This session will give a detailed report on the functionality found in newer kernel versions as it relates to Linux on System z. Areas included are advanced virtualization, storage support, RAS, security, as well as usability and serviceability. This session will also give some insight into the IBM Linux on System z development process itself.
Last, not least, attendees get an overview of features, functionalities and tools specific to SUSE Linux Enterprise Server for System z.
This session will teach you how to leverage virtualization and advanced management technologies from Novell to build an internal cloud infrastructure. You'll be able to build an infrastructure that allows your IT organization to package, price and promote IT service capabilities to your internal customers while giving them exceptional visibility into how those services are performing against SLA targets. Learn what an enterprise cloud is, and why having a virtual infrastructure isn't enough. Understand how the concept of an internal cloud can help you work better and more efficiently with your customers, improve communication, boost utilization and speed delivery of new IT services.
How Partners Are Helping Customers with Novell TeamingNovell
Novell Teaming brought next-generation team collaboration capabilities to the Novell portfolio. And Novell Teaming 2 offers even more to make your teams as productive as possible. In this session you'll hear from two Novell partners with significant experience deploying Novell Teaming in customer environments. Join them to learn about the success they've seen as organizations leverage the product's innovative team workspace, document management, knowledge retention and workflow capabilities.
This session will explore what happens after server consolidation: Workload profiles change, usage patterns change, and resource utilization goes up and down. During this session, we will discuss how the storage footprint changes, and what used to be ideally optimized isn't anymore.
You will learn how to quantify the gap between resource allocation and actual usage, how to recover and redeploy excess capacity, and how to find common virtual machine configuration mistakes that can degrade overall performance.
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
You've read the documentation, played in the lab, and now you're ready to jump in and upgrade your NetWare environment to Novell Open Enterprise Server 2 on Linux. Attend this session to glean a final few best practices and to learn how to make the most of the migration tools included in the product. You'll also learn about the various pitfalls encountered during real-world upgrades, as well as the solutions used to resolve them.
Integrating Novell Teaming within Your Existing InfrastructureNovell
So you've decided to implement Novell Teaming, but how do you use it to leverage your existing environment to the fullest extent? Using product demonstrations, this session will how you how to configure authentication against existing LDAP directories; how to integrate with Novell GroupWise, Exchange or other e-mail systems; and how to expose existing document stores so they can be searched and accessed through the Novell Teaming interface.
IBM is investing $1B in Linux on Power. How can your organization save money, increase utilization of available resources and gain benefits from SUSE Linux Enterprise Server on IBM Power
Linux: The Journey, Milestones, and What's AheadJarod Wang
Oracle cares about Linux because in the late 1990s, it saw that Linux on commodity hardware could help standardize IT infrastructure and reduce costs. Oracle adopted a strategy of combining Linux, commodity hardware, and its own products. This allowed customers to deploy and deliver cost effective, reliable, and open standards-based applications. Since then, Oracle has fully embraced Linux and made major commitments to its development and support, helping establish Linux as the standard operating system in the data center.
This session will teach you how to leverage virtualization and advanced management technologies from Novell to build an internal cloud infrastructure. You'll be able to build an infrastructure that allows your IT organization to package, price and promote IT service capabilities to your internal customers while giving them exceptional visibility into how those services are performing against SLA targets. Learn what an enterprise cloud is, and why having a virtual infrastructure isn't enough. Understand how the concept of an internal cloud can help you work better and more efficiently with your customers, improve communication, boost utilization and speed delivery of new IT services.
How Partners Are Helping Customers with Novell TeamingNovell
Novell Teaming brought next-generation team collaboration capabilities to the Novell portfolio. And Novell Teaming 2 offers even more to make your teams as productive as possible. In this session you'll hear from two Novell partners with significant experience deploying Novell Teaming in customer environments. Join them to learn about the success they've seen as organizations leverage the product's innovative team workspace, document management, knowledge retention and workflow capabilities.
This session will explore what happens after server consolidation: Workload profiles change, usage patterns change, and resource utilization goes up and down. During this session, we will discuss how the storage footprint changes, and what used to be ideally optimized isn't anymore.
You will learn how to quantify the gap between resource allocation and actual usage, how to recover and redeploy excess capacity, and how to find common virtual machine configuration mistakes that can degrade overall performance.
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
You've read the documentation, played in the lab, and now you're ready to jump in and upgrade your NetWare environment to Novell Open Enterprise Server 2 on Linux. Attend this session to glean a final few best practices and to learn how to make the most of the migration tools included in the product. You'll also learn about the various pitfalls encountered during real-world upgrades, as well as the solutions used to resolve them.
Integrating Novell Teaming within Your Existing InfrastructureNovell
So you've decided to implement Novell Teaming, but how do you use it to leverage your existing environment to the fullest extent? Using product demonstrations, this session will how you how to configure authentication against existing LDAP directories; how to integrate with Novell GroupWise, Exchange or other e-mail systems; and how to expose existing document stores so they can be searched and accessed through the Novell Teaming interface.
IBM is investing $1B in Linux on Power. How can your organization save money, increase utilization of available resources and gain benefits from SUSE Linux Enterprise Server on IBM Power
Linux: The Journey, Milestones, and What's AheadJarod Wang
Oracle cares about Linux because in the late 1990s, it saw that Linux on commodity hardware could help standardize IT infrastructure and reduce costs. Oracle adopted a strategy of combining Linux, commodity hardware, and its own products. This allowed customers to deploy and deliver cost effective, reliable, and open standards-based applications. Since then, Oracle has fully embraced Linux and made major commitments to its development and support, helping establish Linux as the standard operating system in the data center.
The document discusses new features and updates to Novell's iPrint printing solution for Linux environments. It covers Windows 7 support, printer driver profiles that allow pre-configuring driver settings, automatic driver/profile updates, accounting integration, and tools for troubleshooting and migrating existing iPrint configurations. The presentation provides information on implementing and using these various iPrint capabilities.
Adaptive Computing Using PlateSpin OrchestrateNovell
Adaptive computing goes beyond just intelligently utilizing available resources; it encompasses quality of service (QoS) targets, fault tolerance (high availability), monitoring, and iterative analysis of the resulting dataset to determine what corrective measures (adaptations) should occur at any given moment. As virtualization becomes widespread in the data center, the need for automating the placement and configuration of workloads (virtual machines) using an adaptive computing model becomes vitally important. This session demonstrates how to use events, introduced in PlateSpin Orchestrate 2.0.2, to create rules that trigger workload provisioning, migration, and other virtual machine lifecycle operations. It will also offer a preview of new functionality included in the upcoming 2.1 release of the product.
Novell Success Stories: Collaboration in EducationNovell
Novell Collaboration benefits are to increase productivity, manage information growth, and leverage investments and skills on Linux.
The beaver Dam Unified School District, the University of Regensburg, George Washington University, and Tuscaloosa City Schools all employ Novell Collaboration services- from Novell Teaming, to Groupwise, to ZENworks, and more- to meet their IT needs.
Novell Identity Manager Tips, Tricks and Best PracticesNovell
This session covers the top tips, tricks and best practices for each component of Novell Identity Manager. You will receive experience by learning from the common mistakes made by others. The session focuses on the identity engine, connector set, Roles Based Provisioning Module and utilities that go into making any Identity Manager implementation easy. You will walk away with the knowledge of best practices for installation, configuration, and customization of Identity Manager. In addition, you will know how to create new policies to enhance your identity and access management solution by removing the barriers between applications, data stores and network platforms. A good understanding of Novell Identity Manager architectures and policies is highly recommended.
There are many roadblocks to cloud adoption. This session will discuss those roadblocks and show how Novell technology and products make the cloud safe, secure, auditable and compliant.
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
Benefit from the hard-won experience gained by Novell Consulting in dozens of Novell Open Enterprise Server 2 upgrades. In this session, we will discuss the methodologies successfully used with both large and small customers. We'll also discuss prerequisites, environmental preparation, migration strategies and post-migration cleanup. Handouts containing a pre-migration discovery survey and a migration checklist will be provided.
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
This session will discuss issues that arise when migrating from Red Hat Enterprise Linux to SUSE Linux Enterprise Server. The session will focus on tools and techniques that can be used in aiding the migration, covering basic migration issues, analysis of the installation base, and moving third-party applications from Red Hat to SUSE Linux Enterprise Server. The session will also briefly touch on the Novell Expanded Support program.
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
Novell Sentinel provides many useful reports right out of the box, but what do you do when you are looking for a custom report? This session will explore how to leverage and integrate the third-party reporting tools Crystal Reports and Jasper. We will introduce you to the Sentinel and Jasper reporting environments from setup to basic usage. You will also learn how to create and generate highly customizable reports that present the Sentinel normalized event data in a format that fits your environment.
Session Benefits
During the session, you will:
Learn how to set up a Crystal Reports and Jasper reporting environment
Create basic reports for Sentinel with reporting tools
Become familiar with the Sentinel and reports environments
Briefly overview the syntax to parse and manipulate normalized Sentinel data
Demonstrate the use of iReport, the graphical report designer for Jasper, to customize existing templates
Maintaining deployed software systems is one of the most challenging processes in enterprise IT. As software systems are deployed, they compound management and maintenance burdens for IT personnel. Systems that are not maintained correctly can result in increased downtime and expenses. Software appliances are no different. But during this session we'll show you simple and easy it is to use the tools that help you keep your software appliances up to date. You will learn how to handle the authentication, entitlement and access controls required to distribute updates. We will show you a framework for remote appliance configuration. And finally, you will learn how to meet unique remote appliance management needs.
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
This session will provide everything you need to know to deploy Novell iFolder 3.8—as well as a look at its latest set of rich features. Showcasing iFolder in single-server, multi-server and cluster deployments, we'll demonstrate iFolder as load balancer and iFolder in a Storage Area Network on Fiber Channel. You'll also hear about new iFolder features like Active Directory integration, pass phrase recovery, platform support and more.
The document provides guidance on effective processes for migrating device software to Linux. It discusses selecting a commercial Linux distribution to focus resources on application software rather than operating system development. The document outlines a methodology for Linux migration projects, including defining success metrics, assessing risks, and addressing impacts to the software development environment. Project phases discussed are startup, requirements, and design, with emphasis on configuration management, testing practices, and flowing requirements to architectural components.
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Novell
Novell Identity Manager tools for implementation and administration have always been the product's key differentiating factor. Recent changes have made Identity Manager implementations even more easy and efficient. Whether you are new to Identity Manager or are an existing user, attend this session to learn more about Designer, Analyzer and iManager.
