This document provides implementation and configuration notes for Backup Recovery and Media Services (BRMS) for Baker Distributing. It details housekeeping tasks, media management procedures, problem determination steps, backup control groups, policies, and recovery planning considerations. Key sections include guidelines for adding media to BRMS inventory, verifying the logical and physical media databases are synchronized, creating pick lists for loading and unloading the media library, and restoring individual IFS objects.
Belém 91-3299-0800 / contato@totalseg.com.br
Manaus 92-3622-8080 / contato.am@totalseg.com.br
www.totalseg.com.br
O Prisma SUPER FÁCIL é o novo relógio de ponto da Henry desenvolvido para atender as necessidades de pequenas e médias empresas. São quatro modelos, todos homologados pelo Ministério do Trabalho e Emprego, segundo normas da Portaria 1510/2009. Possui a tecnologia 8X e conta com muitos de seus recursos, dentre eles, o Web Server embarcado que dispensa a instalação de softwares de configuração. Com a opção de comunicação Serial, TCP/IP e USB via pen drive, a coleta de dados é rápida e fácil. Este equipamento permite cadastramento de até 15 mil colaboradores e sua memória armazena até oito milhões de registros, o que prolonga a vida útil. Sua bobina de 300 metros imprime até 8.500 comprovantes (tickets) e faz do Prisma SUPER FÁCIL econômico até em sua utilização.
Programa do Ensino Profissional Marítimo para Aquaviários PREPOM - 2014Falcão Brasil
O documento apresenta o programa do ensino profissional marítimo para aquaviários da Marinha do Brasil para o ano de 2014, incluindo alterações feitas em várias unidades da Marinha.
Mise en place d’une solution de tests de sécurité pour les passerelles réside...Salmen HITANA
Set up of a security test plan for residential gateways
Abstract: This work, done within the company "Sagemcom" is part of the project for obtaining Computer and Network Engineer Telecommunication National Graduation. The objective of this project is the establishment of a security testing solution for residential terminals. These terminals are the heart of any particular or professional network. Aware that the bridges are highly exposed to risks related to computer security, a test plan will cover possible scenarios and touch all functionality of the gateway (network access, WiFi, UPnP, VoIP, IHM). These tests will eventually be launched on a wide range of Sagemcom products to validate the proposed test environment.
Key Word: Gateway, Security, hacking, pentesting, vulnerability
- Réaliser un environnement virtuel en installant tous les serveurs et postes clients nécessaires
- Sécuriser le réseau en installant un pare-feu Pfsense et le mettre en épreuve par des testes d'intrusions
O documento descreve as características e funcionamento de um mosquetão calibre 7,62 mm, incluindo suas partes principais, mecanismos de segurança e repetição, operações de manejo e desmontagem.
This document provides guidance on failure mode and effects analyses (FMEAs) for the marine industry. It discusses what an FMEA is, its objectives, and when they are carried out. FMEAs are used to identify potential failure modes and their effects on systems to improve safety. They follow standards from classification societies. The document outlines the FMEA process, including defining the system boundaries, identifying failure modes and detection/correction methods. It provides information on vessel audits, testing, and incorporating additional analyses like criticality and risk assessments to strengthen FMEAs. The goal is to identify unacceptable failure modes and ensure corrective actions are implemented to improve safety.
Belém 91-3299-0800 / contato@totalseg.com.br
Manaus 92-3622-8080 / contato.am@totalseg.com.br
www.totalseg.com.br
O Prisma SUPER FÁCIL é o novo relógio de ponto da Henry desenvolvido para atender as necessidades de pequenas e médias empresas. São quatro modelos, todos homologados pelo Ministério do Trabalho e Emprego, segundo normas da Portaria 1510/2009. Possui a tecnologia 8X e conta com muitos de seus recursos, dentre eles, o Web Server embarcado que dispensa a instalação de softwares de configuração. Com a opção de comunicação Serial, TCP/IP e USB via pen drive, a coleta de dados é rápida e fácil. Este equipamento permite cadastramento de até 15 mil colaboradores e sua memória armazena até oito milhões de registros, o que prolonga a vida útil. Sua bobina de 300 metros imprime até 8.500 comprovantes (tickets) e faz do Prisma SUPER FÁCIL econômico até em sua utilização.
Programa do Ensino Profissional Marítimo para Aquaviários PREPOM - 2014Falcão Brasil
O documento apresenta o programa do ensino profissional marítimo para aquaviários da Marinha do Brasil para o ano de 2014, incluindo alterações feitas em várias unidades da Marinha.
Mise en place d’une solution de tests de sécurité pour les passerelles réside...Salmen HITANA
Set up of a security test plan for residential gateways
Abstract: This work, done within the company "Sagemcom" is part of the project for obtaining Computer and Network Engineer Telecommunication National Graduation. The objective of this project is the establishment of a security testing solution for residential terminals. These terminals are the heart of any particular or professional network. Aware that the bridges are highly exposed to risks related to computer security, a test plan will cover possible scenarios and touch all functionality of the gateway (network access, WiFi, UPnP, VoIP, IHM). These tests will eventually be launched on a wide range of Sagemcom products to validate the proposed test environment.
Key Word: Gateway, Security, hacking, pentesting, vulnerability
- Réaliser un environnement virtuel en installant tous les serveurs et postes clients nécessaires
- Sécuriser le réseau en installant un pare-feu Pfsense et le mettre en épreuve par des testes d'intrusions
O documento descreve as características e funcionamento de um mosquetão calibre 7,62 mm, incluindo suas partes principais, mecanismos de segurança e repetição, operações de manejo e desmontagem.
This document provides guidance on failure mode and effects analyses (FMEAs) for the marine industry. It discusses what an FMEA is, its objectives, and when they are carried out. FMEAs are used to identify potential failure modes and their effects on systems to improve safety. They follow standards from classification societies. The document outlines the FMEA process, including defining the system boundaries, identifying failure modes and detection/correction methods. It provides information on vessel audits, testing, and incorporating additional analyses like criticality and risk assessments to strengthen FMEAs. The goal is to identify unacceptable failure modes and ensure corrective actions are implemented to improve safety.
L’installation d’Elastix basé sur CentOs.
Softphone x-lite.
Le téléphone SIP Atcom d’Astérisk.
GSM/IP : GSM / GATEWAY.
Protocole SIP.Gigue et MOS
Codima VoIP Monitoring &Troubleshooting Toolbox.
Mesure de la bande passante avec WireShark
Este documento apresenta o Regulamento Disciplinar do Exército Brasileiro (R-4), definindo transgressões disciplinares, punições aplicáveis e procedimentos. O regulamento estabelece os princípios da hierarquia e disciplina militar, competências para aplicação de punições, tipos de transgressões e suas classificações, gradação de punições, recursos e recompensas.
CGCFN-1-16 - Manual de Segurança de AutoridadesFalcão Brasil
O documento apresenta as diretrizes para a organização e atuação das equipes de segurança de autoridades da Marinha do Brasil, definindo conceitos, funções, composição das equipes e atribuições de cada membro para garantir a segurança física da autoridade protegida.
Weg cfw-08-manual-do-usuario-0899.5241-5.2x-manual-portugues-brEdglei Ramalho
1. O documento é um manual de usuário para o inversor de frequência CFW-08 que descreve suas especificações, instalação, operação e manutenção.
2. Contém instruções de segurança, especificações técnicas, diagramas de conexão e descrição detalhada dos parâmetros de configuração e operação.
3. Também fornece detalhes sobre dispositivos opcionais compatíveis e protocolos de comunicação suportados.
Kioti Daedong DK45 Tractor Service Repair Manualhjsnekmde
This is the Highly Detailed factory service repair manual for theKIOTI DAEDONG DK45 TRACTOR , this Service Manual has detailed illustrations as well as step by step instructions,It is 100 percents complete and intact. they are specifically written for the do-it-yourself-er as well as the experienced mechanic.KIOTI DAEDONG DK45 TRACTOR Service Repair Workshop Manual provides step-by-step instructions based on the complete dis-assembly of the machine. It is this level of detail, along with hundreds of photos and illustrations, that guide the reader through each service and repair procedure. Complete download comes in pdf format which can work under all PC based windows operating system and Mac also, All pages are printable. Using this repair manual is an inexpensive way to keep your vehicle working properly.
Service Repair Manual Covers:
Chapter 1 General Information
Chapter 2 Engine
Chapter 3 Clutch
Chapter 4 Transmission System
Chapter 5 Front Axle
Chapter 6 Hydraulic System
Chapter 7 Brake
Chapter 8 Electric System
Chapter 9 Cabin System
Wiring Diagram and Electric System
File Format: PDF
Compatible: All Versions of Windows & Mac
Language: English
Requirements: Adobe PDF Reader
NO waiting, Buy from responsible seller and get INSTANT DOWNLOAD, Without wasting your hard-owned money on uncertainty or surprise! All pages are is great to haveKIOTI DAEDONG DK45 TRACTOR Service Repair Workshop Manual.
Looking for some other Service Repair Manual,please check:
https://www.aservicemanualpdf.com/
Thanks for visiting!
8
The document discusses the Indian Marine Commandos or MARCOS, an elite special forces unit of the Indian Navy. It details the history and formation of MARCOS, from its origins in 1971 to becoming an official unit in 1987. It describes MARCOS' selection process and training, which has an attrition rate of around 98% and includes collaboration with US Navy SEALs and British SAS. The duties of MARCOS include conducting special operations such as anti-piracy and counter-terrorism. Examples of MARCOS operations discussed are the Kargil War and rescuing citizens during the Yemen-Saudi Arabia war.
MANUAL DE CAMPANHA EMPREGO DAS COMUNICAÇÕES C 11-1Falcão Brasil
Este documento apresenta o manual de campanha C 11-1 - Emprego das Comunicações, 2a Edição, de 1997. O manual estabelece as diretrizes para o planejamento e emprego do sistema tático de comunicações nas Forças Terrestres brasileiras, abordando tópicos como meios de comunicação, sistemas, centros de comunicações e operações com características especiais.
