Technical library

  • spacer Filter by products, topics, and types of content

    (0 Products)

    (0 Topics)

    (2 Industries)

    (5 Types)

 

1 - 100 of 276 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)

View Results
Title none Type none Date down
Explore new features in Tivoli Service Automation Manager Network Extension for Juniper
IBM Tivoli Service Automation Manager (TSAM) helps enable users to request, deploy, monitor, and manage cloud computing services. Learn the basics of and explore the new features that are introduced in the recently released firewall extension, the TSAM Network Extension for Juniper.
Articles 22 Jul 2014
IBM Global Security Kit, Version 8 - PKCS#11 device integration
This article describes the hardware cryptographic devices that support the PKCS#11 standard and have been tested for use with IBM Global Security Toolkit (GSKit), Version 8.
Also available in: Portuguese  
Articles 15 Jul 2014
Automate application-specific storage provisioning with Rational extensions
Learn how to model and automate the additional storage needs of an application using IBM Deployment Planning and Automation for the Cloud 2.1.0. This freely downloadable accelerator installs on top of and integrates capabilities in IBM Rational Software Architect, IBM Rational Automation Framework, and IBM Tivoli Service Automation Manager. In this article, you can discover how to use this tool to specify custom storage requirements for application components in virtual images through a deployment topology model and use the information to generate deployment automation artifacts that provision the storage elements and attach them to virtual machines in the cloud.
Articles 24 Jun 2014
dev@Pulse Conference
The event features some of the industry’s leading thinkers in mobile, game design, AI, open technologies, front-end development, and more. dev@Pulse is an invitation do more than just take in the sights and the speakers, of course. Developers are encouraged to join in talks, design camps, and code jams – where you’ll have access to tools and APIs that are being used to create the next wave of great platforms.
Articles 20 Jan 2014
Monitoring WebSphere DataPower, Part 1: Fundamentals of monitoring
WebSphere DataPower appliances play a critical role in any enterprise in various capacities, such as Enterprise Service Bus, caching, and so on. Effective monitoring of the appliance ensures that the real value of the appliance is achieved in a consistent fashion. Due to its distinguished nature of being an appliance, it has its own ways of being monitored. This article series will walk through the importance of monitoring the appliance, key monitoring requirements, methods of monitoring, as well as help decide on the right monitoring approach for your requirements.
Also available in: Russian  
Articles 28 Aug 2013
Monitoring WebSphere DataPower, Part 2: Setting up and deploying ITCAM
For effective functioning of WebSphere DataPower appliances, monitoring of its components is crucial. Based on the type of object and the event type, the requirement for monitoring and its corresponding action varies. Apart from real-time monitoring, there is a need for historical data and pre-configured alerts that can provide insight into its functional parameters and may centrally administered, it can be used for a comparative analysis of a cluster of appliances in the enterprise. This article highlights how you can set up and deploy IBM Tivoli Composite Application Manager for DataPower appliances by using its inbuilt framework features.
Also available in: Russian  
Articles 28 Aug 2013
Using Rational Quality Manager to manage lab assets in virtual environments
By extending the IBM Rational Test Lab Manager component of IBM Rational Quality Manager, you can manage test assets in a virtual environment such as a cloud. You can import up-to-date definitions of virtual images and machines for use in your test lab and deploy new virtual machines on demand. This article describes how the IBM Tivoli Lab in Rome is piloting an integration of Rational Quality Manager with IBM Tivoli Service Automation Manager 7.2.2.1 to help test teams improve productivity, cycle times, and cost effectiveness.
Also available in: Chinese  
Articles 12 Aug 2013
Use the Custom Application Agent feature of Tivoli Storage FlashCopy Manager for Unix to protect a MySQL database
This article demonstrates how to protect custom applications with IBM Tivoli Storage FlashCopy Manager and its Custom Application Agent (CAA) feature. Tivoli Storage FlashCopy Manager provides application-aware backups and restores by using the advanced snapshot technologies of storage systems. Using a MySQL database as an example, I show you how to customize the CAA feature and protect your application with Tivoli Storage FlashCopy Manager.
Articles 24 Jul 2013
Extend IBM Security Access Manager for ESSO AccessProfile with Windows native libraries
IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO) responds to requests for user credentials. In this article, learn how to develop and embed a Windows native library inside an ISAM ESSO AccessProfile. An example walks you through the steps of the COM component registration based on the sample library.
Articles 22 Jan 2013
Back up 1000 VMware guests with Tivoli Storage FlashCopy Manager for VMware
A VMware environment with 1000 virtual machines was backed up in 36 minutes using IBM Tivoli Storage FlashCopy Manager for VMware V3.1. This article discusses the program functions and parameters that achieved this result and suggests best practice guidelines.
Articles 27 Nov 2012
Learn advanced automation concepts with FlashCopy Manager for VMware
This article uncovers flexible automation possibilities of FlashCopy Manager for VMware by using its command-line interface in combination with scripting and the VMware vSphere SDK for Perl. You can create advanced data protection scenarios for highly dynamic vSphere environments, that are not possible with the Data Protection for VMware vCenter GUI plug-in, by using these methods.
Articles 26 Nov 2012
Use Tivoli Integrated Portal and Tivoli Common Reporting to create read-only access to Cognos reports
In Cognos Business Intelligence, default users have a wider range of capabilities than would be typically appropriate for users that only need to view reports. In this article, learn how to use Tivoli Integrated Portal and Tivoli Common Reporting to create a class of users that have read-only access to Cognos reports.
Articles 20 Nov 2012
Use Tivoli Storage Manager to back up and recover a DB2 database
This article describes the basics of IBM Tivoli Storage Manager and IBM DB2 architecture, and shows you how to use the Tivoli Storage Manager backup and restore features. This article also provides step-by-step instructions that show you how to back up and restore data on a Tivoli Storage Manager server for the DB2 database. This document can be used as a guide for DB2 database administrators and Tivoli Storage Manager administrators.
Also available in: Chinese   Portuguese   Spanish  
Articles 17 Oct 2012
Manage passwords for virtual images
Thanks to a new tool available for IBM Service Delivery Manager (available as a download in this article) password management for virtual images is now significantly easier. This tip details the procedures for using the tool to change passwords in the IBM Tivoli Monitoring, NFS server, Tivoli Service Automation Manager, and Tivoli Usage and Accounting Manager virtual images.
Also available in: Chinese   Japanese  
Articles 15 Oct 2012
Introducing the SOA Policy Pattern to create reusable policy patterns and to control your services
In general, a policy asserts a requirement, a capability, or another property of intended behavior. In a service-oriented architecture, you can use a policy to reduce risk and increase dynamic control as you author and maintain it separately from any business logic. This article introduces the “SOA Policy Pattern” in which policies are authored, managed, enforced, and monitored using the specific combination of WebSphere Service Registry and Repository, WebSphere DataPower SOA Appliances, and IBM Tivoli Composite Application Manager for SOA.
Also available in: Chinese  
Articles 10 Oct 2012
Find provisioning performance bottlenecks in the cloud
Cloud provisioning is the process of deploying and managing IT resources on cloud infrastructures. Rapid provisioning is a key performance requirement for cloud services, especially when there are a large number of customers requesting resources at the same time; however, it is difficult to determine what factor, or combination of factors, are the causes of poor provisioning performance because there are no existing tools and methods to trace each status change and execution step in provisioning. The author details a provisioning performance test method you can use as a tool to determine where your provisioning performance may be lagging.
Also available in: Chinese   Japanese   Portuguese  
Articles 07 Sep 2012
Using OAuth on IBM WebSphere DataPower Appliances, Part 7: Using DataPower with Tivoli Federated Identity Manager to support OAuth 2.0
Part 7 of this multi-part article series describes how to use a WebSphere DataPower service to act as an OAuth token enforcement point for an IBM Tivoli Federated Identity Manager OAuth authorization server.
Also available in: Portuguese  
Articles 09 Aug 2012
Extend Rational Quality Manager to manage lab assets in the cloud
By extending the Test Lab Manager component of IBM Rational Quality Manager, you can manage test assets in a virtual environment, such as a cloud. You can import up-to-date definitions of virtual images and machines to use them in your test lab, plus you can deploy new virtual machines on demand. This article describes how the IBM Tivoli Lab in Rome is piloting an integration of IBM Rational Quality Manager with IBM SmartCloud Provisioning Version 1.2, to help test teams improve productivity and cycle times and to make the software more cost-effective.
Also available in: Chinese   Portuguese  
Articles 12 Jun 2012
Tivoli System Automation
The purpose of this guide is to introduce Tivoli System Automation for Multiplatforms and provide a quick-start, purpose-driven approach to users that need to use the software, but have little or no past experience with it.
Articles 17 May 2012
Configuring Maximo (TPAE IF ) for TDI Connectors
This article describes how TDI and TAMIT are integrated through the newly added connectors in TDI such as the Simple TPAE IF Connector and the TPAE IF Connector.
Articles 11 May 2012
Design a virtual system pattern
Virtual system patterns in IBM PureApplication System enable fast and repeatable deployments of systems from the virtual machine up to the application. With a virtual system pattern, manual tasks that are needed to bring up your entire topology can be fully automated, which allows an application to be deployed in minutes as opposed to hours or days. Pattern-oriented deployment of middleware eliminates bugs introduced by error-prone, manual configuration processes and allows best practices to be baked into patterns, thereby accelerating and optimizing deployment of solutions. In this article, the authors highlight key points to review when designing and developing a virtual system pattern.
Also available in: Chinese   Japanese   Portuguese  
Articles 11 Apr 2012
Manage a J2EE app with TSAM extensions
IBM Tivoli Service Automation Manager (TSAM) V7.2.2 introduces the extension: A set of TSAM software components that can implement a new IT service automation solution (known as a service definition) or add capabilities to existing service definitions. In this article, the authors explain how to tune the load balancer policy to your system's needs; how to add and remove application servers as the workload of the business application changes; and how to modify the firewall rules and why you might need to do that.
Also available in: Chinese   Japanese   Portuguese  
Articles 02 Mar 2012
Deploy a J2EE app with TSAM extensions
IBM Tivoli Service Automation Manager (TSAM) 7.2.2 introduces the extension, a set of TSAM software components that can implement a new IT service automation solution (known as a service definition) or add capabilities to existing service definitions. In this article, the authors define a scenario in which the desired result is to securely deploy a three-tiered enterprise application (in this case J2EE) to the cloud. They demonstrate how to set up and provision extensions in TSAM as the first step to accomplishing this task.
Also available in: Chinese   Korean   Japanese  
Articles 26 Jan 2012
Extended Insight in WebSphere Application Server environments
IBM Tivoli OMEGAMON XE for DB2 Performance Expert on z/OS V5.1.0 allows end-to-end database transaction response time monitoring for WebSphere Application Server applications with its Extended Insight feature. This capability provides insight into the transaction and SQL statement response-time metrics of a database application throughout all layers of the software stack; from the time that the SQL is issued in the application and through the network and database server. Support is available for WebSphere Application database applications in the form of additional time-spent metrics for the WebSphere Application Server layer and by recognizing transactions and SQL statements from WebSphere Application Server automatically. This article provides detailed information for installing, configuring, and validating the OMPE Extended Insight feature for WebSphere Application Server applications.
