If you’re using SAN in your Power Systems environment without taking advantage of FlashCopy, we have one question for you: Why not?
FlashCopy takes a quick snapshot of your data at a particular point in time, then POOF! Your data is available for backup or use on another partition for high availability, disaster recovery, or even to create a test environment for your developers.
Join IBM i expert Chuck Stupca, IBM emeritus, as he explains how FlashCopy works and how best to take advantage of its unique features. We’ll also discuss ways that it helps you build a better backup strategy for your IBM i environment:
• Making a backup copy of production for tape-based saves
• Providing test environments from your production data in seconds
• Comparing FlashCopy to a save-while-active backup
IBM DS8880 and IBM Z - Integrated by DesignStefan Lein
This Presentation shows the strength of the IBM DS8880 Enterprise Storage Platform with special emphasis on the System Z integration capabilities. December 2017
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfMarna Walle
This presentation shows how to position z/OS in preparing for the new IBM z16 server. This presentation contains the "must know" information to successfully IPL z/OS on IBM z16.
TCP/IP Stack Configuration with Configuration Assistant for IBM z/OS CSzOSCommserver
An overview of using the IBM Configuration Assistant for z/OS Communications Server, a z/OSMF plug-in, to configure the Communications Server TCP/IP stack. Includes updates on new functions for importing existing configuration and generating OBEY files for dynamic configuration modification, which have shipped or are shipping in new function PTFs since the General Availability of V2R2.
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Florence Dubois
With the explosion of data volumes today, businesses are looking for ways to copy huge volumes of data very quickly – from seconds to minutes – with minimal disruption to the running of applications. In this presentation, you will hear about practical use cases for IBM FlashCopy technology in a Db2 for z/OS environment including non-disruptive data integrity checks, FlashCopy image copies allowing for instant restore, SHRLEVEL(CHANGE) consistent image copy backups, system-level backup and recovery. We will provide many hints and tips on how to set up your environment, share lessons learned from customer experience and address common pitfalls.
IBM DS8880 and IBM Z - Integrated by DesignStefan Lein
This Presentation shows the strength of the IBM DS8880 Enterprise Storage Platform with special emphasis on the System Z integration capabilities. December 2017
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfMarna Walle
This presentation shows how to position z/OS in preparing for the new IBM z16 server. This presentation contains the "must know" information to successfully IPL z/OS on IBM z16.
TCP/IP Stack Configuration with Configuration Assistant for IBM z/OS CSzOSCommserver
An overview of using the IBM Configuration Assistant for z/OS Communications Server, a z/OSMF plug-in, to configure the Communications Server TCP/IP stack. Includes updates on new functions for importing existing configuration and generating OBEY files for dynamic configuration modification, which have shipped or are shipping in new function PTFs since the General Availability of V2R2.
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Florence Dubois
With the explosion of data volumes today, businesses are looking for ways to copy huge volumes of data very quickly – from seconds to minutes – with minimal disruption to the running of applications. In this presentation, you will hear about practical use cases for IBM FlashCopy technology in a Db2 for z/OS environment including non-disruptive data integrity checks, FlashCopy image copies allowing for instant restore, SHRLEVEL(CHANGE) consistent image copy backups, system-level backup and recovery. We will provide many hints and tips on how to set up your environment, share lessons learned from customer experience and address common pitfalls.
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
Back in 2017, we introduced you to a new capability called z/OS Encryption Readiness Technology (zERT). zERT provides z/OS network security administrators the data they need to understand and assess the quality of the cryptographic protection being applied to their z/OS network traffic. This session will cover new zERT features that have been added, including the zERT Network Analyzer (a z/OSMF plugin), a healthy list of IBM and ISV products that consume zERT SMF data, some new configuration options, and a few hints and tips.
Z4R: Intro to Storage and DFSMS for z/OSTony Pearson
This session covers basic storage concepts for z/OS operating system with examples for Flash, Disk and Tape devices and how to use DFSMS policy-based management. Presented at IBM TechU in Johannesburg, South Africa September 2019
Learning from ZFS to Scale Storage on and under Containersinside-BigData.com
Evan Powell presented this deck at the MSST 2107 Mass Storage Conference.
"What is so new about the container environment that a new class of storage software is emerging to address these use cases? And can container orchestration systems themselves be part of the solution? As is often the case in storage, metadata matters here. We are implementing in the open source OpenEBS.io some approaches that are in some regards inspired by ZFS to enable much more efficient scale out block storage for containers that itself is containerized. The goal is to enable storage to be treated in many regards as just another application while, of course, also providing storage services to stateful applications in the environment."
Watch the video: http://wp.me/p3RLHQ-gPs
Learn more: blog.openebs.io
and
http://storageconference.us
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
A Parallel Sysplex is a cluster of IBM mainframes acting together as a single system image with z/OS that cooperate, using certain hardware and software products, to process work. Used for disaster recovery, Parallel Sysplex combines data sharing and parallel computing to allow a cluster of up to 32 mainframes to share a workload for high performance and high availability.Parallel Sysplex is analogous in concept to a UNIX cluster – allow the customer to operate multiple copies of the operating system as a single system. This allows systems to be added or removed as needed, while applications continue to run.
Geographically Dispersed Parallel Sysplex (GDPS) is an end to end application availability solution. It is the ultimate disaster recovery and continuous availability solution for a multi-site enterprise. GDPS disk replication technology enhances the resiliency and provides continues availability of data by masking disk outages.
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
The need to perform a DB2 log-based recovery of multiple objects is a very rare event, but statistically, it is more frequent than a true disaster recovery event (flood, fire, etc). Taking regular backups is necessary but far from sufficient for anything beyond minor application recovery. If not prepared, practiced and optimised, it can lead to extended application service downtimes – possibly many hours to several days. This presentation will provide many hints and tips on how to plan, design intelligently, stress test and optimise DB2 log-based recovery.