For Designer, you will hear about Identity Manager staging, role-based entitlements, and key performance improvements such as working over VPN and an optimized import/deployment of your identity management project. The presenters will also offer insight into how well Designer supports the latest versions of Identity Manager and Novell Identity Manager Roles Based Provisioning Module with the new Rich Client Platform (RCP) Designer and the support it offers to Novell Compliance Management Platform. Finally, you'll hear about the Designer roadmap for the Identity Manager product line.
You will also hear about the data cleansing and massaging capabilities in Analyzer. For iManager, you will see new features such as war file deployment.
Virtualizing Mission-critical Workloads: The PlateSpin StoryNovell
Explore the key roadblocks to virtualizing mission-critical workloads. Discuss the potential benefits, in terms of performance and service-level delivery, in migrating these workloads to an internal cloud. Learn how PlateSpin solutions pave the way to migrating mission-critical workloads with little or no downtime, integrate non-disruptive testing in the virtual environment, and provide real-time workload protection and recovery.
Integrating Apple Macs Using Novell TechnologiesNovell
Apple Macs continue to increase in popularity and make up an increasingly large percentage of enterprise desktops. In this session, we'll explore the various Novell products and technologies that can be used to integrate Macs into your environment. You'll leave with a clear understanding of the issues involved and the options available to support the Mac user community in a Novell environment. You'll also have a chance to discuss suggestions for improving on this support.
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Have you wondered what the future of collaboration looks like? Because collaboration is so central to our customers' productivity and profitability, it's a key area for innovation at Novell. It's also an area that complements our focus on intelligent workload management. Attend this session, presented by the Novell Collaboration leadership team, for a sneak peek into our plans for collaboration innovation, as well as the link between collaboration and intelligent workload management.
Richard Lindstedt Collaboration Solution Manager, Novell, Inc.
Ken Muir CTSO - Collaboration Novell, Inc.
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
As your company considers moving toward the cloud either by adopting more Software-as-a-Service applications or other cloud services, the complexity and management of security policies and identities increase. Learn how you can manage a multi-SaaS environment to consistently enforce your internal identity and policy roles in the cloud. Leverage your existing identity infrastructure to enable single sign-on, access the right resources and receive audit logs from the cloud
This document summarizes a presentation on Novell's GroupWise mobility solutions. It discusses Research in Motion and NotifyCorp as existing solutions, then focuses on Novell's Data Synchronizer Mobility Pack. The Mobility Pack allows bidirectional synchronization between GroupWise and mobile devices, supporting email, calendars, contacts and other data. It provides a scalable architecture with a web-based administration interface and connectors that integrate with GroupWise and other applications.
With proven services trusted by organizations all over the world, Novell Open Enterprise Server continues to bring you the innovative capabilities your environment demands. Attend this session to learn more about the architecture that underpins this product and its enterprise-class services. You'll walk away having a greater understanding of Novell Open Enterprise Server on Linux—and how you can leverage it for maximum efficiency and cost savings.
MySQL's 2008-2009 roadmap included:
(1) Enhancements to MySQL Server, including new storage engines, partitioning, and performance improvements.
(2) New tools like MySQL Load Balancer and Query Analyzer to help customers scale their applications and diagnose performance issues.
(3) Ongoing development of MySQL Cluster and features for the MySQL 6.0 release focused on subquery optimization, foreign keys, and online backup/restore.
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...The Linux Foundation
In our interconnected world of mobile and cloud computing, particularly with the rise of governmental spying, corporate espionage, and theft of data by organized crime syndicates, security is more important than ever. Many claims are being made about the security of open-source cloud technologies: How can administrators, users, and developers separate fact from fiction?
This talk will equip the audience with the principles needed to evaluate security claims. We will talk the nature of risk, of vulnerabilities and exploits; the various factors that reduce the risk of vulnerabilities in software; and about TCB, threat models, and defense-in-depth.
We will then apply these principles to three open-source cloud technologies: containers, KVM, and Xen, to see how they stack up. These will be backed up with numbers: lines of code, security advisories, entry points, and so on.
Systemz Security Overview (for non-Mainframe folks)Mike Smith
The document provides an overview of mainframe security for non-mainframe personnel. It discusses IBM System z and how it fulfills its security strategy through three main approaches: 1) enhancing its own host protection through continuous advancements in security capabilities, 2) protecting host interfaces and boundaries to secure identities and data passing across borders, and 3) extending its high quality of service in security into the enterprise through technologies like encryption and identity management. The document highlights several core security features of System z including resource profiles, user profiles, RACF, and how z/OS TCP/IP provides security through features like SAF protection, intrusion detection services, IP filtering, and IPSec.
The document discusses new features and updates to Novell's iPrint printing solution for Linux environments. It covers Windows 7 support, printer driver profiles that allow pre-configuring driver settings, automatic driver/profile updates, accounting integration, and tools for troubleshooting and migrating existing iPrint configurations. The presentation provides information on implementing and using these various iPrint capabilities.
Adaptive Computing Using PlateSpin OrchestrateNovell
Adaptive computing goes beyond just intelligently utilizing available resources; it encompasses quality of service (QoS) targets, fault tolerance (high availability), monitoring, and iterative analysis of the resulting dataset to determine what corrective measures (adaptations) should occur at any given moment. As virtualization becomes widespread in the data center, the need for automating the placement and configuration of workloads (virtual machines) using an adaptive computing model becomes vitally important. This session demonstrates how to use events, introduced in PlateSpin Orchestrate 2.0.2, to create rules that trigger workload provisioning, migration, and other virtual machine lifecycle operations. It will also offer a preview of new functionality included in the upcoming 2.1 release of the product.
