Search Results:

Storage

Aug 4

Simply described, a super highway is a large, wide highway used for traveling at high speeds over long distances. When all goes well, you can quickly travel from point A to point B. However, even the best engineered highway system can become congested, leading to snarled and slow traffic.

Computer systems are similar to highway systems, as they’re designed for data to travel at high speeds by using more than one lane (bandwidth) for each direction of traffic. When all goes well, the data can easily make a smooth and fast trip from the point…

Read Full Article →

News

Aug 3

Version 4.5 Delivers Innovative Solutions Focused on Continuous Data Protection

21st Century Software Inc., leaders in Data Stewardship™, today announced the launch of version 4.5 of DR/VFI®, the company’s flagship Continuous Data Protection Solution.  Through its real-time architecture, DR/VFI protects data while delivering comprehensive application knowledge to administrators. DR/VFI version 4.5 is changing the way mainframe environments are managed by introducing three new innovative solutions: TimeLiner, InstaSnap, and InstaRestore.

  • TimeLiner - benefits users with crucial, up-to-the minute visibility into jobs that may have been running at the time of…
Read Full Article →

News

Aug 3

NewEra Software announced today that The Control Editor (TCE) now includes enhanced Role Based Access Control (RBAC).   In this era of almost weekly notices of security breaches, TCE provides the ability to enhance the security provided by all z/OS External Security Managers (RACF, CA ACF2 and CA Top Secret).

  • TCE/RBAC establishes role-based controls over a variety of components - z/OS, JES, VTAM, TCP/IP, etc. Roles are established to limit authority to only those functions assigned.
  • TCE/RBAC defines, assigns and enforces a second tier of Access Policies to ensure…
Read Full Article →

News

Aug 1

Infonetics Research and Internet Telephony Magazine Recognize Brocade for Industry Leadership

Brocade has announced it has received industry recognition for its leadership in enterprise networking and contributions to Network Functions Virtualization (NFV) from two prominent industry organizations, Infonetics Research and Internet Telephony Magazine. Brocade has earned a high standing in the 2014 Infonetics Research Annual Enterprise Networking and Communication Vendor Scorecard, ranking second overall, and has been named a winner of the 2014 Internet Telephony NFV Pioneer…

Read Full Article →

News

Aug 1

IBM today announced that Reflexis, a leader in integrated real-time execution and workforce management solutions, has selected SoftLayer, an IBM company, to help customers in the retail industry make the transition to cloud computing. Reflexis is looking to transform the retail industry by providing customers with its own platform-as-a-service (PaaS) based on SoftLayer's infrastructure, to help them implement mobile and Web applications.

The retail industry is experiencing an increased demand for cloud applications which satisfy unique business needs and requirements, while alleviating IT security concerns and reducing management complexity. Reflexis has seen a parallel increase in…

Read Full Article →

Blog

Jul 31

Everyone knows that mainframes are the best computers you can have. You can run them locally, you can hide them in the cloud, and you can link them together into a massive processing network. But we also know that there are smaller platforms out there that work differently. Wouldn’t it be brilliant if you could run them all from one place?

Last summer we were excited by the announcement from IBM of its new zBC12 mainframe computer. The zBC12 followed the previous year’s announcement of the zEC12 (Enterprise Class), and 2011 saw the z114,…

Read Full Article →

News

Jul 31

New program embraces key open standards and practices; enables partner collaboration around datacenter innovations based on 64-bit ARM® architecture

Red Hat, Inc., the world's leading provider of open source solutions, today announced the launch of the Red Hat ARM Partner Early Access Program to enhance partner collaboration and facilitate partner-initiated system designs based on the 64-bit capable ARMv8-A architecture that include Red Hat software. The program will be aimed at silicon vendors, independent hardware vendors (IHVs), original equipment manufacturers (OEMs), and original design manufacturers (ODMs), and launches with participation and support from several ARM…

Read Full Article →

Applications & Databases

Jul 31

When strategizing Big Data, enterprises find themselves at the corner of a huge opportunity and the hurdles they need to jump over to turn opportunity into business growth. We’re still in the infancy of Big Data, but IT and line of business (LOB) leaders know that significant business value will accrue from efficiently managing and analyzing large, complex data sets.