IBM released the A9000/R on April 27th 2016. This new platform further enhances the IBM FlashSystems portfolio and gives IBM storage customers even more choices to build even greater solutions!
FlashCopy makes it possible to create, nearly instantaneously, point-in-time copies of entire logical volumes or data sets. This opens up a whole new world of possibilities, and DB2 for z/OS utilities have started to make more and more use of FlashCopy technology. This presentation will introduce the copy options supported by FlashCopy and show how DB2 for z/OS can exploit them. It will provide hints and tips on how to set up your environment. It will also address common pitfalls, including all the gotchas of combining FlashCopy and Remote Copy Services: Metro Mirror (PPRC), z/OS Global Mirror (XRC), Global Copy and Global Mirror.
Are you relatively new to the communications area and want a better understanding of the Communications Server component of z/OS? Have you heard of TCP/IP, SNA, VTAM, APPN, OSA, etc. but wondered what relationship these things have to Communications Server? If so, this presentation is for you!
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
Back in 2017, we introduced you to a new capability called z/OS Encryption Readiness Technology (zERT). zERT provides z/OS network security administrators the data they need to understand and assess the quality of the cryptographic protection being applied to their z/OS network traffic. This session will cover new zERT features that have been added, including the zERT Network Analyzer (a z/OSMF plugin), a healthy list of IBM and ISV products that consume zERT SMF data, some new configuration options, and a few hints and tips.
Z4R: Intro to Storage and DFSMS for z/OSTony Pearson
This session covers basic storage concepts for z/OS operating system with examples for Flash, Disk and Tape devices and how to use DFSMS policy-based management. Presented at IBM TechU in Johannesburg, South Africa September 2019
Learning from ZFS to Scale Storage on and under Containersinside-BigData.com
Evan Powell presented this deck at the MSST 2107 Mass Storage Conference.
"What is so new about the container environment that a new class of storage software is emerging to address these use cases? And can container orchestration systems themselves be part of the solution? As is often the case in storage, metadata matters here. We are implementing in the open source OpenEBS.io some approaches that are in some regards inspired by ZFS to enable much more efficient scale out block storage for containers that itself is containerized. The goal is to enable storage to be treated in many regards as just another application while, of course, also providing storage services to stateful applications in the environment."
Watch the video: http://wp.me/p3RLHQ-gPs
Learn more: blog.openebs.io
and
http://storageconference.us
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
A Parallel Sysplex is a cluster of IBM mainframes acting together as a single system image with z/OS that cooperate, using certain hardware and software products, to process work. Used for disaster recovery, Parallel Sysplex combines data sharing and parallel computing to allow a cluster of up to 32 mainframes to share a workload for high performance and high availability.Parallel Sysplex is analogous in concept to a UNIX cluster – allow the customer to operate multiple copies of the operating system as a single system. This allows systems to be added or removed as needed, while applications continue to run.
Geographically Dispersed Parallel Sysplex (GDPS) is an end to end application availability solution. It is the ultimate disaster recovery and continuous availability solution for a multi-site enterprise. GDPS disk replication technology enhances the resiliency and provides continues availability of data by masking disk outages.
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
The need to perform a DB2 log-based recovery of multiple objects is a very rare event, but statistically, it is more frequent than a true disaster recovery event (flood, fire, etc). Taking regular backups is necessary but far from sufficient for anything beyond minor application recovery. If not prepared, practiced and optimised, it can lead to extended application service downtimes – possibly many hours to several days. This presentation will provide many hints and tips on how to plan, design intelligently, stress test and optimise DB2 log-based recovery.
IBM released the A9000/R on April 27th 2016. This new platform further enhances the IBM FlashSystems portfolio and gives IBM storage customers even more choices to build even greater solutions!
FlashCopy makes it possible to create, nearly instantaneously, point-in-time copies of entire logical volumes or data sets. This opens up a whole new world of possibilities, and DB2 for z/OS utilities have started to make more and more use of FlashCopy technology. This presentation will introduce the copy options supported by FlashCopy and show how DB2 for z/OS can exploit them. It will provide hints and tips on how to set up your environment. It will also address common pitfalls, including all the gotchas of combining FlashCopy and Remote Copy Services: Metro Mirror (PPRC), z/OS Global Mirror (XRC), Global Copy and Global Mirror.
Are you relatively new to the communications area and want a better understanding of the Communications Server component of z/OS? Have you heard of TCP/IP, SNA, VTAM, APPN, OSA, etc. but wondered what relationship these things have to Communications Server? If so, this presentation is for you!
Meet the IBM Storwize family and discover IBM Smarter Storage for small and medium businesses and its advantages: efficient by design, self optimizing, cloud agile. Start smart and grow easily with IBM Smarter Storage and meet its high performance like a midrange disk system.
The Coughlin Group has the homeowners insurance is conveniently located to serve homeowners from Hollywood to Malibu and beyond. Visit : http://www.coughlingroup.com
Personal watercrafts (PWC) are regulated by the same laws that apply to the operation of motorboats of the same size, which is why it’s a good idea to protect yourself financially with proper watercraft insurance.
I presented a whirlwind tour of the most common benchmark tools used to measure parallel file system performance and reviewed case studies of how these have been used in the procurement of NERSC's large file systems at the 2022 Lustre User Group.
The most important part of a modern PostFX pipeline is picking the right color model to support. This way the whole PostFX pipeline can use 32-bit render targets and at the same time have increased color representation and luminance representation.
CBlocks - Posix compliant files systems for HDFSDataWorks Summit
With YARN running Docker containers, it is possible to run applications that are not HDFS aware inside these containers. It is hard to customize these applications since most of them assume a Posix file system with rewrite capabilities. In this talk, we will dive into how we created a block storage, how it is being tested internally and the storage containers which makes it all possible.
