+ All Categories
Home > Documents > z Systems: Strategy Discussion - IBM · z Systems: Strategy Discussion. ... & Operating Systems ......

z Systems: Strategy Discussion - IBM · z Systems: Strategy Discussion. ... & Operating Systems ......

Date post: 09-Jun-2018
Category:
Upload: builiem
View: 215 times
Download: 0 times
Share this document with a friend
31
Ray Jones Vice President, z Systems Software 07. – 08. November 2016 @ IBM z Systems Mainframe Event 2016 z Systems: Strategy Discussion
Transcript

Ray JonesVice President, z Systems Software

07. – 08. November 2016 @ IBM z Systems Mainframe Event 2016

z Systems:Strategy Discussion

ZSystemsandtheDigitalEconomyExplosion in transaction growth

driven by mobility and the Internet of Things

Analytics is moving to real time

to capture new opportunities at the point of impact

Cloud is the new standardfor delivering service, agility, trust

and efficiency

PlatformCoreCapabilities:

TransactionProcessing

DataServing

MixedWorkloads

EconomyatScale

TrustedandSecureComputing

Reliable,Available,Resilient

VirtuallyLimitlessScale

2

© 2016 IBM Corporation 4

IBMzSystems:Innovation– Integratedbydesign

SemiconductorTechnology

MicroprocessorDesign

SystemsDesign

Virtualization&OperatingSystems

z13z13sDS8880

Compilers,Tools&JavaVirtualMachine1

OptimizedMiddleware1

1OpenSourceandLinuxbringawealthofnewmanagementtools,languages,databases,etc.tozSystems– therearejustafewlistedonthischart

Security Performance Compliance Simplicity

• Protection against misuse of privileged user credentials: Blockchain operating environments and data are protected by secured service containers against access and abuse by root users, system administrator credentials and other privileged user access. These Blockchain instances are locked so they must deployed to system models configured to our high security settings.

• Malware protection: Blockchain data and software is protected from malware being installed.

• Protection of peers from one another: Blockchainpeers are able to run in protected, isolated environments to prevent deliberate or unintentional leakage of information from one party's environment to another.

• Key safety: Identity, communications, and data privacy are safeguarded by having all keys in a secure services container. For our general-availability release, key security will be further enhanced by implementing “secure key” using our tamper-resistant crypto-card (certified to highest level - FIPs 140-2 Level 4).

• Hardware accelerators:Crypto optimization supports an environment that moves hashing and symmetric encryption to accelerators and optimizes digital signatures to reduce drain on CPU performance.

• Highly auditable operating environment:Hardware and firmware audit logs provide information about any critical actions done to system such as replacing hardware or changing configurations. This allows such changes to be audited, including verification of unauthorized actions.

• Open-source Hyperledger code along with a single, integrated stack.

5 5

ServiceType HighSecurity

Platform Bluemix

Confidentialtransactions Yes

DashboardMonitor Yes

Nodes 4nodes+CertificateAuthority

Purpose Simulateabusinessnetwork

Environment Isolatedsingletenant

IBMSecureServiceContainer Yes

High security business networkService Plan on Bluemix

https://www.ibm.com/blockchain/bluemix.htmlSignup:

How we deliver valueBenefit Value How

Prevent Edward Snowden-type attack

Protection against misuse of privileged user credentials

Our differentiation is that IBM Secure Service Containers prevent system admins with access to the hardware from disabling the restrictions as it is possible on other environments:• No access to the data store• No ability to modify any of the code in the container• All data leaving the container is encrypted

HOW: We do this by encrypting all data on the disk; only the machine hardware has the keys—there are no keys accessible to privileged users. Only authorized APIs are available (not the underlying software). For example on other systems, system admins can disable SELinux on the Redhat Enterprise Linux, then get full access to the system.

Data Privacy Participants in a business network can’t see each other’s private data

Because each peer in the network has a copy of all data from all parties, we do not want the owner of each peer to be able to look at the data stored in the peer. The container prevents the machine owner from peeking /viewing the raw data. The only thing a peer owner can do is start or stop a peer.

HOW: All peer data and code is encrypted all the time. The peer owner does not have the keys.

