Latest Entries

Using RACF To Control Access To DB2 Objects

Ever since the release of DB2 Version 5 and OS/390 Version 2, Release 4, you have had a choice of how you protect your DB2 resources: native DB2 controls or RACF. An effective DB2 security implementation using RACF requires close coordination between your DBA team and your security implementation (RACF) team. This article describes the security mechanisms available with RACF…

Read Full Article →

The Event-Driven Enterprise

Organizations trying to become an agile, real-time enterprise often don’t notice that most of their critical business events lie dormant, locked within the safe confines of their complex operating systems. Event-driven architecture offers the promise of unlocking business potential in a world where business processes and their dependencies on business events occur without latency. Imagine a corporation where:…

Read Full Article →

Are your OS/390 applications experiencing virtual storage constraints? If you don’t know and don’t know how you can find out, then this article is for you. Some applications, such as DB2, use a tremendous amount of “above the line” virtual storage. If the virtual storage consumption is not monitored, you could unexpectedly experience virtual storage constraints, leading to application failures. Monitoring virtual storage consumption is one step you can take toward proactive capacity planning in your environment. This article will demonstrate how you can use IBM’s RMF product to monitor the virtual storage utilization of specific address spaces running on your system…

Read Full Article →

Like the mainframe, many people have predicted the death of SNA networking. This article examines the current state of SNA networking and applications, and explores the reasons why many enterprises choose to maintain their investment in SNA applications. We also examine some alternatives for transporting your SNA data across an IP network and help you determine the best way to do this…

Read Full Article →

Once upon a time, it was easy. Twenty years ago, there were mainframe computers aimed at either business or scientific computing; there were departmental minicomputers; and there were microcomputers (or PCs) on people’s desktops. Everyone in the IT service organization knew which of these systems was which, which mattered, which needed 24x7 support, and which systems generated phone calls in the middle of the night…

Read Full Article →

Are you having trouble making robust legacy applications talk to hot, new Web applications? Trying to manage business transactions with your partners when everyone is running their proprietary software on different platforms? Simple, flexible interoperability is the “Holy Grail” behind Web services. However, simplicity does not come without cost. This article will introduce you to Web services, provide an introduction to the key performance issues that characterize Web services-based applications, and help you begin to explore the possibilities for performance monitoring such complex, distributed applications…

Read Full Article →

Building Systems Management Competency

In recent years, it has become more complicated to effectively manage technology. For the most part, improvements in individual hardware and software components have made it easier to very quickly put together large and complex systems. Yet, there are still major challenges with applications and platforms concerning integration, cost, complexity, and scalability. If companies are to achieve real success in meeting these challenges, they must address, or build upon, systems management competencies…

Read Full Article →

To quote the oft-quoted Mark Twain, “The reports of my death have been greatly exaggerated.” It is a hackneyed refrain but, nonetheless, describes the current physiology of the bits and bytes of CMOS technology that compose the heart and soul of the S/390 Enterprise System Server—the mainframe. To some, the mainframe may conjure up nostalgic visions of a time long ago when systems programmers roamed a computing landscape of refrigerated, raised-floor, maximum-security rooms with large, tape-whirring, light-flashing computers and ruled through cryptic technological jargon that left mere business managers in awe. To others, the mainframe may represent an outdated monolith; emblematic of a decade dominated by disco, Watergate, and Bob Dylan. These people may feel that the mainframe is old, clunky, and seemingly useless in the hustling, bustling “enterprise” world of Unix, Windows, and Web servers—the so-called real technologies of today…

Read Full Article →