“Eduardo is very skilled technically, quick-witted, communicative, pragmatic and open to new ideas and technologies. While we worked together in IBM, he was always willing to help and gave me the freedom to gather input from clients dissatisfied with a legacy tool we maintained and to propose a software redesign that would attend everyone needs. Not wasting time is one of his priorities and I really appreciated that.”
About
22 years of full-time professional experience - on record - that reflects a continuous…
Experience
Licenses & Certifications
Publications
-
Init.js: Um Guia para o Porquê e Como da Stack Completa do JavaScript
toptal.com
Paid translation of article to Portuguese. Revision done by Murilo.
-
O H-1B: A Jornada de um Desenvolvedor iOS de Honduras para o Vale do Silício
toptal.com
Paid translation of article to Portuguese. Revision done by Murilo.
-
Por que há tantos Pythons?
toptal.com
Paid translation of article to Portuguese. Revision done by Murilo.
-
Security for Linux on System z: Securing Your Network
IBM Redbooks
The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This…
The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This web document describes the best practices for securing your network. It was written as as part of IBM Redbooks publication Security for Linux on System z, SG24-7728.
Other authorsSee publication -
Security for Linux on System z
IBM Press
https://play.google.com/store/books/author?id=Eduardo+Kienetz
No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful.
This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to…https://play.google.com/store/books/author?id=Eduardo+Kienetz
No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful.
This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve.
The base for a secure system is tightly related to the way the architecture and virtualization has been implemented on IBM System z. Since its inception 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform.
This book is intended for system engineers and security administrators who want to customize a Linux on System z environment to meet strict security, audit, and control regulations.Other authors -
-
DB2 10 for Linux on System z Using z/VM v6.2, Single System Image Clusters and Live Guest Relocation
IBM Press
https://play.google.com/store/books/author?id=Eduardo+Kienetz
IBM® z/VM® 6.2 introduced significant changes to z/VM with a multi-system clustering technology that allows up to four z/VM instances in a single system image (SSI) cluster. This technology is important because it offers you an attractive alternative to vertical growth by adding new z/VM systems. In the past, this capability required duplicate efforts to install, maintain, and manage each system. With SSI, these duplicate…https://play.google.com/store/books/author?id=Eduardo+Kienetz
IBM® z/VM® 6.2 introduced significant changes to z/VM with a multi-system clustering technology that allows up to four z/VM instances in a single system image (SSI) cluster. This technology is important because it offers you an attractive alternative to vertical growth by adding new z/VM systems. In the past, this capability required duplicate efforts to install, maintain, and manage each system. With SSI, these duplicate efforts are reduced or eliminated.
Support for live guest relocation (LGR) allows you to move Linux virtual servers without disrupting your business or incurring loss of service, thus reducing planned outages. The z/VM systems are aware of each other and take advantage of their combined resources. LGR enables you to relocate guests from a system requiring maintenance to a system that will remain active during maintenance.
A major advantage for DB2 v10 customers is that using z/VM 6.2 does not require any changes to existing DB2 structures. This remarkable benefit is due to the fact that DB2 v10 is installed as part of the LInux guest on z/VM and is fully integrated into LGR. This allows you to smoothly move DB2 v10 when you move Linux virtual servers, without interrupting either DB2 v10 or z/VM operations and services.
This IBM Redbooks publication will help you to understand how DB2 10 on Linux for System z behaves while running on a z/VM that is being relocated using z/VM’s 6.2 Live Guest Relocation feature.
In this book, we explore memory management, the DB2 Self-tuning memory manager feature, time synchronization, networking, and storage and performance considerations with regards to relocation. We also offer some best practices found during a live guest relocation for DB2 v10.Other authorsSee publication
Languages
-
Portuguese
Native or bilingual proficiency
-
English
Native or bilingual proficiency
-
Spanish
Limited working proficiency
-
French
Limited working proficiency
Recommendations received
5 people have recommended Eduardo
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More