Novell Success Stories: Collaboration in EducationNovell
Novell Collaboration benefits are to increase productivity, manage information growth, and leverage investments and skills on Linux.
The beaver Dam Unified School District, the University of Regensburg, George Washington University, and Tuscaloosa City Schools all employ Novell Collaboration services- from Novell Teaming, to Groupwise, to ZENworks, and more- to meet their IT needs.
Novell Identity Manager Tips, Tricks and Best PracticesNovell
This session covers the top tips, tricks and best practices for each component of Novell Identity Manager. You will receive experience by learning from the common mistakes made by others. The session focuses on the identity engine, connector set, Roles Based Provisioning Module and utilities that go into making any Identity Manager implementation easy. You will walk away with the knowledge of best practices for installation, configuration, and customization of Identity Manager. In addition, you will know how to create new policies to enhance your identity and access management solution by removing the barriers between applications, data stores and network platforms. A good understanding of Novell Identity Manager architectures and policies is highly recommended.
There are many roadblocks to cloud adoption. This session will discuss those roadblocks and show how Novell technology and products make the cloud safe, secure, auditable and compliant.
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
Benefit from the hard-won experience gained by Novell Consulting in dozens of Novell Open Enterprise Server 2 upgrades. In this session, we will discuss the methodologies successfully used with both large and small customers. We'll also discuss prerequisites, environmental preparation, migration strategies and post-migration cleanup. Handouts containing a pre-migration discovery survey and a migration checklist will be provided.
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
This session will discuss issues that arise when migrating from Red Hat Enterprise Linux to SUSE Linux Enterprise Server. The session will focus on tools and techniques that can be used in aiding the migration, covering basic migration issues, analysis of the installation base, and moving third-party applications from Red Hat to SUSE Linux Enterprise Server. The session will also briefly touch on the Novell Expanded Support program.
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
Novell Sentinel provides many useful reports right out of the box, but what do you do when you are looking for a custom report? This session will explore how to leverage and integrate the third-party reporting tools Crystal Reports and Jasper. We will introduce you to the Sentinel and Jasper reporting environments from setup to basic usage. You will also learn how to create and generate highly customizable reports that present the Sentinel normalized event data in a format that fits your environment.
Session Benefits
During the session, you will:
Learn how to set up a Crystal Reports and Jasper reporting environment
Create basic reports for Sentinel with reporting tools
Become familiar with the Sentinel and reports environments
Briefly overview the syntax to parse and manipulate normalized Sentinel data
Demonstrate the use of iReport, the graphical report designer for Jasper, to customize existing templates
Maintaining deployed software systems is one of the most challenging processes in enterprise IT. As software systems are deployed, they compound management and maintenance burdens for IT personnel. Systems that are not maintained correctly can result in increased downtime and expenses. Software appliances are no different. But during this session we'll show you simple and easy it is to use the tools that help you keep your software appliances up to date. You will learn how to handle the authentication, entitlement and access controls required to distribute updates. We will show you a framework for remote appliance configuration. And finally, you will learn how to meet unique remote appliance management needs.
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
This session will provide everything you need to know to deploy Novell iFolder 3.8—as well as a look at its latest set of rich features. Showcasing iFolder in single-server, multi-server and cluster deployments, we'll demonstrate iFolder as load balancer and iFolder in a Storage Area Network on Fiber Channel. You'll also hear about new iFolder features like Active Directory integration, pass phrase recovery, platform support and more.
The document provides guidance on effective processes for migrating device software to Linux. It discusses selecting a commercial Linux distribution to focus resources on application software rather than operating system development. The document outlines a methodology for Linux migration projects, including defining success metrics, assessing risks, and addressing impacts to the software development environment. Project phases discussed are startup, requirements, and design, with emphasis on configuration management, testing practices, and flowing requirements to architectural components.
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Novell
Novell Identity Manager tools for implementation and administration have always been the product's key differentiating factor. Recent changes have made Identity Manager implementations even more easy and efficient. Whether you are new to Identity Manager or are an existing user, attend this session to learn more about Designer, Analyzer and iManager.
For Designer, you will hear about Identity Manager staging, role-based entitlements, and key performance improvements such as working over VPN and an optimized import/deployment of your identity management project. The presenters will also offer insight into how well Designer supports the latest versions of Identity Manager and Novell Identity Manager Roles Based Provisioning Module with the new Rich Client Platform (RCP) Designer and the support it offers to Novell Compliance Management Platform. Finally, you'll hear about the Designer roadmap for the Identity Manager product line.
You will also hear about the data cleansing and massaging capabilities in Analyzer. For iManager, you will see new features such as war file deployment.
Virtualizing Mission-critical Workloads: The PlateSpin StoryNovell
Explore the key roadblocks to virtualizing mission-critical workloads. Discuss the potential benefits, in terms of performance and service-level delivery, in migrating these workloads to an internal cloud. Learn how PlateSpin solutions pave the way to migrating mission-critical workloads with little or no downtime, integrate non-disruptive testing in the virtual environment, and provide real-time workload protection and recovery.