Also available in: Portuguese  
Articles 08 Dec 2011
Establish a system to build custom virtual cloud images
Virtual images allow users to freeze-dry preferred software environments and deliver them to users in a rapid and consistent manner: As a result, companies are turning to virtual images as a means to improve software delivery within their data centers. As they make greater use of virtual images, challenges are emerging -- such as determining how much content to put into a single image and how best to construct these images. The authors discuss these challenges and introduce the IBM Image Construction and Composition Tool (ICCT), freely available for download, that addresses many of these challenges and provides a systematic approach to constructing virtual images in the cloud.
Also available in: Chinese   Japanese   Portuguese  
Articles 07 Dec 2011
Why software quality assurance and IT security need to work together
This article describes a new approach to security, with the software development and software quality assurance teams working together to be exponentially more effective. It explains how quality assurance processes can help IT be more secure and how IT security can help secure the test environment more efficiently. Readers will also learn how to incorporate security testing better into the software development life cycle.
Also available in: Chinese   Russian   Portuguese  
Articles 04 Oct 2011
DB2 Tools corner: New data sharing group support in IBM Tivoli OMEGAMON XE for DB2 Performance Expert on z/OS
IBM Tivoli OMEGAMON XE for DB2 Performance Expert on z/OS has added support for data sharing group displays. You can now display CPU times, CPU percentages, object data set names that are used by a thread, and locking conflict resource names for remote members of a data sharing group.
Articles 08 Sep 2011
Verify the CloudBurst 2.1 Tivoli software stack
The advantages an appliance brings with it are often achieved by complex tasks; many times this complexity is hidden by the interface to the appliance, giving the user a limited view of the entire configuration and integration points. But a user may need to verify or re-verify the software stack when the environment changes (restoring backup images in a disaster recovery scenario), making modifications to hardware configurations (like when you add new blades) or software configurations (like when you add new networks with VLAN tagging). In this article, the author provides a quick guide to verifying the IBM CloudBurst 2.1 Tivoli software stack.
Also available in: Chinese   Japanese  
Articles 26 Aug 2011
Solving problems in the DB2 pureScale cluster services environment
This tutorial guides DBAs and system administrators in problem determination for DB2 pureScale cluster services. As you deploy IBM DB2 pureScale Feature for DB2 Enterprise Server Edition systems into production, you need to acquire appropriate problem determination skills. This tutorial provides information about gathering diagnostic information when failures occur, and provides additional information to aid in understanding the tightly integrated subcomponents of the DB2 pureScale Feature, such as the Cluster Caching Facility (CF), General Parallel File System (GPFS), Reliable Scalable Cluster Technology (RSCT), and IBM Tivoli Systems Automation for Multiplatforms (Tivoli SA MP).
Also available in: Chinese   Korean   Vietnamese   Portuguese  
Articles 18 Aug 2011
IBM Global Security Kit, Version 7 - PKCS#11 Device Integration
This article describes the hardware cryptographic devices that support the PKCS#11 standard and have been tested for use with IBM Global Security Toolkit (GSKit), Version 7.
Articles 15 Aug 2011
The Business of IT: How to Improve Service and Lower Costs
This book provides IT and business executives with methods to achieve greater business discipline throughout IT, collaborate more effectively, sharpen focus on the customer, and drive greater value from IT investment. The book focuses on four specific areas of business practices related to improving IT service management, managing services’ cost and value, measuring IT performance with a goal of improving service and lowering cost, and improving customer alignment.
Books 15 Jul 2011
ITIL Capacity Management
Drawing on his extensive ITIL experience, Larry Klosterboer covers all facets of ITIL-based capacity management, and offers proven solutions to the challenges IT organizations encounter in implementation. He presents expert guidance on accurately projecting demand and growth, planning and staffing, tool selection, process implementation, and much more.
Books 15 Jul 2011
Implementing ITIL Configuration Management
You’ll learn how to plan your implementation, deploy tools and processes, administer ongoing configuration management tasks, refine ITIL information, and leverage it for competitive advantage. Throughout, Klosterboer demystifies ITIL’s jargon, illuminates each technique with real-world advice and examples, and helps you focus on the specific techniques that offer maximum business value in your environment.
Books 15 Jul 2011
Implementing ITIL Change and Release Management
Klosterboer offers in-depth coverage of the crucial issues every implementer will face, including make-or-break challenges most consultants can’t or won’t talk about. For example, he demonstrates how to set a reasonable project scope, migrate data, execute successful pilot programs, and continually improve quality once ITIL practices are in place.
Books 15 Jul 2011
Real-world journey to your own private cloud, Part 1: Prepare the concept
In this article series, the author outlines the process, from conception to deployment, that his team used to build a private, on-premise cloud environment that incorporates structures found in IaaS and PaaS cloud service models. The cloud environment is constructed with software and hardware components chosen by the team; however, the article contains knowledge and instruction that can be used regardless of technologies you choose. Part 1 provides information on cloud structures, the five phases in the development roadmap, and details on some of the solutions the team discovered.
Also available in: Chinese   Korean   Japanese   Portuguese  
Articles 11 Jul 2011
Real-world journey to your own private cloud, Part 2: Install and configure the software
In this article series, the author outlines the process, from conception to deployment, that his team used to build a private, on-premise cloud environment that incorporates structures found in IaaS and PaaS cloud service models. The cloud environment is constructed with software and hardware components chosen by the team; however, the article contains knowledge and instruction that can be used regardless of technologies you choose. Part 2 provides information on installing and configuring the server environments and cloud software components, post-installation activities, and special features of the installed software.
Also available in: Chinese   Korean   Japanese  
Articles 11 Jul 2011
Real-world journey to your own private cloud, Part 3: Use the cloud
In this article series, the author outlines the process, from conception to deployment, that his team used to build a private, on-premise cloud environment that incorporates structures found in IaaS and PaaS cloud service models. The cloud environment is constructed with software and hardware components chosen by the team; however, the article contains knowledge and instruction that can be used regardless of technologies you choose. Part 3 defines IBM Tivoli Service Automation Manager (TSAM) user roles, provides an example of the cloud provisioning process and a list of sample exercises the user can do to test the implementation, and shows you some general tricks and tips we learned in implementing the project.
