This document provides an overview and introduction to the IBM Tivoli Monitoring for Transaction Performance (TMTP) product. TMTP allows for end-to-end monitoring of complex e-business transactions as they traverse multiple application servers and systems. The key capabilities of TMTP include seamless transaction decomposition and correlation, automatic problem identification and baselining, and policy-based transaction discovery. TMTP utilizes various components like the Web Transaction Performance (WTP) component and Enterprise Transaction Performance (ETP) component to monitor transactions across various technologies and platforms.
This document provides guidance on best practices for implementing IBM Tivoli License Manager. It begins with an overview of the product and discusses business perspectives and challenges related to license management. It then covers key aspects of the project engagement and delivery phases. The document focuses on solution design considerations, including gathering requirements, defining scope, architectural decisions, and the physical design of IBM Tivoli License Manager components. It provides information on sizing, scalability, communications, and operating system support.
This document provides instructions for installing and setting up IBM TotalStorage Productivity Center V2.3. It discusses the required prerequisites, including software, ports, and user accounts. It also describes planning considerations like the lab environment setup. The document then covers the step-by-step installation process and important post-installation configuration tasks to ensure proper functionality.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center (TPC) version 3.1. It describes the key components and features of TPC, including how it collects and manages storage data using standards like SNMP, SLP, CIM and WBEM. The document also covers installation prerequisites, user account configuration, supported storage subsystems and best practices for server sizing and security.
The document is an integration guide for IBM Tivoli Service Request Manager V7.1. It covers integration best practices and architectures. It includes demonstration scenarios for integrating the Tivoli Service Request Manager with other products like event management solutions, other service desk solutions, IBM Tivoli Directory Integrator, and more. The guide explains the integration components, benefits, scenarios, and provides instructions for specific integrations.
This document provides an overview of automated provisioning using IBM's Tivoli Intelligent Orchestrator and Enterprise Workload Manager. It describes the key components of the provisioning solution including Tivoli Intelligent Orchestrator, Enterprise Workload Manager, and Tivoli Provisioning Manager. It also outlines an example test environment used to demonstrate automated provisioning through the configuration of Tivoli Intelligent Orchestrator, Enterprise Workload Manager, and their integration using the objective analyzer.
This document provides an overview and guide for designing and implementing an IT security compliance management solution using IBM Tivoli Security Information and Event Manager (SIEM). It discusses the business needs and technical criteria for such a solution. The document also describes the architecture and components of IBM SIEM, including log management, normalization, consolidation, and compliance reporting capabilities. Finally, it outlines the design process for a compliance management solution, including discovery, planning, implementation, and operational considerations.
The document provides guidance on installing and deploying IBM's Tivoli IT Asset Management portfolio of products. It discusses Tivoli Asset Management for IT, Tivoli License Compliance Manager, and Tivoli License Compliance Manager for z/OS. The document guides readers through planning, installing middleware, installing the core products, configuring components, collecting data, and generating reports. The goal is to help organizations effectively manage their IT assets and software licenses.
This document is a certification guide for IBM Tivoli Business Service Manager V4.1.1. It contains chapters that cover certification overview, planning, installation, configuration, customization, and operations of IBM Tivoli Business Service Manager V4.1.1. The guide provides details on the architecture, test objectives, prerequisites, installation process, configuration settings, and day-to-day operations of the software to help readers prepare for and obtain certification.
This document provides guidance on best practices for implementing IBM Tivoli License Manager. It begins with an overview of the product and discusses business perspectives and challenges related to license management. It then covers key aspects of the project engagement and delivery phases. The document focuses on solution design considerations, including gathering requirements, defining scope, architectural decisions, and the physical design of IBM Tivoli License Manager components. It provides information on sizing, scalability, communications, and operating system support.
This document provides instructions for installing and setting up IBM TotalStorage Productivity Center V2.3. It discusses the required prerequisites, including software, ports, and user accounts. It also describes planning considerations like the lab environment setup. The document then covers the step-by-step installation process and important post-installation configuration tasks to ensure proper functionality.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center (TPC) version 3.1. It describes the key components and features of TPC, including how it collects and manages storage data using standards like SNMP, SLP, CIM and WBEM. The document also covers installation prerequisites, user account configuration, supported storage subsystems and best practices for server sizing and security.
The document is an integration guide for IBM Tivoli Service Request Manager V7.1. It covers integration best practices and architectures. It includes demonstration scenarios for integrating the Tivoli Service Request Manager with other products like event management solutions, other service desk solutions, IBM Tivoli Directory Integrator, and more. The guide explains the integration components, benefits, scenarios, and provides instructions for specific integrations.
This document provides an overview of automated provisioning using IBM's Tivoli Intelligent Orchestrator and Enterprise Workload Manager. It describes the key components of the provisioning solution including Tivoli Intelligent Orchestrator, Enterprise Workload Manager, and Tivoli Provisioning Manager. It also outlines an example test environment used to demonstrate automated provisioning through the configuration of Tivoli Intelligent Orchestrator, Enterprise Workload Manager, and their integration using the objective analyzer.
This document provides an overview and guide for designing and implementing an IT security compliance management solution using IBM Tivoli Security Information and Event Manager (SIEM). It discusses the business needs and technical criteria for such a solution. The document also describes the architecture and components of IBM SIEM, including log management, normalization, consolidation, and compliance reporting capabilities. Finally, it outlines the design process for a compliance management solution, including discovery, planning, implementation, and operational considerations.
The document provides guidance on installing and deploying IBM's Tivoli IT Asset Management portfolio of products. It discusses Tivoli Asset Management for IT, Tivoli License Compliance Manager, and Tivoli License Compliance Manager for z/OS. The document guides readers through planning, installing middleware, installing the core products, configuring components, collecting data, and generating reports. The goal is to help organizations effectively manage their IT assets and software licenses.
This document is a certification guide for IBM Tivoli Business Service Manager V4.1.1. It contains chapters that cover certification overview, planning, installation, configuration, customization, and operations of IBM Tivoli Business Service Manager V4.1.1. The guide provides details on the architecture, test objectives, prerequisites, installation process, configuration settings, and day-to-day operations of the software to help readers prepare for and obtain certification.
Deployment guide series maximo asset mng 7 1Slađan Šehović
This document is a deployment guide for Maximo Asset Management V7.1. It contains information about new features in V7.1, pre-installation planning and requirements, installation instructions, and post-installation configuration tasks. The guide is intended to help IT professionals successfully deploy Maximo Asset Management.
The document is a manual for Tivoli Business Systems Manager Version 2.1. It provides an overview of the product, which allows for end-to-end business impact management through integrated systems management. The manual details the product structure, components, functions, database structure, user interface, and planning requirements for implementation. It is intended to help users understand and implement the key capabilities of Tivoli Business Systems Manager.
This document discusses managing an SOA environment with Tivoli products. It introduces SOA concepts and components. It describes several Tivoli products for SOA management, including ITCAM for SOA, ITCAM for WebSphere, ITCAM for Response Time Tracking, and OMEGAMON XE for Messaging. It covers basic and advanced SOA and Web services management tasks that can be performed with these products, such as monitoring, debugging performance, understanding calling patterns, and maintaining continuity with an enterprise service bus.
This document provides an overview and planning guide for implementing an availability and performance monitoring solution based on IBM's Tivoli portfolio and following an ITIL-based management approach. It discusses key concepts in ITIL, availability management, and capacity management. It also introduces IBM's service management framework and blueprint. Additionally, it provides overviews of the various Tivoli products for resource monitoring, composite application management, event correlation, business service management, mainframe management, and process management. Finally, it includes sample scenarios for monitoring UNIX servers, web applications, networks, and a complex retail environment.