MANUAL DE CAMPANHA EXPLORAÇÃO EM RADIOTELEFONIA C 24-9Falcão Brasil
Este documento apresenta os procedimentos padrão para exploração radiotelefônica em campanha militar. Ele define regras para pronúncia de letras e algarismos, sinais especiais de serviço, códigos "Q" e "Z" e expressões convencionais de serviço, visando facilitar comunicações seguras e reduzir tempo de transmissão. O documento também discute emprego das radiocomunicações e elementos básicos da exploração, como alfabeto fonético, algarismos fonéticos e clareza/intensidade
CADERNO DE INSTRUÇÃO MANEABILIDADE DE VIATURAS BLINDADAS CI 17-1/3Falcão Brasil
Este documento apresenta um caderno de instrução sobre a maneabilidade de viaturas blindadas para o Exército Brasileiro. O documento contém nove capítulos que abordam tópicos como a utilização do terreno, vulnerabilidades de blindados, posições de tiro, combate noturno e atravessia de cursos d'água. O caderno foi elaborado pelo Centro de Instrução de Blindados e aprovado experimentalmente pelo Comando de Operações Terrestres para o período de 2002 a 2004.
RELAÇÃO DOS MANUAIS DE CAMPANHA (C) E INSTRUÇÕES PROVISÓRIAS (IP)Falcão Brasil
Este documento fornece uma lista dos Manuais de Campanha e Instruções Provisórias do Exército Brasileiro, organizados por série temática. A lista contém 199 itens, cobrindo diversas áreas como engenharia, artilharia, infantaria, logística e operações especiais. O documento tem como objetivo manter militares e órgãos atualizados sobre a doutrina do Exército.
Hyper-V Replica est une des grosses nouveautés disponible dans Hyper-V édition Windows Server 2012. Cette fonctionnalité est destinée à vous aider dans la mise en oeuvre d'un plan de reprise d'activité grâce à la réplication de machines virtuelles sur un environnement de secours. Au programme : une exploration dans le détail d'Hyper-V Replica, le tout avec un maximum de démonstrations et de bonne humeur !!
The document provides troubleshooting information for the 2506-15 industrial engine. It discusses important safety information and outlines the electronic control system. The electronic system uses an electronic control module and electronic unit injectors. The ECM controls fuel injection and timing based on sensor inputs. Programmable parameters can be changed using a service tool. Diagnostic codes and event codes are used to help troubleshoot issues. Functional tests are provided to test components and circuits.
Fortinet UTM - les Fonctionnalités avancéeseAlphorm
Formation complète ici:
http://www.alphorm.com/tutoriel/formation-en-ligne-fortinet-fortigate-utm-nse4-les-fonctionnalites-avancees
Cette formation Fortinet UTM : les Fonctionnalités avancées est la suite de la précédente formation Fortinet Fortigate UTM (NSE4).
Dans cette formation Fortinet UTM, vous allez découvrir les fonctionnalités avancées du pare-feu Fortigate : le routage avancé, le mode transparent, les VDOMs, les certificats, la HA, les outils de diagnostic.
Les chapitres traités au cours de cette formation Fortinet UTM visent à compléter vos connaissances des pare-feu Fortigate UTM et vous permettre de déployer des architectures de sécurité réseau complexes.
La formation Fortinet Fortigate UTM (NSE4) et cette formation Fortinet UTM : les Fonctionnalités avancées vous préparent et vous aident à réussir la certification NSE4 (Network Security Expert).
Manual Técnico do Precursor Paraquedista (EB60-MT-34.403)Falcão Brasil
Este manual técnico apresenta os conceitos e procedimentos técnicos e operacionais exclusivos aos precursores paraquedistas das Forças Armadas brasileiras, padronizando técnicas, táticas e processos a serem usados. O documento descreve missões, capacidades, lançamentos aéreos, operações de zonas de lançamento e pouso de aeronaves e helicópteros, controle de tráfego aéreo militar e operações de inteligência.
AS/400 Concepts and Tools -- What you will learnRamesh Joshi
This one-day workshop on AS/400 concepts and tools aims to give participants an overview of what a full course on becoming an AS/400 developer would entail. The workshop plan is to have participants open a free AS/400 account, develop a simple "Hello World" program, and work on a nano project. Participants will learn about key AS/400 concepts like libraries, objects, files, tables and the programming development tools for designing screens, menus, and writing code. The workshop also covers debugging, SQL, emulation software, and next steps for participants.
The document provides a technical introduction to the IBM AS/400 system. It discusses the history and evolution of the AS/400 from its origins in the System/38. Key aspects of the AS/400 architecture are its technology independence, object-based design, integration of hardware and software, single-level store, and support for work management and programming. The document also explores the AS/400 command interface, file system, users, and startup process. It briefly discusses other environments like Unix, hypervisor, and Windows that can run on AS/400 hardware.
L’installation d’Elastix basé sur CentOs.
Softphone x-lite.
Le téléphone SIP Atcom d’Astérisk.
GSM/IP : GSM / GATEWAY.
Protocole SIP.Gigue et MOS
Codima VoIP Monitoring &Troubleshooting Toolbox.
Mesure de la bande passante avec WireShark
Este documento apresenta o Regulamento Disciplinar do Exército Brasileiro (R-4), definindo transgressões disciplinares, punições aplicáveis e procedimentos. O regulamento estabelece os princípios da hierarquia e disciplina militar, competências para aplicação de punições, tipos de transgressões e suas classificações, gradação de punições, recursos e recompensas.
CGCFN-1-16 - Manual de Segurança de AutoridadesFalcão Brasil
O documento apresenta as diretrizes para a organização e atuação das equipes de segurança de autoridades da Marinha do Brasil, definindo conceitos, funções, composição das equipes e atribuições de cada membro para garantir a segurança física da autoridade protegida.
Weg cfw-08-manual-do-usuario-0899.5241-5.2x-manual-portugues-brEdglei Ramalho
1. O documento é um manual de usuário para o inversor de frequência CFW-08 que descreve suas especificações, instalação, operação e manutenção.
2. Contém instruções de segurança, especificações técnicas, diagramas de conexão e descrição detalhada dos parâmetros de configuração e operação.
3. Também fornece detalhes sobre dispositivos opcionais compatíveis e protocolos de comunicação suportados.
Kioti Daedong DK45 Tractor Service Repair Manualhjsnekmde
This is the Highly Detailed factory service repair manual for theKIOTI DAEDONG DK45 TRACTOR , this Service Manual has detailed illustrations as well as step by step instructions,It is 100 percents complete and intact. they are specifically written for the do-it-yourself-er as well as the experienced mechanic.KIOTI DAEDONG DK45 TRACTOR Service Repair Workshop Manual provides step-by-step instructions based on the complete dis-assembly of the machine. It is this level of detail, along with hundreds of photos and illustrations, that guide the reader through each service and repair procedure. Complete download comes in pdf format which can work under all PC based windows operating system and Mac also, All pages are printable. Using this repair manual is an inexpensive way to keep your vehicle working properly.
Service Repair Manual Covers:
Chapter 1 General Information
Chapter 2 Engine
Chapter 3 Clutch
Chapter 4 Transmission System
Chapter 5 Front Axle
Chapter 6 Hydraulic System
Chapter 7 Brake
Chapter 8 Electric System
Chapter 9 Cabin System
Wiring Diagram and Electric System
File Format: PDF
Compatible: All Versions of Windows & Mac
Language: English
Requirements: Adobe PDF Reader
NO waiting, Buy from responsible seller and get INSTANT DOWNLOAD, Without wasting your hard-owned money on uncertainty or surprise! All pages are is great to haveKIOTI DAEDONG DK45 TRACTOR Service Repair Workshop Manual.
Looking for some other Service Repair Manual,please check:
https://www.aservicemanualpdf.com/
Thanks for visiting!
8
The document discusses the Indian Marine Commandos or MARCOS, an elite special forces unit of the Indian Navy. It details the history and formation of MARCOS, from its origins in 1971 to becoming an official unit in 1987. It describes MARCOS' selection process and training, which has an attrition rate of around 98% and includes collaboration with US Navy SEALs and British SAS. The duties of MARCOS include conducting special operations such as anti-piracy and counter-terrorism. Examples of MARCOS operations discussed are the Kargil War and rescuing citizens during the Yemen-Saudi Arabia war.
MANUAL DE CAMPANHA EMPREGO DAS COMUNICAÇÕES C 11-1Falcão Brasil
Este documento apresenta o manual de campanha C 11-1 - Emprego das Comunicações, 2a Edição, de 1997. O manual estabelece as diretrizes para o planejamento e emprego do sistema tático de comunicações nas Forças Terrestres brasileiras, abordando tópicos como meios de comunicação, sistemas, centros de comunicações e operações com características especiais.
MANUAL DE CAMPANHA EXPLORAÇÃO EM RADIOTELEFONIA C 24-9Falcão Brasil
Este documento apresenta os procedimentos padrão para exploração radiotelefônica em campanha militar. Ele define regras para pronúncia de letras e algarismos, sinais especiais de serviço, códigos "Q" e "Z" e expressões convencionais de serviço, visando facilitar comunicações seguras e reduzir tempo de transmissão. O documento também discute emprego das radiocomunicações e elementos básicos da exploração, como alfabeto fonético, algarismos fonéticos e clareza/intensidade
CADERNO DE INSTRUÇÃO MANEABILIDADE DE VIATURAS BLINDADAS CI 17-1/3Falcão Brasil
Este documento apresenta um caderno de instrução sobre a maneabilidade de viaturas blindadas para o Exército Brasileiro. O documento contém nove capítulos que abordam tópicos como a utilização do terreno, vulnerabilidades de blindados, posições de tiro, combate noturno e atravessia de cursos d'água. O caderno foi elaborado pelo Centro de Instrução de Blindados e aprovado experimentalmente pelo Comando de Operações Terrestres para o período de 2002 a 2004.
RELAÇÃO DOS MANUAIS DE CAMPANHA (C) E INSTRUÇÕES PROVISÓRIAS (IP)Falcão Brasil
Este documento fornece uma lista dos Manuais de Campanha e Instruções Provisórias do Exército Brasileiro, organizados por série temática. A lista contém 199 itens, cobrindo diversas áreas como engenharia, artilharia, infantaria, logística e operações especiais. O documento tem como objetivo manter militares e órgãos atualizados sobre a doutrina do Exército.
Hyper-V Replica est une des grosses nouveautés disponible dans Hyper-V édition Windows Server 2012. Cette fonctionnalité est destinée à vous aider dans la mise en oeuvre d'un plan de reprise d'activité grâce à la réplication de machines virtuelles sur un environnement de secours. Au programme : une exploration dans le détail d'Hyper-V Replica, le tout avec un maximum de démonstrations et de bonne humeur !!
The document provides troubleshooting information for the 2506-15 industrial engine. It discusses important safety information and outlines the electronic control system. The electronic system uses an electronic control module and electronic unit injectors. The ECM controls fuel injection and timing based on sensor inputs. Programmable parameters can be changed using a service tool. Diagnostic codes and event codes are used to help troubleshoot issues. Functional tests are provided to test components and circuits.