Also available in: Chinese   Korean   Japanese  
Articles 11 Jul 2011
Configure multiple networks in CloudBurst 2.1
The authors explain how to implement a multiple-network configuration based on VLAN using VMware as the hypervisor and SuSe Linux as the guest operating system.
Also available in: Chinese  
Articles 11 May 2011
Managing value through Tivoli service delivery and support
See how a global financial corporation implements an IBM service management strategy using Tivoli software.
Also available in: Portuguese  
Demos 06 May 2011
Tivoli Composite Application Manager for SOA
See how you can achieve faster problem resolution in your SOA environment with Tivoli software.
Also available in: Portuguese  
Demos 06 May 2011
Green energy efficiency in data center using Tivoli architecture
See how you can tackle energy efficiency in your enterprise.
Also available in: Portuguese  
Demos 06 May 2011
Tivoli Remote Control
See key features of Tivoli Remote Control in action.
Demos 06 May 2011
Best practices for access control in multi-tenant cloud solutions using Tivoli Access Manager
Learn how to use the IBM Tivoli Access Manager to provide tenant awareness, protect your application resources, and to provide single sign-on.
Also available in: Chinese   Portuguese  
Articles 01 May 2011
SSL configuration for IBM Tivoli Directory Server 6.0
Gain an overview of SSL configuration for IBM Tivoli Directory Server 6.0 on the AIX 5L operating system. Learn about command line configuration steps for SSL key database creation, certificate creation, certificate extraction, SSL authentication mechanisms, troubleshooting for SSL issues, and steps to perform LDAP client-server communication.
Also available in: Chinese  
Articles 18 Apr 2011
Configure secure communications with WebSphere Application Server and WebSphere Message Broker using SAML 2.0 tokens and Tivoli Federated Identity Manager
This article shows you how to configure secure communication using the SAML token profile with WebSphere Application Server V7 hosting a Web service client and server, and WebSphere Message Broker V7 acting as an enterprise service bus to mediate the application communication and ensure that security requirements are met. IBM Tivoli Federated Identity Manager V6.2 acts as the Security Token Service (STS) and issues the SAML tokens.
Articles 13 Apr 2011
Automate software distribution with Tivoli Provisioning Manager Express for Software Distribution
Learn how to use Tivoli Provisioning Manager Express for Software Distribution.
Also available in: Portuguese  
Demos 13 Apr 2011
Automate smarter with Tivoli Provisioning Manager Web Replay
Learn how to use Web Replay.
Also available in: Portuguese  
Demos 13 Apr 2011
Configure secure communications with WebSphere Application Server and WebSphere Message Broker using SAML 2.0 tokens and Tivoli Federated Identity Manager
This article shows you how to configure secure communication using the SAML token profile with WebSphere Application Server V7 hosting a Web service client and server, and WebSphere Message Broker V7 acting as an enterprise service bus to mediate the application communication and ensure that security requirements are met. IBM Tivoli Federated Identity Manager V6.2 acts as the Security Token Service (STS) and issues the SAML tokens.
Articles 13 Apr 2011
Tivoli Provisioning Manager Express for Inventory
Learn about the inventory management capabilities of Tivoli Provisioning Manager Express for Inventory.
Demos 12 Apr 2011
IBM unstructured data security solution
This demo uses a fictitious scenario to show how IBM's data security solutions can classify, secure and monitor your unmanaged, unstructured data.
Demos 28 Mar 2011
Tivoli security user compliance management
This demo uses a fictitious scenario to show how Tivoli's security management products work together to provide an audit trail of unauthorized access.
Also available in: Portuguese  
Demos 28 Mar 2011
IBM application security solutions
See brief demos of Rational AppScan and Tivoli Access Manager.
Also available in: Portuguese  
Demos 25 Mar 2011
Build a private cloud with CloudBurst and TSAM
An organization must address a number of considerations when building a private cloud computing environment; specifically, it needs to take a holistic approach to private clouds that include creating, deploying, monitoring, and managing service construction and delivery. Both the Tivoli Service Automation Manager (TSAM) and WebSphere CloudBurst Appliance equip users with these capabilities. In this article, the authors discuss why and how you can integrate Tivoli Service Automation Manager with WebSphere CloudBurst to deliver a private cloud.
Also available in: Chinese   Korean   Russian   Japanese   Portuguese  
Articles 01 Mar 2011
Configuring global security in WebSphere Lombardi Edition V7.2 using Tivoli Directory Server V6.3
Learn how to configure global security in IBM WebSphere Lombardi Edition V7.2 using an LDAP server. This helps enterprise users to log in and use the various applications in Lombardi Edition and allows the IT department better access control. This tutorial uses IBM Tivoli Directory Server V6.3 as the LDAP server and IBM DB2 as the database.
Also available in: Chinese   Portuguese  
Articles 26 Jan 2011
IBM WebSphere performance tuning and IBM Tivoli Monitoring
Discover best practices and tools for creating continuous improvement for transaction response times, as well as, initial hardware procurement performance evaluations for IBM WebSphere Application Server 7 and POWER7 architectures with IBM Tivoli Monitoring.
Also available in: Portuguese  
Articles 21 Dec 2010
IBM Tivoli Provisioning Manager로 오픈 소스 샌드박스 빌드: Part 1, 소프트웨어 배치
회사에서 어떻게 IT 자원에 너무 많은 비용을 지출하지 않고 신기술을 실험할 수 있을까요? 그 해답은 테스트와 평가를 위해 서로 다른 애플리케이션들을 작은 규모로 파일럿 배치할 수 있게 해주는 오픈 소스 샌드박스입니다. 2편 시리즈 기사 중 첫 번째인 본 기사에서는, 오픈 소스 도구와 IBM Tivoli Provisioning Manager를 사용하여 애플리케이션의 파일럿 배치를 테스트하기 위한 샌드박스를 생성할 수 있는 방법을 설명할 것입니다. 이전에 샌드박스 관련 경험이 없어도 상관없습니다.
Articles 14 Dec 2010
Configure single sign-on between Tivoli Access Manager v6.1/WebSEAL and Tivoli Integrated Portal v1.1.x
This article provides detailed instructions for integrating Tivoli Access Manager version 6.1 and Tivoli Integrated Portal version 1.1.x. Explore how to configure single sign-on between Tivoli Access Manager/WebSEAL and Tivoli Integrated Portal using Tivoli Access Manager Extended Trust Association Interceptor (ETai). Step-by-step instructions and plenty of code examples walk you through the tasks.
Articles 07 Dec 2010
Tune IBM DB2 for optimum IBM Tivoli Security Operations Manager performance
IBM Tivoli Security Operations Manager gathers massive amounts of information that is stored in a relational database such as DB2. Learn how tuning DB2 for Linux, UNIX, and Windows helps you get the best performance from your IBM Tivoli Security Operations Manager installation.
Also available in: Chinese   Portuguese  
Articles 11 Nov 2010
Comment lines: Integrating WebSphere Service Registry and Repository with Tivoli Application Dependency Discovery Manager
Using the IBM WebSphere Service Registry and Repository Discovery Library Adapter (DLA), administrators can see the Web services present in an IT environment in the same IBM Tivoli Application Dependency Discovery Manager user interface with which they view other resources, applications, and systems. Here is a high level overview of the integration possible between these two products that could help you enhance your understanding and visibility of your overall IT environment.
Also available in: Chinese   Portuguese  
Articles 06 Oct 2010
Using DB2 High Availability Disaster Recovery with Tivoli Systems Automation and Reliable Scalable Cluster Technology
The DB2 High Availability (HA) feature, introduced in DB2 9.5, enables a new level of integration between the data server and cluster management software, providing a unified High Availability Disaster Recovery (HADR) automation framework. In this tutorial, get an introduction to this integrated solution, and learn about useful diagnostic tools for working with DB2 and Tivoli Systems Automation, a key piece of the solution. Achieve the highest possible level of performance and reliability for your data, understanding how to solve problems and address issues.
Also available in: Chinese   Korean   Portuguese  
Articles 30 Sep 2010
Using the LDAP wrapper with InfoSphere Federation Server
The LDAP wrapper is a pure Java package that is based on InfoSphere Federation Server Java wrapper SDK technology. By providing read-only access to LDAP directory servers in an SQL environment, the LDAP wrapper facilitates the integration and connectivity between business data in a relational database and human resource data in the LDAP directory server.
Also available in: Chinese   Korean   Portuguese  
Articles 23 Sep 2010
IBM's Test Automation Strategy: Build your test automation architecture around IBM Rational Quality Manager
Over the past years, the aim of improving the development life cycle and the quality of hardware and software products has led to test automation. One major challenge has been that each team has unique automation needs. IBM has created a test automation strategy that encourages reuse, building a flexible solution that uses IBM Rational Quality Manager as a hub to coordinate other products with various automated test capabilities.
Also available in: Chinese   Korean  
Articles 31 Aug 2010
Create a virtual data center with POWER7 and IBM Tivoli Provisioning Manager
Have you ever wondered how to bundle together data center resources? Do you ever have to manually deploy and configure your servers, operating systems, middleware, applications, storage and networking devices? They can be managed as a single entity using physical and virtual IBM servers. In this article, you will learn what a virtual data center is, how to create one using POWER7 VMControl and IBM Tivoli Provisioning Manager, and how to use a virtual data center to manage your IT systems and virtualization technologies as a single point of control access. In the process, we'll show you an example of how you can use the Tivoli product for patch management, which is one of the most difficult tasks to manage in a large server farm.
Also available in: Korean   Portuguese  
Articles 29 Jun 2010
Secure DB2 resources using Tivoli Access Manager for Operating Systems
Learn how to secure your IBM DB2 resources using Tivol Access Manager for Operating Systems (TAMOS). TAMOS is an IBM solution for securing resources on UNIX and Linux operating systems. This article steps you through two real-world scenarios to show you how to use TAMOS to set policies that protect DB2 resources. You can use these scenarios as a foundation for building an enterprise-wide security solution for your database.
Also available in: Korean   Portuguese  
Articles 22 Apr 2010
Using ITCAM for SOA to monitor BPM Systems: Part 3: Using Service-to-Service topology view
The Service-to-Service topology view exposes the application invocation transaction and execution path by topology diagram view. This article explains what is the Service-to-Service topology and how to read the Service-to-Service topology. The Service-to-Service topology view is very clear and simple for small systems with few apllications, processes and simple service invocation styles. However, the topology diagram would become very complex if there are many applications in WDPE and the invocations are complex. This article also described some best practices and methodologies to filter and reorganize the Service-to-Service topology to be more understandable.
Also available in: Chinese   Portuguese  
Articles 03 Dec 2009
IBM Tivoli and green IT: Datacenter efficiency
See how the integration of facility, asset, and IT resource data can improve green data center management by using IBM’s green service management solution. This demo shows how an energy-related issue can be detected and efficiently solved through intelligent relocation of infrastructure and workload distribution based on available cooling and power capacity.