The storage container framework was developed as part of Ozone (HDFS-7240). This is talk will also explore the current state of Ozone along with CBlocks. This talk will explore architecture of storage containers, how replication is handled, scaling to millions of volumes and I/O performance optimizations.
El Estado de la Seguridad de IBM i en 2020HelpSystems
Durante 17 años, el Estudio de Seguridad de IBM i ha proporcionado información útil acerca de cómo organizaciones en todo el mundo protegen sus sistemas Power (IBM i, AS/400, iSeries, etc.). En este webinar grabado presentamos en exclusiva los resultados del estudio y analizamos qué se espera del futuro de la Seguridad de esta plataforma. Además, damos tips útiles para identificar y priorizar las vulnerabilidades y errores más frecuentes, para evitar una filtración de datos.
Vea este webinar grabado y obtenga información sobre:
Comandos y controles de acceso a la red
Controles de Seguridad a nivel de servidor
Usuarios que pueden acceder a su información privilegiada
Perfiles y Seguridad de contraseñas
Protección anti-virus y malware
Estrategias para auditorías de sistema
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...HelpSystems
Los ciberataques ya no solo ponen en riesgo una estación de trabajo. Desde smartphones hasta un equipo de resonancia magnética, hoy en día cualquier dispositivo que se conecta a Internet, es factible de ser hackeado.
Pero a diferencia de una estación de trabajo, o incluso servidores de red, muchos de estos dispositivos no tienen instalados firewalls o antivirus para protegerlos ante un ataque. Aún más desconcertante es el hecho de que muchos tipos de malware pueden infectarlos sin dar ninguna señal de su presencia o del daño que están causando.
Lamentablemente, la situación en torno al COVID-19 y la necesidad de muchos empleados en todo el mundo de trabajar en forma remota, ha llevado a un aumento en los ataques de hackers, a mayores vulnerabilidades y a un crecimiento exponencial en la actividad de los equipos de Seguridad. Por lo tanto, es un momento crítico para que las empresas revisen y actualicen su postura de Seguridad.
En este escenario, surge una pregunta clave ¿cómo identificar un dispositivo comprometido antes de que sea demasiado tarde?
Vea este webinar grabado para conocer a fondo cómo funciona una solución de detección activa de amenazas (active threat detection), por qué encuentra amenazas que otros software pasan por alto y cómo hace para verificar las infecciones con certeza.
¿Quiere ver Network Insight en acción? Solicite una demo: https://www.helpsystems.com/es/cta/demostracion-vivo-core-security
Con todas las consultas enviadas por los usuarios, las aplicaciones externas y los trabajos por lotes que impactan constantemente en su servidor IBM i, ¿cómo es posible detectar trabajos abusivos de CPU y problemas de rendimiento?
En este webinar grabado le mostramos cómo las funcionalidades de monitoreo en tiempo real, notificaciones inteligentes y control proactivo de trabajos que ofrece Robot Monitor pueden ayudarlo a detectar y resolver problemas que afecten a la performance de su IBM i.
Se tratará de una demostración real de cómo Robot Monitor le permite:
Configurar el monitoreo para solicitudes de bases de datos: QZDASOINIT, QRWTSRVR, etc.
Obtener visibilidad de las sentencias SQL que están ralentizando su sistema
Controlar los trabajos por lotes de larga duración y otros problemas que atentan contra el rendimiento de IBM i
Configurar notificaciones para trabajos que consumen demasiada CPU
Generar reportes sobre el rendimiento histórico de trabajos y subsistemas
Bajar la prioridad de ejecución para trabajos abusivos o detenerlos automáticamente
Fuerza de trabajo digital, software robots, bots, robotics… Seguramente haya escuchado hablar mucho de conceptos como estos, que hacen referencia a la Automatización Robótica de Procesos o RPA.
RPA puede ayudarlo a eliminar operaciones manuales, reducir costos, evitar errores de ejecución y más. ¿Pero qué es exactamente y por qué es tan popular?
Vea este webinar y en solo 45 minutos conozca:
Qué es RPA y su relación con BPM, BPO y WLA
Distintos tipos de automatización
Usos frecuentes de RPA en cada industria
Cómo calcular el ROI de su proyecto de automatización
Todavía muchas empresas intercambian información con clientes, socios u otras sedes, mediante scripts o programas desarrollados a medida. Y lo hacen a pesar del trabajo que les demanda su mantenimiento y de no cumplir con los estándares de Seguridad actuales. La tecnología de Managed File Transfer le permite asegurar, centralizar y auditar el envío y recepción de archivos, con una solución corporativa escalable, fácil de administrar y más segura.
Vea la grabación de nuestro webinar, en el que un experto en Ciberseguridad le explica por qué la transferencia de archivos mediante scripts puede convertirse en una amenaza para su empresa.
Además, le presentará una nueva tecnología corporativa que permite asegurar, centralizar y auditar el envío y recepción de archivos, con una solución escalable y fácil de administrar.
Solicite una demostración en vivo de GoAnywhere MFT: https://www.helpsystems.com/es/cta/solicite-una-demostracion-en-vivo-de-goanywhere-mft
Tras muchos años de llevar adelante procesos de Automatización, hemos ayudado a muchos departamentos de IT a hacer más eficientes sus propios procesos. En este webinar, presentamos los casos más frecuentes de procesos de IT que se pueden automatizar utilizando diferentes tecnologías, así como también ejemplos reales de proyectos innovadores de automatización.
Conozca los tipos de proyectos que están llevando a cabo sus colegas de IT, cómo lo hacen y qué softwares utilizan.
Vea este webinar en el que un experto en Automatización le explicará:
Diferencias y usos de distintas tecnologías de automatización: RPA, scheduling, MFT, scripts y más.
Ideas de automatización de procesos de IT: generación de reportes, procesos nocturnos, resolución automática de incidencias, chequeos manuales de operación y muchos más!