Integrating Apple Macs Using Novell TechnologiesNovell
Apple Macs continue to increase in popularity and make up an increasingly large percentage of enterprise desktops. In this session, we'll explore the various Novell products and technologies that can be used to integrate Macs into your environment. You'll leave with a clear understanding of the issues involved and the options available to support the Mac user community in a Novell environment. You'll also have a chance to discuss suggestions for improving on this support.
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Have you wondered what the future of collaboration looks like? Because collaboration is so central to our customers' productivity and profitability, it's a key area for innovation at Novell. It's also an area that complements our focus on intelligent workload management. Attend this session, presented by the Novell Collaboration leadership team, for a sneak peek into our plans for collaboration innovation, as well as the link between collaboration and intelligent workload management.
Richard Lindstedt Collaboration Solution Manager, Novell, Inc.
Ken Muir CTSO - Collaboration Novell, Inc.
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
As your company considers moving toward the cloud either by adopting more Software-as-a-Service applications or other cloud services, the complexity and management of security policies and identities increase. Learn how you can manage a multi-SaaS environment to consistently enforce your internal identity and policy roles in the cloud. Leverage your existing identity infrastructure to enable single sign-on, access the right resources and receive audit logs from the cloud
This document summarizes a presentation on Novell's GroupWise mobility solutions. It discusses Research in Motion and NotifyCorp as existing solutions, then focuses on Novell's Data Synchronizer Mobility Pack. The Mobility Pack allows bidirectional synchronization between GroupWise and mobile devices, supporting email, calendars, contacts and other data. It provides a scalable architecture with a web-based administration interface and connectors that integrate with GroupWise and other applications.
With proven services trusted by organizations all over the world, Novell Open Enterprise Server continues to bring you the innovative capabilities your environment demands. Attend this session to learn more about the architecture that underpins this product and its enterprise-class services. You'll walk away having a greater understanding of Novell Open Enterprise Server on Linux—and how you can leverage it for maximum efficiency and cost savings.
MySQL's 2008-2009 roadmap included:
(1) Enhancements to MySQL Server, including new storage engines, partitioning, and performance improvements.
(2) New tools like MySQL Load Balancer and Query Analyzer to help customers scale their applications and diagnose performance issues.
(3) Ongoing development of MySQL Cluster and features for the MySQL 6.0 release focused on subquery optimization, foreign keys, and online backup/restore.
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...The Linux Foundation
In our interconnected world of mobile and cloud computing, particularly with the rise of governmental spying, corporate espionage, and theft of data by organized crime syndicates, security is more important than ever. Many claims are being made about the security of open-source cloud technologies: How can administrators, users, and developers separate fact from fiction?
This talk will equip the audience with the principles needed to evaluate security claims. We will talk the nature of risk, of vulnerabilities and exploits; the various factors that reduce the risk of vulnerabilities in software; and about TCB, threat models, and defense-in-depth.
We will then apply these principles to three open-source cloud technologies: containers, KVM, and Xen, to see how they stack up. These will be backed up with numbers: lines of code, security advisories, entry points, and so on.
Systemz Security Overview (for non-Mainframe folks)Mike Smith
The document provides an overview of mainframe security for non-mainframe personnel. It discusses IBM System z and how it fulfills its security strategy through three main approaches: 1) enhancing its own host protection through continuous advancements in security capabilities, 2) protecting host interfaces and boundaries to secure identities and data passing across borders, and 3) extending its high quality of service in security into the enterprise through technologies like encryption and identity management. The document highlights several core security features of System z including resource profiles, user profiles, RACF, and how z/OS TCP/IP provides security through features like SAF protection, intrusion detection services, IP filtering, and IPSec.
The document discusses securing Linux systems by securing the physical environment and bootloader. It recommends securing the room where the Linux computer is located, locking down the CPU case and BIOS to prevent booting from removable media. It also suggests disabling the Ctrl+Alt+Delete reboot shortcut and password protecting the GRUB bootloader to prevent unauthorized access and bootloader hacking attempts. Physical security of the room and computer case, along with logical security of the boot process are key focuses of the document.
This document provides an overview of Linux security and auditing. It discusses the history and architecture of Linux, important security concepts like physical security, operating system security, network security, file system security and user/group security. It also describes various Linux security tools that can be used for tasks like vulnerability scanning, auditing, intrusion detection and password cracking.
File System Implementation & Linux SecurityGeo Marian
This document discusses file system implementation and Linux security. It begins by describing how file systems are typically stored on disks with partitions and sectors. It then explains how files are created, opened, read, written to, and deleted in a file system. Two common allocation methods are also summarized - contiguous allocation and linked allocation. Finally, it outlines some common security threats like intruders, malicious programs, and generic attacks and how TCP wrappers can be used to filter network access on Linux servers.
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsAnne Nicolas
This conference proposes to browse the differences between the models that make up the security modules of Linux kernels.
An introduction to implementation will be presented in order to understand how to develop a security module.
The document describes several open-source operating system projects including Agnix, an educational kernel written in C; BDOS, a 16-bit OS for 80x86 PCs aimed at beginners; and Cobos, an Eclipse-based IDE for developing COBOL applications on mainframes. It provides brief descriptions of each OS project including their purpose, programming languages used, target platforms, and key features. The OS projects cover a wide range of domains from embedded systems to mainframes to educational and hobbyist kernels.
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security OverviewShawn Wells
Co-presented with Matt Jamison (Sr Architect, DoD Programs) at the IBM Teach the Teacher (IBM T3) conference. Discussed SELinux, Policy Enforcement, Discretionary Access Control, Multi-Level Security vs Multi-Category Security, Role-Based Access Control, usage of SELinux, Linux Audit Subsystem, and host hardening procedures.
