Ray JonesVice President, z Systems Software
07. – 08. November 2016 @ IBM z Systems Mainframe Event 2016
z Systems:Strategy Discussion
ZSystemsandtheDigitalEconomyExplosion in transaction growth
driven by mobility and the Internet of Things
Analytics is moving to real time
to capture new opportunities at the point of impact
Cloud is the new standardfor delivering service, agility, trust
and efficiency
PlatformCoreCapabilities:
TransactionProcessing
DataServing
MixedWorkloads
EconomyatScale
TrustedandSecureComputing
Reliable,Available,Resilient
VirtuallyLimitlessScale
2
© 2016 IBM Corporation 4
IBMzSystems:Innovation– Integratedbydesign
SemiconductorTechnology
MicroprocessorDesign
SystemsDesign
Virtualization&OperatingSystems
z13z13sDS8880
Compilers,Tools&JavaVirtualMachine1
OptimizedMiddleware1
1OpenSourceandLinuxbringawealthofnewmanagementtools,languages,databases,etc.tozSystems– therearejustafewlistedonthischart
Security Performance Compliance Simplicity
• Protection against misuse of privileged user credentials: Blockchain operating environments and data are protected by secured service containers against access and abuse by root users, system administrator credentials and other privileged user access. These Blockchain instances are locked so they must deployed to system models configured to our high security settings.
• Malware protection: Blockchain data and software is protected from malware being installed.
• Protection of peers from one another: Blockchainpeers are able to run in protected, isolated environments to prevent deliberate or unintentional leakage of information from one party's environment to another.
• Key safety: Identity, communications, and data privacy are safeguarded by having all keys in a secure services container. For our general-availability release, key security will be further enhanced by implementing “secure key” using our tamper-resistant crypto-card (certified to highest level - FIPs 140-2 Level 4).
• Hardware accelerators:Crypto optimization supports an environment that moves hashing and symmetric encryption to accelerators and optimizes digital signatures to reduce drain on CPU performance.
• Highly auditable operating environment:Hardware and firmware audit logs provide information about any critical actions done to system such as replacing hardware or changing configurations. This allows such changes to be audited, including verification of unauthorized actions.
• Open-source Hyperledger code along with a single, integrated stack.
5 5
ServiceType HighSecurity
Platform Bluemix
Confidentialtransactions Yes
DashboardMonitor Yes
Nodes 4nodes+CertificateAuthority
Purpose Simulateabusinessnetwork
Environment Isolatedsingletenant
IBMSecureServiceContainer Yes
High security business networkService Plan on Bluemix
https://www.ibm.com/blockchain/bluemix.htmlSignup:
How we deliver valueBenefit Value How
Prevent Edward Snowden-type attack
Protection against misuse of privileged user credentials
Our differentiation is that IBM Secure Service Containers prevent system admins with access to the hardware from disabling the restrictions as it is possible on other environments:• No access to the data store• No ability to modify any of the code in the container• All data leaving the container is encrypted
HOW: We do this by encrypting all data on the disk; only the machine hardware has the keys—there are no keys accessible to privileged users. Only authorized APIs are available (not the underlying software). For example on other systems, system admins can disable SELinux on the Redhat Enterprise Linux, then get full access to the system.
Data Privacy Participants in a business network can’t see each other’s private data
Because each peer in the network has a copy of all data from all parties, we do not want the owner of each peer to be able to look at the data stored in the peer. The container prevents the machine owner from peeking /viewing the raw data. The only thing a peer owner can do is start or stop a peer.
HOW: All peer data and code is encrypted all the time. The peer owner does not have the keys.
6
HighSecurityBusinessNetwork
7
SecureServiceContainerensures…
Nosystemadminaccess,ever• Oncetheapplianceimageisbuilt,
OSaccess(ssh)isnotpossible• OnlyRemoteAPIsavailable• Memoryaccessdisabled• Encrypteddisk• Debugdata(dumps)encrypted
HowtheSecureServiceContainerbootsequenceworks…Bootsequence1. Firmware bootloader is loaded in memory2. Firmware loads the software bootloader from disk
i. Check integrity of software bootloaderii.Decrypt software bootloader
3. Software bootloader activate encrypted disksi. Key stored in software bootloader (encrypted)ii.Encryption/decryption done on the flight when accessing
appliance code and data
Secure Service Container HighSecurityBusinessNetwork
©2015IBMCorporation8
Everledger – Highvalueassets
IBM’ssecureblockchain cloudenvironment,underpinnedbyIBMLinuxONE,theindustry’smostsecureLinux-onlyserver,isidealfororganizationssuchasEverledger,acompanythattracksandprotectsdiamondsandothervaluablesviatheblockchain.Everledger isbuildingadigitalbusinessnetworkusingIBMBlockchain topoweritsglobalcertificationsystemtotrackvaluableitemsthroughthesupplychain,helpingtoprotectsuppliers,buyersandshippersagainsttheft,counterfeitingandotherformsofcorruption.Theblockchain isusedtodemonstratetheoriginofhigh-valuegoodssuchasdiamonds,fineartandluxurygoods.
LeanneKemp,CEOandFounderofEverledger,explainshowIBMBlockchain andLinuxONEhelpsEverledger buildadigitalledger."Whenyouareinthebusinessofprovenance,securedrecords,accessandtransparencyareeverything.Thereisnocompromisewhenitcomestosecurityandonecannotunderestimatetheexpertiserequiredtoenablethis."
• Pressrelease:https://www-03.ibm.com/press/us/en/pressrelease/50169.wss
• VideotestimonybyLeanneKemp,FounderofEverledger
• http://youtu.be/Sn7bILEJ-nY
Why?
UseCa
se
©2015IBMCorporation9
SupportingagiletransformationonzSystems
WASforz/OS CICSTS
RuleExecutionServer
(onCICS)
JavaBatch
Rule&EventExecutionServer
• Reduceddevlifecyclefrom6monthsto2weeks
• Reducedoverallimplementationtimefrom9monthsto6weeks(integrationtest4weeks)
• HUGEreductioninoverallcost• Increasedtoplinerevenue,more
responsivetothebusinessandcustomer
LargeUSfinancialservicesco.
IdentifyopportunitiestoincreaseprofitabilityEnforceconsistencytoensure compliance
Leverageinformationtomanagerisk
z/OS
Java
Java(LibertyinCICS)
Cobol,PL1,Assembler,etc
IBMDecisionServer
Rule&EventExecutionServer
© 2016 IBM Corporation 10
• EZSource,helpsenterprisesunderstandandsafelymodifybusiness-criticalapplicationsastheyundergodigitaltransformationleveraginghybridcloud.
• EZSource strengthenIBMsolutionsforhybridcloud,APImanagementandDevOps,helpingtoaccelerateclients’digitaltransformation.
Selectcustomers
“It'sasmartmoveforIBM…Withthevastmajorityofthese
mainframeapplicationsrunningonIBMhardware,IBMhasavestedinterestinensuringthatcustomerscontinuetogetthevaluefrom
thesesystems.IBM’sservicesarmneedstoolslikethistoenabletheir
modernizationofferings.I’msurprisedIBMdidn’tmakethis
acquisitionsooner.”- IDGNewsService
EZSource :ApplicationDiscoveryUnlockthevalueinyourbusinesscriticalapplications
© 2016 IBM Corporation 11
EZSourcehasaproventrackrecordofdrivingcustomertransformations
GlobalInsuranceCompanySecurelyopenexistingmainframe
insurancesystemstowebservicesandimprovequality/maintainability
MajorUKBankBatchapplicationarchitecture,workflowpriority,anddependencyre-engineering
• Challenge: HighlycomplexportfolioofmainframeapplicationswithJapanesemarketspecificchallengesandmulti-vendordeliveryteams
• UseCase: DeployEZSourcetoentiredevelopmentgrouptodrivebettercodequalityandfastertransformation
• Analyzeddataflowsacrossapplicationsfordatacleansing.Reducedanalysiseffortby30%.
• Definedandimplementedcorecodingstandardstoimprovequality
• Challenge:Highlycomplexbatchapplicationportfoliocontainingover330,000batchjobsand100millionlinesofcode
• UseCase: Implementedastherepositoryofrecord,withapplicationsourcedatafedfromvarioussourcesystems,viaagentstothemainframesourcecodemanagementandbatchscheduler
• Transformationofbatchportfoliotoreducerisk&improveresiliency
• Improvemaintainabilityofbatchprocessingthroughsimplification
• Reducedoverallapplicationmanagementdeliverycostby18%
• Reducedapplicationanalysiscostsby65%
• Reduceddocumentationcostsby90%
• Reducedcostandtimeofstafftraining
• Improvedregulatorycompliance
GlobalLifeInsuranceITmodernisationprogram
togaincontrolofexistingappsandintroducenewapps
IBM DevOps for Enterprise Systems
DriveDevOpsimprovementwithanalysis,insight,andoptimization• Analysis: Rapidlyidentifyareasofconcerninyourapplicationportfolio,thenassesstheimpact,scope,riskandactionsrequired
• Insight: ImprovetheaccuracyofyourplanningandestimatingwithinsightsgainedfromdatacollectedfromDevOpsactivities
• Optimization: Cutwasteandworksmarterbyexecutingtheoptimumactionsrequiredtobuild,testanddeployyourapplications
Version1.0.1IntelligentTestingforHybriddevelopment
AutomateddatacollectionandJavasupport• Runtherighttests• Runfewertests• TracktrendsandflagissuesRationalTeamConcertBuildIntegration
• Build,TestandcapturedatadirectlyfromyouragileRTCenvironment
“DevOps Intelligence”
CognitiveDevops – getridoftheguesswork:ApplicationDeliveryIntelligence(ADI)
©2015IBMCorporation13
RMODE64 Misc,…zNext,etc.
FoundationalItems
z/OSv2.3Hills
Armoredz/OS(ex:Multi-FactorAuthentication)Roadmap
March25,2016– IBMMulti-FactorAuthenticationforz/OSGA,includessupportforRSA©SecurID ©hardandsofttokens& initialIBMzSecureSuiteSupportforMFA– (ProductPID5655-162).Supported onz/OSv2.1&v2.2.
ContinuousDeliverypostGA:~2Q2016– IBMTouchToken supportforiOSdevices
2H2016– PIV/CACcardsupport&pre-authenticatedusersupport
~4Q2016– additionalIBMzSecureSuiteSupportforMFA&RESTfulserviceforMFA
CloudEnablementforz/OSRoadmap
September29,2015– SoD announcedIBMplantodeliverIBMz/OSCloudenhancements
3Q2015- z/OSCloudPoC starts
February16,2016– z/OSCloudbetaannouncement
June2016– Betaviaregistrationlink:z/OSCloudbetaregistration(https://www-01.ibm.com/marketing/iwm/dre/signup?source=stg-web&S_PKG=ov44345)
ContinuousDeliverythroughoutyearwithYEdeliverablestov2.1&v2.2,includingWorkfloweditor,resourcemanagement,e-mailnotification,tenancy.
Futures– Microservices …
z/OSSimplification(viaU/IandOpenAPIs)Roadmap
January 2016 - Rolledbackz/OSMFv2.2functionality toz/OSMFv2.1
March2016- ImprovedfileanddatasetRESTAPIs&z/OSMFmobileapplication– zEvent &SupportforMFA
May2016- Upgradetoliberty8.5.5.8
September2016- Enhancementsforcommoninstall
December2016– Cloudprovisioningforz/OSv2.1&v2.2
September2017- z/OSMFalways‘on’withz/OSV2.3GA& Sysplexmanagementapplication& Incidentlog& consoleapplication
HWExploitation Performance ConstraintRelief
© 2016 IBM Corporation 14
IBM Multi-Factor Authentication for z/OS V1R2Higher assurance authentication for IBM z/OS systems with RACF
• IBM Multi-Factor Authentication on z/OS provides a way to raise the assurance level of z/OS and applications / hosting environments by extending RACF to authenticate users with multiple authentication factors.
• Support for multiple third-party authentication systems at the same time• RSA® Ready supporting RSA SecurID® Tokens (hardware & software based)• IBM TouchToken – Timed One time use Password (TOTP) generator token• Support PIV/CAC cards - Commonly used to authenticate in the Public Sector
enterprises; leverages out of band authentication infrastructure – New with V1R2• Tightly coupled with SAF & RACF
• RACF provides the configuration point to describe multi-factor authentication requirements down to a per User ID basis
• Deep RACF integration for configuration and provisioning data stored in RACF database allowing seamless back-up and recovery, and remote management
Typical Client Use Cases:• Enable strong authentication for employees that carry iOS devices with TouchID, RSA
SecurID token generators, or PIV/CAC cards for system authorization.• Provides multi-factor authentication in support of PCI-DSS requirements for personnel
with non-console administrative access to the systems handling card data.
Fast, flexible, deeply integrated, easy to
deploy, easy to manage, and easy to
use.
Achieve regulatory compliance such as HSPD-12, PCI-DSS reduce risk to critical
applications and data.
Architecture supports multiple third-party
authentication systems at the same time
* StatementofDirection
© 2016 IBM Corporation 15
IBM z Systems Cyber Security Analytics BetaA cognitive solution, developed by IBM research, which learns user behavior over time. By establishing a baseline of normal user activity, the solution can automatically identify anomalies and identify possible threats posed by rogue insiders or attackers using compromised administrator credentials.
Currently in beta, this offering will be delivered to a limited set of z13 and z13s customers as a service.• Customers collect and send 3-4 months of SMF / Access Monitor data to IBM• IBM Research will run the data through the analytics engine
• Analysis and reports will be reviewed with the client, highlighting any anomalies that should be investigated
Wearelookingtoengagenewcustomers:Encourageyourcustomerstosign-upforthebeta:https://www.ibm.com/marketing/iwm/dre/signup?source=stg-web&S_PKG=ov44344
©2015IBMCorporation16
HybridOnPremise Cloud
Optimization• IBMCapacityMgmt Analytics.• NEW- ZOperationalInsights(SaaS)
“Insighttoactioninhalfthetime”
ITOperationalAnalyticsSolutionsonzSystems
InvestigateandAutomate• NEW- IBMOperations Analyticsforz Systems• NEW- IBMCommonDataProviderforz/OS
Predict• NEW- IBMzAware (AnomalyDetection)• IBMOperations Analytics– PredictiveInsights
• CapacityManagement• Softwarecostanalysis• Enterpriseresourceandworkloadoptimization
• SMEinsightsincloud (SaaS)
• LogAnalytics• Domaininsightsandexpertadvice• Alertnotificationandautomation• UnifieddatacollectionforlogsandSMF
• Pro-ActiveOutageAvoidance• PredictProblemsbeforeoccurrence• Loganomalydetection
Analyze and intelligently search ops data
Broadinsightstoaddressclientchallenges
Built-in IBM expertise to predict issues instead of
waiting for failure
Use analytics to avoid under or over capacity
situationsOptimize subsystems and benchmark against others
(SaaS – coming soon)
z operational analytics solutions from IBM to enable clients to search, analyze, predict, resolve, and optimize to reduce costs, avoid outages, and minimize time to resolution
Capture, store, and report on resources and usage across the
organization
Accounting&Chargeback ServiceLevelReporting
Detect anomalies before they
happen
Analyze system capacity
Optimize for cost and performance
Improve time-to-resolution for day-to-day operational
issues
Provide insight into resource usage
Notify operations of suspicious activity that
could indicate a security breach
Avoid security breaches
©2015IBMCorporation18
Thecommondataprovider(CDP)isanewofferingdrivenbycustomerrequests,toaddressthegrowingOperationalAnalytics(ITOA)requirement
TheCDPprovides:
• Asinglesourceforz/OSOperationalDatainaflexible,consumableformatbothonandoffplatform
• (Near)RealtimedatafeedofSMFdataandlogdata
• Singleinterfacethatiseasytoconfigureanduse
• Readonce- writemany
• Multipledestinationsindifferentformatsfordifferentconsumers
• BatchdatacollectionalsoavailablefordeepdiveanalysisortomanageCPUconsumption
• Documentedprotocolsandformatsforsendingandconsumingdatawillbeprovided,enablingdataingestiontowidelyusedIndustryAnalyticsPlatformsorEnterprise-specificsolutionsforaccessandanalysis
VisionandPurpose• Aninteractiveframeworkforcombiningmultipleviewsofthedatatoprovideadeeper
understandingoftheEnterprise
CommonDataProvider(CDP)overview
IBM DevOps for Enterprise Systems
IBMSystemzAdvancedWorkloadAnalysisReporter(IBMzAware)Overview
UsingAnalyticstoImprovezAvailability
§Cuttingedgepatternrecognitiontechniquesbasedonmachinelearning,looksatthehealthofasystemtopinpointdeviationsfromthe‘norm’
■ Identifiesunusualsystembehaviorofz/OSandLinuxonSystemzworkloads
§ ImprovesproblemdiagnosisacrossasetofSystemzservers
§Highspeedanalyticsfacilitatestheabilitytoconsumelargequantitiesofmessagelogs
§Speedsupthetimetodecideonappropriatecorrectiveactionsonproblemsbeforetheygetbiggerandimproveavailability
§Allowestablishmentofprocedurestopreventreoccurrence
§Helpsidentifywhat‘youdon’tknow’
Monitorsz/OSandLinuxonzimagesrunningnativelyorasaguest
zAware’s capacityasa‘watchdog’canhelptodetectunusualbehavior
innearrealtime
IzAware host
Linuxon
systemz
z/OSIBM
zAware
zAware monitoredclients
z/OS
IBMzAwareWebGUItomonitorresults
z/VM
Linuxon
systemz
Linuxon
systemz
IBMOperationsAnalyticsforzSystems
20
• Network insights• Security insights• Event notification• Hadoop support
• Analysis of performance metrics (SMF real time data provider)
• Integration with existing Service Management tooling (Automation, Monitoring, Event Management, Service Desk)
• Role-based access control• Multi-time zone support
in 2015
SEARCH
ANALYZE Launch to Support Doc
RESOLVE
INTEGRATE
Accelerateproblemisolationandidentification…Reducemeantimetorepair§ Analyze varioustypesofdata(logs,metrics,events,troubletickets)from
multiplesources(mainframeanddistributed)
§ SurfacecommonissueshiddeninthedataviatheProblemInsightstabandtakestepstoproblemsresolutionusingtheprovidedsuggestedactions.
§ Locateproblemsfromsystem,configuration,softwarelogsandperformancemetricsusing rapidindexsearchand patternanalysis
§ IsolateissuesacrossvariousdomainsincludingOS,Middleware,applications,etc.
§ LeverageExpertAdvicevialinkstosupportdocumentationandoperationsnotestoresolveproblemsquickly
§ Visualizesearchresultswithanalytictoolstorapidlydeterminerootcause
§ Out-of-the-boxanalysisandinsightsforz/OS,WebSphere,DB2,CICS,IMS,MQ,Network,Securityaswellasdistributedsystems
§ Enableearlyerrordetectionandbroadenscopeofautomationwith eventnotifications
§ Fullycustomizabletomeetyourneeds• Enhanced security
insights from SMF 80• Root cause insights
through new Problem Insights views
• Support for industry-standard log management tools (Logstash, Apache Kafka)
• VSAM ESDS support• Client-side Expert Advice• Expanded WAS insights from
SMF 120
in 2016
©2015IBMCorporation21
PRIVATECLOUD
Engageintoday’shybridcloudworldwithyourzfoundation
Data Apps
APIs APIs
PUBLICCLOUD
ENTERPRISEIT
DataApps
APIs APIs
HybridCloud
AnalyticsSecuritySocial
Infrastructure Infrastructure
Sourcingnewinnovationfrommobiledevelopercommunities
• CitiMobileChallenge• Exposing34API’sfromCitiplus
API’sfrom10otherpartners• Openinginnovationto1000’s,
formuchlessinvestmentthanwouldtakeotherwise
z/OSConnectEnterpriseEdition
DataConversion
DiscoveryFunction
AuditFunction
LoggingFunction
GranularAuthorization
CICS
IMS
DB2
Task
REST
RESTClient
RESTJSON
Whatitis…1 2
3
4
1. z/OSConnectexploitsembedded Liberty
2. ServiceProvidergivesbackendconnectivity
3. Interceptorsprovideconfigurablefunction
4. Extensibleinterfaceprovidesflexibility
SuchasaWASz/OSserverhostingREST
Along-runningtaskusingWOLAAPIstohostaservice
IBMAPIConnect:Simplified&ComprehensiveAPIfoundation
What does IBM API Connect provide?• Automated, visual and coding options for creating APIs• Node.js and Java support for creating Microservices• Integrated enterprise grade clustering, management and
security to run APIs• Lifecycle and governance for APIs, Products and Plans• Access control over API’s, API Plans and API Products• Advanced API usage analytics • Customizable, self service developer portal for publishing APIs • Policy enforcement, security and control
Create Run
ManageSecure
©2015IBMCorporation24
z/OSCloudEnablement:Middlewareservices§ Allfivetraditionalmiddlewareonz/OSareparticipatinginz/OSCloud
Ø CICS,IMS,DB2,WAS,MQ
§ Eachmiddlewareisprovidingservicestodynamicallyprovisionmiddlewareinstance
Ø CICS– ServicestoprovisionCICSRegioninsinglesystemaswellasCICSPLEXenvironments
Ø IMS– ServicetoprovisionIMSsubsysteminstance
Ø MQ– ServicetoprovisionMQQueueManagerinstance
Ø DB2– ServicetoprovisionDB2subsysteminstance
Ø WAS/WebSphereLibertyProfile– ServicetoprovisionWASorWLPserver
§ Middlewarearealsoprovidingservicestocreaterelevantresourcedefinitions
Ø MQ– Servicetoprovisionqueueresourceandload/clearmessagesinqueue
Ø DB2– ServicetoprovisionDB2objectresourcee.g.DB2schemawithsampledata
Ø IMS– ServicetoprovisionIMSDatabaseobject
§ Middlewarearealsoprovidingcapabilitytoconnectacrossdifferentmiddlewareinstancese.g.WLPtoDB2orCICStoMQconnectivity.
©2015IBMCorporation25
Outdatedviewsofinfrastructurecanimpedeprogress
SignificantcomplexitySeparateddatawarehouses
AnalyticslatencyTransactionaldataisnotreadilyavailable
LackofsynchronizationDataisnoteasilyaggregatedandfresh
DataduplicationMultiplecopiesofthesamedata
ExcessivecostsOfmovingdataaround
SourceData
PredictiveScoring
PredictiveModeling
...Butwehaveasolutionforthis!
Scale and speed for the next era of mobile applicationsOver 1 Million Inserts per second measured, will scale higher280 trillion rows in a single table, with agile partition technology
In Memory database23% CPU reduction for lookups with advanced in-memory techniques
Next Gen application support360 million transactions per hour through RESTful web API
Deliver analytical insights fasterUp to 2x speedup for query workloads, 100x for targeted queries
Up to 1 TB Partition Size, or 4 Petabytes per table space
RedefiningenterpriseITfordigitalbusinessandthemobileappeconomyDB2 12 for z/OS:
IBMConfidential26
Anearlylook
SimpleLook-up:Faster&Cheaper
27
6%
11%
16%
23%
2 3 4 5
IndexLevels
CPUImprovement(%)fromSimpleLookupinDB212
Up to 23% CPU reduction for index look up using DB2 12 In-memory index tree
27
SignificantCPUReductioninDB2V12QueryWorkloads
283,02%
4,52%
8,66%
11,00%
13,18%
15,70%
17,00%
18,00%
19,00%
23,77%
24,00%
34,10%
66%
80%
85%
90%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% 75% 80% 85% 90%
BIDAY-LongSAP BW
TPCDTPCH-SQLPL
Cust3Cryst.Rpt-Short
Cust1-ClusTPCH-parallel
TPCH-seqCust2
BIDAY-ShortSAP CDS FIN
Cust1-UnclWAS Portal
SAP CDS FioriCryst.Rpt-Long
CPU time %
CPUReduction%
UNIONALLw/View
ComplexOuterJoin,UDF
Complexreporting,largesort
Simplequeryorlargedata
scan
28
©2015IBMCorporation29
Createacompetitiveadvantageinthedigitalera
CreatingIntelligentinteraction intransactionsintegratedacrossmobile&coreprocesses
Atrustedcomputing platformtosupportsecuregrowthintransactionsanddata
Operationalandanalyticsapplicationsresidewiththedatainasinglefullyvirtualizedsystem
Aflexibleandrobustinfrastructureforrapiddeliveryofhighqualityservices
…maketheextraordinarypossible!!!
DevOps
Infrastructure
Cloud Social
AnalyticsMobile
Security
©2015IBMCorporation31
DB2V12cloudservicesprovisioningapproach• ProvidelifecycleoperationsforDB2forz/OStocompensateforgeneralweakeningoftraditionalz/OSskills
• AutomatedtaskmanagementforinstallingandmigratingproductionDB2forz/OSsubsystemsanddatasharinggroups
§ Databaseprovisioning(DBaaS)forDB2forz/OSfortestanddevelopmentuse,providinganAPIforlifecycleoperations,whichisaprerequisiteforanycloud-drivenapproaches§ Schemaprovisioning
§ Automatedschemachangesaspartoftheapplication§ Automatedschemadefinitionwithobjectverification(*)
§ Systemprovisioning
§ Dataas-a-servicebyDB2ServicesServerintegratedsolutionthatenablesdeveloperstomakeexistingDB2assets– SQLandStoredProcedures– availableintoday’sgrowingmobileandcloudapplicationecosystemviaRESTAPI