Fortinet UTM - les Fonctionnalités avancéeseAlphorm
Formation complète ici:
http://www.alphorm.com/tutoriel/formation-en-ligne-fortinet-fortigate-utm-nse4-les-fonctionnalites-avancees
Cette formation Fortinet UTM : les Fonctionnalités avancées est la suite de la précédente formation Fortinet Fortigate UTM (NSE4).
Dans cette formation Fortinet UTM, vous allez découvrir les fonctionnalités avancées du pare-feu Fortigate : le routage avancé, le mode transparent, les VDOMs, les certificats, la HA, les outils de diagnostic.
Les chapitres traités au cours de cette formation Fortinet UTM visent à compléter vos connaissances des pare-feu Fortigate UTM et vous permettre de déployer des architectures de sécurité réseau complexes.
La formation Fortinet Fortigate UTM (NSE4) et cette formation Fortinet UTM : les Fonctionnalités avancées vous préparent et vous aident à réussir la certification NSE4 (Network Security Expert).
Manual Técnico do Precursor Paraquedista (EB60-MT-34.403)Falcão Brasil
Este manual técnico apresenta os conceitos e procedimentos técnicos e operacionais exclusivos aos precursores paraquedistas das Forças Armadas brasileiras, padronizando técnicas, táticas e processos a serem usados. O documento descreve missões, capacidades, lançamentos aéreos, operações de zonas de lançamento e pouso de aeronaves e helicópteros, controle de tráfego aéreo militar e operações de inteligência.
AS/400 Concepts and Tools -- What you will learnRamesh Joshi
This one-day workshop on AS/400 concepts and tools aims to give participants an overview of what a full course on becoming an AS/400 developer would entail. The workshop plan is to have participants open a free AS/400 account, develop a simple "Hello World" program, and work on a nano project. Participants will learn about key AS/400 concepts like libraries, objects, files, tables and the programming development tools for designing screens, menus, and writing code. The workshop also covers debugging, SQL, emulation software, and next steps for participants.
The document provides a technical introduction to the IBM AS/400 system. It discusses the history and evolution of the AS/400 from its origins in the System/38. Key aspects of the AS/400 architecture are its technology independence, object-based design, integration of hardware and software, single-level store, and support for work management and programming. The document also explores the AS/400 command interface, file system, users, and startup process. It briefly discusses other environments like Unix, hypervisor, and Windows that can run on AS/400 hardware.
Parameshwaran.R is seeking a challenging position to contribute to organizational growth while enhancing his skills. He has 2 years of experience as a System Engineer at HCL Technologies working on Disney projects. He holds a B.E. in Electrical and Electronics Engineering from Velammal Institute of Technology. His responsibilities include system monitoring, batch job monitoring, backups, restorations, and troubleshooting. He has expertise in BRMS, native backups, MIMIX, and robot jobs on IBM iSeries systems.
Modernize your AS400 - the future proof, low cost solution.112Motion
Tom, the CIO of ABC corporation, needs to modernize their logistics ERP system which runs on an aging AS/400 to meet new business requirements. The experts recommend implementing a business services layer on top of the AS/400 to develop new functionality, while retaining the backend. They create a proof-of-concept in 2 weeks demonstrating the new purchasing process integrated with the AS/400 using various products. Impressed, Tom asks them to implement and train his staff on the solution.
Extracts from AS/400 Concepts & Tools workshopRamesh Joshi
This document provides an overview of topics to be covered in a two-day AS/400 concepts and tools training course. Day 1 introduces AS/400 concepts and covers programming tools like PDM, SDA, and SEU. Day 2 focuses on programming languages like CL and RPG and debugging tools. The objective is to give participants a sense of what a full training course would entail to prepare them to become AS/400 developers. Several examples are provided to illustrate programming concepts and tools.
The document provides an overview of the history and technical details of the IBM AS/400 midrange computer system, later renamed IBM i. It discusses the origins of the system in IBM's Rochester, Minnesota facilities in the late 1980s. It also describes the key aspects of the IBM i operating system such as its object-based design, hardware integration, single-level storage, and support for multiple programming languages. The document concludes with a brief overview of navigating and exploring objects within an IBM i system.
El documento trata sobre el manejo de errores y el diseño de pantallas en AS/400. Explica que AS/400 ofrece seguridad y flexibilidad para aplicaciones sofisticadas. Luego describe cómo manejar errores utilizando spool y proteger archivos spool de accesos no autorizados. También cubre el diseño interactivo de pantallas y menús usando SDA, incluyendo la creación de pantallas, tipos de campos y colores.
B7.2 a1353-ra platform commissioning solaris 2.6chungminh1108
This document provides instructions for commissioning an Alcatel BSS B7.2 - A1353-RA Platform using Solaris 2.6. It describes installing the operating system, third party software and patches, and customizing the platform. The document outlines prerequisites, required tasks including installing software from multiple CDs, updating firmware, declaring the machine on the network, and configuring optional features. It also includes appendices with details on specific tasks like updating firmware and flashprom releases.
This technical manual provides instructions for operation and maintenance of a nitrogen generating unit (NGU). It describes the major components of the NGU, including the feed air system, filter tower, membrane assembly, and electrical enclosure. The document provides guidance on installation, setup, operation, performance monitoring, troubleshooting, and shutdown of the NGU. It also includes an overview of the nitrogen production process and theory of operation.
This document provides an overview of the FortiManager system including key features, documentation resources, and basic configuration instructions. It summarizes the new features introduced in version 4.0 MR3 including improvements to global policies, administrative domains, installation wizards, policy usability, FortiToken support, management models, licensing, and the web-based manager. It also describes the FortiManager management module and its role in centrally managing FortiGate devices and their configurations.
Motorola solutions wing 5.3 wireless controller system reference guide (part ...Advantec Distribution
This document provides a summary of features and configuration steps for the Motorola Solutions WiNG 5 Enterprise Controller. It includes chapters that describe the web user interface, provide a quick start guide for initial setup and configuration of a managed wireless LAN, and explain how to configure devices, profiles, licenses, certificates and other settings. The quick start guide walks through configuring access to the GUI, creating a RF domain, wireless profiles, WLAN configuration, access point profiles and a DHCP server policy to complete and test a basic network configuration.
Motorola solutions wing 5.3 wireless controller system reference guide (part ...Advantec Distribution
This document provides a summary of key features and configuration steps for the Motorola Solutions WiNG 5 Enterprise Controller system. It includes chapters on the web user interface, quick start guide, dashboard, device configuration, wireless configuration, profile configuration, RF domain configuration and security configuration. The quick start guide chapter provides step-by-step instructions for configuring a basic managed wireless local area network using the controller's graphical user interface. It describes tasks such as configuring network access, creating wireless profiles and wireless local area network configurations, as well as associated settings for devices, domains and policies.
This document provides instructions for configuring IPS security policies on Juniper Networks SRX Series services gateways using the command line interface, Juniper Networks Security Management, and J-Web. It describes how to configure basic networking and security settings like interfaces, security zones, and firewall policies. It also covers enabling IPS functionality through licensing, creating IPS security policies, updating IPS signatures, and verifying the IPS configuration.
SAP GRC Access Control provides functions for ensuring users only receive necessary access rights, detecting and mitigating authorization risks, and preventing future violations. It includes risk analysis and remediation, enterprise role management, compliant user provisioning, and superuser privilege management. Risk analysis identifies authorization risks and cleans profiles. Role management defines and manages roles. User provisioning requests and approves access rights changes through workflow. Superuser management temporarily assigns emergency access rights and monitors associated activities.
This document provides a quickstart guide for installing and configuring the IBM Virtual Disk System, which integrates the IBM SAN Volume Controller (SVC) with IBM midrange disk systems. It includes an introduction to the hardware components, such as the SVC node, UPS, IBM System Storage Productivity Center, DS3400 storage subsystem, EXP3000 expansion unit, and Brocade SAN switches. It also covers planning the physical layout and SAN configuration, installing and setting up the SVC cluster, DS3400, zoning the SAN switch, and creating virtual disks on the SVC. Sample configurations are presented to demonstrate typical implementations.
This document provides a quickstart guide for installing and configuring the IBM Virtual Disk System, which integrates the IBM SAN Volume Controller (SVC) with IBM midrange disk storage systems. It includes an introduction to the hardware components, such as the SVC nodes, UPS, IBM DS3400 storage, and Brocade SAN switches. It also covers planning the physical layout and SAN configuration, installing and setting up the SVC cluster, configuring the IBM DS3400, and creating virtual disks using the SVC. Sample configurations are presented to demonstrate common implementation scenarios.
Ngen mvpn with pim implementation guide 8010027-002-enNgoc Nguyen Dang
This document provides guidance on implementing an NGEN Multicast Virtual Private Network (MVPN) using Protocol Independent Multicast (PIM) on a Juniper Networks network. It describes the network topology, hardware, software, and configuration steps used for validation. The configuration sections cover enabling PIM on core and provider edge routers, configuring inet-mvpn for IBGP sessions, enabling MVPN for individual VPN instances, and associating provider tunnels. Validation is done through checking the control and data plane operation, including PIM states and multicast traffic flows.
This document is the administrator's guide for Citrix XenServer 5.6 Feature Pack 1. It provides information on managing users and authentication using Active Directory, configuring resource pools and high availability, managing storage repositories and virtual disk images, and using Role Based Access Control (RBAC) to manage access permissions. The guide contains information on XenServer concepts like hosts, pools, virtual block devices (VBDs), and virtual disk data formats (VHD and LUN-based). It also describes features like storage management, host power on configuration, and auditing.
This document provides an overview of the configuration and advanced operation capabilities of the OMNI 6000/3000 flow computer firmware revisions 22.74 and 26.74. It describes how to configure physical inputs and outputs, meter stations, meter runs, temperature, pressure, density, products, batches, and other parameters using the keypad in program mode. It also covers user-programmable functions including Boolean flags, variables, and display screens. Finally, it details the flow equations and algorithms used to calculate flow rates and properties for liquid hydrocarbons in US customary and SI metric units.
This document is a user guide for the LSI SAS2 Integrated RAID solution. It describes the benefits of the integrated RAID solution such as host interface support, metadata support, SMART support, and Fusion-MPT support. It also provides overviews of how mirrored volumes operate and their key features like resynchronization, hot swapping, hot spares, online capacity expansion, and more. The document includes steps for creating mirrored volumes, managing hot spare disks, and other administrative tasks.
The document provides an overview and administrator guide for OnTime 2008 project management software. It discusses the OnTime product line including OnTime for Windows, Web Edition, VS.NET, Customer Portal, and Remote Server. It also covers installing and setting up OnTime, including planning deployment, installing OnTime and its components, setting up the OnTime database, configuring system options and email notifications.
E ran2[1].1 dbs3900 lte fdd product description(2011q1)ProcExpl
This document provides an overview of the DBS3900 LTE product from Huawei, which uses a distributed architecture with separate baseband units (BBU) and remote radio units (RRU). It describes the positioning and benefits of the product, the architecture including the BBU and various RRU options, common application scenarios, typical configurations, operation and maintenance features, and technical specifications.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
Parallels Business Automation - Standard Provider Guidewebhostingguy
1. Parallels Business Automation - Standard is an end-to-end solution for hosting service providers and data centers that allows them to decrease operating costs while increasing revenues.
2. It provides tools for managing servers, hosting plans, billing, support tickets, and resellers from a centralized web-based interface.
3. Parallels Business Automation - Standard is compatible with modern browsers and can be accessed securely over the internet. It requires a server with at least 2GB RAM and 40GB disk space to operate.
This document provides an administrator manual for Atoll version 3.1.0. It discusses installing and configuring Atoll and its components, setting up distributed calculation servers, managing licenses, and working with Atoll databases. The manual is divided into several sections covering topics such as supported technologies, installation, license management, database management, and more.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions AP-6511 Access Point. It includes chapters that describe accessing and navigating the web user interface, an initial setup wizard, dashboard for monitoring device health and inventory, configuration of device and wireless settings, and more. The document contains detailed instructions, descriptions, and reference information for configuring and managing the access point via the web interface.
This document provides guidance on hardening the security of Siemens Simatic WinCC Flexible 2008 human-machine interface (HMI) software. It outlines configuration steps to strengthen the operating system, database management system, additional protection measures, WinCC Flexible system parameters, runtime security settings, access settings, Sm@rtServer security, MiniWeb security, OPC server security, web service security, and SMTP security. The document contains over 10 sections with over 100 specific configuration recommendations to lock down the WinCC Flexible 2008 system and protect industrial assets.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Presentation of the OECD Artificial Intelligence Review of Germany
myBRMS
1. BRMS Implementation and Configuration Notes
Prepared for Baker Distributing on 06/24/2011
by Thomas and Victoria Wolfe
Page 1 of 60
2. BRMS Implementation and Configuration Notes
Housekeeping (STRMNTBRM command)......................................................................................................... 4
Significant Parameters .................................................................................................................................. 5
Remove Media Information (RMVMEDI) ............................................................................................... 5
Remove Log Entries (RMVLOGE) .......................................................................................................... 5
Expired Media Listing (PRTEXPMED) ................................................................................................... 5
Recovery Reports Listing (PRTRCYRPT) ............................................................................................... 5
Reorganize BRMS database (RGZBRMDB) ........................................................................................... 5
Media Management .......................................................................................................................................... 6
Adding (Registering) Media with BRMS ..................................................................................................... 6
Enrolling Media ........................................................................................................................................ 7
Work with Media Library Status (WRKMLBSTS) command ..................................................................... 8
Verifying BRMS Logical and Physical Databases ....................................................................................... 8
Work with Media (WRKMEDBRM) command........................................................................................... 9
Example of creating pick list(s) to unload media library........................................................................ 10
Example of creating pick list(s) to load media library............................................................................ 11
Media Networking Entries .......................................................................................................................... 11
BAKER – Production Partition............................................................................................................... 11
TEST – Development Partition............................................................................................................... 12
Problem Determination .................................................................................................................................. 12
Display Log (DSPLOGBRM) Command ................................................................................................... 12
Key reports from STRMNTBRM command .............................................................................................. 13
Backup Activity Report .............................................................................................................................. 13
Save Strategy Exceptions Report ................................................................................................................ 13
Recovery Reports ........................................................................................................................................ 13
Centralized Media Audit Report ................................................................................................................. 13
Media Volume, Volume Threshold and Volume Statistic Reports ............................................................ 13
Backup Control Groups .................................................................................................................................. 14
Daily Control Group ................................................................................................................................... 14
Security Data (*SAVSECDTA) ............................................................................................................. 14
IBM (*IBM) ............................................................................................................................................ 14
Configuration (*SAVCFG)..................................................................................................................... 14
All User (**ALLUSR) ............................................................................................................................ 14
Document Library Objects (*SAVDLO) ................................................................................................ 14
IFS Objects (*LINK) .............................................................................................................................. 14
Exit Processing (*EXIT) ......................................................................................................................... 15
Client Omit Entries ................................................................................................................................. 15
Attributes................................................................................................................................................. 16
Save While Active (SWA) ...................................................................................................................... 17
Weekly Control Group ................................................................................................................................ 18
System (*SAVSYS) ................................................................................................................................ 18
IBM (*IBM) ............................................................................................................................................ 18
All User (**ALLUSR) ............................................................................................................................ 18
Document Library Objects (*SAVDLO) ................................................................................................ 18
IFS Objects (*LINK) .............................................................................................................................. 18
Attributes................................................................................................................................................. 19
Page 2 of 60
3. BRMS Implementation and Configuration Notes
Scheduler Command (RBO) ................................................................................................................... 20
Backup Policy ............................................................................................................................................. 21
System Policy.............................................................................................................................................. 22
Media Policy ............................................................................................................................................... 23
FULL Backup (32 Days) ........................................................................................................................ 23
INCR Backup (21 Days) ......................................................................................................................... 23
Recovery Planning .......................................................................................................................................... 24
Summary of BRMS Recovery Operations .................................................................................................. 24
Additional Recovery Considerations .......................................................................................................... 25
Adding steps to recovery report .................................................................................................................. 25
Hardware Management Console (HMC) .................................................................................................... 26
Backup Critical Console Data ................................................................................................................. 27
Running Recovery Reports On Demand..................................................................................................... 27
Example of Volume Summary Report .................................................................................................... 27
Partial Example of Recover System Report................................................................................................ 28
Restoring an IFS object .................................................................................................................................. 34
Work with Link Information (WRKLNKBRM) command ........................................................................ 34
Installing IBM i Navigator Plug-In................................................................................................................. 37
Additional Resources ...................................................................................................................................... 39
Appendix 1 - Display Media Library Status (DSPMLBSTS) .......................................................................... 40
Source Code for Model Tables ................................................................................................................... 40
Control Group Model Table – iCTLGRP DDL Script ........................................................................... 40
Media Class Model Table – iMEDCLS DDL Script .............................................................................. 40
Source Code for Command Interface ......................................................................................................... 41
DSPMLBSTS – Display Media Library Status Command Source ........................................................ 41
Source Code for Command Processing Program (CPP) ............................................................................. 42
DSPMLBSTS – Display Media Library Status Command Processing Program ................................... 42
Source Code for Value Choice Programs (VCP) ........................................................................................ 44
DSPMLBSTS2 – Display Media Library Status 2 Value Choice Program............................................ 44
DSPMLBSTS3 – Display Media Library Status 3 Value Choice Program............................................ 46
Appendix 2 – Check In for Media Library (CheckIn) ..................................................................................... 49
Panel Layout (command interface) Examples ............................................................................................ 49
Source Code for Command Interface ......................................................................................................... 50
CheckIn – Check In for Media Library Command Interface .................................................................. 50
Source code for Command Processing Program (CPP).............................................................................. 51
CheckIn – Check In for Media Library Command Processing Program ................................................ 51
CheckIn – Create Object Instructions ......................................................................................................... 56
Appendix 3 – Backup Control Group Processing Verification ....................................................................... 57
Daily Save Changes Backup Job Completion RBO Scheduler Entries ...................................................... 57
Monthly Application Backup Job Completion RBO Scheduler Entries ..................................................... 57
Spot Check Backup Completion (Display Log using BRMS) DSPLOGBRM .......................................... 58
Manually Insuring Media is Available for Backup Control Groups........................................................... 59
Work with Media Library Media (WRKMLMBRM) Command ........................................................... 59
Additional Resources for Integrating BRMS and IBM Tivoli Storage Manager ............................................ 60
Page 3 of 60
4. BRMS Implementation and Configuration Notes
Housekeeping (STRMNTBRM command)
You should perform BRMS housekeeping on a daily basis. The BRMS maintenance operation automatically
performs BRMS cleanup on your system, updates backup information, and runs reports1. BRMS
maintenance performs these functions:
• expires media
• removes media information
• removes migration information (180 days old)
• removes log entries (from beginning entry to within 90 days of current date)
• runs cleanup
• retrieves volume statistics
• audits system media
• changes journal receivers
• prints expired media report
• prints version report
• prints media information
• prints recovery reports
Use Help/Systems Robot Schedule (RBO) command to review parameters on the Start Maintenance for
BRMS (STRMNTBRM) command.
1
WRKPCYBRM *SYS command determines location (BRMSOUTQ) for BRMS listings
Page 4 of 60
5. BRMS Implementation and Configuration Notes
Significant Parameters
Remove Media Information (RMVMEDI)
*REUSE = Media content information associated with a volume is not removed from the media content
inventory file until the volume is re-used even though the volume has already expired.
Remove Log Entries (RMVLOGE)
Remove all types of log entries after ninety (90) days.
Expired Media Listing (PRTEXPMED)
*YES = Print expired media report.
Recovery Reports Listing (PRTRCYRPT)
*ALL = Print all recovery reports
• *RCYACT - Recovery Activities
• *RCYANL – Recovery Analysis
• *SAVEXCP - Save Strategy Exceptions
Reorganize BRMS database (RGZBRMDB)
*YES = Reorganize the BRMS database
• This command should not be used by control group *EXIT item as results will be unpredictable.
• All object (*ALLOBJ) authority is required to run this command.
• This command should be run as an independent job. No other BRMS functions should be active when
the STRMNTBRM command is processing.
Page 5 of 60
6. BRMS Implementation and Configuration Notes
Media Management
BRMS makes media management simple by maintaining an inventory of your tape media. It keeps track of
what data is backed up on which tape and which tapes have available space. When you run a backup, BRMS
selects the tape to use from the available pool of tapes. BRMS prevents a user from accidentally writing
over active files or using the wrong tape.
Before you can use any tape media with BRMS, you need to add it to the BRMS inventory and initialize it.
You can do this using IBM i Navigator Add media wizard (under Media, right-click Tape Volumes and
select Add). You can also use the green-screen BRMS command ADDMEDBRM (Add Media to BRM).
Once you've added tape media to the BRMS inventory, you can view the media based on criteria you
specify, such as the volume name, status, media pool, or expiration date. This gives you the capability to
manually expire a tape and make it available for use in the BRMS media inventory.
Adding (Registering) Media with BRMS
Option 1 media management, option 9 work with media libraries and option 8 work with MLB media.
Page 6 of 60
7. BRMS Implementation and Configuration Notes
Enrolling Media
• Determine Media Class
o It is important to have sufficient volumes enrolled in the BRMS scratch pool before performing a
save operation. A media scratch pool is a group of available (expired and unused) media that
share the same media class. BRMS draws the media it uses for backup and recovery operations
from this pool.
• Review WRKCLSBRM (*MED) and WRYPCYBRM (*SYS)
• Enroll Media Volumes into BRMS (Media Library Device)
o Load media into I/O station (if not already done)
o Type WRKMLBBRM at the command line to get to the Work with Media Library Media display
Press Enter twice
Option 1 add MLB media2
Do NOT add cleaning
tape
Only volumes in Inserted
status need to be added.
Volumes here shown as
example only.
2
Volumes need only to be initialize *YES and check active files *NO the first time media is added to BRMS
Page 7 of 60
8. BRMS Implementation and Configuration Notes
Work with Media Library Status (WRKMLBSTS) command
BRMS supports all IBM media libraries (MLB) and has the capability to support third-party library devices.
An MLB is an automated media library. You can store a large number of media in an MLB unit and access a
specified volume or volumes for read and write operations. BRMS determines which volumes reside in the
MLB, and when needed, issues the proper command to mount the volume.
Media libraries enable BRMS to provide the following support:
• Perform save and restore operations automatically.
• Perform file retrieve automatically.
• Migrate infrequently used data from DASD to less expensive storage media while maintaining the
ability to access it automatically.
• Archive massive amounts of data, such as in image or spooled archive applications.
• Provide hardware that new applications can use to manage offline storage.
• Manage scratch volumes and volume usage.
Verifying BRMS Logical and Physical Databases
When using a tape library with Backup Recovery and Media Services (BRMS) you may need to verify that
the BRMS database (logical database) and the tape library database (physical database) are identical. The
IBM Redpaper, BRMS and Tape Library: Verifying Your BRMS Logical and Physical Databases are
Synchronized can be found at http://www.redbooks.ibm.com/abstracts/tips0291.html?Open
This functionality can be achieved through with the inclusion of additional products such as the Advanced
Feature of BRMS from IBM or our Display Media Library Status (DSPMLBSTS) command 3which is our
own custom utility that checks synchronization of media library device with BRMS media inventory and
returns a result set to display, spool file, or user-specified output file. Sample usage is shown below:
3
Source code provided in Appendix 1.
Page 8 of 60
9. BRMS Implementation and Configuration Notes
The DSPMLBSTS command lists information contained in both the BRMS logical database and media
library device physical database. It is a helpful quick verification that the media library device contains
expired media and is ready for use.
Output Information Includes:
• MLB Device Name
• MLB Volume Identifier
• MLB Library Category
o *SHARE400
o *INSERT
o *EJECT
• BRMS Status
• BRMS Expiration Date
• BRMS Move Policy
• BRMS Location
• BRMS Media Class
• Label Media Type
• BRMS System
• BRMS Media Usage Statistics
• MLB Write Protect Status
Work with Media (WRKMEDBRM) command
The Work with Media using BRM (WRKMEDBRM) command manages active, expired or all media
volumes in the media inventory by creation and expiration date for any or all locations. The following
parameters can be used to tailor this display or printed report. The report that is produced is the Media
report. The report, if printed, is written to printer file QP1AMM.
Page 9 of 60
12. BRMS Implementation and Configuration Notes
TEST – Development Partition
Problem Determination
Display Log (DSPLOGBRM) Command
• Log of success or failure of BRMS operations and status messages
• Shows only BRMS related information – one place to look
o First place to start any type of problem determination
In conjunction with joblogs, history (QHST) log, and QSYSOPR message queue
• Selected information from joblog, history log and QSYSOPR message queue
• Sub-selection options of messages displayed:
o Media Management
o Maintenance
o Backup and Recovery
o Archive and Retrieval
o Security (Functional Usage)
o Migration
o Time and Date selection
o Message severity selection
o F9/F10 = All parameters, User and Message Id Selection
• F11=Alternate View on Display BRM Log panel provides qualified job information
Page 12 of 60
13. BRMS Implementation and Configuration Notes
Key reports from STRMNTBRM command
Backup Activity Report
• This report identifies libraries and objects that were not saved. Use it to look for errors in your save
operation and take action as appropriate.
Save Strategy Exceptions Report
• Use this report to see which libraries, if any, were not saved, and to help you devise save strategies for
them. If the report indicates that BRMS did not save a library already in a control group, you need to
investigate why the error occurred
Recovery Reports
• The STRMNTBRM command can produce any number of the three essential recovery reports
(Recovery Analysis, Volume Summary, and ASP Recovery). If desired, you can make this request from
the Print recovery reports parameter
Centralized Media Audit Report
• The STRMNTBRM command produces this report for each system in a network. BRMS does not
generate this report if you have a single-system environment.
Media Volume, Volume Threshold and Volume Statistic Reports
• The STRMNTBRM command generates these reports automatically. These reports show volumes that
have equalled or exceeded the usage or read/write threshold limits that are set for the media class. Check
these error thresholds and take appropriate action to replace volumes with errors.
Page 13 of 60
14. BRMS Implementation and Configuration Notes
Backup Control Groups
The Work with Control Groups using BRM (WRKCTLGBRM) command manages all backup control groups
in BRMS. Whenever possible, the hierarchical structure of BRMS defaults control group values to media,
move, backup and system polices for consistency.
Daily Control Group
Performs save-while-active (users are allowed to be signed on the system) best practices system-wide daily
incremental-cummulative backup:
Security Data (*SAVSECDTA)
This entry saves user profile (password changes, etc.) and other system security information.
IBM (*IBM)
This entry saves all system licensed program product (LPP) information in the QSYS file system.
Configuration (*SAVCFG)
This entry saves an image (bit copy) that can be used for rapid (and complete only) system restore to the
same hardware.
All User (**ALLUSR)
This entry saves all customer (primarily non-IBM) information in the QSYS file system.
Document Library Objects (*SAVDLO)
This entry saves all customer (primarily non-IBM) information in the DLO file system.
IFS Objects (*LINK)
This entry saves both customer and IBM information in the integrated file system.
Page 14 of 60
15. BRMS Implementation and Configuration Notes
Exit Processing (*EXIT)
These four (4) entries start and stop two (2) TCP/IP servers so that some objects can be saved that are
normally exclusively allocated.
• *HTTP - IBM i Power by Apache servers (http://tinyurl.com/3vztfan)
• *IBMHELP – IBM i automated remote (phone home) support (http://tinyurl.com/3qocybk)
Client Omit Entries
These entries can be managed through IBM i Navigator, System i Director or 5250 (API4) interfaces:
CTLGRP OMTLIB OMTOBJ OMTTYP _ Select OOCGNAME as CTLGRP,
BAK_DAILY BSAVEFILES *ALL *ALL OOLIBNAME as OMTLIB,
BAK_DAILY FASTFAX *ALL *ALL OOOBJNAME as OMTOBJ,
OOTYPE as OMTTYP
BAK_DAILY FTASTIC *ALL *ALL From qusrbrm/qa1aoo
BAK_DAILY QMPGDATA *ALL *ALL
BAK_DAILY QUSRDIRDB QGLDLOCK *USRSPC
BAK_DAILY RBTCONLIB RBCMANAGER *DTAARA
BAK_DAILY RBTCONLIB RBC603DA *DTAARA
BAK_DAILY RBTSYSLIB RSL550DA *DTAARA
BAK_DAILY ROBOTLIB RBT542DA *DTAARA
BAK_DAILY ROBOTLIB RBT635 *DTAARA
BAK_DAILY ROBOTLIB RBT660 *DTAARA
BAK_DAILY ROBOTLIB RBT695DA *DTAARA
******** End of data ********
4
http://tinyurl.com/3weybu6
Page 15 of 60
17. BRMS Implementation and Configuration Notes
Save While Active (SWA)
The save-while-active (SWA) feature allows users to resume activity after save processing
reaches a certain point. i5/OS refers to this point as the synchronization checkpoint. By using the
save-while-active feature, you can reduce application downtime and increase user access to
selected data or applications.
• *LIB - This value indicates that library objects can be saved while in use by another job.
Because all of the library objects reach checkpoint together, BRMS saves them in a consistent
state in relationship to each other. If you specify multiple libraries in the control group, BRMS
performs the checkpoint processing individually for the objects within each specified library.
For example, to save LIBA and LIBB, the system performs two separate SAVLIB commands
and establishes two checkpoints.
• *SYNCLIB - This value also specifies that objects in a library can be saved while in use by
another job. However, in this case, all of the objects and all of the libraries reach a checkpoint
together. BRMS saves them in a consistent state in relationship to one another.
To use the save-while-active feature with a save that does not use journaling or commitment
control, you need to prevent user access until BRMS reaches the synchronization point. Once the
system reaches the checkpoint, the system releases the exclusive locks on the library, and users
can resume normal activity. Meanwhile, BRMS continues to save the data.
Page 17 of 60
18. BRMS Implementation and Configuration Notes
Weekly Control Group
Performs restricted-state (users are NOT allowed to be signed on the system) best practices system-wide
weekly full backup:
System (*SAVSYS)
This entry saves full system information including licensed internal code (LIC) and user profiles.
IBM (*IBM)
This entry saves all system licensed program product (LPP) information in the QSYS file system.
All User (**ALLUSR)
This entry saves all customer (primarily non-IBM) information in the QSYS file system.
Document Library Objects (*SAVDLO)
This entry saves all customer (primarily non-IBM) information in the DLO file system.
IFS Objects (*LINK)
This entry saves both customer and IBM information in the integrated file system.
Page 18 of 60
20. BRMS Implementation and Configuration Notes
Scheduler Command (RBO)
Control groups consist of groups of libraries, objects, folders, spooled files, and other types of data
that share common characteristics or that you want grouped together for backup purposes.
Whereas policies determine how data is processed, control groups determine, by their content,
which data to process. They also specify what kind of backup you want BRMS to perform, such as
full, incremental, or cumulative-incremental. In addition, control groups specify which days the
data will be processed, and the order in which the processing occurs.
Control groups usually refer to, and work with, related policies. You can set control group
attributes to override policy decisions.
Though you cannot create control groups specifically for a recovery job, BRMS does efficiently
recover data by control groups.
