Learning Guide

Autonomic Computing on iSeries Learning Guide


Autonomic computing -- it's one of the buzz phrases in the IT world. But what is it exactly? And how does it apply to the iSeries?

According to IBM, many of the foundation technologies encompassed by autonomic computing manifest themselves in the iSeries. From day one, the company says, the iSeries has contained many autonomic capabilities, including the ability to automatically phone for service in anticipation of a failure and the ability to automatically allocate data to all available disk drives while self-optimizing disk drive utilization.

What other autonomic features does the iSeries contain? We did some digging and found a wealth of resources to get you up to speed and even help you use the features.

TABLE OF CONTENTS
   Autonomic Computing Quick Start
   Case Studies
   Articles
   The Four Components of Autonomic Computing on iSeries
   Learn more


Autonomic Computing Quick Start
[ Return to Table of Contents ]

Case Studies
[ Return to Table of Contents ]

Articles
[ Return to Table of Contents ]

The four components of autonomic computing on the iSeries
[ Return to Table of Contents ]

1. Self-configuring features

2. Self-healing features

3. Self-optimizing features

4. Self-protecting features

  • Self-protecting object-based kernel


  • Digital object tagging, automatic object retranslation (virus removal)


  • Tagged storage, RAID, ECC, dual line cords


  • IP takeover (also known as IP address takeover): the ability to transfer a server IP address from one iSeries to another, causing the two machines to appear at different times as the same server to a client application.


  • Enterprise identity mapping
    iSeries ADMINISTRATOR: The hows and the whys of EIM
    Article: IBM to open source EIM single sign-on


  • Built in support for Kerberos [authenticates requests for service in a network], LDAP [aids in the location of network resources], SSL [manages Internet transaction security], VPN [manages Internet transmission security], Digital Certificates [provides identity authentication]

Learn more
[ Return to Table of Contents ]

This was first published in April 2003

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: