Latest Entries

Busy mainframe executives might be surprised to learn how they’re really spending their time. We all lose focus throughout the day; our moods and energy levels fluctuate, so we’re more or less inclined to perform different kinds of tasks at different times. However, there’s a simple way to get an objective view, and it involves your mobile phone.  …

Read Full Article →

The IT department is the core of the modern enterprise and one of the keys to its success. While making decisions that affect the technology and systems deployed by the IT department is difficult, business success depends on correct decisions being made to minimize costly errors that can impact a company or organization’s ability to remain competitive in the marketplace. One area where costly errors can easily be made is in the understanding of the true cost and the Return on Investment (ROI) of various information technology expenditures…

Read Full Article →

Linux on System z will celebrate its tenth anniversary in June 2010. This open source project has come a long way and benefited many. This article explains how open source software development is organized, how IBM contributes System z-specific parts, how customers get this software, and what services are available from IBM. In particular, you’ll learn how Linux on System z is developed and maintained…

Read Full Article →

In the next few months, we will see the arrival of “zNext,” the replacement for IBM’s current top-end z10 system (IBM is apparently offering Early Support Programs for the second quarter of this year). Exactly when the system will reach general availability still isn’t clear, but the signs are that we may see a roll-out by summer. What it will be called is also uncertain: z11 would make sense, but IBM doesn’t always favor the logic of sequential numbering! …

Read Full Article →

This article describes the need for identity and resource access management on the mainframe to mitigate inappropriate use of applications and data. It will compare and contrast how such management is implemented by the three top security servers: IBM RACF, CA-Top Secret, and CA-ACF2. It points to the System z mainframe as the most secure platform, making it the best choice for hosting highly sensitive data, including electronic keys required to access encryption-protected data and to sign and authenticate sensitive data exchanges. Finally, it considers how the three security servers are evolving to manage such keys as well as their role in an enterprise Public Key Infrastructure (PKI)…

Read Full Article →

The focus of IT infrastructure management has never been static for long. Early on, for expensive mainframe systems, the focus was exclusively on job management and control to ensure high utilization rates. The IT staff focused on keeping the infrastructure busy, but as available as possible to serve business needs. This remains true today as Business Service Management (BSM)—the ability of IT to understand and adapt its operations to support business operations—gains attention…

Read Full Article →