Demos 01 Oct 2009
Ajax in a network: Security and topology challenges of aggregating content from multiple sites in an Ajax architecture
There can be challenges when introducing Asynchronous JavaScript and XML (Ajax) programming techniques into a network environment. This article looks at security and topology scenarios that you might be trying to solve when creating Ajax style architectures that aggregate content from multiple sites. This article explores these scenarios using the IBM Tivoli Access Manager WebSEAL product in conjunction with the IBM WebSphere Application Server Feature Pack for Web 2.0 for developing Ajax style architectures for WebSphere Application Server.
Also available in: Chinese   Portuguese  
Articles 30 Sep 2009
IBM Tivoli Identity and Access Assurance
Learn about IBM Tivoli Identity and Access Assurance, IBM's industry leading software that helps you improve service, reduce costs and support your compliance efforts. IBM Tivoli Identity and Access Assurance can help ensure that the right users have access to the right resources at the right time, providing comprehensive identity management, access management, and user compliance auditing capabilities.
Demos 28 Sep 2009
IBM Tivoli Security Management for z/OS
Learn about IBM Tivoli Security Management for z/OS, a comprehensive security solution that can help you automate compliance reporting, enhance security posture to reduce risks, improve business agility and reliability, reduce costs, increase productivity and develop operational efficiencies for your dynamic infrastructure. The Tivoli Security Management for z/OS solution enhances and accelerates mainframe security management with simplified security administration, efficient user management, security policy enforcement, and automated audit and compliance reporting for z/OS RACF.
Also available in: Portuguese  
Demos 28 Sep 2009
IBM Tivoli Data and Application Security
Learn about IBM Tivoli Data and Application Security, a browser to disk security solution that helps you protect the integrity and confidentiality of organizational data and transactions. IBM Tivoli Data and Application Security protects sensitive data and applications via auditable access controls, fine-grained entitlements and encryption key management. It provides end-to-end protection of sensitive data in enterprise storage and within critical applications to support regulatory compliance initiatives, improve business agility and reliability and reduce costs.
Also available in: Portuguese  
Demos 28 Sep 2009
High scalability and availability of AIX secldapclntd using the Tivoli Directory Server proxy
The secldapclntd daemon provides and manages connection between the AIX security LDAP load module of the local host and an LDAP server, and handles transactions from the LDAP load module to the LDAP server. Simple configuration steps do not allow us to specify highly available and scalable LDAP servers at the back end. This article lists the steps to configure a highly available and scalable back-end LDAP for the secldapclntd daemon using the Tivoli Directory Server proxy.
Also available in: Chinese   Portuguese  
Articles 01 Sep 2009
Using ITCAM for SOA to monitor BPM Systems: Part 2: How ITCAM for SOA monitors service-oriented architectures
The metrics collected by ITCAM for SOA are gathered from SCA messages, in this article, we will analyze the metrics, compare and map metrics to the WebSphere Dynamic Process Edition (WDPE) and runtime behaviors. We also explain how to read, understand and analysis the metrics, and how to aware the WDPE applications from the metrics.
Also available in: Chinese   Spanish  
Articles 28 Aug 2009
Using ITCAM for SOA to monitor BPM Systems: Part 1: Setup the environment with ITCAM for SOA and WDPE
WDPE (WebSphere Dynamic Process Edition) is a key IBM BPM Suite element, with built-in support for adapting, responding dynamically to change. This offering provides the BPM enabled by SOA foundational capabilities for modeling, simulating, deploying, monitoring end-to-end dynamic business processes. ITCAM (IBM Tivoli Composite Application Manager) for SOA is the proper product to monitor the BPM system for the service state, performance, health information, etc.
Also available in: Chinese   Spanish  
Articles 25 Aug 2009
Tivoli Provisioning Manager Launchpad
This demo download includes videos, demos, and resource links for IBM Tivoli Provisioning Manager. IBM Tivoli Provisioning Manager solutions can help you manage the complete life cycle of your data center and distributed resources from initial provisioning to patching and configuration maintenance to resource repurposing or end of life. These products automate the manual tasks of provisioning and configuring servers, operating systems, middleware, software applications, storage and network devices.
Demos 16 Jun 2009
The Support Authority: IBM Software Support Toolbar provides shortcuts to problem solving resources
Support resources for IBM software can literally be just a click (or two) away when you have the IBM Software Support Toolbar installed on your Web browser. Here's how to get and use this simple tool that makes accessing documentation, downloads, education, and other technical information for all IBM software brands more convenient than ever.
Also available in: Chinese   Portuguese  
Articles 20 May 2009
Use Ruby on Rails to create an LDAP directory service in Tivoli Directory Server V6.0
In this article, learn how to use the Net::LDAP library to create an LDAP directory service in the Tivoli Directory Server V6.0 directory server. Walk through examples to add, modify, search, and delete a directory entry with the Net::LDAP Ruby library. Create a Ruby on Rails application using Tivoli Directory Server V6.0 as a back-end database.
Also available in: Portuguese  
Articles 28 Apr 2009
Understand IBM InfoSphere MDM Server Security, Part 5: Integrating Master Data Management Server with Tivoli Federated Identity Manager
This article builds on Part 4 of this series, “Using SAML in MDM Server Security.” It shows how the integration of IBM InfoSphere Master Data Management (MDM) Server and IBM Tivoli Federated Identity Manager (TFIM) can extend MDM Server’s identity propagation capabilities and facilitate client application development. Learn how to use and configure these components to solve real-world business problems.
Also available in: Chinese  
Articles 26 Feb 2009
Single sign on to a IBM WebSphere Portal through IBM Tivoli Access Manager WebSEAL
Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it may be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits).
Also available in: Portuguese  
Articles 18 Feb 2009
Using Tivoli Access Manager for eBusiness WebSEAL without a user registry
Often customers require a web single sign-on and authorization solution but are unable or unwilling to replace or synchronize their existing user registry with another. This can pose a problem for customers wishing to leverage Tivoli Access Manager for eBusiness (TAMeB) where their existing user registry is not supported natively by TAMeB. This article will demonstrate how to utilize Tivoli Access Manager for eBusiness WebSEAL without requiring the enterprise users to be in the TAMeB directory. This article requires some prior knowledge of Tivoli Access Manager for eBusiness authentication, the TAMeB external authentication interface (EAI), and the Tivoli Federated Identity Manager (TFIM) Security Token Service (STS).