Ejemplos de proyectos reales de equipos de IT en todo el mundo.
Consejos a tener en cuenta para que un proyecto de automatización sea exitoso.
La plataforma IBM i cuenta con más de 30 años en el mercado. Sin embargo, existe muy poca información de calidad sobre su actualidad y tendencias.
Por eso, el Estudio de Mercado de IBM i de HelpSystems, que cumple su 6° aniversario, es una de las fuentes más consultadas y valoradas por la comunidad IBM i. Surge de la encuesta a más de 500 a usuarios en todo el mundo acerca de su uso y prioridades para el próximo año.
En este webinar se presentamos los resultados del estudio 2020 y contamos con la participación especial y la opinión de Hernando Bedoya, experto de IBM y una de las personas de habla hispana que más sabe IBM i en el mundo.
Algunos de los temas a tratar en la sesión son:
Cuáles son las tendencias de uso de IBM i en la nube?
¿Cuáles son las preocupaciones en materia de Seguridad y Alta Disponibilidad/Data Recovery?
¿Qué planes tienen los usuarios para plataforma?
¿Cuál es el ROI de IBM i en comparación con otros servidores?
Muchas empresas todavía transfieren archivos e información sensible a través de FTPs, emails o complejos scripts. Estos métodos ya no son seguros ni le permiten alcanzar fácilmente el cumplimiento de normativas como GDPR o PCI DSS.
En solo 45 minutos conozca cómo la tecnología de Managed File Transfer (MFT) o Transferencia Segura de Archivos le permite automatizar, encriptar y auditar todo el envío y recepción de archivos de su empresa, en forma centralizada y muy fácilmente.
Conozca GoAnywhere MFT: https://www.helpsystems.com/es/cta/solicite-una-demostracion-en-vivo-de-goanywhere-mft
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPAHelpSystems
Para Zurich Argentina el alta de denuncias y la actualización de precios y vigencias de pólizas son procesos críticos de su Negocio. Con el aumento en la complejidad de los procesos, realizar estas tareas en forma manual demanda tiempo y recursos.
La empresa encontró en la tecnología RPA la solución para automatizar una fuerza laboral de 10 personas, procesar más de 37.000 pólizas y denuncias más rápidamente, y evitar errores manuales.
Vea este webinar grabado, en el que Diego Martínez, Responsable de Estrategia y Arquitectura IT de Zurich Argentina, y Gustavo Petrucelli, Responsable de Desarrollo RPA de Zurich Argentina, cuentan cómo llevaron adelante el proyecto, qué beneficios obtuvieron y cómo fue la experiencia de comenzar a identificar y gestionar las necesidades de automatización en toda la empresa.
Centro de Excelencia en Automatización 3HelpSystems
Compañías de distintos tamaños e industrias están creando Centros de Excelencia para extender los beneficios de la Automatización Robótica de Procesos (RPA) en toda su organización. Contar con una estrategia centralizada les permite descubrir oportunidades de automatización, reducir costos y tener mejores resultados que con un proyecto aislado de automatización.
En la última sesión de nuestro curso práctico “Cómo crear su Centro de Excelencia de Automatización”compartimos casos reales de compañías que tomaron esta iniciativa. Mostramos qué proyectos implementaron, qué dificultades enfrentaron, cuáles son los aprendizajes de sus experiencias y qué resultados puede usted esperar para su compañía.
Cómo crear un Centro de Excelencia de Automatización 2HelpSystems
Ya sea que su empresa esté dando los primeros pasos o ya cuente con un proyecto avanzado de Automatización Robótica de Procesos (RPA), debe saber que los beneficios que obtendrá serán tan potentes como sus bases tecnológicas. Tomar las decisiones correctas respecto a la infraestructura y sistemas, le permitirá garantizar la escalabilidad de su proyecto RPA y evitar problemas futuros.
En la segunda sesión de nuestro curso práctico “Cómo crear su Centro de Excelencia de Automatización”, compartimos las mejores prácticas y estrategias para que su automatización sea de nivel empresarial.Vea este webinar y recibe consejos sobre qué infraestructura y procesos implementar, cómo configurar bots que pueda reutilizar, cómo priorizar entre distintos proyectos a automatizar y más técnicas para que pueda explotar el máximo potencial de RPA.
Comience a transformar su empresa hoy mismo, descargue una prueba gratuita de Automate: https://www.helpsystems.com/es/cta/prueba-gratuita-automate-desktop
Construyendo un Centro de Excelencia de Automatización PARTE 1HelpSystems
Muchas empresas están evolucionando hacia la transformación digital y la implementación de Automatización Robótica de Procesos (RPA) para ser más escalables, flexibles y eficientes. Pero el factor humano continúa siendo el elemento clave para que esa transformación sea exitosa.
Reunir un equipo multidisciplinario de profesionales para integrar un Centro de Excelencia (COE) de Automatización, e implementar los procesos y mejores prácticas, son las claves para extender los beneficios de la automatización a toda su empresa.
No se pierda la primera sesión de nuestro curso práctico “Cómo crear su Centro de Excelencia de Automatización”. En solo 3 sesiones, obtendrá ideas, herramientas y casos reales de otras empresas, que le ayudarán a crear con éxito su Centro de Excelencia y potenciar al máximo la Automatización Robótica de Procesos en su compañía.
Inicie una prueba gratuita de Automate: https://www.helpsystems.com/es/cta/prueba-gratuita-automate-plus
¿Cómo monitorea su IT? ¿Tiene muchas soluciones dispersas? ¿Poca visibilidad integral? ¿Controles técnicos que no se relacionan con el Negocio? ¿Muchos scripts, software open source o herramientas complejas, poco ágiles o costosas de mantener? Si siente identificado, ¡no se puede perder este webinar grabado!