Extending ibm business process manager to the mobile enterprise with ibm work...bupbechanhgmail
This document provides an overview of extending IBM Business Process Manager (BPM) to enable mobile processes using IBM Worklight. It discusses the benefits of mobile-enabling processes and key features of BPM and Worklight that support this capability. These include Worklight adapters and APIs to access backend systems from mobile apps and BPM's REST interface to trigger processes and tasks from mobile devices. The document also provides architecture guidance for integrating BPM and Worklight to build mobile-enabled process applications.
This document provides an overview of IBM Tivoli Security Management for z/OS, a solution for administering mainframe security on z/OS. It allows for audit and security activity reporting, security event alerting, fine-grained command control, efficient security administration, security and audit baseline establishment, automated cleanup of redundant security definitions, and identification of trusted users. The solution includes components for security administration, audit collection, command verification, and security event management. Customer scenarios demonstrate how it can be used to satisfy auditors, protect critical resources from insider abuse, and demonstrate audit readiness.
This document provides best practices for planning and implementing large scale IBM Tivoli Monitoring environments. It discusses hardware sizing, scalability considerations, and performance optimization for the Tivoli Enterprise Monitoring Server, Tivoli Enterprise Portal Server, Tivoli Data Warehouse, and Tivoli Enterprise Monitoring agents. Firewall configuration and historical data collection are also addressed. The goal is to help customers deploy Tivoli Monitoring in a way that meets their monitoring needs as their environments grow to support thousands of devices and applications.
The document provides an overview and installation instructions for integrating multiple IBM Tivoli products. It discusses security integration using LDAP and single sign-on. Product installations covered include IBM Service Management, Tivoli Monitoring, Tivoli Netcool, Tivoli Workload Scheduler, Tivoli Usage and Accounting Manager, and Tivoli Storage Productivity Center. The document is intended to help customers integrate these products in their environments.
This document provides an overview and instructions for deploying and using IBM Tivoli Composite Application Manager for WebSphere V6.0. It describes how to plan, install, and configure the managing server and data collectors to monitor WebSphere application servers. It also provides guidance on using the monitoring console to analyze performance issues.
Ibm system z in a mobile world providing secure and timely mobile access to...bupbechanhgmail
This document discusses integrating IBM System z mainframes into mobile strategies. It provides an overview of IBM's MobileFirst platform for developing secure and integrated mobile applications. The document also explores architectural options for connecting mobile applications to transactional systems like those running on IBM System z. It proposes a reference architecture that incorporates elements such as Worklight servers, caching services, security layers, and transaction processing to bridge the gap between mobile and mainframe systems in a secure manner.
This document provides an overview and insider's guide to IBM Tivoli Management Services Warehouse and Reporting. It discusses the architecture and internals of Tivoli Data Warehouse, best practices for deployment configurations, and step-by-step instructions for configuring various components like the Warehouse Proxy and Summarization and Pruning agent. It also demonstrates how to integrate Tivoli Data Warehouse with other Tivoli products for reporting.
This document provides a summary of IBM's Tivoli Identity and Access Assurance solution, which addresses identity, access, and compliance requirements. It introduces the solution and its key components for identity management, access management, security information and event management, and single sign-on. It describes tangible business benefits around automating compliance initiatives, improving operational efficiency and security, and enhancing user productivity. Finally, it provides examples of how customers have implemented the solution in phases to achieve single sign-on, improve log and access management for auditing, and enable access to external business partners and services.
This document provides an overview of Tivoli Management Agents (TMA). TMA is a lightweight software component that is installed on managed nodes to perform management tasks. It reduces resource usage and improves scalability compared to previous versions of Tivoli software. TMA supports installation, configuration, command line interface, web interface, and communication with Tivoli Management Region servers. It allows for simplified and centralized management of large numbers of nodes. The document discusses advantages of TMA, preloaded TMA capabilities, installation procedures, configuration options and policies, and future directions for TMA.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, Agents, and Catalog Manager. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer environment, disaster recovery procedures, and planning for each ITLM component. Finally, it walks through setting up the ITLM Administration Server with steps for installing required software like IBM DB2 and WebSphere and configuring the DB2 schema. The document aims to help IT professionals successfully set up their ITLM license management environment.
This document provides an overview and instructions for installing and configuring the Tivoli Management Environment (TME) platform. It discusses planning the installation, installing TME software on UNIX and PC nodes, configuring the TME management regions and resources, creating administrators and policy regions, and diagnosing common installation issues. It also provides guidance on setting up backups and describes capabilities of the Tivoli/Courier deployment application for managing file packages.
El documento trata sobre los plásticos, incluyendo su origen, propiedades, qué son, cómo se conforman, utilidades, contaminación, reciclaje, ventajas y desventajas. Explica que los primeros plásticos surgieron en 1860 como sustituto del marfil, y que actualmente son materiales omnipresentes pero también contaminantes que tardan siglos en degradarse, por lo que el reciclaje es importante para reducir su impacto ambiental.
Este documento presenta la herramienta ALIADA, la cual permite publicar los datos de bibliotecas y museos como Linked Open Data de forma automática. El documento describe la agenda de una presentación sobre ALIADA, incluyendo una introducción a la herramienta, una demostración práctica de su uso, y una discusión sobre las impresiones. ALIADA transforma los metadatos en RDF y los enlaza con otros conjuntos de datos, permitiendo la publicación y descubrimiento de los datos culturales de una manera más conectada a nivel global.
R&K Consulting provides market research services including industry research, company research, and market access research. Their mission is to develop information to define markets, market potential, competition, and product requirements to help clients gain a competitive advantage. They focus on upstream and downstream research in key industries such as industrial products, machinery, new energy, new materials, and more.
Este documento presenta resúmenes de 3 libros recientes sobre informática y periodismo. El primer libro trata sobre la gestión de almacenes de datos empresariales usando SAP Netweaver. El segundo libro ofrece anotaciones para la transmisión de noticias médico-científicas. El tercer libro es una compilación de investigaciones sobre el uso de tecnologías de información y comunicación en educación, incluyendo Internet, Web 2.0 y educación virtual.
El documento describe la relación entre clientes y servidores. Un servidor es un programa en una computadora que provee recursos e información a computadoras clientes que se conectan a través de una red. Los clientes ejecutan programas que permiten comunicarse con los servidores para acceder a la información almacenada, como páginas web o correo electrónico. Cada dispositivo en una red tiene una dirección única que permite la comunicación entre clientes y servidores.
Este documento proporciona información sobre cómo incluir sonido en un blog. Explica cómo grabar audio en línea usando servicios como Odeo, cómo alojar archivos de audio en sitios como DivShare, y cómo insertar reproductores de audio en blogs usando código HTML. También cubre cómo grabar audio directamente desde una computadora y convertir formatos de archivo.
Deployment guide series maximo asset mng 7 1Slađan Šehović
This document is a deployment guide for Maximo Asset Management V7.1. It contains information about new features in V7.1, pre-installation planning and requirements, installation instructions, and post-installation configuration tasks. The guide is intended to help IT professionals successfully deploy Maximo Asset Management.
The document is a manual for Tivoli Business Systems Manager Version 2.1. It provides an overview of the product, which allows for end-to-end business impact management through integrated systems management. The manual details the product structure, components, functions, database structure, user interface, and planning requirements for implementation. It is intended to help users understand and implement the key capabilities of Tivoli Business Systems Manager.
This document discusses managing an SOA environment with Tivoli products. It introduces SOA concepts and components. It describes several Tivoli products for SOA management, including ITCAM for SOA, ITCAM for WebSphere, ITCAM for Response Time Tracking, and OMEGAMON XE for Messaging. It covers basic and advanced SOA and Web services management tasks that can be performed with these products, such as monitoring, debugging performance, understanding calling patterns, and maintaining continuity with an enterprise service bus.
