When working in an IBM AIX® environment that uses the IBM System Storage® SAN Volume Controller (SVC), you need to be able to determine the SVC volumes that represent each AIX hdisk.This article coversthe procedure to perform this manually as well as automate the process by using a script. With these skills, you will be able to better manage the storage on your SVC and AIX systems.
You might also be interested in...
IBM® Rational® Developer for AIX® and Linux® provides unified environments specialized for the development of software solutions targeted to distributed platforms utilizing technologies of C and C++ (on AIX and Linux), COBOL (on AIX), Java, Enterprise Java, Web 2.0, mobile Web, SOA, SCA, OSGi and other technologies.
Michael Hamelin introduces the new format for theX-Force Threat Intelligence Quarterlyreport. He also summarizes the ongoing trends in poisoned watering hole attacks and the emergence of point of sales attacks since 2010.
In this interview, Angel Tomala-Reyes discusses the Cloud Foundry open source project and how Codename BlueMix relates to it. He talks about the advantages BlueMix has over the base Cloud Foundry for developers, organizations, and end users. He also talks about the open beta for Codename BlueMix and some of the services that are available in the open beta.
Starting with version 16, IBM® SPSS® provides a free plug-in that enables you to run R syntax from within SPSS. The plug-in connects R to the active database. You can write results that are obtained from R into a new SPSS database for further manipulation in SPSS. Catherine Dalzell discussesher developerWorks articlethat shows readers how to use SPSS and R together.
You might also be interested in ....
Get your IBM SPSS 14-DAY TRIAL in three minutes or less! Start leveraging your data today to identify your best customers, forecast future trends, improves supplierperformance, and more. Download theIBM SPSS Trial.
The Key Management Interoperability Protocol (KMIP) defines the communication between a Key Lifecycle Management System (KLMS) and its clients. Some companies have been working with proprietary implementations of KMIP in different programming languages for a while, but until now, no open source solution existed. Hence, the creation of KMIP4J, an open source implementation of KMIP in Java™ code now available onwww.sourceforge.net. In this interview, one of the co-creators of KMIP4J, Michael Guster, introduces this project. Find out more about KMIP4J at thisdeveloperWorks article.
You may also be interested in...
IBM has published a new white paper on encrypting data at enterprise scale. Learn about encrypting mission critical data with confidence and reduce security risks across the enterprise and beyond. Download the white paper, "Encrypting Data With Confidence."
Learn how to model and analyze time series data to detect anomalies in cybersecurity, infrastructure management, and other domains using InfoSphere Streams and the TimeSeries toolkit. Bharath Kumar and Dattaram Rao have published ahow-to guide on developerWorksthat walks you through how to use the TimeSeries tookkit step by step. You can get started with InfoSphere Streams by downloading the Quck Start edition.
InfoSphere Streams Quick Start edition is a free, downloadable, non-production version of InfoSphere Streams, a high-performance analytics platform that allows user-developed applications to rapidly ingest, analyze, and correlate information as it arrives from thousands of real-time sources. With no data or time limits, InfoSphere Streams Quick Start Edition allows you to experiment with stream computing in your own unique environment. Build a powerful analytics platform that can handle incredibility high data throughput, up to millions of events or messages per second.
Senthil Nathan and Bugra Gedik have published "Using InfoSphere Streams with memcached and Redis" to show how to externalize the Streams application state using a Distributed Process Store (DPS). They demonstrate with two popular NoSQL key-value data stores, memcached and redis.
Getting Started With InfoSphere Streams.
InfoSphere® Streams Quick Start Edition is a free, downloadable, non-production version of InfoSphere Streams, a high-performance analytics platform that allows user-developed applications to rapidly ingest, analyze, and correlate information as it arrives from thousands of real-time sources. With no data or time limits, InfoSphere Streams Quick Start Edition allows you to experiment with stream computing in your own unique environment. Build a powerful analytics platform that can handle incredibility high data throughput, up to millions of events or messages per second.
Sanjeev Sharma discusses his new Book,DevOps For Dummies. He also discusses how DevOps relates to Continuous Delivery of software and how it benefits an organizations core line of business. He also offers some guidance on how companies can get started with DevOps.
Chris Hockings and Jenny Wong discuss the rising need for "Bring Your Own Identity" in corporate web applications as a follow on to "Bring Your Own Device." They discuss the challenges and standards that can help make Bring Your Own Identity a reality. They also discuss their how-to guide, "Enable bring-your-own-identity authentication" and their demonstration video, "Self-registration and bring-your-own-identity using "Tivoli Federated Identity Manager."
Stephanie Trunzo is the Chief Creative Officer for PointSource, which is an early adopter of theJazzHub platform. In this interview, she talks about how her company's usage of JazzHub goes way beyond the development phases of a project to encompass every interaction with its clients. You canregister for an account on JazzHuband start hosting your projects immediately.
IBM's X-Force research team has released theIBM X-Force 2013 Mid-Year Trend and Risk Reportto summarize their latest IT security findings. Michael Hamelin is a security architect on the X-Force team and in this interview he discusses some of highlight trends in the report. He discusses the "what's old is new" trends, the new type of "reputation stealing" attacks, and the latest technology based attacks on mobile platforms. In the first six months of 2013, the X-Force team researched 4100 new vulnerabilities, investigated 900 million web pages, created 27 million new entries in its web filter database, and managed 180 million malware signatures. You can download theIBM X-Force 2013 Mid-Year Trend and Risk Reportfor free and read all the details of their findings.