En este sesión le presentamos Vityl IT & Business Monitoring, un enfoque de monitoreo mucho más ágil y orientado a Negocio. Vea todas las funcionalidades del producto, incluyendo:
Dashboards para visibilidad en tiempo real sobre la disponibilidad y rendimiento de los servicios, aplicaciones, infraestructura y sus componentes.
Información clara sobre errores, riesgos y tendencias en capacidad, para evitar problemas e implementar una mejora continua.
Plantillas out-of-the-box para monitorear prácticamente todas las tecnologías del mercado: servidores, dispositivos, aplicaciones de bases de datos, etc.
Reportes de SLAs de los servicios y aplicaciones.
Vea este webinar grabado para conocer en a fondo todas las nuevas funcionalidades y novedades de la versión Vityl IT & Business Monitoring 6.3.
1 año de RGPD: 3 formas en las que HelpSystems puede ayudarHelpSystems
HelpSystems sigue ayudando a compañías en Europa a cumplir con el reglamento en tres áreas principales: intercambio seguro y cifrado de archivos, automatización de las peticiones de acceso y modificación de los datos personales en cualquier aplicación y más controles específicos de cumplimiento de todos los elementos de la infraestructura. Si su empresa todavía necesita mejorar algún aspecto de la normativa, en HelpSystems estamos para ayudarle.
Vea este webinar en el que explicamos el tipo de proyectos que estamos llevando adelante con clientes para el cumplimiento de RGPD, el portfolio de HelpSystems para cumplir con la normativa y tips a tener en cuenta para mejorar la Seguridad de su compañía.
Muchas empresas todavía transfieren archivos e información sensible a través de FTPs, emails o complejos scripts. Estos métodos ya no son seguros ni le permiten alcanzar fácilmente el cumplimiento de normativas como GDPR o PCI DSS.
En solo 45 minutos conozca cómo la tecnología de Managed File Transfer (MFT) o Transferencia Segura de Archivos le permite automatizar, encriptar y auditar todo el envío y recepción de archivos de su empresa, en forma centralizada y muy fácilmente.
Conozca GoAnywhere MFT: https://www.helpsystems.com/es/cta/solicite-una-demostracion-en-vivo-de-goanywhere-mft
Automate es la solución de automatización robótica de procesos de HelpSystems, que le da la flexibilidad de automatizar desde tareas simples, hasta procesos complejos de IT… muy fácilmente.
¿No nos cree? Vea usted mismo lo fácil que es empezar con Automate.
Vea la grabación de este webinar en el que recorrimos el producto y mostramos cómo crear, desde cero, algunos de los casos de automatización más frecuentes: Microsoft Excel, email, interacción con aplicaciones, sitios web y bases de datos, y más.
Además, podrá obtener recomendaciones a tener en cuenta si está considerando empezar un proyecto de Automatización Robótica de Procesos (RPA) en su empresa.
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...HelpSystems
Tras muchos años de llevar adelante procesos de Automatización, hemos ayudado a muchos departamentos de IT a hacer más eficientes sus propios procesos. En este webinar, presentamos los casos más frecuentes de procesos de IT que se pueden automatizar utilizando diferentes tecnologías, así como también ejemplos reales de proyectos innovadores de automatización.
Conozca los tipos de proyectos que están llevando a cabo sus colegas de IT, cómo lo hacen y qué softwares utilizan.
Vea este webinar en el que un experto en Automatización le explicará:
Diferencias y usos de distintas tecnologías de automatización: RPA, scheduling, MFT, scripts y más.
Ideas de automatización de procesos de IT: generación de reportes, procesos nocturnos, resolución automática de incidencias, chequeos manuales de operación y muchos más!
Ejemplos de proyectos reales de equipos de IT en todo el mundo.
Consejos a tener en cuenta para que un proyecto de automatización sea exitoso.
5 problemas del intercambio de archivos mediante scriptsHelpSystems
Todavía muchas empresas intercambian información con clientes, socios u otras sedes, mediante scripts o programas desarrollados a medida. Y lo hacen a pesar del trabajo que les demanda su mantenimiento y de no cumplir con los estándares de Seguridad actuales. La tecnología de Managed File Transfer le permite asegurar, centralizar y auditar el envío y recepción de archivos, con una solución corporativa escalable, fácil de administrar y más segura.
Vea la grabación de nuestro webinar, en el que un experto en Ciberseguridad le explica por qué la transferencia de archivos mediante scripts puede convertirse en una amenaza para su empresa.
Además, le presentará una nueva tecnología corporativa que permite asegurar, centralizar y auditar el envío y recepción de archivos, con una solución escalable y fácil de administrar.
https://www.helpsystems.com/es/cta/solicite-una-demostracion-en-vivo-de-goanywhere-mft
Grupo Banco San Juan, logró automatizar la obtención y envío de información crítica de Negocio a su Data Center Corporativo, donde se realizan procesos de BI para la orquestación de campañas comerciales. Conozca por qué GoAnywhere MFT se convirtió en un socio estratégico para alcanzar el éxito. Además se presentan otros casos de éxito reales de aplicación de GoAnywhere MFT en diferentes industrias.
Todavía muchos profesionales de IT creen el mito de que la Seguridad de los servidores Power Systems (IBM i, AS/400, iSeries) es imbatible. La realidad es que son vulnerables si no se configuran de forma adecuada.
Vea la grabación de nuestro webinar en el que presentamos el Security Scan, la herramienta gratuita que le permite diagnosticar el estado de la Seguridad de su IBM i e identificar qué aspectos de la configuración debe reforzar.
Durante la sesión realizamos un recorrido por las principales áreas: perfiles de usuario, permisos especiales, exit points, valores de sistema, reglas de red, antivirus y más.
Además, podrá conocer vulnerabilidades frecuentes que se desconocen, pero que son fáciles de evitar, y recibir consejos prácticos que puede implementar usted mismo para mejorar su Seguridad.