Linux is considered to be a secure operating system by default. Still there is a lot to learn about system hardening and technical auditing. This 1-hour presentation explains the need for hardening and auditing of your systems. We discussed some additional documents and tools, to further help this endeavor.
This presentation is suitable for both beginners and those with experience in system hardening.
The document provides an overview of Linux, including its history and features. It discusses how Linux originated from the GNU project and was started by Linus Torvalds. Linux is an open source operating system that can run on various platforms. It provides features like multi-user access, multitasking, and security benefits compared to other operating systems. The document also describes the typical Linux desktop environment and popular software applications available for Linux.
The document summarizes a presentation on network security and Linux security. The presentation covered introduction to security, computer security, and network security. It discussed why security is needed, who is vulnerable, common security attacks like dictionary attacks, denial of service attacks, TCP attacks, and packet sniffing. It also covered Linux security topics like securing the Linux kernel, file and filesystem permissions, password security, and network security using firewalls, IPSEC, and intrusion detection systems. The presentation concluded with a reference to an ID-CERT cybercrime report and a call for questions.
The operating system controls the computer by providing an interface between the user and hardware to make the computer more convenient to use. It manages processes, memory, files, security, and interprets commands. The operating system allows users to start and stop processes, allocate memory, create and manage files and directories, implement security measures like passwords and firewalls, and interacts with users through either a command line or graphical user interface.
Security, Hack1ng and Hardening on Linux - an OverviewKaiwan Billimoria
A fairly detailed overview on current state of security and hardening countermeasures being employed on a modern OS like Linux. With a focus on teaching the basics of BOF (Buffer OverFlow), so that one understands how these attacks work.
Focus Group Open Source 04.10.2011 Massimiliano BelardiRoberto Galoppini
IBM's zEnterprise system provides a unified platform for consolidating workloads and optimizing IT resources. It allows running many virtual Linux servers per core with extreme levels of consolidation. This improves utilization rates, lowers costs, and enhances flexibility. Massimiliano Belardi has over 10 years of experience helping clients leverage Linux on the IBM mainframe.
The document provides an overview of a Linux Day tour agenda that promotes SUSE Linux Enterprise 11 Service Pack 1. Key topics covered in the tour include the benefits of SUSE Linux over other distributions for reliability, scalability, systems management, virtualization, security, and certifications. It highlights new features in Service Pack 1 that improve reliability, scalability, systems management, and security.
The document discusses Syncfusion, a company that provides enterprise software components and tools for the Microsoft .NET platform. It was founded in 2001 by industry experts to deliver business innovation through elegant user interfaces, dashboards, and reports. Syncfusion offers award-winning .NET components and controls for Windows Forms, WPF, ASP.NET, ASP.NET MVC and Silverlight. It strives to offer the best value to customers through high quality products and support.
This document provides an overview of Linux on z Systems and IBM's efforts to enable the Linux on z Systems open source ecosystem. It discusses IBM's work porting popular open source software to run on Linux on z Systems, including languages, databases, messaging, and cloud infrastructure packages. It also outlines plans to provide tools and resources to help developers access Linux on z Systems hardware and obtain ported packages. The goal is to simplify and encourage open source software development for the Linux on z Systems platform.
The CIBER / CA partnership & Why CIBER is moving to Nimsoft MonitorCA Nimsoft
Tony Testa's n•fluence 2012 presentation, outlining CIBER's choice of Nimsoft Monitor.
For more information, visit: http://www.nimsoft.com/solutions/nimsoft-monitor.html.
The document introduces the new mainframe and its capabilities. It outlines that mainframes are used by large organizations to host commercial databases and applications requiring high security and availability. Mainframes can process large volumes of different workloads concurrently. Typical mainframe roles include system programmers, operators, developers and administrators. Common operating systems are z/OS, z/VM, VSE, and Linux for zSeries.
This document provides a summary of a presentation on Lotus software, including Domino and Sametime, running on Linux. The presenter, Bill Malchisky Jr., discusses IBM's long commitment to Linux over the past 20 years, including major investments and contributions to open source projects. He outlines the server-side benefits of running Domino and Sametime on Linux. The document also addresses partitioning, disk and Domino, virtualization support, Linux distributions supported, and tuning tips for optimizing Domino performance on Linux.
The document discusses new features and updates related to Linux on IBM System z mainframes, including:
- Support for newer Linux distributions and kernel versions.
- Core system improvements like address space randomization and breaking event handling.
- Enhanced I/O and networking features for DASD, FCP, QDIO, OSA, and z/VM integration.
- Tooling updates like performance monitoring and crash dumping support.
- Filesystem additions like CMSFS for z/VM minidisk access and Btrfs/ext4 changes in kernel 3.2.
The document discusses the release of eZ Publish Platform 5.1 codenamed "Stádda". It provides an overview of past releases from 2010-2013 and highlights new features in 5.1 including improved cluster support, REST API, data caching, and Symfony integration. The architecture maintains support for the legacy 4.x system while introducing new APIs and tools to build apps and extend the platform. Finally, it outlines the new release cycle of annual long term support releases.