Page 20 of 60
22. BRMS Implementation and Configuration Notes
Specifies how to perform backups. You can define weekly backup activities, types of
incremental backup, and the level at which you want to save media information. One backup
policy governs all backup operations. You can define or change these operations at the control
group level.
System Policy
• Very similar to a set of system values, unless other policies or controls are in place, system
policy parameters determine the policy defaults for many of your BRMS operations.
Page 22 of 60
23. BRMS Implementation and Configuration Notes
Media Policy
FULL Backup (32 Days)
INCR Backup (21 Days)
Page 23 of 60
24. BRMS Implementation and Configuration Notes
Recovery Planning
BRMS produces a complete system recovery report that guides you through an entire system recovery. The
report lets you know exactly which media volumes are needed to recover your system.5 Use the report in
conjunction with i5/OS Backup and Recovery (SC41-5304-08).
• BRMS recovery provides for the orderly retrieval of lost or damaged data. Its most important feature is a
series of recovery reports that take you, step-by-step, through the recovery of your system. These reports
not only contain restore instructions, but also indicate which volumes the system requires for the
recovery. With BRMS, you can restore your entire system, or selected items such as control groups,
libraries, objects, folders, auxiliary storage pools (ASPs), spooled files, or integrated file system links.
Summary of BRMS Recovery Operations
5
See section on example recover system report below for more detail.
Page 24 of 60
25. BRMS Implementation and Configuration Notes
Additional Recovery Considerations
When you back your system up using BRMS, Information about each backup item is recorded in the save
history within BRMS. The information in the save history is used to create a recovery report, which steps
you through a full system i (iSeries/AS/400) recovery. Because of the critical nature of this BRMS recovery
report, it is vital that you take a few precautions to ensure that this information is current and accessible
when you need it.
You cannot use your recovery report alone to recover your system. You must also have the system
information for recovery to be successful.
BRMS recovery report does NOT tell you how to configure your disk setup, partition profiles, or recover
Licensed Internal Code. Your recovery is only as good as your backup, So be sure to test your backup and
recovery strategy anytime you change it by doing a full system recovery. Test your recoveries at a disaster
recovery hot site, or by using a test system. It should be obvious, but I will advise you anyway NOT to use
your production server for testing.
You should send the BRMS recovery reports off your system. In a disaster, your System i (iSeries/AS/400)
will not be available, and you will not have access to the output (print) queue containing the latest recovery
report.
• Print your recovery report every time you do a backup and send it offsite with media and/or Email a
copy to another server not located in the same facility as your system. See recovery report automation
checkpoint.
Adding steps to recovery report
Starting at V5R4M0, it is now possible to add additional user recovery steps to the BRMS recovery report.
User recovery information can be included in the recovery report by adding records containing the
information to the appropriate members of file QO1AUSRRCY in library QUSRBRM. Add records to
member PROLOG to include user recovery information to the prolog information in the report.
• Add records to members STEP nnn to include user recovery information to specific steps in the report,
where nnn is the step number as it appears on the report. Up to 92 bytes of user recovery information
can be added to each record. There is no limit to the number of records.
• User recovery information is added to the report following the BRMS information and before any saved
items in the step. This information will be clearly highlighted on the report as user recovery information.
• Each record is read sequentially from the file member, starting from the first record and ending with the
last record, and will be added to the report in the same order as read. Each record will be placed on the
report following the last printed line starting in column 8.
• The user is responsible for all spacing, positioning and translation of the recovery information in each
record.
• The user is responsible for assuring the accuracy of the user recovery information.
• The step numbers in the report differ depending on the value of the Option (OPTION) parameter and the
content of the recovery. If the OPTION or content is changed, the names of the members in file
Page 25 of 60
26. BRMS Implementation and Configuration Notes
QO1AUSRRCY may need to be renamed accordingly. The step numbers should be consistent if the
report type and saved item content are consistent.
• No exception is signaled if user recovery information is requested but no records are found in the
members.
• When using STRRCYBRM USRRCYINF(*ADD) FROMSYS(), the user steps from the target system
will not be included in the recovery report unless the additional steps have being added to the
QO1AUSRRCY file in library QUSRBRM. on the system where the recovery report is being run on.
• STRRCYBRM ACTION(*RESTORE) USRRCYINF(*ADD) will fail with BRM132E
Hardware Management Console (HMC)
If you are using the Hardware Management Console (HMC) for eServer, You must back up the
HMC. This is in addition to using the BRMS *SYSTEM option to obtain a complete back up of your
system. In disaster recovery, a systems administrator can use an appropriate recovery CD and
the Critical Console Data backup to get the HMC back to the state it was in prior to the failure.
It is important to maintain a current Critical Console Data (CCD) back up to use in recovering the
HMC after loss of a disk drive or HMC. Whenever you go to a new version of the HMC code, or
use a Recovery CD to update the HMC, you should create a new CCD backup immediately. The
same is true if you update HMC code between releases using the corrective service files
downloadable from the web,
If you use Recovery media to update your Licensed Internal Code to a new release level, ensure
that you make a new CCD back up after the upgrade process. A CCD back up created at V4R3
will not work on a system upgraded to V4R5 using a Recovery CD.
• Run the initial backup (two copies) and send the DVDs offsite
• Use the HMC scheduler to run the HMC backup daily or weekly on another DVD so that it keep
overwriting the same DVD until there is a change in hardware or the code is updated or
upgraded.
Page 26 of 60
27. BRMS Implementation and Configuration Notes
Backup Critical Console Data
This task backs up all configuration data of the HMC to a DVD-RAM media, capturing any and all changes made to the HMC
after initial installation from the recovery CD.
The following data is included in the backup DVD-RAM media:
• User configuration.
• User preferences, including each user’s home directory.
• HMC configuration files that record the following customizing:
o TCP/IP
o Rexec/ssh facility setting
o Remote virtual terminal setting
o Time zone setting
• HMC log files located in the /var/log directory.
• Service functions settings, such as Inventory Scout, Service Agent, and Service Focal Point.
• Partition profile data backup. The partition profile data must be backed up before performing the “Backup Critical Console
Data” task. The task simply backs up files in the /var/hsc/profiles/MT-MDL*S/N directory, if they already exist.
This task should be performed each time configuration changes are made to the system or the HMC. You might even want to
consider scheduling a regular Backup Critical Console Data task.
Notes:
• The backup DVD-RAM created using this task is only used for the system recovery situation. When updating from an HMC
software level to another, the backup DVD-RAM media is not used.
• The DVD-RAM media has two sides. Each side should be considered as a separate media.
• Each side of a DVD-RAM media must be formatted beforehand.
• Each side of a DVD-RAM media can hold only one generation of the backup; if you performed this task multiple times, only
the backup taken the last time would be preserved.
Running Recovery Reports On Demand
Example of Volume Summary Report
Page 27 of 60
28. BRMS Implementation and Configuration Notes
Partial Example of Recover System Report
****************************************************************************************************
Selection Criteria
Option . . . . . . . . . . . . . : *SYSTEM
Start date and time . . . . . . : 3/28/11 *AVAIL
Ending date and time . . . . . . : *END *AVAIL
Use save files . . . . . . . . . : *YES
Use TSM . . . . . . . . . . . . : *YES
Use duplicate media . . . . . . : *NO
User recovery information . . . : *NO
Libraries to omit . . . . . . . : *DELETE
System name . . . . . . . . . . : BAKER
Volume location . . . . . . . . : *ALL
****************************************************************************************************
****************************************************************************************************
The following report is to be used in conjunction with the "Backup and
Recovery" book, SC41-5304, to assist with recovery from failures.
****************************************************************************************************
When recovering the system, refer to the section on "Recovering
after a Complete Loss" under chapter "Selecting the Right Recovery
Strategy" in the "Backup and Recovery" book, and the details shown
below to determine which recovery steps should be taken and the media
needed for each step.
If you have logical files, and based-on physical and logical files
are in different libraries, refer to the section on "Restoring Logical
Files" in the "Backup and Recovery" book for important restore
considerations before proceeding with recovery.
If you use journaling refer to the section on "Restoring Journals and
Journal Receivers" in the "Backup and Recovery" book for important
restore considerations before proceeding with recovery.
You can use the Start date/time, Stop date/time and Duration fields
to record the time it takes to test or perform your recovery.
A value of *SYSBAS for ASP Name refers to saved items backed up from
the system (1) or basic user (2-32) auxiliary storage pools.
A value of *ADSM for Volume Identifier refers to saved items backed
up to Tivoli Storage Manager (TSM) servers.
If the recovery includes saved items saved to TSM servers or saved
from auxiliary disk pool devices, these saved items will be recovered
after the IPL when these resources become available.
****************************************************************************************************
__ STEP 001 : Recover Licensed Internal Code
Start date/time __________________ Stop date/time __________________ Duration _________________
You must recover the Licensed Internal Code.
To do so, you must follow the procedures for "Recovering the Licensed
Internal Code" as detailed in the "Backup and Recovery" book.
Use the media listed for the *SAVSYS saved item to recover the
Licensed Internal Code.
An alternate installation device must be configured using Dedicated
Service Tools (DST) when the device is connected to a bus other than
the system bus, or the device is attached using a fiber channel.
The Licensed Internal Code distribution media will be required in
addition to the *SAVSYS saved item to recover the system.
----- Attention ---------------------------------------------------
__ Use option 2 when recovering to a different system, or recovering
a system with user auxiliary storage pools, or recovering to the same
system with a different release.
__ Use option 3 when recovering to the same system at the same release
or recovering a logical partition to another logical partition.
---------------------------------------------------------------------
----- Attention ---------------------------------------------------
If you are using a media library device, you will need to use either
standalone, automatic or manual mode, or use the device move media
function to load the media volume containing the *SAVSYS saved item.
Refer to the device documentation if you are not familiar with these
device modes or functions.
---------------------------------------------------------------------
--- Objects ---
Saved Save ----- ASP ------ Save Save Not Sequence Control Volume
Page 28 of 60
29. BRMS Implementation and Configuration Notes
Item Type Name Number Date Time Saved Saved Number Group Identifier
---------- ------- ---------- ----- -------- -------- ------- ------- --------- ---------- ----------
__ *SAVSYS *FULL *SYSBAS 00001 3/29/11 21:33:04 0 0 1 *SYSTEM 100152
****************************************************************************************************
__ STEP 002 : Recover Operating System
Start date/time __________________ Stop date/time __________________ Duration _________________
You must recover the Operating System.
To do so, you must follow the procedures for "Restoring the Operating
System" as detailed in the "Backup and Recovery" book.