Solicite aquí su Security Scan Gratuito: https://www.helpsystems.com/es/cta/se...
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. FlashCopy for IBM i
Broadcasting live from Eden Prairie, Minnesota
Chuck Losinski
Director of Automation Technology
Robot
Chuck Stupca
IBM i Expert
IBM (retired)
3. Agenda
• FlashCopy Defined
• How FlashCopy Works
• FlashCopy Options
• FlashCopy Space Efficiencies
• Automation Opportunities
4. What is FlashCopy?
• A function that occurs within a SAN storage device
• Provides a point-in-time copy of the contents of disk volumes
• Can be a full system or an IASP
• Many options for the copy process available
• Differences between V7000 and DS8000
5. Save While Active
Before starting a discussion of FlashCopy, let’s review a more familiar
point-in-time copy: Save While Active
1.When a Save While Active is started, a sync point is reached before
the save operation starts (this may take some time)
2.The objects to be saved are marked for processing by the save
3.Users may begin to use the objects being saved
4.If an object is changed, before it has been saved, the original
information is moved to a shadow area
5.When the save operation reaches the changed information,
the original information is saved from the shadow area
6. FlashCopy Basics
• A FlashCopy takes place within a single storage unit—you cannot flash
from one storage device to another
• FlashCopy is a physical copy of the disk unit—the storage unit has no
concept of objects
• Logical saves (SAVOBJ, SAVLIB, etc.) can be taken from the FlashCopy units
• There are many different options when you take a DS8000 FlashCopy
• A system or IASP may be quiesced in order to reach a sync point
(usually a matter of seconds)—highly recommended
• Two basic forms of FlashCopy
– FlashCopy with copy
– FlashCopy no copy
7. FlashCopy with Copy
The contents of all disk units in the FlashCopy operation are copied
from source volumes to target volumes.
Source Volumes
Target Volumes
8. FlashCopy with Copy
Force all changes from main storage to the source volumes and issue the
FlashCopy command. A bitmap with all zeroes is generated by the DS.
Source Volumes
Bitmap
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
Target Volumes
9. FlashCopy with Copy
Each track is copied from the source volumes to the target volumes. As the
tracks are copied, the corresponding bit in the mask is changed from 0 to 1.
Source Volumes
Bitmap
1111111111
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
Target Volumes
10. FlashCopy with Copy
Since both the source and target volumes are available for use, the bitmap directs
users of the target volumes to the location of the information being used:
•
•
1 = use the target volume
0 = use the source volume
Source Volumes
Bitmap
1111111111
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
Target Volumes
11. FlashCopy with Copy
Since the source volumes are in use, what happens when a track that
hasn’t been copied is changed in the source volumes?
Source Volumes
Bitmap
1111111111
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
Target Volumes
12. FlashCopy with Copy
Before the change is written to the source volume, the original track
is copied to the target volume and the corresponding bit is set to 1.
Source Volumes
Bitmap
1111111111
0000000000
0000000000
0000000000
0000100000
0000000000
0000000000
0000000000
0000000000
Target Volumes
13. FlashCopy with Copy
Since the bit of the changed track is set to 1, the users of the target volumes
know that the correct data is in the target—kind of like Save While Active
knowing to use the shadow area.
Source Volumes
Bitmap
1111111111
0000000000
0000000000
0000000000
0000100000
0000000000
0000000000
0000000000
0000000000
Target Volumes
14. FlashCopy with Copy
Eventually, all tracks are copied from the source to the target. At this point, the
default FlashCopy operation is complete and the bitmap is removed. There is
no longer a relationship between the source and target volumes.
Source Volumes
Bitmap
1111111111
1111111111
1111111111
1111111111
1111111111
1111111111
1111111111
1111111111
Target Volumes
15. FlashCopy with Copy
Now you have a full copy of the original source volumes to use!
Source Volumes
Target Volumes
16. FlashCopy with Copy
What happens when a track that hasn’t been copied is changed in the
target? The change is written to the target volume and the bit is set to 1.
The track will not be copied from the source to the target.
Source Volumes
Bitmap
1111111111
0000000000
0000000000
0000000000
0000100000
0000000000
0000000000
0000000000
0000000000
Target Volumes
17. FlashCopy no Copy
Only the contents of changed tracks on disk units in the FlashCopy
operation are copied from source volumes to target volumes.
Source Volumes
Target Volumes
18. FlashCopy no Copy
Force all changes from main storage to the source volumes and issue the
FlashCopy command. A bitmap with all zeroes is generated by the DS.
Source Volumes
Bitmap
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
Target Volumes
19. FlashCopy no Copy
No background copy of source tracks to target tracks is performed.
Source Volumes
Bitmap
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
Target Volumes
20. FlashCopy no Copy
When a track in the source volumes is being changed, the track is copied
to the source, and the corresponding bit is set to 1.
Source Volumes
Bitmap
0000000000
0000000000
0000000000
0000000000
0001000000
0000000000
0000000000
0000000000
0000000000
Target Volumes
21. FlashCopy no Copy
Only the original contents of changed tracks are moved to the targets.
Source Volumes
Bitmap
0000000000
0010000000
0000000010
0000000000
0001000000
0000000000
0000000000
0000100000
0000000000
Target Volumes
22. FlashCopy no Copy
Changes to the target system cause the copy bit to be set to 1. This will
prevent a change to the source from overwriting the target change with
original data.
Source Volumes
Bitmap
0000000000
0010000000
0000000010
0000000000
0001000000
0000000000
0000000001
0000100000
0000000000
Target Volumes
23. FlashCopy no Copy
• The relationship between the source and target remains in place until
all source tracks have been changed (highly unlikely).
• Usually the flash copy relationship is explicitly removed when the user
has finished using the targets.
• This form of FlashCopy is typically used to save objects on a partition
that is different from the production partition.
• Since few of the tracks are likely to change during the save operation,
there may be contention for access to the source volumes—usually the
interference is not noticeable.