Ton Ngo has published an article titled "Prototype mobile applications built with IBM Worklight for IBM Watson. " This article is for architects and developers who are interested in building advanced mobile applications either in general or within the IBM Watson context. It describes the design and implementation of a sophisticated mobile application prototype for oncologists that interfaces with IBM Watson and with a hospital's back-end systems. A member of the IBM team that built the prototype explains how the team used IBM Worklight, with help from Dojo Mobile and Apache Cordova, to address the project's technical challenges.
Other items from this episode:
Apache ZooKeeper is a high-performance coordination server for distributed applications. It exposes common services -- such as naming and configuration management, synchronization, and group services -- in a simple interface, relieving the user from the need to program from scratch. It comes with off-the-shelf support for implementing consensus, group management, leader election, and presence protocols. Mark Grover from Cloudera has published "ZooKeeper fundamentals, deployment, and applications" to show how to set up and deploy a ZooKeeper cluster in a simulated miniature distributed environment. You can use this step-by-step article to plan your ZooKeeper environment.
Mario E. De Armas and Joel Gauci have published updates to their three part series called "Enforcing Service Level Agreements using WebSphere DataPower" shows how common policies are governed, enforced, and monitored using IBM® WebSphere® DataPower® XI50 SOA Appliance, WebSphere Service Registry and Repository, and IBM Tivoli® Composite Application Manager for SOA. This series is a must read for organizations that have service level agreement commitments with their internal and external customers.
Advanced persistent threats, the evolution of IT infrastructures, and compliance complacency can stymie security vulnerability monitoring. IBM® Security QRadar® Vulnerability Manager is a new product from IBM that is helping to redefine how IT security teams collect and use vulnerability assessment data. This member of the QRadar product family helps identify an organization's largest exposures and build a smarter remediation and mitigation action plan. By correlating scan results with the security intelligence data of QRadar SIEM, you can quickly prioritize the vulnerabilities that present the greatest potential dangers and avoid false positives or those already classified as non-threatening. developerWorks has published "An architectural view of QRadar Vulnerability Manager" to introduce the capabilities of this new product to IT security practitioners.
Rajath Ramesh and Manjunatha D have published a three part series onUsing JSON in WebSphere Cast Iron. Part 1 of this article series shows how to configure JSON handling activities to invoke JSON-based REST APIs and to create your own JSON-based REST APIs. Part 2 shows how to build an orchestration that invokes JSON-based REST APIs exposed by Salesforce.com® to create an account. Part 3 shows how to design an orchestration that is exposed as a JSON-based API. This series will show you everything you need to know to get started using JSON activities in your Cast Iron orchestrations.
Surajit Paul has published ahow-to guide for Hadoops' Sqoopthat focuses on the Java APIs. Sqoop is an integral part of a Hadoop ecosystem, helping transfer data between NoSQL data storage and the traditional RDBMS. Numerous technical articles have been published featuring the Sqoop command-line interface (CLI) usage. However, as of Sqoop 1.4.3, there is not much insight publicly available about the usage of the Sqoop Java API. This article covers the usage of the Sqoop CLI, with additional emphasis on the Sqoop Java API, using an example of data from the Bombay Stock Exchange. The article is intended to provide preliminary exposure to technical architects, solution architects, technical managers, consultants, data scientists, technical leads, and developers interested in and working in the big data space.
Additional items in this episode:
Joern Klauke, and Martin Jungfer have published a new how-to guide forusing the new scripted interface for DB2 Advanced Copy Services. This new feature introduced in DB2 10.5 allows administrators to invoked the Advanced Copy Services from shell scripts instead of native code. This new feature enables IT shops to incorporate new storage hardware into their back up infrastructure more quickly and consistently. This how to guide will be useful for anyone managing a DB2 backup environment.
Enzo Cialini, Ian D. M. Hakes, Ian D. M. Hakes, Richard Lubell, and Paul McInerney have published a new how to guide on Implementing disaster recovery in IBM PureData System for Transactions. This article outlines the setup and operation of a disaster recovery solution for DB2 V10.5 databases on the IBM PureData System for Transactions, Fix Pack 3 or later. The solution is based on the DB2 High Availability and Disaster Recovery feature, and includes additional elements that are not handled directly by the product. This article will be of interest to anyone who needs to make sure their mission critical data can always be restored.
Neal Ford has published part 2 in hisJava.next series. In this latest installment, he discusses Java's lack of inheritance mechanisms that are commonly found in Groovy, Scala, and Clojure. This installment further explores Clojure's use of protocols as an extension mechanism. If you're interested in the evolution of Java, you'll want to read about these extension mechanisms.
Pietro Marella and Torsten Schlegel have published an extensive guide to managing test assets in a cloud environment. The guide is called "Using Rational Quality Manager to manage lab assets in virtual environments" and is based on a pilot project at the IBM Tivoli Lab in Rome. This guide show how to extend the IBM Rational Test Lab Manager component of IBM Rational Quality Manager to import up to date definitions of virtual images and machines that are available for use in testing fom IBM Tivoli Service Automation Manager. The techniques outline in this guide can help test teams speed up their test cycles and manage complex test environments.
Rajalakshmi Srinivasaraghavan has published an article on developerWorks that explores theformat and features of the DWARF debug file structure. This standard for including source level debug information in object files is widely used by many compilers and tool chains, This article explores the details of this file format so that you can make the best use of your debugging tools and reduce the amount of time you spend tracking down bugs.
Mark Connell and Shili Yang have demonstrated how to integrate IBM Business Process Manager with an external LDAP user directory. Their work is documented in a new article they have recently published on developerWorks called "Securely integrate an LDAP user registry with IBM Business Process Manager". This article will show you how to replace the product's default security provider and instead use your enterprise directory for authentication and authorization in Business Process Manager.