IBM LAB Service Europe

Here is a list of services IBM LAB Services offers in Europe.

IBM LAB Services

We can arrange all sorts of projects around the services provided by lab services such as workshops, investigation, implementations and other.

Performance

  • IBM i iDoctor
  • Job Watcher
  • Collection Services Investigator
  • PEX Analyzer
  • iDoctor workshops
  • IBM i Performance Analysis (described below):

Learn the science and art of performance analysis, methodology and problem solving on IBM i.

Analyzing performance data can be quite complex. This workshop will share useful techniques for data analysis on key IBM i resources and will cover strategies for solving performance problems. Guidance will also be provided on which tool(s) are best suited for the analysis task. This 3-day workshop will aid the student in building a future foundation of performance methodology skills that can then be applied to their IBM i environment.

The workshop will include various degrees of discussion on core concepts, performance monitoring, performance tools and data collectors, problem solving, prevention, system and application tuning, and best practices. Primary data collectors discussed and used include: Collection Services, Job Watcher, Disk Watcher, and Performance Explorer (PEX). A combination of lecture, case study analysis, and hands-on labs will be used to reinforce the concepts. A mixture of IBM i graphical analysis tools, Performance Data Investigator (PDI) and IBM iDoctor for IBM i, will be used throughout the workshop.

  • IBM System Storage DS8000 attached to IBM i
  • SAP on IBM i: Db2 Optimization Workshop
  • SAP on IBM i Performance Workshop

Security

  • TLS and Certificate Setup
  • Single Sign ON (SSO)
  • Encryption
  • Security Mentoring

IBM i Security

  • Security assessments
  • TLS and Certificate Setup
  • Network encryption enablement and certificate management
  • Single sign-on planning and implementation
  • Cryptographic programming using crypto services APIs and CCA APIs with the 476x cryptographic coprocessor
  • LDAP implementation, use, and programming
  • Access control concepts
  • Object signing planning and implementation
  • Auditing setup planning and implementation services
  • Secure planning and implementation of SSH
  • Remediation services
  • AIX Security
  • Security assessments
  • Role Based Access Control planning and implementation services
  • Trusted Execution planning and implementation services
  • PowerSC planning and implementation services
  • BigFix planning and implementation services
  • LDAP planning and implementation services
  • Single sign-on planning and implementation services
  • Auditing setup planning and implementation services
  • Encrypted File System planning and implementation services
  • Secure planning and implementation of SSH
  • Linux Redhat Security
  • Security assessments
  • Hardening services
  • VIOS Security
  • Role based access control
  • Securing VIOS
Verified by MonsterInsights