6

HighSecurityBusinessNetwork

7

SecureServiceContainerensures…

Nosystemadminaccess,ever• Oncetheapplianceimageisbuilt,

OSaccess(ssh)isnotpossible• OnlyRemoteAPIsavailable• Memoryaccessdisabled• Encrypteddisk• Debugdata(dumps)encrypted

HowtheSecureServiceContainerbootsequenceworks…Bootsequence1. Firmware bootloader is loaded in memory2. Firmware loads the software bootloader from disk

i. Check integrity of software bootloaderii.Decrypt software bootloader

3. Software bootloader activate encrypted disksi. Key stored in software bootloader (encrypted)ii.Encryption/decryption done on the flight when accessing

appliance code and data

Secure Service Container HighSecurityBusinessNetwork

©2015IBMCorporation8

Everledger – Highvalueassets

IBM’ssecureblockchain cloudenvironment,underpinnedbyIBMLinuxONE,theindustry’smostsecureLinux-onlyserver,isidealfororganizationssuchasEverledger,acompanythattracksandprotectsdiamondsandothervaluablesviatheblockchain.Everledger isbuildingadigitalbusinessnetworkusingIBMBlockchain topoweritsglobalcertificationsystemtotrackvaluableitemsthroughthesupplychain,helpingtoprotectsuppliers,buyersandshippersagainsttheft,counterfeitingandotherformsofcorruption.Theblockchain isusedtodemonstratetheoriginofhigh-valuegoodssuchasdiamonds,fineartandluxurygoods.

LeanneKemp,CEOandFounderofEverledger,explainshowIBMBlockchain andLinuxONEhelpsEverledger buildadigitalledger."Whenyouareinthebusinessofprovenance,securedrecords,accessandtransparencyareeverything.Thereisnocompromisewhenitcomestosecurityandonecannotunderestimatetheexpertiserequiredtoenablethis."

• Pressrelease:https://www-03.ibm.com/press/us/en/pressrelease/50169.wss

• VideotestimonybyLeanneKemp,FounderofEverledger

• http://youtu.be/Sn7bILEJ-nY

Why?

UseCa

se

©2015IBMCorporation9

SupportingagiletransformationonzSystems

WASforz/OS CICSTS

RuleExecutionServer

(onCICS)

JavaBatch

Rule&EventExecutionServer

• Reduceddevlifecyclefrom6monthsto2weeks

• Reducedoverallimplementationtimefrom9monthsto6weeks(integrationtest4weeks)

• HUGEreductioninoverallcost• Increasedtoplinerevenue,more

responsivetothebusinessandcustomer

LargeUSfinancialservicesco.

IdentifyopportunitiestoincreaseprofitabilityEnforceconsistencytoensure compliance

Leverageinformationtomanagerisk

z/OS

Java

Java(LibertyinCICS)

Cobol,PL1,Assembler,etc

IBMDecisionServer

Rule&EventExecutionServer

© 2016 IBM Corporation 10

• EZSource,helpsenterprisesunderstandandsafelymodifybusiness-criticalapplicationsastheyundergodigitaltransformationleveraginghybridcloud.

• EZSource strengthenIBMsolutionsforhybridcloud,APImanagementandDevOps,helpingtoaccelerateclients’digitaltransformation.

Selectcustomers

“It'sasmartmoveforIBM…Withthevastmajorityofthese

mainframeapplicationsrunningonIBMhardware,IBMhasavestedinterestinensuringthatcustomerscontinuetogetthevaluefrom

thesesystems.IBM’sservicesarmneedstoolslikethistoenabletheir

modernizationofferings.I’msurprisedIBMdidn’tmakethis

acquisitionsooner.”- IDGNewsService

EZSource :ApplicationDiscoveryUnlockthevalueinyourbusinesscriticalapplications

© 2016 IBM Corporation 11

EZSourcehasaproventrackrecordofdrivingcustomertransformations

GlobalInsuranceCompanySecurelyopenexistingmainframe

insurancesystemstowebservicesandimprovequality/maintainability

MajorUKBankBatchapplicationarchitecture,workflowpriority,anddependencyre-engineering

• Challenge: HighlycomplexportfolioofmainframeapplicationswithJapanesemarketspecificchallengesandmulti-vendordeliveryteams

• UseCase: DeployEZSourcetoentiredevelopmentgrouptodrivebettercodequalityandfastertransformation

• Analyzeddataflowsacrossapplicationsfordatacleansing.Reducedanalysiseffortby30%.

• Definedandimplementedcorecodingstandardstoimprovequality

• Challenge:Highlycomplexbatchapplicationportfoliocontainingover330,000batchjobsand100millionlinesofcode

• UseCase: Implementedastherepositoryofrecord,withapplicationsourcedatafedfromvarioussourcesystems,viaagentstothemainframesourcecodemanagementandbatchscheduler

• Transformationofbatchportfoliotoreducerisk&improveresiliency

• Improvemaintainabilityofbatchprocessingthroughsimplification

• Reducedoverallapplicationmanagementdeliverycostby18%

• Reducedapplicationanalysiscostsby65%

• Reduceddocumentationcostsby90%

• Reducedcostandtimeofstafftraining

• Improvedregulatorycompliance

GlobalLifeInsuranceITmodernisationprogram

togaincontrolofexistingappsandintroducenewapps

IBM DevOps for Enterprise Systems

DriveDevOpsimprovementwithanalysis,insight,andoptimization• Analysis: Rapidlyidentifyareasofconcerninyourapplicationportfolio,thenassesstheimpact,scope,riskandactionsrequired

• Insight: ImprovetheaccuracyofyourplanningandestimatingwithinsightsgainedfromdatacollectedfromDevOpsactivities

• Optimization: Cutwasteandworksmarterbyexecutingtheoptimumactionsrequiredtobuild,testanddeployyourapplications

Version1.0.1IntelligentTestingforHybriddevelopment

AutomateddatacollectionandJavasupport• Runtherighttests• Runfewertests• TracktrendsandflagissuesRationalTeamConcertBuildIntegration

• Build,TestandcapturedatadirectlyfromyouragileRTCenvironment

“DevOps Intelligence”

CognitiveDevops – getridoftheguesswork:ApplicationDeliveryIntelligence(ADI)

©2015IBMCorporation13

RMODE64 Misc,…zNext,etc.

FoundationalItems

z/OSv2.3Hills

Armoredz/OS(ex:Multi-FactorAuthentication)Roadmap

March25,2016– IBMMulti-FactorAuthenticationforz/OSGA,includessupportforRSA©SecurID ©hardandsofttokens& initialIBMzSecureSuiteSupportforMFA– (ProductPID5655-162).Supported onz/OSv2.1&v2.2.

ContinuousDeliverypostGA:~2Q2016– IBMTouchToken supportforiOSdevices

2H2016– PIV/CACcardsupport&pre-authenticatedusersupport

~4Q2016– additionalIBMzSecureSuiteSupportforMFA&RESTfulserviceforMFA

CloudEnablementforz/OSRoadmap

September29,2015– SoD announcedIBMplantodeliverIBMz/OSCloudenhancements

3Q2015- z/OSCloudPoC starts

February16,2016– z/OSCloudbetaannouncement

June2016– Betaviaregistrationlink:z/OSCloudbetaregistration(https://www-01.ibm.com/marketing/iwm/dre/signup?source=stg-web&S_PKG=ov44345)

ContinuousDeliverythroughoutyearwithYEdeliverablestov2.1&v2.2,includingWorkfloweditor,resourcemanagement,e-mailnotification,tenancy.

Futures– Microservices …

z/OSSimplification(viaU/IandOpenAPIs)Roadmap

January 2016 - Rolledbackz/OSMFv2.2functionality toz/OSMFv2.1

March2016- ImprovedfileanddatasetRESTAPIs&z/OSMFmobileapplication– zEvent &SupportforMFA

May2016- Upgradetoliberty8.5.5.8

September2016- Enhancementsforcommoninstall

December2016– Cloudprovisioningforz/OSv2.1&v2.2

September2017- z/OSMFalways‘on’withz/OSV2.3GA& Sysplexmanagementapplication& Incidentlog& consoleapplication

HWExploitation Performance ConstraintRelief

© 2016 IBM Corporation 14

IBM Multi-Factor Authentication for z/OS V1R2Higher assurance authentication for IBM z/OS systems with RACF

• IBM Multi-Factor Authentication on z/OS provides a way to raise the assurance level of z/OS and applications / hosting environments by extending RACF to authenticate users with multiple authentication factors.

• Support for multiple third-party authentication systems at the same time• RSA® Ready supporting RSA SecurID® Tokens (hardware & software based)• IBM TouchToken – Timed One time use Password (TOTP) generator token• Support PIV/CAC cards - Commonly used to authenticate in the Public Sector

enterprises; leverages out of band authentication infrastructure – New with V1R2• Tightly coupled with SAF & RACF

• RACF provides the configuration point to describe multi-factor authentication requirements down to a per User ID basis

• Deep RACF integration for configuration and provisioning data stored in RACF database allowing seamless back-up and recovery, and remote management

Typical Client Use Cases:• Enable strong authentication for employees that carry iOS devices with TouchID, RSA

SecurID token generators, or PIV/CAC cards for system authorization.• Provides multi-factor authentication in support of PCI-DSS requirements for personnel

with non-console administrative access to the systems handling card data.

Fast, flexible, deeply integrated, easy to

deploy, easy to manage, and easy to

use.

Achieve regulatory compliance such as HSPD-12, PCI-DSS reduce risk to critical

applications and data.

Architecture supports multiple third-party

authentication systems at the same time

* StatementofDirection

© 2016 IBM Corporation 15

IBM z Systems Cyber Security Analytics BetaA cognitive solution, developed by IBM research, which learns user behavior over time. By establishing a baseline of normal user activity, the solution can automatically identify anomalies and identify possible threats posed by rogue insiders or attackers using compromised administrator credentials.

Currently in beta, this offering will be delivered to a limited set of z13 and z13s customers as a service.• Customers collect and send 3-4 months of SMF / Access Monitor data to IBM• IBM Research will run the data through the analytics engine

• Analysis and reports will be reviewed with the client, highlighting any anomalies that should be investigated

Wearelookingtoengagenewcustomers:Encourageyourcustomerstosign-upforthebeta:https://www.ibm.com/marketing/iwm/dre/signup?source=stg-web&S_PKG=ov44344

©2015IBMCorporation16

HybridOnPremise Cloud

Optimization• IBMCapacityMgmt Analytics.• NEW- ZOperationalInsights(SaaS)

“Insighttoactioninhalfthetime”

ITOperationalAnalyticsSolutionsonzSystems

InvestigateandAutomate• NEW- IBMOperations Analyticsforz Systems• NEW- IBMCommonDataProviderforz/OS

Predict• NEW- IBMzAware (AnomalyDetection)• IBMOperations Analytics– PredictiveInsights

• CapacityManagement• Softwarecostanalysis• Enterpriseresourceandworkloadoptimization

• SMEinsightsincloud (SaaS)

• LogAnalytics• Domaininsightsandexpertadvice• Alertnotificationandautomation• UnifieddatacollectionforlogsandSMF

• Pro-ActiveOutageAvoidance• PredictProblemsbeforeoccurrence• Loganomalydetection

Analyze and intelligently search ops data

Broadinsightstoaddressclientchallenges

Built-in IBM expertise to predict issues instead of

waiting for failure

Use analytics to avoid under or over capacity

situationsOptimize subsystems and benchmark against others

(SaaS – coming soon)

z operational analytics solutions from IBM to enable clients to search, analyze, predict, resolve, and optimize to reduce costs, avoid outages, and minimize time to resolution

Capture, store, and report on resources and usage across the

organization

Accounting&Chargeback ServiceLevelReporting

Detect anomalies before they

happen

Analyze system capacity

Optimize for cost and performance

Improve time-to-resolution for day-to-day operational

issues

Provide insight into resource usage

Notify operations of suspicious activity that

could indicate a security breach

Avoid security breaches

©2015IBMCorporation18

Thecommondataprovider(CDP)isanewofferingdrivenbycustomerrequests,toaddressthegrowingOperationalAnalytics(ITOA)requirement

TheCDPprovides:

• Asinglesourceforz/OSOperationalDatainaflexible,consumableformatbothonandoffplatform

• (Near)RealtimedatafeedofSMFdataandlogdata

• Singleinterfacethatiseasytoconfigureanduse

• Readonce- writemany

• Multipledestinationsindifferentformatsfordifferentconsumers

• BatchdatacollectionalsoavailablefordeepdiveanalysisortomanageCPUconsumption

• Documentedprotocolsandformatsforsendingandconsumingdatawillbeprovided,enablingdataingestiontowidelyusedIndustryAnalyticsPlatformsorEnterprise-specificsolutionsforaccessandanalysis

VisionandPurpose• Aninteractiveframeworkforcombiningmultipleviewsofthedatatoprovideadeeper

understandingoftheEnterprise

CommonDataProvider(CDP)overview

IBM DevOps for Enterprise Systems

IBMSystemzAdvancedWorkloadAnalysisReporter(IBMzAware)Overview

UsingAnalyticstoImprovezAvailability

§Cuttingedgepatternrecognitiontechniquesbasedonmachinelearning,looksatthehealthofasystemtopinpointdeviationsfromthe‘norm’

■ Identifiesunusualsystembehaviorofz/OSandLinuxonSystemzworkloads

§ ImprovesproblemdiagnosisacrossasetofSystemzservers

§Highspeedanalyticsfacilitatestheabilitytoconsumelargequantitiesofmessagelogs

§Speedsupthetimetodecideonappropriatecorrectiveactionsonproblemsbeforetheygetbiggerandimproveavailability

§Allowestablishmentofprocedurestopreventreoccurrence

§Helpsidentifywhat‘youdon’tknow’

Monitorsz/OSandLinuxonzimagesrunningnativelyorasaguest

zAware’s capacityasa‘watchdog’canhelptodetectunusualbehavior

innearrealtime

IzAware host

Linuxon

systemz

z/OSIBM

zAware

zAware monitoredclients

z/OS

IBMzAwareWebGUItomonitorresults

z/VM

Linuxon

systemz

Linuxon

systemz

IBMOperationsAnalyticsforzSystems

20

• Network insights• Security insights• Event notification• Hadoop support

• Analysis of performance metrics (SMF real time data provider)

• Integration with existing Service Management tooling (Automation, Monitoring, Event Management, Service Desk)

• Role-based access control• Multi-time zone support

in 2015

SEARCH

ANALYZE Launch to Support Doc

RESOLVE

INTEGRATE

Accelerateproblemisolationandidentification…Reducemeantimetorepair§ Analyze varioustypesofdata(logs,metrics,events,troubletickets)from

multiplesources(mainframeanddistributed)

§ SurfacecommonissueshiddeninthedataviatheProblemInsightstabandtakestepstoproblemsresolutionusingtheprovidedsuggestedactions.

§ Locateproblemsfromsystem,configuration,softwarelogsandperformancemetricsusing rapidindexsearchand patternanalysis

§ IsolateissuesacrossvariousdomainsincludingOS,Middleware,applications,etc.

§ LeverageExpertAdvicevialinkstosupportdocumentationandoperationsnotestoresolveproblemsquickly

§ Visualizesearchresultswithanalytictoolstorapidlydeterminerootcause

§ Out-of-the-boxanalysisandinsightsforz/OS,WebSphere,DB2,CICS,IMS,MQ,Network,Securityaswellasdistributedsystems

§ Enableearlyerrordetectionandbroadenscopeofautomationwith eventnotifications

§ Fullycustomizabletomeetyourneeds• Enhanced security

insights from SMF 80• Root cause insights

through new Problem Insights views

• Support for industry-standard log management tools (Logstash, Apache Kafka)

• VSAM ESDS support• Client-side Expert Advice• Expanded WAS insights from

SMF 120

in 2016

©2015IBMCorporation21

PRIVATECLOUD

Engageintoday’shybridcloudworldwithyourzfoundation

Data Apps

APIs APIs

PUBLICCLOUD

ENTERPRISEIT

DataApps

APIs APIs

HybridCloud

AnalyticsSecuritySocial

Infrastructure Infrastructure

Sourcingnewinnovationfrommobiledevelopercommunities

• CitiMobileChallenge• Exposing34API’sfromCitiplus

API’sfrom10otherpartners• Openinginnovationto1000’s,

formuchlessinvestmentthanwouldtakeotherwise

z/OSConnectEnterpriseEdition

DataConversion

DiscoveryFunction

AuditFunction

LoggingFunction

GranularAuthorization

CICS

IMS

DB2

Task

REST

RESTClient

RESTJSON

Whatitis…1 2

3

4

1. z/OSConnectexploitsembedded Liberty

2. ServiceProvidergivesbackendconnectivity

3. Interceptorsprovideconfigurablefunction

4. Extensibleinterfaceprovidesflexibility

SuchasaWASz/OSserverhostingREST

Along-runningtaskusingWOLAAPIstohostaservice

IBMAPIConnect:Simplified&ComprehensiveAPIfoundation

What does IBM API Connect provide?• Automated, visual and coding options for creating APIs• Node.js and Java support for creating Microservices• Integrated enterprise grade clustering, management and

security to run APIs• Lifecycle and governance for APIs, Products and Plans• Access control over API’s, API Plans and API Products• Advanced API usage analytics • Customizable, self service developer portal for publishing APIs • Policy enforcement, security and control

Create Run

ManageSecure

©2015IBMCorporation24

z/OSCloudEnablement:Middlewareservices§ Allfivetraditionalmiddlewareonz/OSareparticipatinginz/OSCloud

