Topics to links documents about IT information:
IBM Cloud Service Management and Operations Field Guide
PDF | Cloud | 2019
Most people who say they are doing DevOps are doing mostly dev and very little ops. Cloud service management and operations is about designing, implementing, and continuously improving the operations management processes you use in your enterprise. Cloud service management and operations is organized into personas
who do the work, processes that define what work is needed and how it is performed, and tools to enable and support these activities.
AWS Partner Guide
PDF | Cloud | 2019
More and more customers across the globe are turning to the cloud and associated technology services to give them the flexibility, scalability and reliability they need. Right now there is an enormous opportunity for customer-centric companies to build or grow a successful cloud-based business.
Whatever your needs, Amazon Web Services (AWS) is the right place to start your journey. AWS has the services to help companies – of all sizes – build sophisticated cloud applications and to accelerate success.
AWS is on the same journey that you are on, and that your customers are on: a journey that encompasses growth, change and innovation.
The Cloud Adoption Playbook
PDF | Cloud | 2018
The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation.
Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organization.
Portfolio Evaluation Is The Key To Migrating Applications To The Cloud
PDF | Cloud | 2016
Cloud services in the enterprise are growing,
as customers increasingly want to get out of the data center business. While these services offer flexible new options for CIOs, infrastructure and operations (I&O) professionals, and other business and technology leaders, they pose new challenges in sourcing and ongoing administration, particularly as attention shifts to systems of record and multicloud destinations. Many customers not only take a cloud-first view of migration but also pursue a “public cloud or bust” strategy. I&O pros should use effective
portfolio evaluation — including strategic rightsourcing — to identify the right providers and migration candidates.
IBM Multicloud Manager
PDF | Cloud | 2018
See how intelligent operations, application and multicloud management solutions boost agility and flexibility
IBM Garage method field guide
PDF | Cloud | 2018
Disrupters are reinventing business processes and leading their industries with digital transformations. Adopting real-time processes, agile methodologies, data-driven decision making, and innovative technology evens the playing field.
Cloud Foundry User Survey
PDF| Cloud | 2018
Cloud Foundry is the prevailing open source cloud application platform used by half of the Fortune 500 and a third of the Global 2000 to increase their developer productivity, saving them significant time and resources while making them more competitive in today’s ever-evolving market. Cloud Foundry Foundation’s biggest supporters—including Fujitsu, IBM, Pivotal, SAP and SUSE—donate code and projects back into Cloud Foundry, ensuring the technology continues to evolve at a rapid pace, keeping up with the expeditious changes in IT and cloud.
This report is the second Cloud Foundry User Survey, a series of semi-annual surveys conducted and produced by ClearPath Strategies, a technology- and politics-focused research and strategy firm. For more details on Methodology, see page 15.
The Top 10 Most Downloaded AWS Security and Compliance Documents in 2016
HTML | Cloud | Decembre, 2016
The following list includes the ten most downloaded AWS security and compliance documents in 2016. Using this list, you can learn about what other people found most interesting about security and compliance last year.
The definitive guide to IBM Cloud Object Storage dispersed storage
PDF | Cloud | July, 2016
According to IDC, object-based storage capacity is expected to grow at a CAGR of 30.7% from 2016 to 2020, reaching 293.7 EB in 2020. Likewise, object-based storage market revenue is expected to hit USD 19.8 billion that same year.
The Total Economic Impact™ Of Cleversafe, An IBM Company
PDF | Cloud | 2015
Cleversafe commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize by using Cleversafe object storage. The purpose of
this study is to provide readers with a framework to evaluate the potential financial impact of Cleversafe to reduce the cost of storing massive data sets required for the collection and analysis of big data.
IBM Cloud Object Storage System features and benefits
PDF | Cloud | July, 2016
The IBM® Cloud Object Storage (COS) System is a breakthrough cloud platform that helps solve petabyte and beyond storage challenges for companies worldwide. This Solution Brief summarizes its features that are designed to provide the scalability, availability, security, manageability, flexibility, and lower total cost of ownership (TCO) benefits.
