Academic literature on the topic 'IBM Z'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IBM Z.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IBM Z"
McCain, E. C., P. Bastien, B. F. Belmar, B. Bhattacharya, K. K. Cheruiyot, M. Coq, R. Dartey, et al. "IBM Z development transformation." IBM Journal of Research and Development 64, no. 5/6 (September 2020): 14:1–14:13. http://dx.doi.org/10.1147/jrd.2020.3008122.
Full textJacobi, Christian, and Charles Webb. "History of IBM Z Mainframe Processors." IEEE Micro 40, no. 6 (November 1, 2020): 50–58. http://dx.doi.org/10.1109/mm.2020.3017107.
Full textMauri, R. A. "Message from the General Manager, IBM Z." IBM Journal of Research and Development 62, no. 2/3 (March 2018): 1–2. http://dx.doi.org/10.1147/jrd.2018.2817038.
Full textBieswanger, A., A. Maier, C. Mayer, H. Shah, and J. Candee. "IBM Z in a secured hybrid cloud." IBM Journal of Research and Development 64, no. 5/6 (September 2020): 1:1–1:10. http://dx.doi.org/10.1147/jrd.2020.3008111.
Full textMauri, Ross A. "Message From the General Manager, IBM Z." IBM Journal of Research and Development 64, no. 5/6 (September 2020): 1–2. http://dx.doi.org/10.1147/jrd.2020.3009462.
Full textLac, V. S., J. P. Elliott, J. A. Evans, and G. L. Long. "A comparison of the IBM-1 projections from IBM-2 and IBM-3." Nuclear Physics A 587, no. 1 (May 1995): 101–10. http://dx.doi.org/10.1016/0375-9474(94)00811-z.
Full textOzebek, Tadeja. "IBM Slovenija in e-izobraževanje - Primeri dobre prakse." Andragoška spoznanja 22, no. 4 (December 21, 2016): 111–12. http://dx.doi.org/10.4312/as.22.4.111-112.
Full textJordan, M., N. Sardino, M. McGrath, C. Zoellin, T. E. Morris, C. Carranza Lewis, G. Vance, et al. "Enabling pervasive encryption through IBM Z stack innovations." IBM Journal of Research and Development 62, no. 2/3 (March 1, 2018): 2:1–2:11. http://dx.doi.org/10.1147/jrd.2018.2795898.
Full textValentine, B. D., M. A. Clark, B. E. Myers, P. Callaghan, J. W. Wierbowski, and P. J. Clas. "Design innovations for IBM Z hardware management appliance." IBM Journal of Research and Development 64, no. 5/6 (September 2020): 13:1–13:9. http://dx.doi.org/10.1147/jrd.2020.3008095.
Full textBeichter, F., T. D. Butler, S. B. Compton, D. F. Riedy, M. H. Sabins, and H. M. Yudenfriend. "IBM System z I/O discovery and autoconfiguration." IBM Journal of Research and Development 56, no. 1.2 (January 2012): 15:1–15:12. http://dx.doi.org/10.1147/jrd.2011.2179230.
Full textDissertations / Theses on the topic "IBM Z"
Kryszczuk, Darius. "Návrh prezentace metadat reportů z IBM Cognos BI." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-198465.
Full textFaruzel, Petr. "Empirické porovnání komerčních systémů dobývání znalostí z databází." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76606.
Full textŠverák, Martin. "Analýza nestrukturovaného obsahu z veřejně dostupných sociálních médií za pomocí nástroje Watson společnosti IBM." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-192396.
Full textGustafsson, Alex, and Carl Stensson. "The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21849.
Full textBakgrund. Människor använder internet för bland annat kommunikation, arbete och bankärenden. Asymmetrisk kryptering möjliggör att detta sker säkert genom att erbjuda sekretess och tillit online. Även om dessa algoritmer förväntas vara säkra från attacker med klassiska datorer, riskerar framtida kvantdatorer att knäcka dem med Shors algoritm. Därför utvecklas kvantsäkra krypton för att mitigera detta problem. National Institute of Standards and Technology (NIST) har påbörjat en standardiseringsprocess för dessa algoritmer. Syfte. I detta arbete analyserar vi vilka specialiserade funktioner för kvantsäkra algoritmer som finns i stordator-arkitekturen IBM Z. Vidare studerar vi prestandan av dessa algoritmer på olika hårdvara för att förstå vilka tekniker som kan öka deras prestanda. Metod. Vi utför en litteraturstudie för att identifiera vad som är karaktäristiskt för kvantsäkra algoritmers prestanda samt vilka funktioner i IBM Z som kan möta och accelerera dessa. Vidare applicerar vi en experimentell studie för att analysera den praktiska prestandan av de två framträdande finalisterna NTRU och Classic McEliece på konsument-, moln- och stordatormiljöer. Resultat. Vi fann att IBM Z kunde accelerera flera centrala symmetriska primitiver så som SHA-3 och AES via en hjälpprocessor för kryptografiska funktioner (CPACF). Även om befintliga hårdvarusäkerhetsmoduler inte stödde några av de undersökta algoritmerna, fann vi att de kan accelerera dem via en på-plats-programmerbar grind-matris (FPGA). Baserat på vår experimentella studie, fann vi att datorer med stöd för avancerade vektorfunktioner (AVX) möjlggjorde en signifikant acceleration av kvantsäkra algoritmer. Slutligen identifierade vi att vektorfunktioner, applikationsspecifika integrerade kretsar (ASICs) och FPGAs är centrala tekniker som kan nyttjas för att accelerera dessa algortmer. Slutsatser. Gällande beredskapen hos hårdvara för en övergång till kvantsäkra krypton, finner vi att de föreslagna algoritmerna inte presterar närmelsevis lika bra som klassiska algoritmer. Trots att det är sannolikt att de kvantsäkra kryptona fortsatt förbättras innan övergången sker, kan förbättrat hårdvarustöd för snabbare vektorfunktioner, ökade cachestorlekar och tillägget av polynomoperationer signifikant bidra till att minska påverkan av övergången till kvantsäkra krypton.
Maraczek, Patrik. "Návrh a realizace systému zpracování dat z environmentálních čidel v prostředí IoT." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2020. http://www.nusl.cz/ntk/nusl-417775.
Full textUwakweh, Ozioma I. F. "Cybersecurity in the Retail Industry: Third Party Implications." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1595848539891614.
Full textDavid, Östling. "IBMs stordators framtid i en molnbaserad IT värld : Kommer IBMs stordator att överleva ytterligare ettparadigmskifte eller har den spelat ut sin roll?" Thesis, Karlstads universitet, Handelshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-43408.
Full textPetrželka, Jiří. "Překlad z češtiny do angličtiny." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237125.
Full textGriffel, Frank. "Logische und ontologische Probleme in al-Ġazālīs Fayṣal al-tafriqaẗ bayna l-l-islām wa-z-zandaqa : eine Analyse der ersten sechs Kapitel /." [S.l. : s.n], 1995. http://catalogue.bnf.fr/ark:/12148/cb41085275x.
Full textBenkhmas, Omar. "Procédés et fonctions de l'ironie à travers la Risalat at-tawabi' wa z-zawabi' "Épître des subordonnés et des génies" d'Ibn Shuhayd al-Andalusi." Paris 4, 1995. http://www.theses.fr/1994PA040273.
Full textThe object of this thesis is to expose the methods of irony through an epistle of the time of Omayyad. It is constituted of general introduction that presents the historical field and the technical approach as well as the aims of the selection. In the first chapter, we have proposed to assemble a great number of indications that are personal or general concerning the biography of Ibn Shuhayd and his work. The second chapter is a technical proceding, which has helped us to recognize irony and its effects on those who are being ironized. We have also designated the author as an ironist and his links. And the proportions of this irony in the field of Andalusian literature. As for the last chapter is concerned it is a test where the author metamorphosed his opponents in order to dishonor and to scorn their cultural capacity. Hence, this is the aim of the revival of an author who has been hurt by the collapse of the Amiride's dynasty, and the scorns of his opponents, a writer who represents points of view, a precursor of literature, critics and rhetorical problems
Books on the topic "IBM Z"
Hellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY: IBM, International Technical Support Organization, 2009.
Find full textHellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY]: IBM, International Technical Support Organization, 2011.
Find full textWhite, Bill. IBM System z connectivity handbook. [Poughkeepse, NY]: IBM, International Technical Support Organization, 2009.
Find full textWolfgang, Fries, Jorna Dick, and International Business Machines Corporation. International Technical Support Organization., eds. IBM System z connectivity handbook. [United States]: IBM, International Technical Support Organization, 2008.
Find full textLanz, Franz. IBM z/OS ISPF smart practices. Berlin: De Gruyter/Oldenbourg, 2015.
Find full textRayns, Chris. IBM problem determination tools for z/OS. [Poughkeepsie, New York]: International Technical Support Organization, 2012.
Find full textCorporation, International Business Machines, ed. System z personal development tool: Introduction and reference. S.l: Vervante, 2009.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Leveraging IBM Cognos 8 BI for Linux on IBM System z. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2010.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM System z10 Business Class technical overview. 2nd ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2009.
Find full textFremstad, Per. IBM System z10 Enterprise Class technical guide. 3rd ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2009.
Find full textBook chapters on the topic "IBM Z"
Houston, Iain. "The IBM Z tool." In Lecture Notes in Computer Science, 691–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54834-3_51.
Full textHouston, Iain, and Steve King. "CICS project report experiences and results from the use of Z in IBM." In Lecture Notes in Computer Science, 588–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54834-3_34.
Full textVaupel, Robert, Qais Noorshams, Samuel Kounev, and Ralf Reussner. "Using Queuing Models for Large System Migration Scenarios – An Industrial Case Study with IBM System z." In Computer Performance Engineering, 263–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40725-3_20.