Articles 03 Feb 2009
Tivoli Access Manager and Rational AppScan
Managing security is a critical part of building and maintaining a modern IT infrastructure. IBM offers several complementary offerings in Security Governance, Risk Management and Compliance to help clients manage the security of their complex IT environments. IBM Tivoli Access Manager for e-Business is a market leading software solution in IBM's Identity and Access Management portfolio for managing enterprise web based authentication, authorization and single sign-on. IBM now offers a market leading web application security scanner software offering called IBM Rational AppScan. This article will compare and contrast the two offerings as they relate to IBM's security operations strategy and examine what security benefits each brings to the enterprise environment. A number of scenarios will be presented to highlight the roles of each of the software solutions and how they complement each others capabilities.
Articles 03 Feb 2009
Using Tivoli Access Manager Enterprise Single Sign-on with IBM middleware
IBM Tivoli Access Manager Enterprise Enterprise Single Sign-on (TAM E-SSO) provides cross application (that is, Web, Java , mainframe or terminal services) single sign-on capabilities. The TAM E-SSO AccessAgent and IMS server are supported on Microsoft Windows operating system platforms, and typically leverage Active Directory for user management. However, many customers want to leverage their existing investment in IBM middleware products, and also extend the reach for TAM E-SSO beyond their intranet. This article shows how TAM E-SSO can be deployed into an environment consisting of IBM middleware, namely DB2 and IBM Tivoli Directory Server.
Articles 28 Jan 2009
IBM Tivoli Directory Server - SMS to DMS migration
This article contains the results of performance tests on IBM Tivoli Directory Server (ITDS) running on SMS and DMS during DB2 online backup, recommendations based on the results as well as the steps required for migrating ITDS from SMS to DMS.
Articles 19 Jan 2009
Using Tivoli Storage Manager for performing VSS operations
IBM Tivoli Storage Manager for Copy Services is a product that provides snapshot operations for Tivoli Storage Manager applications.
Articles 12 Jan 2009
How to integrate IBM Rational Asset Manager with your IBM Tivoli database
IBM Rational Asset Manager supports integration with the IBM Tivoli Change and Configuration Management Database (CCMDB). Developers can automatically create assets in Rational Asset Manager from existing configuration items (CIs) in CCMDB and use Rational Asset Manager as a Definitive Software Library (DSL) for storing software images. This article explains how to install and configure the Rational Asset Manager Integration module in a CCMDB environment.
Articles 23 Dec 2008
IBM Tivoli Access Manager: WebSEAL Kerberos Junctions
To successfully enable a single-sign-on from WebSEAL to a Kerberos enabled Web Server, a number of interlocking components need to be configured correctly. The configuration of this environment is complex and requires careful planning and execution. This article highlights the steps necessary to configure a typical environment for WebSEAL Kerberos junctions, and provides tips for testing and debugging configuration components.
Articles 18 Dec 2008
IBM SOA Foundation product integration: A complete ESB Gateway solution featuring WebSphere DataPower, Tivoli Access Manager, and WebSphere Service Registry and Repository
Leveraging the concept of a service-oriented architecture usually brings with it the ability to connect an increasing number of systems within an enterprise -- but also across enterprises. While enabling a higher degree of automation and reduced processing time, this also leads to growing concern about managing and securing the underlying connections between heterogeneous IT systems. This article describes how to address these concerns by implementing an ESB gateway using three of the products within the IBM SOA Foundation platform, beginning with integrating a IBM WebSphere DataPower SOA Appliance with IBM Tivoli Access Manager for security, and then adding IBM WebSphere Service Registry and Repository for endpoint address management.
Also available in: Chinese  
Articles 10 Dec 2008
Automated system recovery in static IP environments using Tivoli Storage Manager
The current IBM Tivoli Storage Manager Automated System Recovery Process supports Networks that are DHCP enabled. In networks that does not support DHCP and uses Static IP's, the local backup sets are used to recover these systems in case of a crash or total failure. In very large environments, servers cannot be ported on DHCP network as the applications hosted in the servers are IP conscious. A typical example of such an environment would be a datacenter with multiple application servers that access multiple database servers. In these environments, the servers are configured with static IP's. This article describes an Automated System Recovery process which facilitates system recovery in Static IP environments.
Articles 21 Nov 2008
Using IBM Tivoli Directory to deploy LDAP with Websphere Community Edition
Learn how to implement user authentication and authorization for WebSphere Application Server Community Edition, using IBM Tivoli Directory Server to configure an LDAP realm.
Also available in: Korean  
Articles 20 Nov 2008
Approaches for solving problems with Tivoli Directory Server synchronization
An enterprise directory server is a critical piece of IT infrastructure. It is important that the directory server infrastructure be highly available, scalable and reliable. To achieve this, a directory server replication topology is often used to replicate the directory data across several directory servers. This article will outline the difficulties that can be encountered when managing a replicated directory infrastructure. The article will also highlight some common replication scenarios, and problems that are commonly encountered when troubleshooting and correcting these issues and some techniques to help solve directory replication issues.
Articles 12 Nov 2008
Adding custom XML extensions to SAML 2.0 request messages
IBM Tivoli Federated Identity Manager 6.2 (TFIM) has extended existing support of the SAML 2.0 federated single sign-on protocol to include the ability to supply custom XML elements as part SAML requests or responses. This capability is exposed by way of an Open Services Gateway Initiative (OSGi) plug-in extension to the Tivoli Federated Identity Manager runtime. This article will outline how to use this extension point including sample Java code and instructions for deployment and testing.
