Search Results:

Operating Systems

Jul 22

Far from being left behind in the mobile application market space, the IBM mainframe is in a prime position to exploit its existing suite of applications to become a major player in the tablet and smartphone world. Here we will show you how this can be accomplished. 

For years, command-line interactions with the mainframe have been derided and used as evidence of its growing irrelevance. However, now this so-called legacy system positions these applications to be exploited by Web services and made accessible to any mobile device.

To illustrate this capability, we created a…

Read Full Article →

News

Jul 21

CA TSOPLUSTM customers facing “End of Life” and “End of Support” can migrate to a fully supported replacement environment with TASKLIB+ and Launch Express from Relational Architects International (RAI). “RAI is working directly with CA Technologies and CA TSOPLUSTM customers to ensure a seamless and transparent migration for users” said Carl Feinberg, CEO of Relational Architects International (RAI).

TASKLIB+ and Launch Express together offer a complete solution and methodology for managing ISPF applications and the dialog libraries they require (including load libraries). “z/OS shops can dramatically improve TSO logon…

Read Full Article →

Operating Systems

Jul 21

IBM introduced significant enhancements in ISPF version 7.1 for z/OS 2.1, which was released in September 2013. Let’s take a look at these new options, commands and settings as well as some changes to MVS/JCL.   

UNIX Directory Lists

ISPF option 3.17 and the UDLIST command produce a z/OS UNIX directory list with an eight-character input field to the left, in front of the directory or file name (see Figure 1). The line command field on UNIX directory lists has characteristics similar to both data set lists and member lists, which were discussed…

Read Full Article →

CICS / WebSphere

Jul 18

Storage violations in CICS are unpredictable, notoriously difficult to identify and resolve, and can cause data corruption and region failure. For this reason, it’s important to learn the common causes of storage violations and what enhancements IBM has made to CICS that reduce the potential for storage violations.

The term “storage violation” has a very precise definition in CICS and is related to control blocks that existed prior to the new architecture introduced in CICS/ESA. In early releases of CICS, the control blocks that tracked task-related storage lived within the storage area…

Read Full Article →

IT Management

Jul 17

As an expert in IT staffing, I tend obviously to focus on the technology job market and the unique challenges we face finding talent for one of the most important and fast-changing industries in the world.

But like employees in any work environment, those who work in IT experience the same on-the-job problems as anyone else.

Consider the worker who accepts a job based on salary alone, but with little knowledge of the workplace culture or what his or her coworkers are like. The result can be pleasant or disastrous. If the worker likes her…

Read Full Article →

Storage

Jul 16

If you follow the conversation around software-defined data centers, you’re eventually going to encounter the term “elastic” in conjunction with computing, networking or storage. No, elastic doesn’t refer to some sort of new media for storing data or to some sort of slingshot method for transporting data faster than the speed of light. Nothing so grand. 

Elastic has to do with provisioning resources and services to support workload, according to the experts, and it works somewhat similarly to the “Goldilocks and the Three Bears” story you heard when…

Read Full Article →

News

Jul 15

Apple and IBM IBM today announced an exclusive partnership that teams the market-leading strengths of each company to transform enterprise mobility through a new class of business apps—bringing IBM’s big data and analytics capabilities to iPhone® and iPad®.Apple® and IBM (NYSE: IBM) today announced an exclusive partnership that teams the market-leading strengths of each company to transform enterprise mobility through a new class of business apps—bringing IBM’s big data and analytics capabilities to iPhone® and iPad®.

The landmark partnership aims to redefine the…

Read Full Article →

News

Jul 14

Company Boasts Thousands of New Clients Since Acquisition, including Enterprise Customers Macy’s, Whirlpool, Daimler subsidiary moovel, Sicoss Group

Today IBM announced SoftLayer is fueling hybrid cloud adoption by attracting thousands of new clients including leading enterprises. To support this ongoing growth, IBM is also launching a range of new cloud services designed for the enterprise that are based on SoftLayer infrastructure.

Just…

Read Full Article →

IT Management

Jul 14

I will be the first to admit that at least in the realm of storage network management, management software has historically been far more reactive in nature. Recently, there have been some significant efforts made to change this, based in large part on feedback received from end users.

Proactive vs. reactive is a subject near and dear to my heart, and I’ve given presentations on the subject at Computer Measurement Group (CMG) conferences with more of a proactive performance management focus. The article “Proactive Management of Your Storage Network” (see page 16) expands on…

Read Full Article →

Applications & Databases

Jul 14

As a database administrator (DBA), you’re probably very technically minded. This is essential, since you’re likely charged with evaluating the features and functions of new versions of database management system software as well as monitoring and tuning the myriad business applications you support. 

However, in addition to being technically savvy, it’s also imperative you have a strategic outlook. Tactics are extremely useful for reacting to issues; however, if you want to get ahead of potential problems, you need to know what strategies lead to success.

