Eduardo Kienetz

Eduardo Kienetz

London, Ontario, Canada
2K followers 500+ connections

About

22 years of full-time professional experience - on record - that reflects a continuous, and gradual development (hands-on).

Experience

Licenses & Certifications

  • Data Center Technical Specialist

    Novell Technical Training

  • LPI 2

    Linux Professional Institute

  • Novell Certified Linux Administrator - SUSE Linux Enterprise 11

    -

    Credential ID 10110207

Publications

  • Init.js: Um Guia para o Porquê e Como da Stack Completa do JavaScript

    toptal.com

    Paid translation of article to Portuguese. Revision done by Murilo.

    See publication
  • O H-1B: A Jornada de um Desenvolvedor iOS de Honduras para o Vale do Silício

    toptal.com

    Paid translation of article to Portuguese. Revision done by Murilo.

    See publication
  • Por que há tantos Pythons?

    toptal.com

    Paid translation of article to Portuguese. Revision done by Murilo.

    See publication
  • Security for Linux on System z: Securing Your Network

    IBM Redbooks

    The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This…

    The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This web document describes the best practices for securing your network. It was written as as part of IBM Redbooks publication Security for Linux on System z, SG24-7728.

    Other authors
    See publication
  • Security for Linux on System z

    IBM Press

    https://play.google.com/store/books/author?id=Eduardo+Kienetz

    No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful.
    This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to…

    https://play.google.com/store/books/author?id=Eduardo+Kienetz

    No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful.
    This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve.
    The base for a secure system is tightly related to the way the architecture and virtualization has been implemented on IBM System z. Since its inception 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform.
    This book is intended for system engineers and security administrators who want to customize a Linux on System z environment to meet strict security, audit, and control regulations.

    Other authors
    • Eric Marins
    • Lydia Parziale
    • Nilesh Patel
    • Vic Cross
    • Jonathan Barney
    • William Johnston
    • Sri Venkatesan
    See publication
  • DB2 10 for Linux on System z Using z/VM v6.2, Single System Image Clusters and Live Guest Relocation

    IBM Press

    https://play.google.com/store/books/author?id=Eduardo+Kienetz

    IBM® z/VM® 6.2 introduced significant changes to z/VM with a multi-system clustering technology that allows up to four z/VM instances in a single system image (SSI) cluster. This technology is important because it offers you an attractive alternative to vertical growth by adding new z/VM systems. In the past, this capability required duplicate efforts to install, maintain, and manage each system. With SSI, these duplicate…

    https://play.google.com/store/books/author?id=Eduardo+Kienetz

    IBM® z/VM® 6.2 introduced significant changes to z/VM with a multi-system clustering technology that allows up to four z/VM instances in a single system image (SSI) cluster. This technology is important because it offers you an attractive alternative to vertical growth by adding new z/VM systems. In the past, this capability required duplicate efforts to install, maintain, and manage each system. With SSI, these duplicate efforts are reduced or eliminated.
    Support for live guest relocation (LGR) allows you to move Linux virtual servers without disrupting your business or incurring loss of service, thus reducing planned outages. The z/VM systems are aware of each other and take advantage of their combined resources. LGR enables you to relocate guests from a system requiring maintenance to a system that will remain active during maintenance.
    A major advantage for DB2 v10 customers is that using z/VM 6.2 does not require any changes to existing DB2 structures. This remarkable benefit is due to the fact that DB2 v10 is installed as part of the LInux guest on z/VM and is fully integrated into LGR. This allows you to smoothly move DB2 v10 when you move Linux virtual servers, without interrupting either DB2 v10 or z/VM operations and services.
    This IBM Redbooks publication will help you to understand how DB2 10 on Linux for System z behaves while running on a z/VM that is being relocated using z/VM’s 6.2 Live Guest Relocation feature.
    In this book, we explore memory management, the DB2 Self-tuning memory manager feature, time synchronization, networking, and storage and performance considerations with regards to relocation. We also offer some best practices found during a live guest relocation for DB2 v10.

    Other authors
    See publication

Languages

  • Portuguese

    Native or bilingual proficiency

  • English

    Native or bilingual proficiency

  • Spanish

    Limited working proficiency

  • French

    Limited working proficiency

Recommendations received

View Eduardo’s full profile

  • See who you know in common
  • Get introduced
  • Contact Eduardo directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses