Latest Entries

As the Internet and corporate intranets extend their reach, many companies are searching for ways to integrate the wealth of mission-critical information residing on their existing systems with World Wide Web technologies. At the same time, software vendors are scrambling to meet this need, each company touting its product(s) as a “complete solution.” Business executives trying to choose a clear direction are faced with many conflicting claims. The resultant confusion can lead to either a poor choice or no choice, with many companies putting off the problem awhile longer, waiting for the right solution to become obvious. However, with the rapid evolution of technology, businesses that choose to wait may also risk losing their competitive advantage…

Read Full Article →

Ever since open systems platforms began offering performance levels approaching lower-end mainframes more than 12 years ago, we have been involved in numerous projects where mainframe and midrange users of various proprietary platforms were moving some or all of their applications to open systems. Yes, the price/performance value has been there, but at a cost of somewhat lower reliability. Since then, open systems platforms have become more robust and offer performance that equals all but the largest mainframe configurations. However, that continuing reliability question combined with an improving mainframe price/performance profile has slowed the movement of applications off the mainframe, particularly core business-critical applications. Arguably, most of the applications that were appropriate candidates for moving off the mainframe have already been moved. In fact, we have seen a couple of cases of applications moving back to the mainframe.  …

Read Full Article →

Mainframe Virtual Security

Enterprises using IBM’s premier Operating System (OS) for S/390 mainframes, z/OS, may have a false sense of confidence regarding the vulnerability of corporate assets. The protection offered by widely used security products can often be circumvented as a result of loopholes in other add-on software. Many such systems are frequently not nearly as resistant to security penetration as corporate management has been led to believe. New inspection, certification, and verification techniques must be implemented before MVS-based systems can be safely used for e-commerce and as a secure repository…

Read Full Article →

Opening Up zStorage

For many years, storage and storage interfaces could have been viewed as the Rodney Dangerfield of the IT infrastrure. It “didn’t get no respect.” Long considered only as a cost — measured by dollar per-megabyte ($/MB) and, more recently, as dollar per-gigabyte ($/GB) — storage has only recently (coinciding with the growth of e-commerce) been seen as cool and trendy…

Read Full Article →

For almost four decades, IBM has built upon its mainframe platform’s strengths. Through multiple hardware generations, thousands of companies worldwide have run strategic operations on “blue” hardware. Starting with the System/360, announced in 1964, through the System/370 in the 1970s, System/370-XA and -ESA in the 1980s, and then the System/390 in the 1990s, the IBM mainframe stood apart from the crowd for its Reliability, Availability and Serviceability (RAS) and power…

Read Full Article →