Here are two…

Read Full Article →

News

Jul 10

IBM today announced it is investing $3 billion over the next 5 years in two broad research and early stage development programs to push the limits of chip technology needed to meet the emerging demands of cloud computing and Big Data systems. These investments will push IBM's semiconductor innovations from today’s breakthroughs into the advanced technology leadership required for the future. The first research program is aimed at so-called “7 nanometer and beyond” silicon technology that will address serious physical challenges that are threatening current semiconductor scaling techniques and will impede the ability to manufacture such chips.…

Read Full Article →

Blog

Jul 9

A history of Innovation and Support for Open Source

The mainframe has been core to many advancements IBM has made, including the strategic move into the open source arena nearly 15 years ago. In 2000, IBM decided to commit $1 billion to Linux and also pledged to help improve the operating system by working within the Linux community. Linux on System z was the first Linux distribution within IBM and since that time IBM has made countless improvements…

Read Full Article →

IT Management

Jul 9

In the early ’90s, I was working for a software company that developed mainframe database performance monitors. One day it was announced that we were being acquired by a much larger company. It was the first time in my career I had faced an acquisition and it was unsettling, to say the least.

The entire experience turned out to be relatively uneventful and even positive. I was able to work with great people and new mentors. I clearly remember one afternoon when my new boss asked me, “Do you consider yourself a manager or a…

Read Full Article →

News

Jul 8

Brocade Fibre Channel Connectivity Supports and Enhances New EMC VMAX3 and XtremIO Product Families

 Brocade (NASDAQ: BRCD), the leader in data center fabric networking solutions, today announced that Brocade® Gen 5 Fibre Channel Storage Area Network (SAN) solutions provide a reliable and high-performance foundation to support and enhance new enterprise and all-flash storage systems that were announced today by EMC.

Fibre Channel SANs are a key unifying element for the new EMC® VMAX®3, and XtremIO™ systems that, as complete end-to-end solutions, allow businesses to redefine what is possible in the data…

Read Full Article →

News

Jul 8

Isilon Delivers 2X the Performance at Half the Cost; Isilon and Pivotal Unite To Deliver Hadoop Analytics for Data Lakes

EMC Corporation today announced a major upgrade to EMC Isilon OneFS, new Isilon platforms and new solutions that reinforce the industry’s first enterprise-grade, scale-out Data Lake. The new products and capabilities, which include ongoing support for HDFS, will help customers significantly advance their ability to ingest, store, protect and manage massive amounts of unstructured data. By leveraging HDFS for the Data Lake, EMC enables customers to bring…

Read Full Article →

News

Jul 8

VMAX³ Is The Foundation For The Hybrid Cloud; Will Bridge Private Clouds With Leading Public Cloud Providers

EMC® Corporation today announced the highly anticipated VMAX3 TM Family, which transforms VMAX® from enterprise storage to an enterprise data service platform. This fundamentally changes what has – until now – been possible with enterprise storage by bringing new levels of cloud-like agility, efficiency and control within the data center.

Historically, IT delivered data services to internal clients while maintaining full control of the data center. IT was the trusted sole provider, but constrained by…

Read Full Article →

News

Jul 8

New Features, Configurations, Integrations and Programs Redefine The Possible With All-Flash Storage

EMC Corporation today announced a multitude of new features and configurations, ecosystem integrations, and business programs for EMC® XtremIO™ all-flash arrays. Collectively, these offer more scale, more capabilities, and more support for consolidated, virtualized, and performance-hungry workloads.

Having already surpassed $100 million in demand within six-months of product availability, EMC believes XtremIO is the fastest-growing all-flash array, and the fastest-growing storage array in history. New XtremIO 3.0 capabilities deliver enterprise data centers with leaps forward in performance, consolidation, and application agility through intelligent…

Read Full Article →

News

Jul 8

New software and services provide easy access to large volumes of information to improve data analytics and business intelligence initiatives

GT Software, a leader in helping enterprise organizations unify business information across any platform, data format or programming language, has unveiled its Data Unification Solution. This ‘next-gen’ software platform and supporting services allow businesses to easily access critical information from across the organization, regardless of where the data resides, on or off the mainframe, for improved business decisions and performance.

Unified Business Information is a Powerful Tool

“In today&rsquo…

Read Full Article →

Blog

Jul 7

The System z offers an increasing number of cloud options. At a SHARE conference this past spring Erich Amrehn, IBM Distinguished Engineer elaborated on Cloud Computing with IBM System z. In his presentation, Amrehn focused on five cloud options: Solution Edition for Computing and Data Cloud, SAP Cloud, CICS Cloud, Hybrid Cloud, and Mobile solution for z. And that’s not even mentioning the z-based IBM Enterprise Cloud System.

Why should a z data center care? In short, you risk being left behind.…

Read Full Article →

IT Management

Jul 7

Let’s start at the core of the matter: Would you be willing to bet your business that you have sufficient controls to protect against data loss and data leaks?

If you’re like most CIOs, you probably can’t answer that question with any level of certainty. You also probably wake up some nights and hold a meeting with yourself, pondering the potentially catastrophic consequences of a security breach.

Here’s another brain-teaser: Other than actually experiencing data loss or leaks, how does a CIO know whether his or her…

Read Full Article →