary solution.
High-performance: Top virtualization benchmarks for performance and scalability for Windows and Linux workloads—so you can be confident it will power your virtual machine workloads.

Do more with less.


Virtualization and cloud computing hold great promise for all kinds of businesses--including Red Hat partners like HP, IBM, Cisco, and Dell. Hear why they choose Red Hat Enterprise Linux 6 with its strong virtualization and conservation infrastructure. Learn more about the features Red Hat Enterprise Linux 6 offers--for mission-critical deployments with superior flexibility, reliability, and cost savings.



Red Hat Enterprise Virtualization Manager Demo


Enterprise virtualization, powered by the people who brought you enterprise Linux®, takes you beyond bare metal to meet your critical business continuity demands for today and the future. Watch this demo to learn how Red Hat Enterprise Virtualization manager simplifies the administration and control of your virtualized enterprise infrastructure



If you really want a more in depth knowledge, take a look at these on-demand webinars at your convenience:

This video playlist explains what a platform as a service (Paas) is and how Red Hat's OpenShift PaaS allows developers to focus on code and customers--not server and software configuration. This video playlist also illustrates the value of moving an application to a platform like OpenShift while also explaining the differences between PaaS, infrastructure as a service (Iaas), and software as a service (SaaS).



Webinars





 


 


 



 

Nice to know about Redhat


 

Collaboration and the Community


This is how Red Hat built a profitable business by sharing. And how we continue to grow and share with our customers. You can do more if you work together. Collaboration works.

 


 

Ever wonder how great features make it from the community into enterprise-ready technology like Red Hat(R) Enterprise Linu(R)?

Fedora Project Leader Paul Friends explains how projects started upstream gain in popularity and maturity, are hardened and tested, and eventually make their way to enterprise solutions.





 The value of Red Hat


Why is Red Hat the open source leader? It begins with collaboration that never ends.

Red Hat executives like Paul Cormier, Iain Gray, Michael Tiemann, and CEO Jim Whitehurst discuss the open source way, the subscription model, and the collaborative community that surrounds and supports Red Hat and JBoss solutions.

Partner representatives from IBM, AMD, Intel, and others discuss the important role of Red Hat and Linux in their organizations, today and in the future.

Get an overview of our basic solutions and services, and see why Red Hat is the open source leader chosen by its customers year after year.
 





For more information please contact me at:


Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook
email:          info@dbaconsulting.nl 

28 July 2013

IBM System z EC12 and BC12 new Mainframe Technology ideal for LUW Apps



 



 

IBM System z EC12 and BC12 new Mainframe Technology ideal for LUW Apps

 

With the IBM zEnterprise® System, IBM extends the mainframe platform to help large enterprises reshape the IT experience for their customers. Enterprises can also drive intelligent insights, in near real time, to improve business performance and reduce risk. Use of the zEnterprise BladeCenter Extension (zBX) allows integration of IBM POWER7 and System x blades.

The zEnterprise continues the mainframe tradition of providing the most trusted and resilient platform for large businesses. The extreme scalability of zEnterprise can offer significant cost savings on core business processes. Freed resources can be used to focus on developing new services to drive growth. With the IBM zEnterprise Unified Resource Manager, organizations can leverage dynamic and intelligent resource management to simplify operations.

A recent study by Rubin Worldwide1 confirms that mainframe "heavy" organizations grow more efficiently in supporting business computational demands than distributed server "heavy" organizations, demonstrating 39% more upward scalability in that they could support revenue growth with 61% less investment than those that were distributed server "intense".

The new IBM zEnterprise® EC12 has up to 50% more total system capacity, new innovations like IBM z-Aware, security hardened into its architecture, and continued support for a hybrid infrastructure, while maintaining core workload strategies of data serving and transaction processing.

 



 

Highlights


1) Centrally managed, integrated hybrid computing technology

2) Keeping data secure, available and easy to manage

3) Balanced design offering virtually limitless cloud expansion and elasticity

4) Comprehensive security and resiliency built in for highest levels of trust and confidence

 



 

Intro to the MainFrame



Intro to the MainFrame (short overview)



System zEnterprise overview (long)




New technologies for cloud, big data, analytics, mobile devices and social media are redefining the way that businesses will be operating on and IT must be transformed to support these technologies. The shift can offer the opportunity to assess and improve the business model and interaction with the customers, partners and employees. To capitalize on this opportunity, organizations must be able to tap into their data and energize applications without going over budget and all the while keeping everything protected and secure.

The IBM® zEnterprise® System delivers unique value and industry leading capabilities allowing you to maximize the business value of your unique information. Make informed and optimized decisions, exploit cloud delivery models to improve operational efficiency, reduce costs and complexity with Infrastructure as a Service, and use the built in System z security at every level to improve customer trust and confidence and know your IT infrastructure is secure. The IBM zEnterprise EC12 (zEC12) and the IBM zEnterprise BladeCenter® Extension (zBX) Model 003 offer a proven hybrid computing design that supports mainframe and the distributed technologies of IBM POWER7® and IBM System x® blades. IBM zEnterprise Unified Resource Manager (zManager) can manage and integrate workloads on the multiple architectures with the simplicity of a single system.

 



 

Migrate to IBM System-z


A new solution approach for consolidation and migration of IT assets based on IBMs own IT Transformation experience. Within IBM, modeling identified significant potential for savings through virtualization on IBM System z. New services from the GTS Server Consolidation and Migration Services leverage product manufacturing concepts and automation techniques to achieve Factory Like production results.

Video on migration




For the last 7 years IBM has provided specialty application engines on System z servers.

1) Integrated Facility for LINUX (or IFL) is dedicated to Linux workloads.

2) System z Application Assist processor (or zAAP) for Java environments.

3) System z Integrated Information processor (or zIIP) for certain data serving workloads.

 



 

For More information see this IBM webpage



 

EC12 most suitable for Enterprise Corporations

IBM zEnterprise® EC12


The secure cloud for data, enabling enterprises to improve service to their customers

The mainframe has always been the IT industry's leading platform for transaction processing; consolidated, secure data serving; and support for enterprise-wide applications. With the zEnterprise EC12 (zEC12), IBM extends the mainframe platform to help large enterprises reshape their customer experiences through information-centric computing.

 



 

Highlights


1) Centrally managed, integrated hybrid computing technology

2) Keeping data secure, available and easy to manage

3) Balanced design offering virtually limitless cloud expansion and elasticity

4) Comprehensive security and resiliency built in for highest levels of trust and confidence
 


BC12 most suitable for Midsize Companies

IBM zEnterprise® BC12


The zEnterprise BC12 (zBC12) offers twice the capacity at the entry level for the same low entry price as its predecessor, the z114. It also delivers significant improvements in availability, security, performance and total system scale to support clients’ growth in both traditional and new workloads including consolidation, cloud, mobile and analytics. With the same zEnterprise innovations and capabilities as the zEC12, the zBC12 lets you scale to the right size without compromise.

Highlights


1) Delivers increased performance, flexibility and scale in a lower cost package

2) Helps save money through consolidation on Linux and an efficient cloud delivery model

3) Enables workloads to be deployed where they run best and cost less with proven hybrid computing

4) Lets you secure it all with confidence on a trusted and resilient infrastructure

 



 



System-z and Linux as the ideal combination for server consolidation


 



 

Virtualization made simple



Value of the IBM® zEnterprise™



IBM® zEnterprise™System Technology Benefits




Novellchalk talk Server Consolidation on System-z



Cisco and hyper-V



 

Why IBMi and DB2



SAP roadmap 2013


IBM zEnterprise systems are very suitable for SAP Bi implementations, especially with SUSE Linux as OS, 70 PERCENT of all SAP implementations run on SUSE Linux.
 


