Search Results:

IT Management

Jan 10 ’11

Callout: The zEnterprise extends the magic of the mainframe to distributed environments by providing systems management and stack integration across multiple hardware platforms.

In the computing world, we’ve evolved from the original computers (mainframes) to mid-tier machines to servers to PCs and smart phones. All these platforms have their benefits, and enterprise computing environments are multi-platform for a reason. Each platform is optimized to run different workloads. For example, the mainframe provides the fastest, most secure database and transaction processing, but it needs front-end applications to enable Web access.

It’s imperative…

Read Full Article →

News

Jan 6 ’11

Partnership Arms Customers to Optimize Performance of Key Applications, Meet Growth Objectives and Service Level Agreements Compuware Corporation (Nasdaq:CPWR), the technology performance company, and HTC Global Services, Inc. (HTC) announced today that they have partnered to provide application performance management (APM) solutions to customers worldwide. HTC customers will benefit from Compuware's enterprise to Internet APM solution through HTC's systems integration and product implementation  services. HTC is a Troy, Michigan-based global provider of IT solutions and business process outsourcing services. "Combining HTC's service delivery and Compuware's market-leading APM solution will give customers visibility into the performance of critical…

Read Full Article →

News

Jan 6 ’11

Complimentary Compuware Resource Gives Step-by-Step Guidance and Best Practices for Game-Changing Service Performance DETROIT, Jan. 6, 2011 (GLOBE NEWSWIRE) -- Compuware Corporation (Nasdaq:CPWR), the technology performance company, today announced a new e-book in partnership with SPI Research, a recognized authority and research firm focused on the professional services industry. The complimentary Compuware offering is titled "Building Lasting Value: Growth Strategies for Professional Services Organizations." The e-book offers services leaders practical advice and best practices for growing and maturing a services business. The book draws on SPI consultants David Hofferberth and Jeanne Ulrich's collective sixty-plus years of professional service consulting expertise…

Read Full Article →

IT Management

Jan 4 ’11

AWLC: Advanced Workload License Charges. This new pricing metric is allowed only on zEnterprise (z196) machines.

Hardware MSU: These represent the hardware’s ability to perform work. This is the measurement that must be used for capacity planning.

IPLA: International Program License Agreement. These products are most often tools and utilities and are licensed with one-time charges for a specific MSU capacity. These products also offer subscription and support for ongoing maintenance and the ability to upgrade to new versions.

Mainframe Charter: IBM’s published plan to invest in the mainframe…

Read Full Article →

Operating Systems

Jan 4 ’11

Identity propagation is a new identity assertion capability provided by z/OS V1R11 and CICS Transaction Server (CICS TS) V4.1. Together with new functions in WebSphere DataPower or the CICS Transaction Gateway (CICS TG), it supports a cross-platform, end-to-end security solution, providing for identity assertion, control, and auditing.

Identity Assertion

Modern enterprise information processing systems typically consist of multiple software components, each of which perform distinct services. Over time, these services tend to be reused in different topologies. This often introduces the challenge of how to provide secure access between middleware components that use…

Read Full Article →

IT Management

Jan 4 ’11

By the time you read this, the 2010 U.S. mid-term election campaigns will be history. Most of us will be thankful that the vituperous TV and radio ads will have disappeared from the airwaves and we’re back to our normal diet of air-headed pitches for household cleaning products and breakfast cereals.

In the IT world, however, the battle for the hearts and minds of business decision-makers goes on. 

For some of the mainframers I talk to regularly, there’s a fear that, as the economy shows signs of improvement, old plans…

Read Full Article →

IT Management

Jan 4 ’11

My father’s career was spent working within hierarchical bureaucracies. Sure, he worked on programs and projects directed through matrix management. But in his day, the org chart ruled. Chain of command was paramount. Decision-making was, for the most part, orderly and predictable.

Dad intuitively understood my working environment when I started at a software development company that built mainframe products. Mainframes and their data architectures were mature. The processes used to build our products were mature (even when they weren’t very efficient). He understood that I was working in a top-down, command-and-control, divide-and-conquer,…

Read Full Article →

DB2 & IMS

Jan 4 ’11

The access paths formulated by the DB2 optimizer during the BIND and REBIND processes are critical to your application performance. These access paths determine not only how DB2 data is accessed by your program, but how efficiently it’s accessed. Whether you’re preparing a new program, implementing changes into your existing DB2 applications, upgrading to a new version of DB2, or simply trying to achieve optimum performance for existing applications, an exhaustive and thorough REBIND management policy should be of paramount importance.

However, many organizations aren’t doing everything possible to keep access…

Read Full Article →

IT Management

Jan 4 ’11

It’s been a good quarter for IBM, and for the first time in a while, the mainframe is responsible for much of the excitement. In the financial results announced on Oct. 8, revenues from System z server products increased 15 percent compared with a year ago, while total delivery of System z MIPS increased by 54 percent.

