
On Demand Operating Environment : Managing the Infrastructure (Virtualization Engine Update).
Title:
On Demand Operating Environment : Managing the Infrastructure (Virtualization Engine Update).
Author:
Redbooks, IBM.
Personal Author:
Physical Description:
1 online resource (394 pages)
Contents:
Front cover -- Contents -- Figures -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Summary of changes -- June 2005, Second Edition -- Part 1 Overview -- Chapter 1. Introduction -- 1.1 Getting to On Demand Business -- 1.2 Infrastructure to support an On Demand Business -- 1.3 Capabilities -- 1.3.1 Integration capabilities -- 1.3.2 Infrastructure management capabilities -- 1.4 On Demand Operating Environment architecture -- 1.5 Summary -- Chapter 2. Infrastructure management overview -- 2.1 Business drivers -- 2.2 Framework for infrastructure management -- 2.3 Automation -- 2.3.1 Business Service Management -- 2.3.2 Policy-based Orchestration -- 2.3.3 Availability -- 2.3.4 Security -- 2.3.5 Optimization -- 2.3.6 Provisioning -- 2.4 Virtualization -- 2.4.1 The value of virtualization -- 2.4.2 Server virtualization -- 2.4.3 Storage virtualization -- 2.4.4 Network virtualization -- 2.4.5 Distributed systems -- 2.4.6 The IBM Virtualization Engine -- Chapter 3. The IBM Virtualization Engine -- 3.1 Overview of the IBM Virtualization Engine -- 3.2 Systems technologies -- 3.2.1 Systems technologies for the zSeries family -- 3.2.2 Systems technologies integrated into the pSeries -- 3.2.3 Systems technologies integrated into the iSeries -- 3.2.4 Systems technologies integrated into xSeries and BladeCenter -- 3.3 Systems services -- 3.3.1 Suite for Servers -- 3.3.2 Suite for Storage -- 3.3.3 System services summary -- 3.4 Summary -- Part 2 How to's for managing the Infrastructure -- Chapter 4. How to secure access and control of information, resources, and applications -- 4.1 Vision -- 4.1.1 Web Services security components -- 4.1.2 Hardware and software security mechanisms -- 4.1.3 Glimpse of the future -- 4.2 How to get started today.
Chapter 5. How to provide scalable and consistent management and control of operations for end-to-end business systems -- 5.1 Vision -- 5.1.1 The role of standards -- 5.1.2 Orchestration and provisioning -- 5.1.3 The Service Oriented Architecture model -- 5.1.4 Automation -- 5.2 How to get started today -- 5.2.1 Enterprise Workload Management component -- 5.2.2 IBM Tivoli Business Systems Manager component -- 5.2.3 Virtualization Engine Console component -- 5.2.4 IBM Director Multiplatform component -- 5.2.5 IBM Tivoli Enterprise Console component -- 5.2.6 IBM Tivoli Monitoring components -- 5.2.7 IBM Tivoli Intelligent ThinkDynamic Orchestrator component -- 5.2.8 The storage components -- 5.2.9 The Electronic Service Agent component -- 5.2.10 The automation environment -- 5.3 Key products to start with -- Chapter 6. How to avoid system failures and take automated action to resolve problems -- 6.1 Vision -- 6.2 How to get started today -- 6.2.1 Hardware solutions -- 6.2.2 Software and services solutions -- 6.3 Key products to start with -- Chapter 7. How to protect systems from intrusions and threats using monitor and alert systems -- 7.1 Vision -- 7.2 How to get started today -- 7.2.1 The IBM Integrated Security Solution for Cisco Networks -- 7.2.2 The IBM Tivoli Security Management environment -- 7.2.3 z/OS environment solutions -- 7.3 Key products to start with -- Chapter 8. How to monitor systems to allow establishment of business SLAs and automate detection and remediation of violations -- 8.1 Vision -- 8.2 How to get started today -- 8.2.1 The IBM Tivoli Business Service Management solution -- 8.3 Key products to start with -- Chapter 9. How to reduce the time and cost to re-purpose IT resources to meet business requirements -- 9.1 Vision -- 9.1.1 Architecture approach: the MAPE Loop -- 9.1.2 Optimizing existing resources.
9.1.3 Storage approach -- 9.2 How to get started today -- 9.2.1 The MAPE Loop implementation -- 9.2.2 The role of the grid -- 9.2.3 Storage implementations -- 9.3 Key products to start with -- Chapter 10. How to map IT resources used by various business processes of an end-to-end solution -- 10.1 Vision -- 10.2 How to get started today -- 10.2.1 Understand the usage of data -- 10.2.2 Understand the usage of specific components -- 10.2.3 Sample scenario -- 10.3 Key products to start with -- Chapter 11. How to consolidate and simplify the IT infrastructure -- 11.1 Vision -- 11.2 How to get started today -- 11.2.1 zSeries implementation example -- 11.2.2 Storage implementation example -- 11.2.3 BladeCenter implementation example -- 11.3 Key products to start with -- Chapter 12. How to optimize utilization and pool resources across a heterogeneous environment -- 12.1 Vision -- 12.1.1 Open Grid Services Architecture -- 12.1.2 Workload management -- 12.2 How to get started today -- 12.2.1 The zSeries example -- 12.2.2 Examples of LPAR -- 12.2.3 The grid benefit -- 12.2.4 Mixing partitioning and grid capabilities -- 12.2.5 Infrastructure management tools -- 12.2.6 Storage focus -- 12.3 Key products to start with -- Chapter 13. How to provision system resources in order to meet business demands -- 13.1 Vision -- 13.2 How to get started today -- Chapter 14. How to monitor end-to-end applications, their topology, and their resources -- 14.1 Vision -- 14.2 How to get started today -- 14.2.1 IBM Tivoli Monitoring for Transaction Performance -- 14.2.2 Enterprise Workload Manager -- 14.3 Key products to start with -- Part 3 Infrastructure management: Detailed scenarios -- Chapter 15. How to secure access and control of information, resources, and applications -- 15.1 Introduction -- 15.2 General strategy -- 15.3 Solution components -- 15.3.1 Identity management.
