| | Copyright |
| | About Prentice Hall Professional Technical Reference |
| | Trademarks |
| | Foreword: Linux in the Emerging On Demand World |
| | | The future of e-business: e-business on demand |
| | | The importance of open standards to an on demand business |
| | | On demand, Open Source and Linux |
| | | Linux and the on demand business |
|
| | Preface |
| | | Terminology used in this book |
| | | Disclaimer |
| | | Acknowledgements |
|
| | Part 1. Linux on the Mainframe an Introduction |
| | | Chapter 1. Introducing Linux |
| | | Section 1.1. Benefits of the Linux operating system |
| | | Section 1.2. The role of the Open Source community |
| | | Section 1.3. The role of distributions |
| | | Section 1.4. Linux structure |
| | | Section 1.5. Summary |
|
| | | Chapter 2. Introducing the Mainframe |
| | | Section 2.1. The mainframe's birth |
| | | Section 2.2. General-purpose computer architecture |
| | | Section 2.3. Distinguishing features of the mainframe |
| | | Section 2.4. From real to virtual |
| | | Section 2.5. Summary |
|
| | | Chapter 3. Introducing Linux on the Mainframe |
| | | Section 3.1. Why Linux fits the mainframe |
| | | Section 3.2. What was done to fit Linux onto the mainframe |
| | | Section 3.3. How Linux fits the mainframe |
| | | Section 3.4. Six reasons to run Linux on the mainframe |
| | | Section 3.5. Summary |
|
|
| | Part 2. Planning for Linux |
| | | Chapter 4. Overview of What You Can Do with Linux on the Mainframe |
| | | Section 4.1. Horizontal and vertical growth |
| | | Section 4.2. ISPCompany and its new business application |
| | | Section 4.3. StoreCompany and its business application |
| | | Section 4.4. Summary |
|
| | | Chapter 5. Sample Projects |
| | | Section 5.1. Building a team |
| | | Section 5.2. Choosing the right Linux project |
| | | Section 5.3. Summary |
|
| | | Chapter 6. Total Cost of Ownership: the Challenge |
| | | Section 6.1. Total cost-of-ownership factors |
| | | Section 6.2. The mainframe and the TCO equation |
| | | Section 6.3. Linux and the TCO equation |
| | | Section 6.4. ISPCompany: TCO considerations |
| | | Section 6.5. StoreCompany: TCO considerations |
| | | Section 6.6. Summary |
|
|
| | Part 3. Is Linux on the Mainframe for Me? |
| | | Chapter 7. The Value of Virtualization |
| | | Section 7.1. What is z/VM? |
| | | Section 7.2. How Linux can run on z/VM |
| | | Section 7.3. What does z/VM provide? |
| | | Section 7.4. What is logical partitioning? |
| | | Section 7.5. Why run Linux on z/VM? |
| | | Section 7.6. Summary |
|
| | | Chapter 8. Security Considerations |
| | | Section 8.1. The role of security policy |
| | | Section 8.2. Risk assessment |
| | | Section 8.3. Before opening the doors: hardening |
| | | Section 8.4. Opening the doors |
| | | Section 8.5. Preventing attacks |
| | | Section 8.6. Keeping up to date on security issues |
| | | Section 8.7. Summary |
|
| | | Chapter 9. Setting Up Linux on the Mainframe |
| | | Section 9.1. Distribution considerations |
| | | Section 9.2. Running Linux on the mainframe |
| | | Section 9.3. Creating images |
| | | Section 9.4. Purpose of Linux images |
| | | Section 9.5. Setting up for secure and efficient I/O |
| | | Section 9.6. Summary |
|
| | | Chapter 10. Communicating in a Virtual Environment |
| | | Section 10.1. Communication methods under z/VM |
| | | Section 10.2. Scenario: networking in a virtual environment |
| | | Section 10.3. Virtual failover solutions |
| | | Section 10.4. Communicating with the outside world |
| | | Section 10.5. Summary |
|
| | | Chapter 11. Achieving Higher Availability |
| | | Section 11.1. What is high availability? |
| | | Section 11.2. The zSeries hardware availability |
| | | Section 11.3. Redundancy and single points of failure |
| | | Section 11.4. High availability for the ISPCompany example |
| | | Section 11.5. High availability for the StoreCompany OaK example |
| | | Section 11.6. A quick look at the future |
| | | Section 11.7. Summary |
|
|
| | Part 4. Making the Most of Linux on the Mainframe |
| | | Chapter 12. Systems Management |
| | | Section 12.1. Controlling the cost of systems administration |
| | | Section 12.2. Systems management disciplines |
| | | Section 12.3. Policies |
| | | Section 12.4. Procedures |
| | | Section 12.5. Using tools |
| | | Section 12.6. Using a framework |
| | | Section 12.7. Summary |
|
| | | Chapter 13. Availability Management |
| | | Section 13.1. Availability policy |
| | | Section 13.2. Health monitoring |
| | | Section 13.3. Automation |
| | | Section 13.4. Change management |
| | | Section 13.5. Key factors to consider in availability |
| | | Section 13.6. Summary |
|
| | | Chapter 14. Data Management |
| | | Section 14.1. Keeping data on the mainframe |
| | | Section 14.2. Introduction to backup and restore |
| | | Section 14.3. Quota |
| | | Section 14.4. Data, policies, and tools |
| | | Section 14.5. Database management |
| | | Section 14.6. Performance tuning and capacity planning |
| | | Section 14.7. Summary |
|
| | | Chapter 15. Performance and Capacity Planning |
| | | Section 15.1. Day-to-day performance |
| | | Section 15.2. Relative capacity and capacity planning |
| | | Section 15.3. Summary |
|
| | | Chapter 16. System Administrator Tasks |
| | | Section 16.1. Expanding the system administrator's role in your organization |
| | | Section 16.2. Change management |
| | | Section 16.3. Tasks that are unique to Linux on the mainframe |
| | | Section 16.4. Tools policies |
| | | Section 16.5. Becoming familiar with the mainframe |
| | | Section 16.6. Summary |
|
|
| | Part 5. Running Applications |
| | | Chapter 17. Deploying Linux Servers |
| | | Section 17.1. Where can you find applications for Linux on the mainframe? |
| | | Section 17.2. Simple server hardware consolidation |
| | | Section 17.3. Summary |
|
| | | Chapter 18. Porting Applications to Linux on the Mainframe |
| | | Section 18.1. What you can gain by porting an application to Linux on the mainframe |
| | | Section 18.2. Before you decide to port |
| | | Section 18.3. What effort to expect |
| | | Section 18.4. What you need |
| | | Section 18.5. Where to get more information |
| | | Section 18.6. Summary |
|
| | | Chapter 19. Building Integrated Server Environments |
| | | Section 19.1. Inter-image communications |
| | | Section 19.2. Example for an integrated environment |
| | | Section 19.3. Connectors to back-end systems |
| | | Section 19.4. Consolidating a 3-tier environment |
| | | Section 19.5. Enriching your mainframe environment with new applications |
| | | Section 19.6. Summary |
|
|
| | Part 6. Reference |
| | | Chapter 20. Linux-on-the-Mainframe Reference |
| | | Section 20.1. Linux distributions for the mainframe |
| | | Section 20.2. Overview of Linux directory structure |
| | | Section 20.3. Exploiting mainframe processor architecture |
| | | Section 20.4. Linux-on-the-mainframe device drivers |
|
| | | Chapter 21. Mainframe Reference |
| | | Section 21.1. The mainframe architecture |
| | | Section 21.2. Mainframe registers |
| | | Section 21.3. The program status word |
| | | Section 21.4. Integrated Facility for Linux (IFL) |
|
| | | Chapter 22. Debugging and Dump Analysis |
| | | Section 22.1. What information you need |
| | | Section 22.2. Debugging under z/VM |
| | | Section 22.3. General Linux debugging facilities |
| | | Section 22.4. Linux kernel debugging tools |
| | | Section 22.5. Linux system dump tools |
|
| | | Chapter 23. Security Reference |
| | | Section 23.1. Security certification |
| | | Section 23.2. General security considerations |
| | | Section 23.3. z/VM tools |
|
| | | Chapter 24. Communications Reference |
| | | Section 24.1. zSeries virtual connections |
| | | Section 24.2. An example of server consolidation based on Linux |
|
| | | Chapter 25. Systems Management Tools |
| | | Section 25.1. Availability management tools |
| | | Section 25.2. Data management tools |
| | | Section 25.3. Security management tools |
| | | Section 25.4. Performance and capacity planning tools |
| | | Section 25.5. System administrator tools |
| | | Section 25.6. Tools Web sites |
|
| | | Chapter 26. Performance Reference |
| | | Section 26.1. Tuning Linux guests under VM |
| | | Section 26.2. When to use kernel patches |
| | | Section 26.3. Performance tools |
|
| | | Chapter 27. Examples for Applications |
|
| | Part 7. Appendices |
| | | Appendix A. ISPCompany |
| | | Section A.1. Corporate profile of ISPCompany |
| | | Section A.2. Offerings |
| | | Section A.3. Description of environment |
| | | Section A.4. Example new client |
|
| | | Appendix B. StoreCompany |
| | | Section B.1. Corporate profile of StoreCompany |
| | | Section B.2. Description of environment |
| | | Section B.3. Programming model and middleware platform |
| | | Section B.4. Project 1: Firewall and proxy server |
| | | Section B.5. Project 2: Web application server |
| | | Section B.6. Project 3: OaK project |
|
|
| | Glossary |
| | Further Reading |
| | Bibliography |
| | | Books |
| | | IBM Redbooks |
| | | IBM articles and papers |
| | | Other IBM publications |
| | | Other articles and papers |
|