Jenkins on AWS
PDF | Cloud | Septembre, 2016
Although there are many ways to deploy the Jenkins open-source automation server on Amazon Web Services (AWS), this whitepaper focuses on two specific approaches. First, the traditional deployment on top of Amazon Elastic Compute Cloud (Amazon EC2). Second, the containerized deployment that leverages Amazon EC2 Container Service (Amazon ECS). These approaches enable customers to take advantage of the continuous integration/ continuous delivery (CI/CD) capabilities of Jenkins. Using an extensive plugin system, Jenkins offers options for integrating with many AWS services and can morph to fit most use cases (e.g., traditional development pipelines, mobile development, security requirements, etc.).
How to effectively operate a bimodal IT Strategy
PDF | Cloud | April, 2017
There are a lot of myths surrounding bimodal IT strategies, either that mode 1 is outdated and mode 2 is the future, or mode 1 is always on-prem and mode 2 is always in the cloud, but these myths don’t always turn out to be true.
A bimodal strategy may be the best way to confront digitization today, simultaneously focusing on stability and innovation.
Access this e-guide to learn from Kurt Marko, analyst at MarkoInsights, what the benefits of a bimodal IT strategy might be in your organization.
Magic Quadrant for Cloud Infrastructure as a Service, Worldwide
HTML| Cloud | Juny, 2017
The market for cloud IaaS is dominated by two leading service providers. Other service providers have responded by launching new offerings, but customers must carefully manage the risks of adopting less-mature offerings.
AWS Government Handbook Series: Secure Network Connections
PDF | Cloud | August, 2017
As a global first mover, the USG has invested considerable time in developing approaches to network perimeter security. As discussed below, however, while these approaches have been operating in the traditional IT space, additional innovation and iteration is necessary to better align with newer, non-traditional technologies, such as cloud.
Comparing Traditional, Converged and Hyperconverged Infrastructure
VIDEO | Cloud | January, 2017
This quick 10 minute video describes the differences between traditional, converged, and hyperconverged architectures and provides some strategies for customers who are looking to evaluate these choices in a normalized way.
Comparing Cloud Instance Pricing: AWS vs Azure vs Google vs IBM
HTML | Cloud | Novembre, 2017
As cloud computing matures, instance types from the top public cloud providers are becoming more similar, making it easier to compare cloud instance pricing. At the same time, cloud providers continue to reduce prices and add discounting options, creating opportunities to save money for the 85 percent of organizations that have a multi-cloud strategy.
In this article we dive down into the details to show you which providers have the lowest-cost options for cloud compute instances and under which circumstances. We also cover what’s been changing in cloud pricing over the last six to nine months.
Cloud Security Report
PDF | Cloud | January, 2017
In the last few years the IT industry has crossed the chasm and cloud adoption no longer looks like an exotic proposition. This is as profound a paradigm shift as the Internet transformation appeared to be two decades ago, and it is driving an equally powerful change in the way we must evaluate the threat landscape. In 2017, we see a consolidation of threats in the very topmost layers of the computing model. The shift suggests that new approaches and fresh thinking will be required for businesses looking to increase their security posture and manage risk in cloud and hybrid environments.
Jenkins the definitive guide ebook
PDF | Cloud | 2011
This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can take your Continuous Integration infrastructure further. Much of this book discusses Jenkins in the context of Java or JVM-related projects. Nevertheless, even if you are using another technology stack, this book should give you a good grounding in Continuous Integration with Jenkins. We discuss how to build projects using several non-Java technologies, including as Grails, Ruby on Rails and .NET. In addition, many topics, such as general configuration, notification, distributed builds and security are applicable no matter what language you are using.
IBM SoftLayer New Customer Document
PDF | Cloud | February, 2016
IBM SoftLayer Cloud Services delivers IAAS (Infrastructure As A Service) and is designed to run enterprise workloads. It is the ideal solution to create hybrid solutions with your on premise datacenter(s). Check the IBM Cloud Chalk and Talk video on YouTube for more information on the IBM Cloud solution.
IBM offers also different types of SAAS (Software As A Service) and PAAS (Platform As A Service) solutions running on SoftLayer. Check the IBM Marketplace website. IBM can also help you with migrating your data to the cloud. Please contact your local IBM Cloud representative for assistance.
CIO guide to multi-cloud operationsIBM Application Modernization – Field Guide
PDF | Cloud | 2020
The cloud industry is well established, but complexity is commonplace. The advent of serverless computing, Kubernetes, containers and a vast number of possible deployment scenarios leaves many businesses in the dark as to how they should progress with their cloud strategy.
AWS – Amazon Simple Queue Service. Developers Guide
PDF | Cloud | 2020
Amazon Simple Queue Service (Amazon SQS) offers a secure, durable, and available hosted queue that lets you integrate and decouple distributed software systems and components. Amazon SQS offers
common constructs such as dead-letter queues (p. 38) and cost allocation tags (p. 35). It provides a generic web services API and it can be accessed by any programming language that the AWS SDK supports.
NIST Special Publication 800-88, Revision 1: Guidelines for Media Sanitization
PDF | Security | 2015
NIST has published an updated version of Special Publication (SP) 800-88, Guidelines for Media Sanitization. SP 800-88 Revision 1 provides guidance to assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort. Information disposition and sanitization decisions occur throughout the information system life cycle.
Recomendación esquema nacional de seguridad – Preguntas frecuentes
PDF | Security | 2012
El Real Decreto 3/2010, de 8 de enero, por el que se regula el Esquema Nacional de Seguridad en el ámbito de la Administración Electrónica da cumplimiento a lo previsto en el artículo 42 de la Ley 11/2007, de 22 de junio, de acceso electrónico de los ciudadanos a los Servicios Públicos. Su objeto es establecer la política de seguridad en la utilización de medios electrónicos y está constituido por principios básicos y requisitos mínimos que permitan una protección adecuada de la información.
Por tanto, la finalidad del Esquema Nacional de Seguridad es la creación de las condiciones necesarias de confianza en el uso de los medios electrónicos, a través de medidas para garantizar la seguridad de los sistemas, los datos, las comunicaciones y los servicios electrónicos, que permita a los ciudadanos y a las Administraciones públicas, el ejercicio de derechos y el cumplimiento de deberes a través de estos medios.
Guide to the Secure Configuration of Red Hat Enterprise Linux 7
HTML | Security | Genuary, 2017
This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of content structured in the eXtensible Configuration Checklist Description Format (XCCDF) in order to support security automation. The SCAP content is is available in the scap-security-guide package which is developed at https://www.open-scap.org/security-policies/scap-security-guide.
Windows Server® 2008 R2 Security Guide
DOC | Security | Septembre, 2010
This guide provides instructions and recommendations to help strengthen the security of computers running Windows Server® 2008 that are members of an Active Directory® domain.
In addition to the guidance that the Windows Server 2008 R2 Security Guide prescribes, this Solution Accelerator provides tools, step-by-step procedures, recommendations, and processes that significantly streamline the deployment process. This guide not only provides you with effective security setting guidance. It also provides you with a reproducible method that you can use to apply the guidance to both test and production environments.
Secure Windows Server 2012 R2 and Windows Server 2012
HTML| Security | November 1, 2013
To help you locate resources to secure your servers running Windows Server 2012 R2 and Windows Server 2012, the following links have been compiled for essential assessment tools, reference documentation, and product offerings. Get started with the Security and Protection.
Berkeley Information Security and Policy
ISP Services: Common questions about Information Security and Policy’s service offerings.
PCI (industria de tarjetas de pago) – Normas de seguridad de datos Versión 3.0
PDF | Security | November, 2013
Las Normas de seguridad de datos de la industria de tarjetas de pago (PCI DSS) se desarrollaron para fomentar y mejorar la seguridad de los datos del titular de la tarjeta y facilitar la adopción de medidas de seguridad uniformes a nivel mundial. Las PCI DSS proporcionan una referencia de requisitos técnicos y operativos desarrollados para proteger los datos de los titulares de tarjetas. Las PCI DSS se aplican a todas las entidades que participan en el procesamiento de tarjetas de pago, entre las que se incluyen comerciantes, procesadores, adquirientes, entidades emisoras y proveedores de servicios, como también todas las demás entidades que almacenan, procesan o transmiten CHD (datos del titular de la tarjeta) o SAD (datos de autenticación confidenciales). “A continuación, encontrará una descripción general de los 12 requisitos de las DSS de la PCI.”