This document provides an overview and planning guide for implementing an availability and performance monitoring solution based on IBM's Tivoli portfolio and following an ITIL-based management approach. It discusses key concepts in ITIL, availability management, and capacity management. It also introduces IBM's service management framework and blueprint. Additionally, it provides overviews of the various Tivoli products for resource monitoring, composite application management, event correlation, business service management, mainframe management, and process management. Finally, it includes sample scenarios for monitoring UNIX servers, web applications, networks, and a complex retail environment.
Extending ibm business process manager to the mobile enterprise with ibm work...bupbechanhgmail
This document provides an overview of extending IBM Business Process Manager (BPM) to enable mobile processes using IBM Worklight. It discusses the benefits of mobile-enabling processes and key features of BPM and Worklight that support this capability. These include Worklight adapters and APIs to access backend systems from mobile apps and BPM's REST interface to trigger processes and tasks from mobile devices. The document also provides architecture guidance for integrating BPM and Worklight to build mobile-enabled process applications.
This document provides an overview of IBM Tivoli Security Management for z/OS, a solution for administering mainframe security on z/OS. It allows for audit and security activity reporting, security event alerting, fine-grained command control, efficient security administration, security and audit baseline establishment, automated cleanup of redundant security definitions, and identification of trusted users. The solution includes components for security administration, audit collection, command verification, and security event management. Customer scenarios demonstrate how it can be used to satisfy auditors, protect critical resources from insider abuse, and demonstrate audit readiness.
This document provides best practices for planning and implementing large scale IBM Tivoli Monitoring environments. It discusses hardware sizing, scalability considerations, and performance optimization for the Tivoli Enterprise Monitoring Server, Tivoli Enterprise Portal Server, Tivoli Data Warehouse, and Tivoli Enterprise Monitoring agents. Firewall configuration and historical data collection are also addressed. The goal is to help customers deploy Tivoli Monitoring in a way that meets their monitoring needs as their environments grow to support thousands of devices and applications.
The document provides an overview and installation instructions for integrating multiple IBM Tivoli products. It discusses security integration using LDAP and single sign-on. Product installations covered include IBM Service Management, Tivoli Monitoring, Tivoli Netcool, Tivoli Workload Scheduler, Tivoli Usage and Accounting Manager, and Tivoli Storage Productivity Center. The document is intended to help customers integrate these products in their environments.
This document provides an overview and instructions for deploying and using IBM Tivoli Composite Application Manager for WebSphere V6.0. It describes how to plan, install, and configure the managing server and data collectors to monitor WebSphere application servers. It also provides guidance on using the monitoring console to analyze performance issues.
Ibm system z in a mobile world providing secure and timely mobile access to...bupbechanhgmail
This document discusses integrating IBM System z mainframes into mobile strategies. It provides an overview of IBM's MobileFirst platform for developing secure and integrated mobile applications. The document also explores architectural options for connecting mobile applications to transactional systems like those running on IBM System z. It proposes a reference architecture that incorporates elements such as Worklight servers, caching services, security layers, and transaction processing to bridge the gap between mobile and mainframe systems in a secure manner.
This document provides an overview and insider's guide to IBM Tivoli Management Services Warehouse and Reporting. It discusses the architecture and internals of Tivoli Data Warehouse, best practices for deployment configurations, and step-by-step instructions for configuring various components like the Warehouse Proxy and Summarization and Pruning agent. It also demonstrates how to integrate Tivoli Data Warehouse with other Tivoli products for reporting.
This document provides a summary of IBM's Tivoli Identity and Access Assurance solution, which addresses identity, access, and compliance requirements. It introduces the solution and its key components for identity management, access management, security information and event management, and single sign-on. It describes tangible business benefits around automating compliance initiatives, improving operational efficiency and security, and enhancing user productivity. Finally, it provides examples of how customers have implemented the solution in phases to achieve single sign-on, improve log and access management for auditing, and enable access to external business partners and services.
This document provides an overview of Tivoli Management Agents (TMA). TMA is a lightweight software component that is installed on managed nodes to perform management tasks. It reduces resource usage and improves scalability compared to previous versions of Tivoli software. TMA supports installation, configuration, command line interface, web interface, and communication with Tivoli Management Region servers. It allows for simplified and centralized management of large numbers of nodes. The document discusses advantages of TMA, preloaded TMA capabilities, installation procedures, configuration options and policies, and future directions for TMA.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, Agents, and Catalog Manager. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer environment, disaster recovery procedures, and planning for each ITLM component. Finally, it walks through setting up the ITLM Administration Server with steps for installing required software like IBM DB2 and WebSphere and configuring the DB2 schema. The document aims to help IT professionals successfully set up their ITLM license management environment.
This document provides an overview and instructions for installing and configuring the Tivoli Management Environment (TME) platform. It discusses planning the installation, installing TME software on UNIX and PC nodes, configuring the TME management regions and resources, creating administrators and policy regions, and diagnosing common installation issues. It also provides guidance on setting up backups and describes capabilities of the Tivoli/Courier deployment application for managing file packages.
El documento trata sobre los plásticos, incluyendo su origen, propiedades, qué son, cómo se conforman, utilidades, contaminación, reciclaje, ventajas y desventajas. Explica que los primeros plásticos surgieron en 1860 como sustituto del marfil, y que actualmente son materiales omnipresentes pero también contaminantes que tardan siglos en degradarse, por lo que el reciclaje es importante para reducir su impacto ambiental.
Este documento presenta la herramienta ALIADA, la cual permite publicar los datos de bibliotecas y museos como Linked Open Data de forma automática. El documento describe la agenda de una presentación sobre ALIADA, incluyendo una introducción a la herramienta, una demostración práctica de su uso, y una discusión sobre las impresiones. ALIADA transforma los metadatos en RDF y los enlaza con otros conjuntos de datos, permitiendo la publicación y descubrimiento de los datos culturales de una manera más conectada a nivel global.
R&K Consulting provides market research services including industry research, company research, and market access research. Their mission is to develop information to define markets, market potential, competition, and product requirements to help clients gain a competitive advantage. They focus on upstream and downstream research in key industries such as industrial products, machinery, new energy, new materials, and more.
Este documento presenta resúmenes de 3 libros recientes sobre informática y periodismo. El primer libro trata sobre la gestión de almacenes de datos empresariales usando SAP Netweaver. El segundo libro ofrece anotaciones para la transmisión de noticias médico-científicas. El tercer libro es una compilación de investigaciones sobre el uso de tecnologías de información y comunicación en educación, incluyendo Internet, Web 2.0 y educación virtual.
El documento describe la relación entre clientes y servidores. Un servidor es un programa en una computadora que provee recursos e información a computadoras clientes que se conectan a través de una red. Los clientes ejecutan programas que permiten comunicarse con los servidores para acceder a la información almacenada, como páginas web o correo electrónico. Cada dispositivo en una red tiene una dirección única que permite la comunicación entre clientes y servidores.
Este documento proporciona información sobre cómo incluir sonido en un blog. Explica cómo grabar audio en línea usando servicios como Odeo, cómo alojar archivos de audio en sitios como DivShare, y cómo insertar reproductores de audio en blogs usando código HTML. También cubre cómo grabar audio directamente desde una computadora y convertir formatos de archivo.
El documento describe la iglesia colonial de Lahuaytambo ubicada en los Andes peruanos que data de 1678. Describe detalles arquitectónicos como la capilla más antigua construida en 1618, el altar mayor estilo neoclásico, y las campanas donadas en 1608. También menciona leyendas locales como que la iglesia fue construida sobre una mina y procesiones importantes como la del Señor de la Asunción durante la Semana Santa.
