Operating Systems

Rules of Product Support for Vendors

1 Customers lie. They don’t mean to, but they do. They tell you they tried things they didn’t, they swear they didn’t change things they did, and they assure you they understand instructions that made as much sense to them as a foreign language would. When they start arguing with you, that often means you’re getting close to something they did that they know they shouldn’t have done . . . keep digging!…

Read Full Article →

The VSE Redirector

The evolutionary process of software development can produce some amazing things. Whether it’s a Department of Defense communications protocol that becomes the standard for most communications in the world today, or a college student who has a dream of a free operating system that causes upheaval, the fruits of software engineering can revolutionize the way we work and play…

Read Full Article →

Data security is an increasingly big concern. Each time an article hits the papers about someone hacking into a computer and retrieving thousands of credit card numbers or other sensitive data, it puts everyone’s vulnerability in the spotlight. If you’re like many companies, you’ve already taken steps to protect at least some of your sensitive information. IBM’s Integrated Cryptographic Service Facility (ICSF) is an excellent tool you can use to protect data…

Read Full Article →

Linux 2.6: What’s in It for zSeries?

Linux 2.6 will be coming soon to a distribution near you. There are plenty of articles describing the new features, but they tend to focus on the Intel user (see the Reference section at the end of the article). This article describes some of the new features important to the zSeries user such as the new threading model, scheduling improvements, the new mechanisms for handling and naming devices, and networking. Some of these enhancements are so significant that the major distributors have back-ported them to the 2.4 kernel. I’ll also explore some recent “code drops” specifically for the zSeries 2.4 kernel…

Read Full Article →

When IBM discontinued support for 3174 controllers for legacy mainframes, data center managers may have been left wondering where to turn for replacements. However, there seems little reason for concern. Besides IBM’s own replacement upgrade, the 2074, there are several sources for used controllers and new solutions from other vendors…

Read Full Article →

Stored procedures have been around since DB2 Version 4 and have seen a few changes since their inception. Version 8 (V8) brings a new requirement to using stored procedures: Workload Manager (WLM). In the past, using WLM to manage stored procedure address spaces was optional. It’s worth taking a quick look at how stored procedures work with WLM so we can understand the benefits. We may want to begin the conversion of our stored procedures from DB2 managed address spaces before we migrate to V8 to take advantage of the WLM environment…

Read Full Article →

Most performance tuning activities involve systems tuning such as managing I/O, adjusting parameters, moving workloads, etc. Only rarely do you work directly with application developers to improve code efficiency. But there’s a third tuning method—one that’s only rarely employed, but often can be highly effective. This is particularly true when you can’t touch the application…

Read Full Article →