15.3.2 Privacy management -- 15.3.3 Security management console -- 15.3.4 Data protection -- 15.4 Scenario -- 15.4.1 Business context -- 15.4.2 Current environment -- 15.4.3 Business objectives -- 15.4.4 Technical objectives -- 15.4.5 Solution approach -- 15.5 Product positioning -- 15.5.1 Identity management -- 15.5.2 Privacy Control Management -- 15.6 Linkages -- 15.7 Glimpse of the future -- 15.8 Summary -- Chapter 16. How to provision system resources according to business demands -- 16.1 Introduction -- 16.2 General strategy -- 16.3 Solution components -- 16.4 Scenario -- 16.4.1 Current environment -- 16.4.2 Business objectives -- 16.4.3 Technical objectives -- 16.4.4 Solution approach -- 16.4.5 Benefits and summary -- 16.5 Product positioning -- 16.5.1 Self-configuring IBM ^ -- 16.5.2 Self-configuring IBM TotalStorage -- 16.5.3 Hypervisors and workload managers -- 16.5.4 IBM Tivoli Provisioning Manager -- 16.5.5 IBM Tivoli Intelligent ThinkDynamic Orchestrator -- 16.6 Linkages -- 16.7 Glimpse of the future -- 16.8 Summary -- Chapter 17. How to balance workloads in the network -- 17.1 Introduction -- 17.1.1 Overview of the CISCO CSM -- 17.1.2 Overview of EWLM's load balancing recommendations -- 17.1.3 The Server/Application State Protocol (SASP) -- 17.2 Configuring the components -- 17.2.1 Configuring the Catalyst 6509 and the CSM for EWLM -- 17.2.2 Configuring EWLM for load balancing -- 17.2.3 Failover considerations -- 17.3 Network balancing example -- 17.3.1 Network and application topology -- 17.3.2 Load balancing configurations -- 17.4 Lessons learned -- 17.4.1 Best practices -- 17.4.2 Special EWLM benefits to load balancing -- 17.4.3 Troubleshooting -- 17.5 Conclusion -- Chapter 18. How to consolidate, simplify, and optimize the storage IT infrastructure -- 18.1 Introduction -- 18.2 General strategy -- 18.3 Solution components.
18.4 Scenario -- 18.4.1 Current environment -- 18.4.2 Business objectives -- 18.4.3 Technical objectives -- 18.4.4 Solution approach -- 18.4.5 Benefits and summary -- 18.5 Product positioning: Conclusion -- 18.5.1 IBM TotalStorage SAN Volume Controller -- 18.5.2 IBM TotalStorage SAN File System -- 18.5.3 IBM TotalStorage Productivity Center -- 18.6 Summary -- Chapter 19. How to monitor using EWLM -- 19.1 Introduction -- 19.2 General strategy -- 19.3 Solution components -- 19.4 Scenario -- 19.4.1 Current environment -- 19.4.2 Business objective -- 19.4.3 Technical objectives -- 19.5 Scenario implementation -- 19.5.1 Architecture components -- 19.5.2 Implementation of IBM EWLM -- 19.5.3 Monitoring scenario -- 19.5.4 How to use EWLM to debug/diagnose a performance problem -- 19.5.5 Benefits and summary -- 19.6 Glimpse of the future -- 19.7 Summary -- Part 4 Appendixes -- Appendix A. Getting Started with the Virtualization Engine -- A.1 "Start Your Engines" Workshops -- A.2 VE Consulting/Assessment study engagement overview -- A.2.1 Objectives -- A.2.2 Offerings -- A.2.3 Methodology -- A.3 The Planning Advisor -- Appendix B. Standards overview -- B.1 Open source -- B.2 Standards organizations -- B.2.1 IETF - Internet Engineering Task Force -- B.2.2 W3C - World Wide Web Consortium -- B.2.3 JCP - Java Community Process -- B.2.4 OASIS - Organization for the Advancement of Structured Information Standards -- B.2.5 WS-I - Web Services Interoperability Organization -- B.2.6 DMTF - Distributed Management Task Force -- B.2.7 GGF - Global Grid Forum -- B.2.8 OMG - Object Management Group -- B.3 Key standards -- B.3.1 XML standards -- B.3.2 SOAP - Simple Object Access Protocol -- B.3.3 WSDL - Web Services Description Language -- B.3.4 UDDI - Universal Description, Discovery, and Integration -- B.3.5 WS-I Basic Profile 1.0a.
B.3.6 WS-Security - Web Services Security.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Genre:
Electronic Access:
Click to View