Full textHöfert, Rolf. "Z." In Von Fall zu Fall – Pflege im Recht, 313–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-16593-1_20.
Full textSühl, Carsten. "RT-Z: An Integration of Z and timed CSP." In IFM’99, 29–48. London: Springer London, 1999. http://dx.doi.org/10.1007/978-1-4471-0851-1_3.
Full textFrodl, Andreas. "Gesundheitsberufe A – Z." In Gesundheitsberufe im Einsatz, 37–534. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-18072-0_7.
Full textSmith, Graeme, and Ian Hayes. "Towards Real-Time Object-Z." In IFM’99, 49–65. London: Springer London, 1999. http://dx.doi.org/10.1007/978-1-4471-0851-1_4.
Full textMacColl, Ian, and David Carrington. "Specifying Interactive Systems in Object-Z and CSP." In IFM’99, 335–52. London: Springer London, 1999. http://dx.doi.org/10.1007/978-1-4471-0851-1_18.
Full textRentzsch, Hans-Peter. "Verhandlungstips von A bis Z." In Erfolgreich verhandeln im weltweiten Business, 151–70. Wiesbaden: Gabler Verlag, 1999. http://dx.doi.org/10.1007/978-3-322-82808-8_11.
Full textMeyer, Jean. "Kapitel 8: Generation Z." In Die 25 besten Finanzberater Deutschlands im Ranking von Jean Meyer, 167–86. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-27541-9_8.
Full textConference papers on the topic "IBM Z"
Warnock, James, Brian Curran, John Badar, Gregory Fredeman, Donald Plass, Yuen Chan, Sean Carey, et al. "4.1 22nm Next-generation IBM System z microprocessor." In 2015 IEEE International Solid- State Circuits Conference - (ISSCC). IEEE, 2015. http://dx.doi.org/10.1109/isscc.2015.7062930.
Full textJacobi, Christian, Timothy Slegel, and Dan Greiner. "Transactional Memory Architecture and Implementation for IBM System Z." In 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2012. http://dx.doi.org/10.1109/micro.2012.12.
Full textDemetriou, Dustin W., Milnes David, A. Cory VanDeventer, Randy Zoodsma, and Donald W. Porter. "Advances in IBM Z Water Cooling: z13, z14, z15." In 2021 20th IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems (iTherm). IEEE, 2021. http://dx.doi.org/10.1109/itherm51669.2021.9503152.
Full textSchober, Torsten, Bodo Hoppe, Shimon Landa, and Ronny Morad. "IBM system z functional and performance verification using X-Gen." In 2008 IEEE International High Level Design Validation and Test Workshop (HLDVT). IEEE, 2008. http://dx.doi.org/10.1109/hldvt.2008.4695883.
Full textThompto, Brian W., and Bodo Hoppe. "Verification for fault tolerance of the IBM system z microprocessor." In the 47th Design Automation Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1837274.1837405.
Full textCoico, Patrick A., Amilcar Arvelo, Gaetano P. Messina, Frank L. Pompeo, and Donald W. Scheider. "Hermetic Encapsulation Technique Developed for the IBM Z-Server Multi-Chip Module." In ASME 2007 InterPACK Conference collocated with the ASME/JSME 2007 Thermal Engineering Heat Transfer Summer Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/ipack2007-33440.
Full textBALDINI-NETO, E., and C. L. LIMA. "AN IBM-4 LIKE MODEL FOR THE CALCULATIONS OF N = Z NUCLEAR BINDING ENERGIES." In Proceedings of the International Symposium. WORLD SCIENTIFIC, 2001. http://dx.doi.org/10.1142/9789812811233_0039.
Full textOler, Adam M., Ning Zhang, Steven R. Brandt, and Qin J. Chen. "Implementation of Finite Height Levee in CaFunwave Using an Immersed Boundary Method." In ASME 2015 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/imece2015-51506.
Full textMrad, Imen, Abdessamad Abdelhedi, Jean Pierre Barbot, and Lassaad Sbita. "Robust hybrid observer for IBC based on Z(TN)-observability." In 2017 International Conference on Green Energy Conversion Systems (GECS). IEEE, 2017. http://dx.doi.org/10.1109/gecs.2017.8066190.
Full textASHIQ, MUHAMMAD, and QAISER MUSHTAQ. "PARAMETRIZATION OF G*(2, Z) ON PL(Fq)." In Proceedings of the ICM Satellite Conference in Algebra and Related Topics. WORLD SCIENTIFIC, 2003. http://dx.doi.org/10.1142/9789812705808_0020.
Full textReports on the topic "IBM Z"
Francke, Angela, Sven Lißner, and Anke Juliane. Big Data im Radverkehr : Teil II. Technische Universität Dresden, September 2021. http://dx.doi.org/10.26128/2021.241.
Full text