1) El documento presenta un proyecto de vida de una persona que desea sensibilizarse sobre la importancia de planificar su vida. 2) El objetivo es equiparla con herramientas para construir su proyecto de vida personal y social. 3) Incluye un análisis DOFA personal y metas a corto, mediano y largo plazo para lograr sus sueños de terminar sus estudios y tener un buen trabajo.
The document provides a list and descriptions of design projects by Katie Lovett including renovations of hotel suites and guestrooms as well as new luxury apartment and condominium buildings. Projects include the Hyatt Reston suite renovation, IL Lugano boutique hotel room renovation, Mariner Bay luxury apartment building, The Fitzgerald mid-rise apartment building, Arboretum Place high-rise apartment building, and the Palisades luxury high-rise apartment building. Schematic designs, renderings, and photos of completed projects are included.
Okos mastercard kártya - többet tud, mint gondolnád!Csaba Németh
Dombornyomott mastercard azoknak is, akik negatív adósbesorolás alá esnek. Nincs hitelvizsgálat, nem kell jövedelemigazolás. Pénzügyi inkognitó megőrzése, névtelen kártyahasználat.
Los niños de una escuela en Fuentemilanos llevaron a cabo una visita turística por su pueblo para mostrarle los lugares más interesantes a sus nuevos profesores. Visitaron el Parque de las Ruedas, la Fuente Perdigones donde aprendieron sobre el origen del nombre del pueblo, la iglesia con diferentes estilos artísticos, casas floridas y El Caño donde aprendieron sobre la técnica del esgrafiado, antes de terminar en la plaza donde pasaron un rato jugando.
Este documento presenta la oferta formativa de EOI Escuela de Organización Industrial para el año 2012-2013. En menos de 3 oraciones, resume lo siguiente:
EOI es una escuela de negocios pionera en España con más de 50 años de experiencia formando directivos. La escuela ofrece una amplia gama de programas de postgrado, formación ejecutiva, programas en línea y formación in company. El documento detalla la oferta formativa de EOI en diferentes áreas como gestión, medio ambiente y energía.
“micasa.dyndns.org”
Para ello se utilizan servicios de DNS dinámico como:
- DynDNS (dyndns.org)
- No-IP (no-ip.com)
Estos servicios actualizan automáticamente el registro DNS cuando la IP cambia.
DNS 32
Esta empresa ganadera busca invertir en tecnología para la ganadería como la inseminación artificial y maquinaria para reducir costos. Su objetivo es proveer un buen producto al mercado nacional que contribuya positivamente a la agricultura. Fue constituida legalmente en 1999 por nueve socios y su sede principal se encuentra en Huacho, Lima.
Este boletín electrónico del Programa Institucional de Tutorías de la Universidad Autónoma de Yucatán presenta información sobre el Módulo de Trayectoria y Tutoría en el Sistema de Información y Control Escolar Institucional, noticias sobre eventos relacionados con la tutoría, información sobre becas para estudiantes, una experiencia como tutora, y temas varios relacionados con la tutoría.
Commerciale avec un "E" - Infographie de SalezeoSalezeo
A contre courant de nombreux préjugés, une illustration de la montée en puissance des femmes dans les fonctions de vente et de commerce en France.
entreprise.sealezeo.com
The document provides guidance on installing and deploying IBM's Tivoli IT Asset Management portfolio of products. It discusses Tivoli Asset Management for IT, Tivoli License Compliance Manager, and Tivoli License Compliance Manager for z/OS. The document guides readers through planning, installing middleware, installing the core products, configuring components, collecting data, and generating reports. The goal is to help organizations effectively manage their IT assets and software licenses.
This document provides an overview of asset management processes using IBM's Tivoli Asset Management for IT. It discusses reviewing asset management life cycles and processes, and applying Tivoli Asset Management for IT to manage the asset life cycle from acquisition to retirement. The document contains practical examples of implementing asset management processes using Tivoli's applications for discovery, reconciliation, and tracking assets through their life cycles.
This document provides an overview of asset management processes using IBM's Tivoli Asset Management for IT software. It discusses reviewing asset management life cycles and processes, and how to apply Tivoli Asset Management for IT to implement those processes. The document contains practical examples and discusses topics like the initial data load process, defining asset management roles and entities, and how to procure software. It is intended to help IT organizations learn how to implement effective asset management.
This document provides an overview of asset management processes using IBM's Tivoli Asset Management for IT. It discusses reviewing asset management life cycles and processes, and applying Tivoli Asset Management for IT to manage the asset life cycle from acquisition to retirement. The document contains practical examples of implementing asset management processes using Tivoli's applications for discovery, reconciliation, and tracking assets through their life cycles.
This document provides instructions for installing and configuring IBM TotalStorage Productivity Center V2.3. It discusses the Productivity Center software suite and key concepts underpinning its architecture. The document also covers planning considerations for installation, such as prerequisites, security setup, and testing. Detailed steps are provided for installing the base Productivity Center components and optional modules.
This document provides an overview of IBM Service Management products and how they can be used together to implement end-to-end IT service management. It discusses IBM Tivoli products for change, configuration, release and asset management. It also explores topology considerations for deploying the products and provides examples of integrating them for incident and problem management, release management, and with an external service desk. The goal is to learn best practices for using IBM's service management portfolio.
This document provides an overview of the IBM Tivoli Asset Management for IT portfolio. It discusses the challenges of IT asset management and introduces the concepts of software asset management and the new ISO/IEC 19770-1 software asset management standard. It then describes the architecture and components of the Tivoli Asset Management for IT solution, including the Tivoli License Compliance Manager, Tivoli License Compliance Manager for z/OS, and Tivoli Asset Compliance Center products. The remainder of the document discusses these products in more detail and explains their capabilities for software inventory, license tracking, and reporting.
This document discusses managing a Service Oriented Architecture (SOA) environment using Tivoli products. It describes SOA concepts and components as well as SOA governance. It then discusses various Tivoli products for managing different aspects of an SOA environment, including ITCAM for SOA, ITCAM for WebSphere, ITCAM for Response Time Tracking, and OMEGAMON XE for Messaging. It covers basic SOA and web services management tasks such as monitoring, debugging performance issues, and understanding calling patterns. It also discusses more advanced topics such as mediation management using an Enterprise Service Bus, maintaining web service continuity, service monitoring automation, and using a managed message logger.
This document provides an overview and introduction to IBM Tivoli Business Service Manager V4.1. It discusses the key concepts of business service management and the architecture of Tivoli Business Service Manager. The document also covers installation, migration considerations, working with the Discovery Library toolkit, and operational aspects of Tivoli Business Service Manager V4.1.
This document provides guidance for IBM Tivoli Netcool/OMNIbus V7.2 certification. It discusses the certification program and test objectives, and provides an overview of the installation, configuration, and customization processes for Netcool/OMNIbus. Key topics covered include planning the Netcool/OMNIbus architecture and components, installing and configuring various elements like the ObjectServer and gateways, and setting up security through roles, groups and users. The document aims to prepare readers for the certification exam by explaining the essential tasks and concepts relating to a Netcool/OMNIbus implementation.
This document provides an overview and instructions for installing and configuring IBM Tivoli OMEGAMON XE for monitoring WebSphere Business Integration middleware. It discusses the OMEGAMON distributed architecture and describes how to install the Candle Management Server, OMEGAMON DE agents, and configure WebSphere MQ monitoring. The document also provides examples of using the OMEGAMON configuration tools to define WebSphere MQ resources, schedule actions, and view monitoring data.