24. FlashCopy V7000
• Source and target volumes are specified using a mapping operation
• Target volumes must be identical in size to the source volumes
• Multiple volumes may be placed in a consistency group
– Similar to a DS FlashCopy of multiple volumes
– Provides a point-in-time copy for all volumes in the consistency group
• Rather than copying tracks, V7000 copies “grains”
– User specifies the size of a grain
– May be 64K – 256K
– Default is 256K
• FlashCopy on V7000 is with copy
25. Other DS8000 FlashCopy Options
• Persist: keep a FlashCopy relationship in place
• Record: keep track of changes made since the last point in time copy
– Often used in conjunction with the persist option
• Target inhibit: prevent writing to the target volumes
– Do not use with IBM i
26. Using Persist and Record
• Most often used to update target volumes copied using
FlashCopy with copy
• At the completion of the full copy from source to target,
the bitmap between source and target is retained
• Because record is also specified, a second bitmap is used to
record the changes on the source volumes and target volumes
• At the next instance for FlashCopy, a variation called
Resync flash is used
27. Resync Flash
• Changes to tracks in both sets of volumes are recorded in the bitmap
• Remember that our original flash was a point-in-time flash of the
source volumes
Source Volumes
Bitmap
0010000000
0010000000
0000000010
0000000100
0001000000
0000000001
0000000000
0000100000
1000000000
Target Volumes
28. Resync Flash
In order to restore the changed tracks in the target to the values in the original
FlashCopy, the changes will be “backed out” using the unchanged pages in
the source.
Source Volumes
Bitmap
0010000000
0010000000
0000000010
0000000100
0001000000
0000000001
0000000000
0000100000
1000000000
Target Volumes
29. Resync Flash
• Full copy of source volumes must be completed
• When a resync flash is issued, a second bitmap of all zeroes
is created
• Changes that occur while the resync flash is taking place are
recorded in the second bitmap
– Changes to a track in a source volume will cause the original track
to be written to the target
– Changes to a track in a target volume are more complicated
30. Resync Flash—Changes to Target Volumes
Condition 1 – the track is not scheduled to be copied during the resync flash
•The change is made to the target volume and the corresponding bit in the change recording
bitmap for the next resync is set to 1.
•The track will not be copied from the source volume to the target volume.
Condition 2 – the track is scheduled for resync and has already been copied from the source
•The track on the target is changed.
•The corresponding bit in the change recording bitmap for the next resync is set to 1.
Condition 3 – the track is scheduled for resync but has not yet been copied from the source
•The track on the target is changed and the corresponding bit in the change recording bitmap
for the next resync is set to 1.
•The track will not be copied from the source volume to the target volume.
31. Why Use FlashCopy
• Clone an IASP or system using FlashCopy with copy
• Use the target volumes for save operations
– IPL the full system flash with special handling
• System name
• IP addresses
– Vary on a FlashCopy IASP
• In the event that the source volumes become mucked,
the target volumes provide a quick recovery to the point
in time of the FlashCopy
32. Saving Objects from a FlashCopy
• The save is taking place on a different system
• An IBM i has an operating system option for saving from a full system
– The production system will not have the date of last save changed
– IBM i will adjust the catalog to “spoof” a save from the production system
• Saving from an IASP attached to a different partition is much easier
– The save is still done on a different system/partition
– IBM i has an option to update the last saved information in the source IASP
• Lab Services Toolkit provides an automated process for both full
system and IASP FlashCopy
33. Space Efficient FlashCopy
• To this point, the target volumes in either a DS8000 or a V7000 have
been the same size as the source volumes (fully provisioned).
• Do we need fully provisioned targets?
– FlashCopy no copy will not copy everything
– Often times, target volumes have a short life span, e.g., they exist only until a
save operation is complete
• In a DS8000, we can use targets that are smaller than the source
volumes (thin provisioning).
34. Space Efficient FlashCopy
The DS8000 targets are configured differently.
Source Volumes
Space is allocated for the target volumes.
Allocated space is a percentage of the space for the source volumes.
Choose a percentage that will not overflow during the save operation.
35. Space Efficient FlashCopy
The DS8000 targets are configured differently.
Source Volumes
Target Volumes
“Virtual” target volumes are defined
to be the same size as the source
volumes.
There is a mapping between the
tracks of the target volumes and the
actual disk space used for the
FlashCopy.
36. Space Efficient FlashCopy
The DS8000 targets are configured differently.
Source Volumes
Target Volumes
A change to a track in the source
causes the original track to be
written to the allocated area.
The bitmap between source and
target indicates that the original
page is in the “virtual” target disk.
37. Space Efficient FlashCopy
The DS8000 targets are configured differently.
Source Volumes
Target Volumes
When a user of the target volumes
accesses the changed page, the
bitmap directs the read to the target
volume.
The changed track in the target
volume is mapped to original
information in the allocated area.
38. FlashCopy Summary
• Contained within a single storage unit
• A fast way to establish a point-in-time image of volumes
(disk units) in IBM i
• Copies are physical, not logical i.e., there is no way to restore
individual objects from a FlashCopy
• Can make full system or IASP copies
• Save operations can be performed on the target units
• Space efficient FlashCopy reduces storage requirements
39. Resources
• Redbooks
–
–
–
–
–
SG24-7938 Overview of the IBM Storwize V7000
SG24-8886 IBM System Storage DS8000: Architecture and Implementation
SG24-7120 IBM i and IBM System Storage
SG24-7103 IBM System Storage Copy Services and IBM i
SG24-6788 IBM System Storage DS8000 Copy Services for Open Systems
• IBM Education
– AS541 IBM PowerHA for IBM i, Clustering, and IASP Implementation (4 days)
– OS830 System Storage DS6000 and DS8000 on I (3 days)
• STG Lab Services
– IASP Copy Services Toolkit (2 versions)
– Full System FlashCopy Toolkit
40. Automation Opportunities
• Many of the Robot products can exploit this technology
–
–
–
–
–
Robot/SCHEDULE to automate the FlashCopy execution
Robot/SAVE to execute and track your backup to media
Robot/CONSOLE to monitor for FlashCopy messages
Robot/ALERT to notify you of any issues
Robot/SPACE to track disk usage statistics, notify of growth thresholds and
automate cleanup tasks
41. Automation Opportunities
Automated Job Scheduling
Message Management
- Improve uptime
- Eliminate errors
- Avoid overtime
- Save time with automated documentation
- Event-based scheduling more effective
- View only important messages
- Acknowledge important messages
- Single pane of glass view
- Maximize uptime
- Easy to locate cause of errors
Performance Management
Disaster Recovery
- Dynamic expert tuning
- Proactive disk saving
- Capture runaway jobs fast
- Managed impact of change
- Easy to show that SLAs have been met
- Automate save and restore
- Flexible tape management
- Reliable, unattended backups
- Powerful data security and audit
- Simplified disaster recovery planning
Robot systems management solutions save money
and help improve competitiveness.
42. Robot/SCHEDULE, Enterprise, and Replay
Event-Driven Job Scheduling for IBM i and Windows, Unix, Linux and Interactive Tasks
Event-driven scheduling | Flexibility to react to changing events
Schedule Activity Monitor | Powerful scheduling dashboard
Replay | Automates interactive green-screen tasks
Cross Partition Dependencies | Add Robot/NETWORK
Cross Platform Dependencies | Add Robot/SCHEDULE Enterprise
Sophisticated calendars | Adapt to any schedule or fiscal year
Dynamic parameters | Support unattended job submission
Good Morning Report | Keeps you posted on nightly activity
Job blueprints | Generate graphical views of job flow
Job Blueprint shows you job dependencies
between jobs, partitions and platforms!
Database | All data and schedules are stored on the IBM i
ROBOT/SCHEDULE
ROBOT/SCHEDULE
The world’s most advanced job scheduler for IBM i.
Robot Plug-In Modules:
Robot/SCHEDULE SAP Interface • Robot/SCHEDULE Oracle E1 Interface • Robot/REPLAY • Robot/NETWORK
43. Robot/CONSOLE and Robot/ALERT
System Message and Resource Management
Message management | Handle messages automatically
Message notification | Escalate only important messages
OPAL | Defines complex message processing
SNMP SMS SMTP 2-way | Add Robot/ALERT
Consolidated monitoring | Add Robot/NETWORK
Resource monitoring | Keep resources healthy
System log monitoring | Maintain security and compliance
Message history | Detailed historical message analysis
Good Morning Report | Keeps you posted on nightly activity
ROBOT/CONSOLE
ROBOT/CONSOLE
Powerful interface | Easy to use
Message set creation wizard | Easy to install
Automate message responses and resource monitoring
such as: CPU, subsystem, line, job queue, and output
queue. Escalate only the exceptions and reply
remotely.
Automated system monitoring. Don’t be tied to your screen.
Related Robot products: Robot/ALERT and Robot/NETWORK
44. Robot/SAVE
Disaster Recovery
Automated backup | Eliminate save errors
IFS groups | Easily manage IFS backups and restores
Data encryption | Secure mission critical data
Save media management | Error-free media handling
Data centre management | Multi-system/data centre support
Centralized scratch pool | Reuse media across multiple systems
Guided restoration | Improves Recovery Time Objective (RTO)
Object archive | Easy to restore prior versions of data/objects
Restricted State Utility | Safe, unattended system-level saves
Ad hoc operations | Management of media outside of DR
Move Sets help manage the location of save
media at all times.
Reports | Comprehensive DR documentation suitable for audit
ROBOT/SAVE
ROBOT/SAVE
It’s more than save and restore, it’s a whole DR solution.
Related Robot products: Robot/SCHEDULE • Robot/ALERT • Robot/NETWORK
45. Robot/SPACE
Proactive Storage Management
Critical Storage Investigator | Identify storage problem causes
Collection explorer | Graphical storage statistics and trends
Storage audits | Automated disk cleanup
ASP monitors | Monitor ASPs individually
Active job storage monitoring | Identify out of control jobs fast
Storage collections | Flexible, user-defined statistical groupings
Robot/QUERY | Flexible, user-defined storage analysis
Reports | Assist in monitoring storage space
ROBOT/SPACE
ROBOT/SPACE
Critical Storage Investigator (CSI) allows easy
identification of storage problems.
Save disk space. Predict future space requirements. Avoid critical storage conditions.
Related Robot products: Robot/SCHEDULE • Robot/ALERT • Robot/NETWORK
46. Questions?
PRESENTATION RECAP:
•
FlashCopy Defined
•
How FlashCopy Works
•
FlashCopy Options
–
With and without copy
–
Resync flash
–
Persist and record
–
Running saves
•
FlashCopy Space Efficiencies
•
Robot automation opportunities
47. Thank you for joining us today!
Contact Information
Telephone: 800-328-1000 sales
952-933-0609 support
Website:
www.helpsystems.com
Chuck Losinski
Director of Automation
Technology, Robot
Presenters: chuck.losinski@helpsystems.com | 952-563-2790
jcstupca@msn.com
Chuck Stupca
IBM i Expert
IBM (retired)
Editor's Notes
There will be a moment of silence while I start the recorder.
Things to do before the show.
1. Upload the presentation and lobby slides 15-20 minutes ahead of time.
2. Change rights for attendees to only chat with panelist
3. Change event options and get rid of Q&A
4. Auto Advance the lobby Slides
5. Do audio checks very so often, talk about new features, new products, weather, kid sporting events, the Twins, etc. Ice fishing.
There will be a moment of silence while I start the recording.