 
 



 

For more information please contact me at:


Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook
email:          info@dbaconsulting.nl 

25 July 2013

Attachemate Luminet SECURITY



Attachemate Luminet SECURITY is KING


 

Luminet Enterprise Fraud Management Software


See It. Record It. Analyze It.


 


 

Attachmate Luminet enterprise fraud management software sees, records, and analyzes user activity across all applications. It gives you a comprehensive picture of who did what, and when—providing the intelligence you need to take informed action.

 

Traditional approaches to new threats perpetuated by increasingly sophisticated insiders no longer work. Today you need to:

 

•Know for certain whether or not your policies and procedures are being followed.

•Analyze patterns, trends, and differences across multiple employees, departments, and applications.

•Gather detailed forensic evidence—even weeks or months after the user activity occurred.

•Stop scrambling to create a complete audit trail out of incomplete silos of information.

•Quickly access the data you need to demonstrate regulatory compliance and support your audit efforts.

 

With Luminet you can


See user activity—and stop the guessing games.

Luminet enterprise fraud management  software captures a real-time, over-the-shoulder view of user activity on all applications. What’s more, it lets you define adaptable business rules that pinpoint suspicious behavior based on your risk management strategy. It also generates real-time alerts related to questionable activity patterns, so you can immediately zero in on anomalies and support key audit questions.  

Record user activity—and play it back on demand.

Luminet records user activity in real time, then uses a proprietary algorithm to compress the data before storing it in a secure repository. You can conduct powerful full-text searches through current or recorded activity, playing back every screen and keystroke relevant to an alert or a case. You can even use built-in graphical dashboards and custom reports to provide at-a-glance intelligence on key activity metrics.

Analyze user activity—and take informed action.

Luminet helps you clearly distinguish between legitimate and illegitimate activity. For starters, it lets you define robust rules and alerts that respond to suspicious activity in real time. What’s more, its interactive tools detect the cross-channel patterns and trends of users across diverse departments and applications. Armed with this intelligence, you can connect the dots between activities and relationships—and then take informed action.


The Luminet link analysis tool reveals user activity patterns, trends, and complex relationships across diverse enterprise applications.

 



 

Maintain constant visibility of questionable user activity patterns with real-time alerts.

 

Attachmate Luminet enterprise fraud management software can help you:

Stop fraud and misuse

Your trusted employees commit more privacy violations than anyone else. Sometimes it’s intentional; sometimes it’s not. With Luminet, you can quickly tell the difference.

Get compliant

Luminet can help you meet the key requirements of regulations such as PCI DSS, FACTA Red Flag Reporting, FFIEC, Sarbanes-Oxley Act, Gramm-Leach-Bliley, HIPAA, FISMA, PIPEDA, and Basel II—without changing a single line of code.

Pass the audit

No more slogging through cryptic, incomplete log files. Luminet records user activity in real time—screen by screen, keystroke by keystroke—creating an audit trail directly from the network.

Gather effective intelligence via 100% visibility, continuous monitoring, and proactive alerts.

Strengthen accountability via performance benchmarking and process improvement.

Get immediate results via rapid deployment and on-demand report generation from historical data.

Presentation on Luminet



Video with some of the presentation content



Key Features of Luminet


•Real-time, cross-channel monitoring of user activity

•Screen-by-screen replay and Google-like searches

•Historical data analysis of captured activity

•On-demand reports  in multiple formats, including PDFs

•Customizable risk-based scoring

•Behavioral analytics tools, including graphical link display

•Investigation Center with fraud dashboard and management tools

•Rules and Policy Toolkit with custom rules support

•SIEM Extensions for NetIQ Sentinel 7

•Support for Oracle Forms 6.5 and 10

•FIPS 140-2 validated cryptographic module
 

Luminet enterprise fraud management software sees, records, and analyzes user activity across all applications.