This document provides an overview and instructions for installing and using IBM Tivoli OMEGAMON XE for WebSphere Business Integration V1.1. It discusses monitoring WebSphere MQ, WebSphere Message Broker, and WebSphere Interchange Server. The document covers installing the OMEGAMON infrastructure including the Candle Management Server and agents. It also provides examples of configuring and monitoring WebSphere MQ resources and troubleshooting scenarios.
This document is a deployment guide for IBM Tivoli Monitoring V6.2. It provides best practices for installing and configuring the product. It discusses the IT environment requirements and hardware/software prerequisites. It also includes sample deployment scenarios and steps for upgrading from previous versions. The guide is intended to help customers successfully plan and implement IBM Tivoli Monitoring.
This document is a deployment guide for IBM Tivoli Monitoring V6.2. It provides best practices for installing and configuring the product's components, including the monitoring server, portal server, monitoring agents, and Tivoli Data Warehouse. It also covers upgrading from previous versions, agent deployment methods, database requirements, and sample deployment scenarios.
This document is a certification guide for IBM Tivoli Provisioning Manager Express for Software Distribution V4.1. It provides an overview of IBM's professional certification program and the certification objectives for Tivoli Provisioning Manager Express V4.1. The guide also covers recommended resources for study, including courses and publications. Additionally, it details best practices for planning, installing, configuring, and administering Tivoli Provisioning Manager Express for Software Distribution V4.1.
This document provides a deployment guide for IBM Tivoli Compliance Insight Manager. It begins with an overview of the product architecture and components, including the Tivoli Compliance Insight Manager cluster, Enterprise Server, Standard Server, actuators, Management Console, iView Web portal, databases, and component architecture. It then discusses the product processes of collection, mapping and loading, data aggregation and consolidation, and reporting and presentation. The document also covers planning for customer engagement, including services engagement preparation, solution scope and components, and defining solution tasks. Finally, it provides an example customer environment of Gym and Health Incorporation to illustrate a potential deployment design.
This document provides a deployment guide for IBM Tivoli Compliance Insight Manager. It begins with an overview of the product architecture and components, including the Tivoli Compliance Insight Manager cluster, Enterprise Server, Standard Server, actuators, Management Console, iView Web portal, databases, and component architecture. It then discusses the product processes of collection, mapping and loading, data aggregation and consolidation, and reporting and presentation. The document also provides guidance on planning for customer engagement, including defining solution tasks and scope. It includes a case study of implementing the solution for a fictional company called Gym and Health Incorporation.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center (TPC) version 3.1. Key points include:
- TPC is a storage management software that allows users to monitor and manage storage devices from multiple vendors through a single interface.
- New features in v3.1 include support for additional devices and improved reporting capabilities.
- TPC uses open standards like SNMP, SLP, CIM and WBEM to collect data from storage systems and present it to users.
- The document provides installation planning guidance covering hardware requirements, port configurations, security considerations and supported storage platforms.
- Detailed installation instructions are included for Windows 2003, covering
This document provides a step-by-step guide for deploying IBM Tivoli Configuration Manager (TCM). It discusses TCM components, required expertise for installation, planning considerations, and provides examples of installing TCM in small/medium and large enterprises. The guide includes details on installing TCM servers, databases, desktop clients, and configuring components. It also addresses backup strategies and connecting multiple TCM regions.
This document provides a step-by-step guide for deploying IBM Tivoli Configuration Manager. It discusses best practices for installation planning, including required expertise, deployment considerations, and backup strategies. It also provides two case studies detailing example installations of Tivoli Configuration Manager in a small/medium enterprise and a large enterprise.
Similar to End to-end e-business transaction management made easy sg246080 (20)
This document provides the table of contents and introduction for the PostgreSQL 15.1 documentation. It describes that PostgreSQL is an open-source object-relational database system that uses and extends the SQL language combined with many features that safely store and scale the most complicated data workloads. The documentation is copyrighted by the PostgreSQL Global Development Group and provides instructions for how to report bugs and get further information.
This document provides the table of contents and introduction for the PostgreSQL 14.6 documentation. It describes that PostgreSQL is an open-source object-relational database system that uses and extends the SQL language combined with many features that safely store and scale the most complicated data workloads. The documentation is copyrighted by the PostgreSQL Global Development Group and provides instructions for how to report bugs and get further information.
This document provides instructions for a lab exercise on getting started with IBM MobileFirst Platform. It introduces the key concepts of MobileFirst Platform Studio and walks through steps to import a sample banking application project, examine the project structure, add an Android environment, and preview the application in the Mobile Browser Simulator and an Android device. It also demonstrates how to invoke adapters and use the MobileFirst Platform Console and Operational Analytics. The lab aims to familiarize users with the MobileFirst Platform development tools and features.
The IBM MobileFirst Platform provides mobile application development tools and services. It allows developers to integrate backend data, continuously improve apps based on user feedback, and deliver personalized experiences. The platform provides modular services for contextualizing apps, securing data, and gaining insights from usage data. It supports both hybrid and native mobile application development.
IBM MobileFirst Foundation provides tools for developing hybrid, native, and mobile web applications using standards-based technologies. This proof of technology session will demonstrate how to use IBM MobileFirst Foundation to accelerate mobile app development, provide management of deployed apps, and utilize capabilities like in-app notifications, operational analytics, and sentiment analysis. The agenda includes presentations and hands-on labs covering app development, backend integration, app lifecycle management, quality assurance, and the MobileFirst architecture. The session is intended for IT professionals interested in a mobile application platform and will be offered free of charge with breakfast provided.
The document describes adding a mobile coupons ("My Offers") feature to the IBMBank mobile application. It involves using the MobileFirst Platform Service Discovery wizard to generate an adapter for a SOAP web service, adding HTML/JS to display offer data from the service, and implementing local storage of selected offers using the JSON Store database. Key steps include discovering and testing the SOAP service, importing JS files, initializing JSON Store, modifying the app code to retrieve and save offers, and previewing the updated app.
This document provides instructions for a lab exercise on getting started with IBM MobileFirst Platform. It introduces the key concepts of MobileFirst Platform Studio and walks through steps to import a sample banking application project, examine the project structure, add an Android environment, and preview the application in the Mobile Browser Simulator and an Android device. It also demonstrates how to invoke backend services using adapters and view analytics data from the MobileFirst Operations Console. The document contains detailed steps, screenshots and explanations to help users learn fundamental MobileFirst Platform development tasks.
This document describes a lab exercise to demonstrate application management functions in IBM MobileFirst using the MobileFirst Operations Console. The lab will:
1. Deploy an initial version of an IBMBank mobile application to a MobileFirst Server.
2. Publish an updated version of the application to fix a bug, and test the "Direct Update" feature which pushes changes to client devices.
3. Configure application status notifications via the MobileFirst Operations Console and see them displayed on an Android emulator.
This document provides an overview of IBM MobileFirst Platform's operational analytics features. It describes how the analytics platform collects and analyzes data from mobile applications, servers, and devices to provide visibility into performance and usage. The analytics console contains various views and capabilities for searching logs, viewing charts and reports, and diagnosing issues. It summarizes the different data sources, events captured, and the client and server APIs used to log additional analytics data. The document then outlines the steps to access the analytics console and walk through its key pages and functionality.
This document provides instructions for using the MobileFirst Quality Assurance tool on Bluemix to perform sentiment analysis. It first gives a brief overview of MobileFirst Quality Assurance and its capabilities. It then outlines the steps to set up a Mobile Quality Assurance service instance on Bluemix and link it to an iOS app. Finally, it describes how to view the sentiment analysis results in production, including overall sentiment scores, attribute dashboards, comparison to other apps, and attribute trend statistics.
The document describes an exercise using IBM Mobile Quality Assurance (MQA) to test a mobile banking application and report bugs. Students will launch an Android emulator containing the instrumented app. They can test the app functionality and use MQA's in-app notification to report bugs found, such as a misspelled button label. MQA will capture screenshots which students can annotate to describe the issue. All bug reports are uploaded to MQA and viewed by instructors in Bluemix to share with the class. The goal is to introduce MQA's capabilities for mobile app testing and feedback.
This document provides an overview of firewalls and demilitarized zones (DMZs), and summarizes Tivoli Framework solutions for communicating across firewalls in a secure manner. It describes how Tivoli Framework 3.7.1 introduced single port bulk data transfer and endpoint upcall port consolidation to reduce open ports. The Firewall Solutions Toolbox further improves security with endpoint and gateway proxies, relays to cross multiple DMZs adhering to no direct routing, and supporting unidirectional communications. It also describes the event sink for collecting events from non-Tivoli sources.
This document provides an overview of planning and implementing Tivoli Data Warehouse Version 1.3. It discusses the key components of Tivoli Data Warehouse including the control center server, source databases, central data warehouse, data marts, warehouse agents, and Crystal Enterprise server. It also covers planning considerations such as hardware and software requirements, physical and logical design choices, database sizing, security, network traffic, and skills required. The document is intended as a guide for implementing and managing a Tivoli Data Warehouse.
This document provides an overview and guide for using Business Objects reporting tools with Tivoli Data Warehouse 1.2. It covers Business Objects products and platform, installing Business Objects desktop components, configuring Business Objects for Tivoli Data Warehouse, creating reports, advanced reporting and security features, and deploying reports. The document contains examples and step-by-step instructions for setting up Business Objects and generating simple to advanced reports on Tivoli Data Warehouse data.
This document provides an overview of implementing the Tivoli Enterprise Console (TEC). It discusses planning requirements such as the management software, managed devices, event sources, and rule policies. It then covers installing the required relational database management system (RDBMS), either Oracle or Sybase. Finally, it describes setting up the Tivoli Management Framework, installing the TEC software, configuring distributed monitoring and scripts, and deploying event adapters.
This document provides an overview and comparison of IBM tape library solutions for backing up IBM xSeries servers. It discusses factors to consider when selecting a tape library such as capacity, number of drives, and scalability. It also provides configuration details for backing up to tape libraries using Tivoli Storage Manager, VERITAS Backup Exec, and CA ARCserve. Recovery procedures using the backup software and Tivoli Disaster Recovery Manager are also covered.
This document provides a release guide for IBM Tivoli Storage Productivity Center Version 4.2. It includes information on the new features and functions of Tivoli Storage Productivity Center V4.2, an overview of the product architecture and family, and instructions for installing Tivoli Storage Productivity Center on Windows and Linux systems. The document covers preinstallation steps, installing prerequisite software like DB2, and installing the Tivoli Storage Productivity Center servers, graphical user interface (GUI), and command line interface (CLI).
This document discusses data synchronization features in IBM Tivoli Directory Integrator 6.1, including delta detection, delta tagging, and delta application. Delta detection discovers changes in a data source and retrieves only the modified data. Delta tagging stores change information in the retrieved data using operation codes. Delta application then uses these tags to efficiently propagate only necessary changes to target systems.
This document discusses strategies for migrating and consolidating storage using IBM TotalStorage products. It describes migrating a storage volume from one SAN to another using IBM SAN Volume Controller without interrupting access. It also outlines two methods for migrating data between tape technologies using IBM Tivoli Storage Manager: migrating individual nodes or migrating entire storage pools to a new tape technology.
This document provides guidance on deploying IBM Tivoli Composite Application Manager for WebSphere (ITCAM for WebSphere). It includes sample code, installation instructions, and assistance with scope development for a services engagement with ITCAM for WebSphere. The document covers planning the engagement, demonstrating the key capabilities of ITCAM for WebSphere through a sample implementation, and implementing the full ITCAM for WebSphere solution. It also discusses complementary solutions that can be bundled with an ITCAM for WebSphere engagement.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
22. Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
AIX® Lotus® Tivoli Enterprise™
CICS® Notes® Tivoli Enterprise Console®
Database 2™ PureCoverage® Tivoli Management
DB2® Purify® Environment®
™ Quantify® Tivoli®
IBM® Rational® TME®
ibm.com® Redbooks™ WebSphere®
IMS™ Redbooks (logo) ™
The following terms are trademarks of other companies:
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun
Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, and service names may be trademarks or service marks of others.
xx End-to-End e-business Transaction Management Made Easy
24. Chapter 2, “IBM Tivoli Monitoring for Transaction Performance in brief” on
page 37
Chapter 3, “IBM TMTP architecture” on page 55
Part 2, “Installation and deployment” on page 83 is targeted towards persons that
are interested in implementing issues regarding IBM Tivoli Monitoring for
Transaction Performance. In this section, we will describe best practices for
installing and deploying the Web Transaction Performance components of IBM
Tivoli Monitoring for Transaction Performance Version 5.2, and we provide
information on how to ensure the operation of the tool. This section includes:
Chapter 4, “TMTP WTP Version 5.2 installation and deployment” on page 85
Chapter 5, “Interfaces to other management tools” on page 153
Chapter 6, “Keeping the transaction monitoring environment fit” on page 177
Part 3, “Using TMTP to measure transaction performance” on page 209 is aimed
at the audience that will use IBM Tivoli Monitoring for Transaction Performance
functions on a daily basis. Here, we provide detailed information and best
practices on how to configure monitoring policies and deploy monitors to gather
transaction performance data. We also provide extensive information on how to
create meaningful reports from the data gathered by IBM Tivoli Monitoring for
Transaction Performance. This part includes:
Chapter 7, “Real-time reporting” on page 211
Chapter 8, “Measuring e-business transaction response times” on page 225
Chapter 9, “Rational Robot and GenWin” on page 325
Chapter 10, “Historical reporting” on page 375
It is our hope that this redbook will help you enhance your e-business
management solutions to benefit your organization and better support future
Web based initiatives.
The team that wrote this redbook
This redbook was produced by a team of specialists from around the world
working at the International Technical Support Organization, Austin Center.
Morten Moeller is an IBM Certified IT Specialist working as a Project Leader at
the International Technical Support Organization, Austin Center. He applies his
extensive field experience as an IBM Certified IT Specialist to his work at the
ITSO where he writes extensively on all areas of Systems Management. Before
joining the ITSO, Morten worked in the Professional Services Organization of
IBM Denmark as a Distributed Systems Management Specialist, where he was
xxii End-to-End e-business Transaction Management Made Easy
25. involved in numerous projects designing and implementing systems
management solutions for major customers of IBM Denmark.
Sanver Ceylan is an Associate Project Leader at the International Technical
Support Organization, Austin Center. Before working with the ITSO, Sanver
worked in the Software Organization of IBM Turkey as an Advisory IT Specialist,
where he was involved in numerous pre-sales projects for major customers of
IBM Turkey. Sanver holds a Bachelors degree in Engineering Physics and a
Masters degree in Computer Science.
Mahfujur Bhuiyan is a Systems Specialist and Certified Tivoli Enterprise™
Consultant at TeliaSonea IT-Service, Sweden. Mahfujur has over eight years of
experience in Information Technology with a focus on systems and network
management and distributed environment, and was involved in several projects
in designing and implementing Tivoli environments for TeliaSonena’s external
and internal customers. He holds a Bachelors degree in Mechanical Engineering
and a Masters degree in Environmental Engineering from the Royal Institute of
Technology (KTH), Sweden.
Valerio Graziani is a Staff Engineer at the IBM Tivoli Laboratory in Italy with nine
years of experience in software development and verification. He currently leads
the System Verification Test on IBM Tivoli Monitoring. He has been an IBM
employee since 1999 after working as an independent consultant for large
software companies since 1994. He has three years of experience in the
application performance measurement field. His areas of expertise include test
automation, performance and availability monitoring, and systems management.