While the IBM results as a whole were positive as predicted, the mainframe growth may have raised a few eyebrows among the “new technology” fans on Wall Street. It reflects the huge concerted sales effort under way at IBM…

Read Full Article →

IT Management

Jan 4 ’11

Most mentoring relationships are founded on the concept that a learned elder works with an aspiring newcomer to share knowledge and help them leap hurdles and transform their career. This model dates back to the days of guild apprenticeships, where it was assumed the protégé was a “tabula rasa” (blank slate) on which the mentor would write. At the end of the apprenticeship, you had a trained tradesperson, but the mentor was unchanged by the experience.

This old model does a disservice to the abilities and knowledge of the protég…

Read Full Article →

Applications & Integrations

Jan 4 ’11

IBM Information Management System (IMS) and the IMS application programs it runs have been serving its customers well for a long time. Your IMS application programs are likely a core asset of your business. If you were to calculate the true value of your IMS application programs to your business—including the investment made in them over the years and the savings their continued use represents compared to the costs and risks of replacing them—the value would be huge.

To keep reaping dividends from your IMS applications and avoid the steep costs and significant…

Read Full Article →

Applications & Integrations

Jan 4 ’11

Most data still lives on the mainframe, and Web front-ends have made some of that mainframe data more accessible. For example, when you use an online banking application or place an online order from a brick-and-mortar store, you’re accessing mainframe data through a Web interface.

To meet rising demand, IT organizations will continue to make even more mainframe data accessible through the Web. While Web-enabling legacy data has many benefits, it also delivers a different set of challenges: extreme availability and security requirements, the need to find and fix problems on a variety of platforms,…

Read Full Article →

IT Management

Jan 4 ’11

You don’t need another challenge when managing your mainframe database data, but eDiscovery is one you need to understand clearly. eDiscovery is the process of making selected Electronically Stored Information (ESI) available to the proper parties involved in litigation matters.

ESI can come in many data types, including social collaboration data (notably emails), files, and databases. System z implementations can deal with social collaboration data such as Lotus Domino, and files through an enterprise content management application. However, here we’ll focus on database information, such as the use of DB2 for z/OS…

Read Full Article →

Operating Systems

Jan 4 ’11

2011 promises to be another exciting year for z/VSE with z/VSE 4.3 just now becoming available, and some excellent  education events, and conferences. What follows should help you plan the year ahead.    

April 15 - 19, 2011—WAVV in Colorado Springs: WAVV 2011 will be held at the Crowne Plaza in Colorado Springs, CO. The agenda grid with session titles is available at www.wavv.org; as the abstracts are completed, they’ll also be posted. The session grid for WAVV 2011 contains some very enticing topics.   …

Read Full Article →

Operating Systems

Jan 4 ’11

How often have you wasted time reconfiguring your Linux systems using a line-mode terminal? How often have you struggled using “ed” to correct configuration files; for example, replacing the Internet Protocol (IP) address in the network configuration?

Terminal connections over the z/VM Inter-User Communication Vehicle (IUCV) let you run your favorite editor. The terminal server using z/VM IUCV helps you connect to your Linux instances even when they aren’t connected to an IP network.

This article introduces you to the Linux on System z terminal server and the concept…

Read Full Article →

News

Jan 3 ’11

>> nuBridges Exchange Commerce Suite v3.5.1 produces audit trails for digitally exchanged documents to aid companies in compliance with HIPPA, SOX and PCI DSS; expands cross-platform support for popular operating systems and databases

ATLANTA — December 21, 2010 — nuBridges, the secure eBusiness authority, announced today that a new version of nuBridges Exchange™ Commerce Suite™ is now available. Version 3.5.1 of nuBridges’ secure digital business data exchange software now automatically tracks business documents to help companies comply with data…

Read Full Article →

News

Dec 28 ’10

PGP® data encryption, a widely accepted standard in industry and government, is now available for IBM z/OS systems through Software Diversified Services.PGP Command Line for IBM Mainframes easily integrates into existing mainframe processes and provides compression and encryption for data at rest, in transmission, and in archival backups--thus helping enterprises achieve compliance with regulatory and business-partner standards.Implementing PGP for data security on z/OS mainframes also provides the confidence of employing an integrated security system across multiple platforms: IBM z/OS, iSeries, and AIX; Sun Solaris; and Unix, Linux, Windows, and Macintosh machines.PGP also…

Read Full Article →

News

Dec 17 ’10

Bob Thomas, publisher of Mainframe Executive and z/Journal, talks with CA Technologies' Dayton Semerjian, general manager of CA Technologies' mainframe business, about the significant mainframe changes taking place, the affect on mainframers everywhere, and how CA is helping solve the issues.

Click here to view the interview

Read Full Article →

News

Dec 14 ’10

InfoSec, Inc. and DG Technology Consulting are pleased to announce their partnership in the development and sales of a new mainframe-based technology solution designed to help customers leverage their mainframe investment. This solution, called the Mainframe Event Acquisition System (MEAS) is targeted for release in the first quarter of 2011 and is designed to help clients collect, in real-time, information pertaining to security events, database related events, transaction processing events and more.

The technology enables mainframe clients the ability to collect, store, report and take action against the data through integration with …

Read Full Article →