Articles 28 Oct 2008
Auditing Tivoli Identity Manager with Tivoli Compliance Insight Manager
IBM Tivoli Identity Manager (TIM) is a provisioning platform that centralizes and automates the lifecycle management of user's access rights on various end systems. TIM administrative users can provision identities to many different systems, such as operating systems, data stores and other applications. By auditing TIM, we can monitor activities performed by these administrative users and report any violations involved in the user management activities. The IBM Tivoli Compliance Insight Manager (TCIM) provides a unique and comprehensive view into the user management activities of TIM. Using TCIM we can collect all data from the TIM logs, store them, normalize the data using W7 process to comprehend what was collected and report all exceptions based on the TCIM policies.This article demonstrates the auditing of TIM with TCIM and provides an overview of the customizations and processes involved from the collection of the TIM audit logs to the preparation of reports based on these logs.
Articles 28 Oct 2008
Lotus Notes AdminP operations using Tivoli Identity Manager
IBM Tivoli Identity Manager (ITIM) provides an adapter for IBM Lotus Notes system. The adapter provides a wide range of functions related to the lifecycle of Lotus Notes accounts. Most noticeable among these are Lotus Notes AdminP Operations. The Lotus Notes AdminP Operations are used to handle events such as department transfer, name change and certificate expiring. This article provides an overview of the customizations and the processes involved in these operations.
Articles 21 Oct 2008
Tape inventory script for Tivoli Storage Manager on open systems
The script gives a consolidated inventory report of the all the tapes used by IBM Tivoli Storage Manager, which are present inside or outside of the IBM TotalStorage SCSI Library, including the tape's status, access mode, home slot number, storage pool to which it belongs, offsite readiness and status and the TSM server or instance that owns them.
Articles 20 Oct 2008
User Centric Identity with Tivoli Federated Identity Manager, Part 2: Self registration and account recovery using information cards and OpenID
Attracting users to register at your retail Web site has always been a challenge. Not only do you need to have a fantastic service to offer, you also need to make the on-boarding process as simple and convenient as possible. Traditional federation technologies like Liberty and SAML allowed companies to collaborate with tightly-coupled user bases by establishing 1:1 or many:few relationships; however, that model does not scale to the true retail space. User Centric Identity management technologies like OpenID and Information Cards allow people to manage their own identity attributes at distributed "Identity Providers" (including self-issued Information Cards). This article will demonstrate how to implement self-registration using an Information Card or OpenID (with the simple registration extension - SREG). Automated recovery of an account is also implemented, such as when the user centric credential with which it was registered is lost. Sample code is provided to rapidly enable these capabilities with IBM Tivoli Federated Identity Manager 6.2.
Articles 15 Oct 2008
Managing OpenID trusted sites with Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager 6.2 (TFIM) introduces support for OpenID 1.1 and 2.0 authentication protocols. When configured in the role of an OpenID Provider (Identity Provider), TFIM allows end users to record choices about authenticating to trusted relying-party sites. For example a user may select "Allow authentication forever" to a particular relying-party, and may select which attributes they are willing to share with that site. By default TFIM stores these choices in persistent cookies on the user's browser. The cookie technique is effective, but not portable for users across different browsers. This article will demonstrate how to write your own plug-in for the storage and retrieval of user choices (for example to a database) via the TFIM TrustedSitesManager extension point.
Articles 15 Oct 2008
Secure replication in IBM Tivoli Directory Server
The article describes how to easily configure different replication topologies in IBM Tivoli Directory Server (TDS) using simple shell scripts. These scripts can be used to configure all known replication topologies (like Peer-peer, Master-Replica-Forwarder, Gateways etc) using simple bind, SSL with certificates or Kerberos authentication mechanism. The information in this article applies to TDS version 5.2 and later.
Articles 30 Sep 2008
Tivoli Directory Server 6.1 password policy : enhancements, configuration and troubleshooting
A password policy is a set of rules designed to enhance security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations which ensures that users change their passwords periodically, passwords meet construction requirements, the re-use of old password is restricted, and users are locked out after a certain number of failed attempts. This article is intended to highlight the new features introduced with IBM Tivoli Directory Server(TDS) 6.1 release and describe the ways of debugging trivial password policy problems in TDS.
Articles 29 Sep 2008
Single sign-on from Microsoft Office SharePoint Server to applications
Microsoft Office SharePoint Server (MOSS) provides a single sign-on capability for applications whose content is retrieved for rendering via MOSS. Microsoft provides an interface through which other credential providers can be integrated. In this article, an approach to integrate IBM Tivoli Access Manager for e-Business with Microsoft Office SharePoint Server for downstream single sign-on is introduced. Sample code is also provided to demonstrate the integration approach described in this article.
Articles 29 Sep 2008
Understanding the Tivoli Federated Identity Manager Information Service 6.2
IBM Tivoli Federated Identity Manager 6.2 (TFIM) provides a Web service interface designed to obtain federation, federated user, and user alias information from a TFIM environment. This Web service is known as the TFIM Information Service. This article shows how to create a Web service client from the interface using Rational Application Developer 7.0 and also contains a sample application which uses the newly created Web service client to query federation, federated user and user alias information.
Articles 18 Sep 2008
Enabling Microsoft Office Sharepoint Server Client Integration through Tivoli Access Manager e-business WebSEAL using Forms Authentication
This article describes a IBM Tivoli Access Manager for e-business (TAMeb) WebSEAL integration for Microsoft Office SharePoint Server that allows Office Client integration to be used with forms based authentication. The solution relied on a custom authentication mechanism for WebSEAL and the use of a one time use persistent cookie. This article provides the source code of a prototype implementation.
Articles 16 Sep 2008

1 - 100 of 276 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)