This document outlines the roadmap for eZ Publish from a user experience perspective. It discusses the transition from eZ Publish 4.x to eZ Publish Platform 5.x, with 5.4 being the last release to support both new and legacy codebases. The goals for 5.4 are stated as quality, stability, and providing a smooth upgrade path for current users as well as future migration to fully new generations of the eZ product. An overview of the new architecture is presented, focusing on improved user interfaces, content services, and the separation of the business solutions product from the open source eZ Platform.
This document provides an overview of Chef and its capabilities for infrastructure automation and deployment. It discusses how Chef works using infrastructure as code to define reusable resources and automate deployment. It also covers Chef's porting to Linux on POWER systems and partnership with IBM, including support for Chef on various IBM platforms. The document concludes with an advertisement for a demo of using Chef to automate application deployment on Linux on POWER.
Piyush Bansal is a software engineer with over 4 years of experience working with latest technologies. He has experience managing Linux/Unix servers globally and performing tasks like server builds, monitoring, maintenance, and troubleshooting issues. His current role involves providing operational support and maintenance for servers running Solaris and Red Hat Enterprise Linux for a company that provides revenue management software.
Using OSGi R4 Service Platform in Vehicle Embedded Systems - Miguel Lopez, So...mfrancis
The document discusses using the OSGi R4 specification in vehicle embedded systems. R4 provides significant enhancements over R3, including twice as many pages in specifications and public API methods. R4 is well-suited for vehicle systems as it allows modular integration of new features, localization of applications, simplified service programming, event-based communication between bundles, power management, and diagnostic services. The speaker provides examples of how R4 enables gradually integrating new features, localizing applications for different languages, and enhancing application development.
The document discusses various third-party tools available for the IBM i (iSeries/AS400) platform. It describes tools for software development, system administration and monitoring, reporting and business intelligence, document management, barcoding, job scheduling and database management. Specific products mentioned include tools for source control, change management, performance monitoring, menu management, automated operations, web application development, and more.
Learn about Current & Future Linux on System z Technology to Improve performance statistics, enhanc node affinity support. For more information, visit http://ibm.co/PNo9Cb.
Bluemix overview - Rencontres Ecole Centrale et Supelec avec IBM France Lab -...Yves LE CLEACH
IBM Bluemix is a cloud platform that allows developers to build, run, and manage applications. It provides flexibility in compute options including containers and virtual machines. Bluemix offers a catalog of services that can extend applications' functionality, as well as tools for development, deployment, monitoring, and management across hybrid environments. The platform can be deployed publicly, on dedicated infrastructure, or locally behind a firewall.
Red Hat for IBM System z IBM Enterprise2014 Las Vegas Filipe Miranda
Red Hat Inc in a Nutshell
- Growing Market for Red Hat - Open Source Model
- Development Powerhouse
- JBoss for IBM System z
Overview of the collaboration between Red Hat and IBM
Red Hat Enterprise Linux 7 Overview
- Highlights about what is new Performance gains with
RHEL7
- CPU, Memory, I/O versus RHEL6
More details on new aspects of RHEL7
- Systemd deep dive
- More details about this new feature
- Linux Containers deep dive
- What can we really do with Linux Containers
- An introduction to Red Hat Openshift
Featured ISVs
- VERISTORM
- Hadoop on Linux for IBM System z
- Sine NOMINE
- High Availability Demo
Where to find more information about RHEL on IBM System z
The document discusses different options for providing mobile file access and sharing for employees. Consumer-grade cloud services are easy for users but lack security controls. Enterprise cloud services provide more security but require duplicating management efforts and often have empty data repositories. Hybrid cloud/on-premise solutions have similar issues and still require separate storage and management. The best option is an on-premise, file system integrated solution that leverages existing files, systems, processes and controls rather than requiring new infrastructure and management.
This document summarizes a class on social media tips, tricks, and planning. The class agenda covers tips and tricks, exercises, engagement, and planning. It then discusses social media goals for Novell, including engaging customers, becoming thought leaders, supporting marketing goals, and providing customer support on social media. Finally, it outlines steps for creating a social media plan, including setting goals, identifying channels, assessing content needs, making connections, creating campaigns, and building a timeline.
The document summarizes various social media tools and platforms discussed in a class about social media marketing beyond the major platforms. It covers Novell communities, blogs, technical communities, social bookmarking, and multimedia platforms. For each topic, it provides examples like LinkedIn, Facebook, Twitter, Novell forums, WordPress, Slashdot, Toolbox, Digg, Delicious, Reddit, StumbleUpon, Slideshare, and Flickr.
This document summarizes Class 2 of a social media marketing course. It discusses the "big three" social networks - Facebook, LinkedIn, and Twitter. For each network, it provides background information, member demographics, traffic trends, etiquette guidelines, and strategies for using the networks. It also lists 9 actions companies can take on each network, such as updating statuses, following competitors, sharing content, and connecting with customers. The class ends with assigning homework to engage with one of the social networks.
The document summarizes an introductory class on social media and inbound marketing. It discusses key topics like the principles of Web 2.0, what social media and inbound marketing are, content strategies for social media, and how to engage and connect with audiences on social platforms. The class covered frameworks for social media programs and channels like blogs, videos and social networks that can be used.
This document summarizes Class 2 of a social media marketing course. It discusses the "big three" social networks - Facebook, LinkedIn, and Twitter. For each network, it provides background information, member demographics, traffic trends, etiquette guidelines, and strategies for using the networks. It also lists 9 actions companies can take on each network, such as updating statuses, following competitors, sharing content, and connecting with customers. The class ends with assigning homework to engage with one of the social networks.
The document discusses LinkedIn and provides 15 tips for using the professional social media platform. It begins with an overview of LinkedIn, including its founding, user base, and purpose for professional networking. It then gives demographics of typical LinkedIn users and etiquette guidelines. The bulk of the document lists 15 specific actions users can take on LinkedIn to build their profile, engage with connections, participate in groups, and get involved in answering questions. It concludes with recommendations for tools and resources to help automate and learn more about using LinkedIn.
The document outlines 15 things users can do on Twitter, from beginning to advanced uses. It recommends that beginning users follow Novell, coworkers, and someone fun. Intermediate users are advised to use a Twitter client, set up searches, and retweet others. Advanced uses include creating lists, attending tweetups, and checking influence metrics. The document provides guidance on effective use of Twitter for sharing information.
The document discusses social media and provides guidance for Novell's use of social media. It outlines the explosive growth of social media and defines key concepts like Web 2.0, inbound marketing, and online communities. It then gives Novell's social media mission, guidelines, and 7 things employees can do to get started with social media, such as following Novell accounts, reading blogs, checking competitors, and spreading word about Novell.
Strategies for sharing and commenting in social mediaNovell
The document discusses strategies for participating in social media conversations. It outlines the benefits of social media participation such as meeting people, building personal brands, and learning. It then describes types of social media participants and provides a model for building communities by listening, talking, energizing, supporting and embracing. The document concludes by providing seven ways to join conversations in social media and seven things to consider before posting, with advice about representing your company appropriately and adding value to discussions.
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
The document discusses challenges around information security, privacy and compliance in the healthcare industry. It notes that traditional approaches are not adequate due to the complexity of healthcare systems and data. It advocates for a new integrated approach that can correlate log and event data across operations, security, compliance and privacy domains. This will help address issues around user identity management and privacy regulations like HIPAA, HITECH and meaningful use requirements.
Intelligent workload management enables organizations to manage computing resources across physical, virtual and cloud environments in a policy-driven, secure and compliant manner to deliver business services to end customers. Intelligent workloads are policy-driven, secure, and compliant and can move across environments while maintaining security controls and understanding compliance requirements. WorkloadIQ provides products and solutions to build, secure, manage and measure workloads across different environments.
The document discusses the importance of identity management in modern computing environments. It argues that identity should serve as the foundation for securing access across devices, applications, and cloud-based services. With identity as the core, enterprises can better balance flexibility, compliance, and security when resources are distributed across different systems. The identity-infused enterprise model allows organizations to leverage existing identity investments to enhance control, visibility, and compliance across hybrid computing environments.
Shining the Enterprise Light on Shades of SocialNovell
2010 has brought an explosion of new social tools to the market, creating a drone of news and conversation that artificially singles out “social” as a stand-alone solution—and for enterprises, a solution to what? When you peel back the category “social,” what capabilities are we really talking about and which ones are missing when it comes to forming a solution that can truly help people in the workplace be more effective?
Learn how to cut through the noise and gain a framework for thinking about the relevance of new tools to their workplace objectives and workplace realities. Attendees will leave this session with a better understanding of use cases and best practices as well as guidance for determining whether a given solution is worth exploring for their enterprise.
This document discusses strategic IT issues for demanding businesses in the 21st century. It addresses topics such as cost reduction, disaster recovery, green IT, compliance, SLAs, and data deduplication. It also covers trends in physical, virtual, and cloud utilization. The document provides information on migrating server workloads to the cloud and consuming cloud services. It discusses intelligent workload management across physical, virtual, and cloud environments to deliver business services.
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
Virtual appliances are the wave of the future, declares IDC, because appliances dramatically simplify application deployment and accelerate the shift to cloud computing. Learn how the landmark strategic partnership between Novell and VMware is delivering innovative appliance versions of VMware products running on SUSE Linux Enterprise Server, and how it can help you move your applications to the cloud. See an exciting demonstration of Novell's award-winning SUSE Studio appliance construction tool, used by software vendors to build appliances in minutes for on-premise and cloud environments, and by enterprises to quickly create optimized Linux image builds. The session will also cover Novell's industry-leading lifecycle management capabilities for appliances. If you're a software vendor, you will leave this session with new ideas on how to simplify delivery of your software, perform appliance lifecycle management and extend your applications to the cloud. If you're an end-user organization, you will learn how to reduce the time spent creating and updating core OS images by 90 percent or more.
That’s right…in a recent IDC report, they tell customers don’t “move” to the cloud, “embrace” it. They also tell customers, don’t even consider the cloud without an identity strategy. That’s where WorkloadIQ comes in. In this session you will learn how WorkloadIQ, Novell’s differentiated approach to intelligent workload management, will help you infuse identity and management into your environment. Come see how together Novell and VMware will allow you to not only embrace the cloud, but also ensure that it’s manageable, secure and compliant. This will include demonstrations of brand new WorkloadIQ products - Novell Cloud Security Service, SUSE Linux Enterprise Server for VMware, Novell Identity Manager 4, and Novell Cloud Manager along with VMware technologies.
1. What´s New with Linux
on System z
Richard Lewis Ihno Krumreich
Senior IT Consultant, IBM Project Manager for SUSE Linux
®
rflewis@us.ibm.com Enterprise for System z, Novell, Inc.
ihno@novell.com
58. Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.