Skip to main content

IBM Z Redbooks

 

Enterprise IT Infrastructure for cognitive business

 
thumb

08 January 2025

Transitioning to Quantum-Safe Cryptography on IBM Z

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might …

Read now
thumb

07 January 2025

Leveraging LinuxONE to Maximize Your Data Serving Capabilities

Data modernization refers to initiatives or processes that lead to more pertinent and precise data, as well as quicker and more effective data processing and analysis, thereby enhancing both organizational management and regulatory compliance while …

Read now
thumb

20 December 2024

Transitioning to Quantum-Safe Cryptography on IBM Z

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might …

Read now


Transitioning to Quantum-Safe Cryptography on IBM Z

08 January 2025, Draft Redbooks

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start ...


Leveraging LinuxONE to Maximize Your Data Serving Capabilities

07 January 2025, Draft Redbooks

Data modernization refers to initiatives or processes that lead to more pertinent and precise data, as well as quicker and more effective data processing and analysis, thereby enhancing both organizational management and regulatory compliance while catering to industrial and societal requirements.. This IBM® Redbooks® publication describes how to maximize the data serving capabilities on ...


Transitioning to Quantum-Safe Cryptography on IBM Z

20 December 2024, Redbooks

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start ...


IBM z16 A02 and IBM z16 AGZ Technical Guide

20 December 2024, Redbooks

This IBM Redbooks® publication describes the features and functions of the latest IBM Z® platform members that are built with the IBM Telum® processor: IBM z16™ A02 and IBM z16 AGZ. It includes information about the IBM z16 A02 and IBM z16 AGZ processor design, I/O innovations, security features, and supported operating systems. The IBM Z platform is recognized for its security, resiliency, ...


Getting Started with IBM Z Cyber Vault

12 December 2024, Draft Redbooks

With cyberattacks on the rise, cyber resiliency is becoming more important than ever. Cyber resiliency provides the required capability to prevent significant impact in the event of an attack. A cybersecurity strategy might minimize the risk of attacks getting through to systems, applications, and data, but a cyber resiliency strategy is needed to recover quickly. Preparing for, responding to, ...


The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2

11 November 2024, Redbooks

This IBM® Redbooks® publication is volume one of five in a series of books entitled The Virtualization Cookbook for IBM Z. The series includes the following volumes: The Virtualization Cookbook for IBM z Systems® Volume 1: IBM z/VM® 7.2, SG24-8147 The Virtualization Cookbook for IBM Z Volume 2: Red Hat Enterprise Linux 8.2 Servers, SG24-8303 The Virtualization Cookbook for IBM z ...


IBM z16 (3931) Technical Guide

25 October 2024, Redbooks

This IBM® Redbooks® publication describes the features and functions of the latest member of the IBM Z® platform that was built with the IBM Telum processor: the IBM z16™ (machine type 3931). It includes information about the IBM z16 processor design, I/O innovations, security features, and supported operating systems. The IBM Z platform is recognized for its security, resiliency, performance, ...


IBM TS7700 R5.4 DS8000 Object Store User’s Guide

03 October 2024, Redpaper

The IBM TS7700 features a functional enhancement that allows for the TS7700 to act as an object store for IBM DS8000® Transparent Cloud Tiering with IBM DS8000, DFSMShsm (HSM), and native DFSMSdss (DSS). This function can be used to move data sets directly from DS8000 to TS7700. This IBM Redpaper publication provides a functional overview of the features, provides client value information, and ...


Practical Migration from x86 to IBM LinuxONE

25 September 2024, Redbooks

IBM LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It is designed to run more transactions faster and with more security and reliability, specifically for the open-source community. It fully embraces open-source-based technology. The following LinuxONE servers are now available: IBM LinuxONE 4 LA1, IBM LinuxONE 4 LA2, IBM LinuxONE 4 AGL, ...


Practical Migration from x86 to Linux on IBM Z

18 September 2024, Redbooks

There are many reasons why you would want to optimize your servers through virtualization using Linux on IBM Z®: Too many distributed physical servers with low utilization A lengthy provisioning process that delays the implementation of new applications Limitations in data center power and floor space High total cost of ownership (TCO) Difficulty allocating processing power ...

 
1–10 of 175 items
of 18 pages
 

Learn more