PCI (Industria de Tarjetas de pago) – Normas de Seguridad de datos Versión 3.2
HTML | Security | April, 2016
The Document Library includes a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step.
The Forrester Wave™: Security Analytics Platforms, Q1 2017
HTML | Security | March, 2017
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Documentation Writing for System Administrators
PDF | Sys Admin | 2003
Documentation is a critical skill for system administrators. I really do not think that it generally comes into consideration when senior sysadmins get hired or when they interview prospective junior sysadmins. But after having read Mark Langston’s excellent booklet, I find myself convinced that the ability to document well and the habit of thorough documentation should be considered essential qualifications for any sysadmin position.
VMware NSX Day 1 Guide Library
HTML | VMware | 2018
Our VMware NSX Guides are authored and technically reviewed by VMware subject-matter experts and cover networking and security essentials.
Below you will find a description of the current books in our library along with a downloadable PDF link.
Review VMware Best Practice documentation
PDF | Vmware | 2015
This book is intended for system administrators who are planning a VMware vSphere 6.0 deployment and want to maximize its performance. The book assumes the reader is already familiar with VMware vSphere concepts and terminology.
VMware vCenter Server Performance and Best Practices. VMware vSphere 6.0
PDF | Vmware | 2015
VMware vCenter Server™ 6.0 substantially improves performance over previous vCenter Server versions. This paper demonstrates the improved performance in vCenter Server 6.0 compared to vCenter Server 5.5, and shows that vCenter Server with the embedded vPostgres database now performs as well as vCenter Server with an external database, even at vCenter Server’s scale limits. This paper also discusses factors that affect vCenter Server performance and provides best practices for vCenter Server performance.
VMware NSX in practice – by Iwan Hoogendoorn
VIDEO | Vmware
A big numbre of videos in youtube about practices of Vmware. Great repository of information about practices of administration of Vmware.
VMware Virtual SAN: Training & Whiteboard
VIDEO | Vmware | 2015
Tech Data hosted a live stream event with special guests from VMware for a training Virtual SAN.
VMware Cloud Foundation – Technical Deep Dive
VIDEO | Vmware | 2016
The Twelve-Factor App
HTML | DevOps | 2017
In the modern era, software is commonly delivered as a service: called web apps, or software-as-a-service. The twelve-factor app is a methodology for building software-as-a-service apps.
IDC MarketScape: Worldwide Object-Based Storage 2016 Vendor Assessment
PDF | Generic | Dec, 2016
The content for this excerpt was taken directly from IDC MarketScape: Worldwide Object-Based Storage 2016 Vendor Assessment (Doc # US41918416). All or parts of the following sections are included in this excerpt: IDC Opinion, IDC MarketScape Vendor Inclusion Criteria, Essential Guidance, Vendor Summary Profile, Appendix and Learn More. Also included is Figure 1.
How Real-Time Data Streaming Helps
PDF | Generic | 2020
Information about use Apache Kafka on differents environments.
Application performance Monitoring (APM)
IBM – APM Home Page
HTML | APM |
Give your DevOps team a comprehensive suite of capabilities for every application stage. Detect, isolate, diagnose and resolve application problems as they occur in complex cloud and on-premises environments.
Application Performance Management and DevOps: A winning combination
PDF | APM | January, 2017
APM and DevOps: A complementary approach to agile, responsive development
Here’s what the industry is getting wrong about APM
HTML | APM | February, 2017
Recently, you may have seen news about recent consolidation in the application process management (APM) space. Some might see this as the industry making big bets on combining network management with application management.
HTML | APM
IBM® Cloud Application Performance Management (APM) is IT service management
software designed to efficiently monitor, analyze and manage cloud, on-premises and hybrid applications and IT infrastructure. It helps you monitor and analyze application performance, discover issues, identify root causes, and prevent outages to improve user experience and stability.
APM Live Demo
HTML | APM
Live demo to known how the APM works
IBM Application Modernization – Field Guide
PDF | Digital Transformation | 2018
Business pressures demand faster time to market and app modernization. Your existing estate determines the best approach to modernization. Containers, Kubernetes, and microservices are proven to deliver speed and simplicity,
and are being adopted rapidly. IBM can make this easy for you.