Use the media listed for the *SAVSYS saved item to recover the
Operating System.
----- Attention ---------------------------------------------------
To prevent the recovery from failing, change the following system
values to the new settings when you reach the "Define and Change the
System at IPL" task during operating system recovery.
Record the current setting for use after the recovery is complete.
System value Current setting New setting
QALWOBJRST _______________ *ALL
QFRCCVNRST _______________ 0
QINACTIV _______________ *NONE
QIPLTYPE _______________ 2
QJOBMSGQFL _______________ *PRTWRAP
QJOBMSGQMX _______________ 30 (minimum, 64 recommended)
QLMTDEVSSN _______________ 0
QLMTSECOFR _______________ 0
QMAXSIGN _______________ *NOMAX
QPFRADJ _______________ 2
QPWDEXPITV _______________ *NOMAX
QSCANFSCTL _______________ *NOPOSTRST
QVFYOBJRST _______________ 1
---------------------------------------------------------------------
--- Objects ---
Saved Save ----- ASP ------ Save Save Not Sequence Control Volume
Item Type Name Number Date Time Saved Saved Number Group Identifier
---------- ------- ---------- ----- -------- -------- ------- ------- --------- ---------- ----------
__ *SAVSYS *FULL *SYSBAS 00001 3/29/11 21:33:04 0 0 1 *SYSTEM 100152
****************************************************************************************************
__ STEP 003 : Set Up Standalone or Media Library Devices for Recovery
Start date/time __________________ Stop date/time __________________ Duration _________________
If you are using a media library device and automatic configuration
is enabled, you can use the media library device to automate recovery
at this time if it is not a 3494 Media Library using TCP/IP.
----- Attention ---------------------------------------------------
If you are using a 3494 Media Library with TCP/IP communications for
recovery, continue to use the media library as a standalone device.
---------------------------------------------------------------------
----- Attention ---------------------------------------------------
If you are using a 3494 Media Library using APPC communications for
recovery, you must configure and setup the communications necessary
to control the cartridge loader.
---------------------------------------------------------------------
For recovery using the device as a media library (TAPMLBxx):
__ A. Unload the media volume containing the *SAVSYS saved item from
the device.
__ B. Load all the volumes needed for the recovery (including the
*SAVSYS volume) in the media library.
__ C. Set the media library device for library operations. Refer to
the device documentation if you are not familiar with enabling
the device for library operations.
__ D. Verify the status of the media library device is VARIED ON.
To do so, type the following command and press "Enter".
WRKMLBSTS
__ E. Use Option 4=Allocate resource to set the current allocation of
the media library resources to ALLOCATED.
For recovery using the device as a standalone device (TAPxx):
__ A. Retrieve all volumes needed for recovery. If you are using an
automatic cartridge loader, insert the volumes in the loader in
the required sequence.
__ B. Type the following command and press "Enter".
WRKDEVD DEVD(*TAP)
__ C. Use Option 8=Work with status to verify the status of the
Page 29 of 60
30. BRMS Implementation and Configuration Notes
device you are using is VARIED ON.
****************************************************************************************************
__ STEP 004 : Recover the BRMS Product and Associated Libraries
Start date/time __________________ Stop date/time __________________ Duration _________________
The BRMS product and associated libraries must be recovered before
you can use the product to perform other recovery operations.
Change the QSYSOPR message queue to prevent messages not related to
the recovery from interrupting the recovery process.
To do so, type the following command and press "Enter".
CHGMSGQ MSGQ(QSYSOPR) DLVRY(*NOTIFY) SEV(99)
Choose from the configured devices, the standalone devices or media
libraries you intend to use for the recoveries which follow.
For tape devices, run the following command.
WRKCFGSTS CFGTYPE(*DEV) CFGD(*TAP)
For media library devices, run the following command.
WRKCFGSTS CFGTYPE(*DEV) CFGD(*TAPMLB)
Type the command choice and press "Enter".
Recover the libraries listed below, specifying the saved-item, the
name of the standalone device or media library you are using,
and the volume identifiers and sequence numbers listed.
For type *FULL, run the following command.
RSTLIB SAVLIB(saved-item) DEV(device-name)
VOL(volume-identifier) SEQNBR(sequence-number)
For type *CUML or *INCR, run the following command.
RSTOBJ OBJ(*ALL) SAVLIB(saved-item) DEV(device-name)
VOL(volume-identifier) SEQNBR(sequence-number)
MBROPT(*ALL)
Type the command choice and press "Enter".
----- Attention ---------------------------------------------------
If you did not save access paths when you saved the QUSRBRM library,
these access paths will be rebuilt when the library is restored.
Verify rebuild of the access paths for files in library QUSRBRM is
complete before proceeding to the next recovery step.
To do so, type the following command and press "Enter".
EDTRBDAP
---------------------------------------------------------------------
--- Objects ---
Saved Save ----- ASP ------ Save Save Not Sequence Control Volume
Item Type Name Number Date Time Saved Saved Number Group Identifier
---------- ------- ---------- ----- -------- -------- ------- ------- --------- ---------- ----------
__ QBRM *FULL *SYSBAS 00001 3/29/11 21:44:13 1,294 0 38 *SYSTEM 100152
__ QMSE *FULL *SYSBAS 00001 3/29/11 21:44:13 7 0 63 *SYSTEM 100152
__ Q1ABRMSF *FULL *SYSBAS 00001 3/29/11 21:44:13 1 0 82 *SYSTEM 100152
__ Q1ABRMSF01 *FULL *SYSBAS 00001 3/29/11 21:44:13 1 0 83 *SYSTEM 100152
__ QUSRBRM *FULL *SYSBAS 00001 3/29/11 21:50:32 219 0 102 *SYSTEM 100152
****************************************************************************************************
__ STEP 005 : Recover BRMS Related Media Information
Start date/time __________________ Stop date/time __________________ Duration _________________
You must recover this information for the BRMS product to accurately
guide you through the remaining recovery steps.
Recover the libraries listed below, specifying the saved-item, the
name of the standalone device or media library you are using,
and the volume identifiers and sequence numbers listed.
To do so, type the following command and press "Enter".
RSTOBJ OBJ(*ALL) SAVLIB(saved-item) DEV(device-name)
VOL(volume-identifier) SEQNBR(sequence-number)
MBROPT(*ALL)
--- Objects ---
Saved Save ----- ASP ------ Save Save Not Sequence Control Volume
Item Type Name Number Date Time Saved Saved Number Group Identifier
---------- ------- ---------- ----- -------- -------- ------- ------- --------- ---------- ----------
__ QUSRBRM *QBRM *SYSBAS 00001 3/29/11 22:14:49 15 0 105 *SYSTEM 100152
****************************************************************************************************
__ STEP 006 : Initialize BRMS Functional Authority Information
Start date/time __________________ Stop date/time __________________ Duration _________________
You must perform this step to initialize BRMS functional authorities.
Register all BRMS resources which use functional authority.
To do so, type the following command and press "Enter".
INZBRM OPTION(*SETAUT)
Assign the QSECOFR user profile administrative functional authority
to the BRMS resources.
Page 30 of 60
31. BRMS Implementation and Configuration Notes
To do so, type the following command and press "Enter".
SETUSRBRM USER(QSECOFR) USAGE(*ADMIN)
****************************************************************************************************
__ STEP 007 : Update System Name in BRMS Media Information
Start date/time __________________ Stop date/time __________________ Duration _________________
BRMS uses the network identifier and default local location name from
the system network attributes to assign a system owner to saved items
and the media containing those saved items.
The network attributes for the saved system are:
Local network ID . . . . . . . . . . .: APPN
Default local location . . . . . . . .: BAKER
Display the network attributes of the recovery system.
To do so, type the following command and press "Enter".
DSPNETA
Record the network attributes of the recovery system:
Local network ID . . . . . . . . . . .: ____________________
Default local location . . . . . . . .: ____________________
If the local network identifier or default local location for the
saved system are different from the recovery system and the recovery
system is correct, you must change the system owner of the saved
items and media in the BRMS history to match the network attributes.
To do so, type the following command and press "Enter".
INZBRM OPTION(*CHGSYSNAM) PRVSYSNAM(APPN.S10602TM ) NEWSYSNAM(*LCL)
----- Attention ---------------------------------------------------
Be sure to specify a fully qualified name for the saved system
using "local-network-id.default-local-location" format.
---------------------------------------------------------------------
If the local network identifier or default local location for the
Select the saved item(s) listed below from the "Select Recovery Items"
display and press "Enter" to recover these saved items. Recovery of
these saved items will require the volumes listed on the report or
duplicate volumes.
--- Objects ---
Saved Save ----- ASP ------ Save Save Not Sequence Control Volume
Item Type Name Number Date Time Saved Saved Number Group Identifier
---------- ------- ---------- ----- -------- -------- ------- ------- --------- ---------- ----------
__ *SAVCFG *FULL *SYSBAS 00001 3/29/11 21:33:04 60 0 36 *SYSTEM 100152
****************************************************************************************************
__ STEP 012 : Recover Required System Libraries
Start date/time __________________ Stop date/time __________________ Duration _________________
You must restore specific system libraries before you can use BRMS to
perform other recovery steps.
If the "Select Recovery Items" display is not shown and you are
performing a complete system restore, run the following command.
STRRCYBRM OPTION(*RESUME)
Otherwise, run the following command.
STRRCYBRM OPTION(*SYSTEM) ACTION(*RESTORE)
Type the command choice and press "Enter".
Select the saved item(s) listed below from the "Select Recovery Items"
display and press "Enter" to recover these saved items. Recovery of
these saved items will require the volumes listed on the report or
duplicate volumes.
--- Objects ---
Saved Save ----- ASP ------ Save Save Not Sequence Control Volume
Item Type Name Number Date Time Saved Saved Number Group Identifier
---------- ------- ---------- ----- -------- -------- ------- ------- --------- ---------- ----------
__ QSYS2 *FULL *SYSBAS 00001 3/29/11 21:48:27 213 0 85 *SYSTEM 100152
__ QGPL *FULL *SYSBAS 00001 3/29/11 21:48:27 1,359 0 86 *SYSTEM 100152
__ QUSRSYS *FULL *SYSBAS 00001 3/29/11 21:48:27 3,676 0 87 *SYSTEM 100152
****************************************************************************************************
__ STEP 013 : Reset BRMS Device and Media Library Information
Start date/time __________________ Stop date/time __________________ Duration _________________
You must reset the BRMS device and media library information.
----- Attention ---------------------------------------------------
If you are using a 3494 Media Library with TCP/IP communications for
recovery, you can now configure the media library for automated
cartridge loading. Configure the 3494 Media Library before you reset
the BRMS device and media library information.
---------------------------------------------------------------------
Clear and initialize the BRMS device and media library information with
the tape and media library devices currently configured on the system.
Page 31 of 60
32. BRMS Implementation and Configuration Notes
To do so, press F12 to return to a command prompt, then type the
following command and press "Enter".
INZBRM OPTION(*DEVICE)
----- Attention ---------------------------------------------------
INZBRM OPTION(*DEVICE) resets some device information to the BRMS
supplied defaults.
---------------------------------------------------------------------
Review the BRMS device information.
To do so, type the following command and press "Enter".
WRKDEVBRM
Update the BRMS device information with any changes necessary before
continuing with the recovery.
****************************************************************************************************
__ STEP 014 : Recover All Remaining System and User Data
Start date/time __________________ Stop date/time __________________ Duration _________________
You may now select to recover all of the data on your system.
Otherwise, skip to the next recovery step.
To do so, type the following command and press "Enter".
STRRCYBRM OPTION(*RESUME)
----- Attention ---------------------------------------------------
Press F9 on the Select Recovery Items display to go to the Restore
Command Defaults display.
__ Ensure the tape device name or media library device name is
correct for the Device prompt.
__ Ensure *SAVLIB is specified for the Restore to library prompt.
__ Ensure *SAVASP is specified for the Auxiliary storage pool prompt.
Press "Enter" to return to the Select Recovery Items display.
---------------------------------------------------------------------
Some system specific lines omitted
Review the joblog or output from your recovery processing
to ensure all recovery steps completed successfully.
Restore authorities to objects.
To do so, type the following command and press "Enter".
RSTAUT USRPRF(*ALL)
To restore authority information saved by BRMS for basic user auxiliary
pools (2-32), run the following command.
RSTAUTBRM USRASP(*ALLUSR)
Type the command choice and press "Enter".
***************************************************************************************************
_ STEP 024 : Verify System Information
Start date/time __________________ Stop date/time __________________ Duration _________________
You should verify your system information.
If you use either of the following commands after the save, additional
reports are created which can be used to verify the system information.
STRRCYBRM PRTSYSINF(*YES)
STRMNTBRM PRTSYSINF(*YES)
If you are using distribution media to restore your system, then you
should use these reports to re-create the system information as
as detailed in the "Backup and Recovery" book.
****************************************************************************************************
__ STEP 025 : Apply PTFs
Start date/time __________________ Stop date/time __________________ Duration _________________
Re-apply PTFs which were applied after the last save of system data.
****************************************************************************************************
__ STEP 026 : Reset System Values
Start date/time __________________ Stop date/time __________________ Duration _________________
Use the commands and recorded values in step "Recover Operating
System" to change the system values to the original setting or to a
new value that meets your desired policy.
****************************************************************************************************
__ STEP 027 : Print Job Log
Page 32 of 60
33. BRMS Implementation and Configuration Notes
Start date/time __________________ Stop date/time __________________ Duration _________________
You should print the joblog.
To do so, type the following command and press "Enter".
DSPJOBLOG JOB(*) OUTPUT(*PRINT)
Review the joblog or output from your recovery processing
to ensure all recovery steps completed successfully.
****************************************************************************************************
__ STEP 028 : Perform IPL
Start date/time __________________ Stop date/time __________________ Duration _________________
Return system to normal mode and IPL.
To do so, type the following command and press "Enter".
PWRDWNSYS OPTION(*IMMED) RESTART(*YES)
* * * * * E N D O F L I S T I N G * * * * *
Page 33 of 60
34. BRMS Implementation and Configuration Notes
Restoring an IFS object
Work with Link Information (WRKLNKBRM) command
The Work with Link Information using BRM (WRKLNKBRM) command works with IFS objects saved using
BRMS.
• Select recovery dates (and/or optionally select directory to restore from) and Press Enter.
• Select directory or sub directory level to restore from with option 9
Page 34 of 60
35. BRMS Implementation and Configuration Notes
• Select volume and date to restore from using option 7.
• Accept default device press F9=Show All Parameters and page down
• Enter a new location if desired, otherwise accept default and page down.
Note: If you are restoring to a new directory change the Create Parent Directories and Allow Object
Differences parameters as shown on the next two panels.
Page 35 of 60
36. BRMS Implementation and Configuration Notes
• Change the Create Parent Directories parameter to *YES if you are restoring to a new location.
• Change the Allow Object Differences parameter.
• Press Enter to start the restore.
• Use the Work with Link (WRKLNK) command to access restored objects in target directory.
Page 36 of 60
37. BRMS Implementation and Configuration Notes
Installing IBM i Navigator Plug-In
• Plug-in support provides the capability to integrate (plug-in) custom tools and applications with
formally supported Operations Navigator functions.
• Enables applications to be accessed and managed as if they were part of the standard
Operations Navigator navigation tree of functions.
An application must be registered to Operations Navigator as a plug-in. Key IBM-provided plug-ins
for v6r1 include:
• Advanced Job Scheduler – 5761JS1
• Backup, Recovery and Media Services (BRMS) – 5761BR1
• Domino for System i - 5761LN1
• On-Demand for System – 5761RD1
• Performance Tools – 5761PT1
• After connecting to the System I, Auto-detection of Plug-Ins is started and a window showing
registered plug-ins, if any, is shown. From that list you can select to install none or each
registered plug-in.
Page 37 of 60
39. BRMS Implementation and Configuration Notes
Additional Resources
Backup and Recovery; SC41-5304-09 (6.1)
Backup and Recovery; SC41-5304-10 (7.1)
Backup, Recovery and Media Services; SC41-5345-06 (6.1)
Backup, Recovery and Media Services; SC41-5345-07 (7.1)
Virtual Tape Redbook; SQ24-7164
i5/OS V5R4 Virtual Tape: A Guide to Planning and Implementation
http://www.redbooks.ibm.com/abstracts/sg247164.html
BRMS for IBM i
http://www-03.ibm.com/systems/i/support/brms/index.html?
Backup, Recovery and Media Services (BRMS) Overview
http://www2.systeminetwork.com/resources/starterkit/chp16/chp16.htm
Backup, Recovery and Media Services for OS/400 – A Practical Approach
http://www.redbooks.ibm.com/abstracts/sg244840.html
Backup, Recovery and Media Services for i 7.1
http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/topic/brms/sc415345.pdf
Page 39 of 60
40. BRMS Implementation and Configuration Notes
Appendix 1 - Display Media Library Status (DSPMLBSTS)
Source Code for Model Tables
Control Group Model Table – iCTLGRP DDL Script
Drop Table ictlgrp;
Create Table ictlgrpR
(controlGroup For Column ctlgrp Character (10 ) Not Null,
Primary Key ( ctlgrp ) );
Label On ictlgrpR
(ctlgrp Text Is 'Control Group');
Label On ictlgrpR
(ctlgrp Is 'Control Group');
Comment On ictlgrpR
(ctlgrp Is 'Control Group');
Label On Table ictlgrpR
Is 'OPNQRYF format for Control Group (BRMS)';
Comment On Table ictlgrpR
Is 'OPNQRYF format for Control Group (BRMS)';
Rename Table ictlgrpR To System Name ictlgrp;
Media Class Model Table – iMEDCLS DDL Script
Drop Table imedCls;
Create Table imedClsR
(mediaClass For Column medCls Character (10 ) Not Null,
mediaText For Column medTxt Character (50 ) Not Null
With Default ' ',
Primary Key ( medCls ) );
Label On imedClsR
(medCls Text Is 'Media Class',
medTxt Text Is 'Media Text');
Label On imedClsR
(medCls Is 'Media Class',
medTxt Is 'Media Text');
Comment On imedClsR
(medCls Is 'Media Class',
medTxt Is 'Media Text');
Label On Table imedClsR
Is 'OPNQRYF format for Media Class (BRMS)';
Comment On Table imedClsR
Is 'OPNQRYF format for Media Class (BRMS)';
Rename Table imedClsR To System Name imedCls;
Page 40 of 60
46. BRMS Implementation and Configuration Notes
/* STANDARD (STD) RETRIEVE DIAGNOSTIC MESSAGES ROUTINE */
Oops: If ((&errCnt *gt 0)) Then(Goto Exit)
Chgvar (&errCnt) (&errCnt + 1)
ChgJob Log(4 0 *seclvl) /* Change option to spool joblog */
Diag: RcvMsg MsgId(&msgId) +
MsgDta(&msgDta) +
MsgType(*diag) +
MsgF(&msgFil) +
SndMsgFLib(&msgLib)
MonMsg Cpf0000
If ((&msgId *eq ' ')) Then(Goto Escp)
SndPgmMsg MsgId(&msgId) +
MsgDta(&msgDta) +
MsgType(*diag) +
MsgF(&msgLib/&msgFil) +
Topgmq(*prv)
MonMsg Cpf0000
Goto Diag
/* STANDARD (STD) RETRIEVE EXCEPTION MESSAGES ROUTINE */
Escp: RcvMsg MsgId(&msgId) +
MsgDta(&msgDta) +
MsgType(*excp) +
MsgF(&msgFil) +
SndMsgFLib(&msgLib)
MonMsg Cpf0000
SndPgmMsg MsgId(&msgId) +
MsgDta(&msgDta) +
MsgType(*escape) +
MsgF(&msgLib/&msgFil) +
Topgmq(*prv)
MonMsg Cpf0000
Goto Exit
/* STANDARD (STD) PROGRAM TERMINATION AND COMPLETION */
Exit: Return
EndPgm
DSPMLBSTS3 – Display Media Library Status 3 Value Choice Program
/*********************************************************************/
/* Program: Display Media Library Status (DSPMLBSTS3) - CVP */
/* Author: Thomas Wolfe */
/* Created: 04/27/2001 */
/* */
/* This source code may be freely distributed and modified as long */
/* as the copyright information is not removed or altered. */
/* */
/* Copyright 2011, 400 Squadron Inc. */
/* */
/* Licensed under the Apache License, Version 2.0 (the "License"); */
/* you may not use this file except in compliance with the License. */
/* You may obtain a copy of the License at: */
/* */
/* http://www.apache.org/licenses/LICENSE-2.0 */
/* */
/* Unless required by applicable law or agreed to in writing, */
/* software distributed under the License is distributed on an */
/* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, */
/* either express or implied. See the License for the specific */
/* language governing permissions and limitations under the */
/* License. */
/* */
/*********************************************************************/
/* Purpose: BRMS (TSM) media library integration (wrapper) utility. */
Page 46 of 60