Scott Henley is an IBM System Engineer based in Australia who performs pre
and post-sales support for IBM Tivoli products. Scott has almost 15 years of
Information Technology experience with a focus on Systems Management
utilizing IBM Tivoli products. He holds a Bachelors degree in Information
Technology from Australia’s Charles Stuart University and is due to complete his
Masters in Information Technology in 2004. Scott holds product certifications for
many of IBM Tivoli PACO and Security products, as well as MCSE status since
1997 and the RHCE status since 2000.
Zoltan Veress is an independent System Management Consultant working for
IBM Global Services, France. He has eight years of experience in the field. His
major areas of expertise include software distribution, inventory, remote control,
and he also has experience with almost all Tivoli Framework-based products.
Thanks to the following people for their contributions to this project:
The Editing Team
International Technical Support Organization, Austin Center
Preface xxiii
26. Fergus Stewart, Randy Scott, Cheryl Thrailkill, Phil Buckellew, David Hobbs
Tivoli Product Management
Russ Blaisdell, Oliver Hsu, Jose Nativio, Steven Stites, Bret Patterson, Mike
Kiser, Nduwuisi Emuchay
Tivoli Development
J.J. Garcia, Greg K Havens II, Tina Lamacchia
Tivoli SWAT Team
Become a published author
Join us for a two- to six-week residency program! Help write an IBM Redbook
dealing with specific products or solutions, while getting hands-on experience
with leading-edge technologies. You'll team with IBM technical professionals,
Business Partners and/or customers.
Your efforts will help increase product acceptance and customer satisfaction. As
a bonus, you'll develop a network of contacts in IBM development labs, and
increase your productivity and marketability.
Find out more about the residency program, browse the residency index, and
apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our Redbooks™ to be as helpful as possible. Send us your comments
about this or other Redbooks in one of the following ways:
Use the online Contact us review redbook form found at:
ibm.com/redbooks
Send your comments in an Internet note to:
redbook@us.ibm.com
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. JN9B Building 003 Internal Zip 2834
11400 Burnet Road
Austin, Texas 78758-3493
xxiv End-to-End e-business Transaction Management Made Easy
28. The following main topics are included:
Chapter 1, “Transaction management imperatives” on page 3
Chapter 2, “IBM Tivoli Monitoring for Transaction Performance in brief” on
page 37
Chapter 3, “IBM TMTP architecture” on page 55
2 End-to-End e-business Transaction Management Made Easy
30. 1.1 e-business transactions
In the Web world, users perceive interacting with an organization or a business
through a Web-based interface as a single, continuous interaction or session
between the user’s machine and the systems of the other party, and that is how it
should be. However, the interaction is most likely made up of a large number of
individual, interrelated transactions, each one providing its own specific part of
the complex set of functions that implement an e-business transaction, perhaps
running on systems owned by other organizations or legal entities.
Figure 1-1 shows a typical Web-based transaction, the resources used to
facilitate the transaction, and the typical components of a transaction breakdown.
user experienced time
transaction time
user sub transaction I sub transaction II sub transaction III
time time time time
network
time
invoking
system
transaction backend time
providing
system
sub transaction
service
provider
service
provider
browser Web Server Application Database
Server Server
Figure 1-1 Transaction breakdown
In the context of this book, we will differentiate between different types of
transactions depending on the location of the machine from which the transaction
is initiated:
Web transaction Originate from the Internet, thus we have no
predetermined knowledge about the user, the system,
and the location of the transaction originator.
4 End-to-End e-business Transaction Management Made Easy
31. Enterprise transaction Initiated from well-known systems, most of which are
under our control, and knowledge of the available
resources exists. Typically, the systems initiating these
types of transactions are managed by our Tivoli
Management Environment.
Application transaction Subtransactions that are initiated by the
application-provisioning Web transactions to the end
users. Application transactions are typically, but not
always, also enterprise transactions, but also may
initiate from third-party application servers.
A typical application transaction is a database lookup
performed from a Web application server, in response
to a Web transaction initiated by an end user.
From a management point of view these transaction types should be treated
similarly. Responsiveness from the Web application servers to any requester is
equally important, and it should not make a difference if the transaction has been
initiated from a Web user, an internal user, or a third-party application server.
However, business priorities may influence the level of service or importance
given to individual requestors.
However, it is important to note that monitoring transaction performance does not
in any way obviate the need to perform the more traditional systems
management disciplines, such as capacity, availability, and performance
management. Since the Web applications are comprised of several resources,
each hosted by a server, these individual server resources must be managed to
ensure that they provide the services required by the applications.
With the myriad servers (and exponentially more individual resources and
components) involved in an average-sized Web application system,
management of all of these resources is more an art than a science. We begin by
providing a short description of the challenges of e-business provisioning in order
to identify the management needs and issues related to provisioning e-business
applications.
1.2 J2EE applications management
Application management is one of the fastest growing areas of infrastructure
management. This is a consequence of the focus on user productivity and
confirms the fact that more and more we are moving away from device-centric
management. Within this segment today, J2EE platform management is only a
fairly small component. However, it is easy to foresee that J2EE is one of the
Chapter 1. Transaction management imperatives 5
32. next big things in application architecture, and because of this, we may well see
this area converted into a bigger slice of the pie, and eventually envision much of
the application management segment being dedicated to J2EE.
Because J2EE based applications cover multiple internal and external
components, they are more closely tied to the actual business process than other
types of application integration schemes used before. The direct consequence of
this link between business process and application is that management of these
application platforms must provide value in several dimensions, each targeted to
a specific constituency within the enterprise, such as:
The enterprise groups interested in the different phases of a business
process and in its successful completion
The application groups with an interest in the quality of the different logical
components of the global application
The IT operations group providing infrastructure service assurance and
interested in monitoring and maintaining the services through the application
and its supporting infrastructure
People looking for a J2EE management solution must make sure that any
product they select does, along with other enterprise-specific requirements,
provide the data suited to these multiple reporting needs.
Application management represents around 24% of the infrastructure
performance management market. But the new application architecture enabled
by J2EE goes beyond application management. The introduction of this new
application architecture has the potential not only to impact the application
management market, but also, directly or indirectly, to disrupt the whole
infrastructure performance market by forcing a change in the way enterprises
implement infrastructure management. The role of J2EE application
architectures goes beyond a simple alternative to traditional transactional
application. It has the potential to link applications and services residing on
multiple platforms, external or internal, in a static or dynamic, loosely coupled
relationship that models a business process much more closely than any other
application did. It is also a non-device platform, yet it is an infrastructure
component with the usual attributes of a hard component in terms of
configuration and administration. But its performance is also related and very
dependent on the resources of supporting components, such as servers,
networks, and databases. The consequences of this profound modification in
application architecture will ripple, over time, into the way the supporting
infrastructure is managed.
The majority of today’s infrastructure management implementations are confined
to devices monitored in real time for fault and performance from a central
enterprise console.
6 End-to-End e-business Transaction Management Made Easy
33. In this context, application management is based on a traditional agent-server
relationship, collecting data mostly from the outside, with little insight into the
application internals. For example:
Standard applications may provide specific parameters (usually resource
consumption) to a custom agent.
Custom applications are mostly managed from the outside by looking at their
resource consumption.
In-depth analysis of application performance using this approach is not a
real-time activity, and the most common way to manage real-time availability and
performance (response time) of applications is to use external active agents.
Service-level management, capacity planning, and performance management
are aimed at the devices and remain mostly “stove-piped” activities, essentially
due to the inability of the solutions used to automatically model the infrastructure
supporting an application or a business process.
This proved to be a problem already in client/server implementations, where
applications spanned multiple infrastructure components. This problem is
magnified in J2EE implementations.
1.2.1 The impact of J2EE on infrastructure management
J2EE architecture brings important changes to the way an application is
supported by the underlying infrastructure. In the distributed environment, a
direct relationship is often believed to exist between the hardware resources and
the application performance. Consequently, managing the hardware resources
by type (network, servers, and storage) is often thought to be sufficient.
J2EE infrastructure does not provide this one-to-one relation between application
and hardware resource. The parameters driving the box performances may
reflect the resource usage of the Java™ Virtual Machine (JVM), but they cannot
be associated directly with the performance of the application, which may be
driven either by its own configuration parameters within the JVM, or by the
impact of external component performances.
The immediate consequence on infrastructure management is that a specific
monitoring tool has to be included in the infrastructure management solution to
care for the specificities of the J2EE application server, and that the application
has to be considered as a service spanning multiple components (a typical J2EE
application architecture is described in 3.6, “Putting it all together” on page 80),
where the determination of a problem’s origin requires some intelligence based
on predefined rules or correlation. This requires expertise in the way the
Chapter 1. Transaction management imperatives 7
34. application is designed and the ability to include this expertise in the problem
resolution process.
Another set of problems is posed by the ability to federate multiple applications
from the J2EE platform using Enterprise Application Integration (EAI) to connect
to existing applications, the generation of complementary transactions with
external systems, or the inclusion of Web Services. This capability brings the
application closer to the business process than before since multiple steps, or
phases, of the process, which were performed by separate applications, are now
integrated. The use of discrete steps in a business process allowed for a manual
check on their completion, a control that is no longer available in the integrated
environment and must be replaced by data coming from infrastructure
management. This has consequences not only on where the data should be
captured, but also on the nature of the data itself. Finally, the complexity of the
application created by assembling diverse components makes quality assurance
(QA) a task that is both more important than ever and almost impossible to
complete with the degree of certainty that was available in other applications.
Duplicating the production environment in a test environment becomes difficult.
To be more effective, operations should participate in QA to bring infrastructure
expertise into the process and should also be prepared to use QA as a resource
during operations to test limited changes or component evolution.
The infrastructure management solution adapted to the new application
architecture must include a real-time monitoring component that provides a
“service assurance” capability. It must extend its data capture to all components,
including J2EE and connectors, to other resources, such as EAI, and be able to
collect additional parameters beyond availability and performance. Content
verification and security are some of the possible parameters, but “transaction
availability” is another type of alert that becomes relevant in this context close to
the business process.
Root-cause analysis, which identifies the origin of a problem in real time, must be
able to pinpoint problems within the transaction flow, including the J2EE
application server and the external components of the application.
An analytical component, to help analyze problems within and without the
application server, is necessary to complement the more traditional tools aimed
at analyzing infrastructure resources.
1.2.2 Importance of JMX
In the management of J2EE platforms, the JMX model has emerged as an
important step in finding an adaptable management model.
8 End-to-End e-business Transaction Management Made Easy
35. The Java Management Extensions (JMX) technology represents a universal,
open technology for management and monitoring that can be deployed wherever
management and monitoring are needed. JMX is designed to be suitable for
adapting legacy systems, implementing new management and monitoring
solutions, and plugging into future monitoring systems.
JMX allows centralized management of managed beans, or MBeans, which act
as wrappers for applications, components, or resources in a distributed network.
This functionality is provided by a MBean server, which serves as a registry for all
MBeans, exposing interfaces for manipulating them. In addition, JMX contains
the m-let service, which allows dynamic loading of MBeans over the network. In
the JMX architectural model, the MBean server becomes the spine of the server
where all server components plug in and discover other MBeans via the MBean
server notification mechanism.
The MBean server itself is extremely lightweight. Thus, even some of the most
fundamental pieces of the server infrastructure are modeled as MBeans and
plugged into the MBean server core, for example, protocol adapters.
Implemented as MBeans, they are capable of receiving requests across the
network from clients operating in different network protocols, like SNMP and
WBEM, enabling JMX-based servers to be managed with tools written in any
programming language. The result is an extremely modular server architecture,
and a server easily managed and configured remotely using a number of
different types of tools.
Impact on IT organizations
The addition of tools requires adequate training in their use. But the types of
problems that these tools are going to uncover also require skills and
organizational groups with IT operations. For example:
The capability to handle more event types in the operation center. Transaction
availability events and performance events are typical of the new applications.
This requires that the operation center understand the impact of these events
and the immediate action required to maintain the service in a service
assurance-oriented, rather than “network and system management”-oriented,
environment.
The capability to handle and analyze application problems, or what appears
to be application problems. This requires that the competency groups in
charge of finding permanent “fixes” understand the application architecture
and are able to address the problems.
A stronger cooperation between QA and operations to make sure that the
testing phase is a true preparation of the deployment phase, and that
recurring tests are made following changes and fixes. Periodic tests to
validate performance and capacity parameters are also good practice.
Chapter 1. Transaction management imperatives 9
36. While service assurance and real-time root-cause analysis are attractive
propositions, the J2EE management market is not yet fully mature. Combined
with the current economic climate, this means that a number of the solutions
available today may disappear or be consolidated within stronger competitors
tomorrow. Beyond a selection based on pure technology and functional merits,
clients should consider the long-term viability of the vendor before making a
decision that will have such an impact on their infrastructure management
strategies.
J2EE application architectures have, and will continue to have, a strong impact
on managing the enterprise infrastructure. As the future application model is
based on a notion of service rather than a suite of discrete applications, the
future model of infrastructure management will be based on service assurance
rather than event management. An expanded set of parameters and a close
integration within a real-time operational model offering root-cause analysis is
necessary.
Recommendations
The introduction of J2EE application servers in the enterprise infrastructure is
having a profound impact on the way this infrastructure is managed. Potential
availability, performance, quality, and security problems will be magnified by the
capabilities of the application technology, with consequences in the way
problems are identified, reported, and corrected. As J2EE technologies become
mainstream, the existing infrastructure management processes, which are
focused today mostly on availability and performance, will have to evolve toward
service assurance and business systems management. Organizations should
look at the following before selecting a tool for transaction monitoring:
1. The product selected for the management of the J2EE application server
meets the following requirements:
a. Provides a real-time (service assurance) and an in-depth analysis
component, preferably with a root-cause analysis and corrective action
mechanism.
b. Integrates with the existing infrastructure products, downstream
(enterprise console and help desk) and upstream (reuse of agents).
c. Provides customized reporting for the different constituencies (business,
development, and operations).
2. The IT operation organization is changed (to reflect the added complexity of
the new application infrastructure) to:
a. Handle more event types in the operation center. Transaction availability
events and performance events are typical of the new applications as well
as events related to configuration and code problems.
10 End-to-End e-business Transaction Management Made Easy
37. b. Create additional competency groups within IT operation, with the ability to
receive and analyze application-related problems in cooperation with the
development groups.
c. Improve the communication and cooperation between competency silos
within IT operations, since many problems are going to involve multiple
hardware and software platforms.
d. Establish or improve the cooperation between QA and operations to make
sure that the testing phase is a true preparation of the deployment phase,
and that many integration and performance problems are tackled
beforehand.
1.3 e-business applications: complex layers of services
A modern e-business solution is much more complex than the standard terminal
processing-oriented systems of the 1970s and 1980s, as illustrated in Figure 1-2
on page 12. However, despite major revisions, especially during the turn of the
last century, legacy systems are still the bread-and-butter of many enterprises,
and the e-business solutions in these environments are designed to front-end
these mainframe-oriented application complexes.
Chapter 1. Transaction management imperatives 11