It gives you a complete and accurate picture of who did what, and when—so you can support audit and compliance initiatives.

 
Monitored Applications

•IBM mainframe: 3270, MQ, LU0, and LU6.2

•IBM AS/400: 5250 and MPTN

•Unisys mainframe: T27

•Fujitsu mainframe: 6680

•Web: HTTP/HTTPS 

•Client/Server: TCP/IP, MQ Series, MSMQ, and SMB

•UNIX: VT

•SWIFT, FIX, and ISO8583 (ATM)

•Database: Microsoft SQL Server 

•FTP

•Other application-to-application protocols can be configured

•Oracle Forms 6.5 (client-server)

•Oracle Forms 10 (web-based)

Security Protocols

•SSL/TLS

•SSH

•AES encryption and digital certificates

Database Support

•Microsoft SQL Server 2005 and later

•Oracle 9 and later

•Any standard SQL database

Directory Server Support

•Microsoft Active Directory

•Any LDAP-compliant directory server

Operating System Support

•Windows Server 2003

•Windows Server 2008

•SUSE Linux

•Red Hat Linux


By introducting Luminet into your SIEM environment, you can


Expand your view of user behavior across enterprise applications

The data captured with Luminet is processed using a behavioral-analytics engine and becomes a consumable event that is further processed by the traditional SIEM engine. For example, take one of your core business applications that is used daily by a variety of users. Some parts of the application reveal personal customer information, such as social security numbers. How can you tell if a user is surreptitiously copying those numbers down? In a traditional SIEM environment, that activity may not even be logged since no change took place. If it is logged, it may not necessarily be flagged as suspicious.

Luminet tracks your users’ application activity, even passive reading of screens, regardless of what may or may not be logged. All user behavior, across all parts of the application, is modeled into application usage patterns and deviations from that model are flagged by Luminet. When suspicious or deceptive behavior is flagged, it can be propagated to your SIEM environment for alerting, or perhaps correlation with other events.
Deep-dive analysis can then be performed in the Luminet Investigation Center to cast the event into the context of the entire sequence of screens the user was moving through when the suspicious activity occurred, providing you with the intelligence you need to defeat insider threats.

 

Enforce policies and facilitate compliance

When Luminet is integrated with your SIEM or other security tools (e.g., IDM or your trouble ticketing system), these systems become more than reporting tools. Depending on your policies and the capabilities of your SIEM product, you can configure Luminet to respond to incidents as they occur. For example, you can define robust rules and alerts that respond to suspicious activity in real time. What’s more, Luminet’s interactive tools help you clearly distinguish between legitimate and illegitimate activity by detecting the cross-channel patterns and trends of users across diverse departments and applications.

Luminet data can then be provided to your existing SIEM and consumed via your established central console to augment your real-time monitoring, event correlation, incident management, and reporting of user activity across multiple applications and multiple data channels. These functions can also help you demonstrate compliance with internal policies and controls as well as government regulations, such as SOX, HIPAA, GLBA, FISMA, and others.

 

Analyze user behavior quickly and thoroughly

Navigating through a sea of disassociated, system-generated data can be as frustrating as having no data at all. Log files and alerts may be able to tell you what’s occurred at a high level, but without the ability to analyze those occurrences, you are missing the ground level details needed to take meaningful action.

Luminet makes it possible for you to drill into the security event logged by your SIEM engine and understand the details of the event and accompanying user activity. Together, the systems can perform high-level event consolidation and triage as well as highly sophisticated behavioral analysis that recognizes new trends, attacks, or violations. You can also manipulate and interact with real-time graphical information and drill down into historical details ranging from seconds to hours in the past. Sophisticated visualization tools like Luminet’s link analysis engine enable you to quickly identify patterns of behavior and activity that were previously invisible to your SIEM solution.

 



 

 

Video of Demo and intro


 

See Luminet in action



 
For more information please contact me at:


Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook
email:          info@dbaconsulting.nl