Ø CICS,IMS,DB2,WAS,MQ

§ Eachmiddlewareisprovidingservicestodynamicallyprovisionmiddlewareinstance

Ø CICS– ServicestoprovisionCICSRegioninsinglesystemaswellasCICSPLEXenvironments

Ø IMS– ServicetoprovisionIMSsubsysteminstance

Ø MQ– ServicetoprovisionMQQueueManagerinstance

Ø DB2– ServicetoprovisionDB2subsysteminstance

Ø WAS/WebSphereLibertyProfile– ServicetoprovisionWASorWLPserver

§ Middlewarearealsoprovidingservicestocreaterelevantresourcedefinitions

Ø MQ– Servicetoprovisionqueueresourceandload/clearmessagesinqueue

Ø DB2– ServicetoprovisionDB2objectresourcee.g.DB2schemawithsampledata

Ø IMS– ServicetoprovisionIMSDatabaseobject

§ Middlewarearealsoprovidingcapabilitytoconnectacrossdifferentmiddlewareinstancese.g.WLPtoDB2orCICStoMQconnectivity.

©2015IBMCorporation25

Outdatedviewsofinfrastructurecanimpedeprogress

SignificantcomplexitySeparateddatawarehouses

AnalyticslatencyTransactionaldataisnotreadilyavailable

LackofsynchronizationDataisnoteasilyaggregatedandfresh

DataduplicationMultiplecopiesofthesamedata

ExcessivecostsOfmovingdataaround

SourceData

PredictiveScoring

PredictiveModeling

...Butwehaveasolutionforthis!

Scale and speed for the next era of mobile applicationsOver 1 Million Inserts per second measured, will scale higher280 trillion rows in a single table, with agile partition technology

In Memory database23% CPU reduction for lookups with advanced in-memory techniques

Next Gen application support360 million transactions per hour through RESTful web API

Deliver analytical insights fasterUp to 2x speedup for query workloads, 100x for targeted queries

Up to 1 TB Partition Size, or 4 Petabytes per table space

RedefiningenterpriseITfordigitalbusinessandthemobileappeconomyDB2 12 for z/OS:

IBMConfidential26

Anearlylook

SimpleLook-up:Faster&Cheaper

27

6%

11%

16%

23%

2 3 4 5

IndexLevels

CPUImprovement(%)fromSimpleLookupinDB212

Up to 23% CPU reduction for index look up using DB2 12 In-memory index tree

27

SignificantCPUReductioninDB2V12QueryWorkloads

283,02%

4,52%

8,66%

11,00%

13,18%

15,70%

17,00%

18,00%

19,00%

23,77%

24,00%

34,10%

66%

80%

85%

90%

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% 75% 80% 85% 90%

BIDAY-LongSAP BW

TPCDTPCH-SQLPL

Cust3Cryst.Rpt-Short

Cust1-ClusTPCH-parallel

TPCH-seqCust2

BIDAY-ShortSAP CDS FIN

Cust1-UnclWAS Portal

SAP CDS FioriCryst.Rpt-Long

CPU time %

CPUReduction%

UNIONALLw/View

ComplexOuterJoin,UDF

Complexreporting,largesort

Simplequeryorlargedata

scan

28

©2015IBMCorporation29

Createacompetitiveadvantageinthedigitalera

CreatingIntelligentinteraction intransactionsintegratedacrossmobile&coreprocesses

Atrustedcomputing platformtosupportsecuregrowthintransactionsanddata

Operationalandanalyticsapplicationsresidewiththedatainasinglefullyvirtualizedsystem

Aflexibleandrobustinfrastructureforrapiddeliveryofhighqualityservices

…maketheextraordinarypossible!!!

DevOps

Infrastructure

Cloud Social

AnalyticsMobile

Security

Thank you!

©2015IBMCorporation31

DB2V12cloudservicesprovisioningapproach• ProvidelifecycleoperationsforDB2forz/OStocompensateforgeneralweakeningoftraditionalz/OSskills

• AutomatedtaskmanagementforinstallingandmigratingproductionDB2forz/OSsubsystemsanddatasharinggroups

§ Databaseprovisioning(DBaaS)forDB2forz/OSfortestanddevelopmentuse,providinganAPIforlifecycleoperations,whichisaprerequisiteforanycloud-drivenapproaches§ Schemaprovisioning

§ Automatedschemachangesaspartoftheapplication§ Automatedschemadefinitionwithobjectverification(*)

§ Systemprovisioning

§ Dataas-a-servicebyDB2ServicesServerintegratedsolutionthatenablesdeveloperstomakeexistingDB2assets– SQLandStoredProcedures– availableintoday’sgrowingmobileandcloudapplicationecosystemviaRESTAPI


Recommended