Since the Enterprise Tech Journal interview with Denny Yost (see page 48) discusses overcoming the challenges facing front-line Big Data managers, this column concentrates on other issues—those faced by IT leaders and managers of…

Read Full Article →

Blog

Jul 29

I didn’t have to cut short my vacation and race back last week to cover the IBM-Apple agreement. Yes, it’s a big deal, but as far as System z shops go it won’t have much impact on their data center operations until late this year or 2015 when new mobile enterprise applications apparently will begin to roll out.

The deal, announced last Tuesday, promises “a new class of made-for-business apps targeting specific industry issues or opportunities in retail, healthcare,…

Read Full Article →

Operations

Jul 29

Like many of you, I belong to several LinkedIn professional groups. Recently, there was a lively discussion in one of the groups about subject-matter experts (SMEs) and their value. That thread served as the inspiration for this column.

Let’s start with a simple definition of SME from Wikipedia: A subject-matter expert (SME) is a person who is an authority in a particular area or topic. This is a simple enough definition and pretty hard to refute.

In my opinion, the mainframe community doesn’t have a current or pending skills shortage. IBM,…

Read Full Article →

Applications & Databases

Jul 28

Enterprise Tech Journal recently had the pleasure of speaking with Kevin Goulet about overcoming the challenges inherent in managing Big Data on System z. As vice president of Product Management for the CA Technologies Database Management portfolio with a long history of product leadership roles, Kevin is in a prime position to observe the Big Data market and the issues companies face in establishing effective Big Data management solutions. Since a sizeable portion of the audience of Enterprise Tech Journal is DBAs who are often charged with the day-to-day handling of Big Data solutions, we focused our questions on…

Read Full Article →

News

Jul 27

O’Malley to Focus on Enhancing Customer Value, Building on Market-Leading Position

Compuware Corporation, the technology performance company, announced that it has appointed Christopher O’Malley President of Mainframe Operations effective. In this role, O’Malley will oversee all facets of the business unit’s operations, including customer support, product development and management, marketing and sales.

Prior to joining Compuware, O’Malley was the CEO of VelociData, a provider of leading-edge Big Data solutions.  He was also the CEO…

Read Full Article →

Blog

Jul 26

Coming up in October 6 - 10, 2014 is the second IBM Enterprise2014 conference. Enterprise2014 brings together the IBM System z Technical University, the IBM Power Systems Technical University and the Enterprise Executive Summit; all combined to provide the premier enterprise infrastructure event.

The highlights of this years event are:

  • 3,000 attendees
  • 50+ client case studies
  • 600+ expert technical sessions covering IBM systems and software topics
  • Insightful executive strategy sessions
  • In-depth coverage of recent product announcements
  • IT trends and directions
  • IBM and industry-renowned speakers
  • Hands-on labs,…
Read Full Article →

Applications & Databases

Jul 25

“Any darn fool can make something complex; it takes a genius to make something simple.” This quote has been attributed to different people over the years, from Albert Einstein to Pete Seeger. Whatever its origin, it can really be applied to code. When given a task to accomplish, developers should all be able to code something that will work. But how will it be understood and maintained in the future? How can you objectively measure something as complex as complexity?

You can try to count software lines of code, but that won’t tell…

Read Full Article →

Blog

Jul 25

The retiring mainframe work force issue has proven to be a slow erosion over time rather than some type of drastic drop off. No matter where your company sits in that continuum, here are three simple steps you can take to help reduce the impact moving forward:

1. Get Current

“When is the best time to buy a Kirby vacuum cleaner? When the Kirby vacuum cleaner salesman is here!” That was the last ditch effort sales line of a door-to-door salesman to my Mom when I was eight, and it stuck with me to…

Read Full Article →

Operating Systems

Jul 24

On April 28, 2014, IBM once again delivered on its Power roadmap with the announcement of the first of the new POWER8 servers. Altogether, five new models were announced: three that run AIX, Linux and iOS and two that are Linux-only. With POWER, IBM offers a technology that can run multiple operating systems on the same hardware simultaneously. This lets users choose operating systems depending on the application while still using the same server. Additionally, within the Linux-only line of servers, users can now choose between using the traditional PowerVM for virtualization on POWER or they can use POWERKVM, the POWER…

Read Full Article →

Operating Systems

Jul 22

Far from being left behind in the mobile application market space, the IBM mainframe is in a prime position to exploit its existing suite of applications to become a major player in the tablet and smartphone world. Here we will show you how this can be accomplished. 

For years, command-line interactions with the mainframe have been derided and used as evidence of its growing irrelevance. However, now this so-called legacy system positions these applications to be exploited by Web services and made accessible to any mobile device.

To illustrate this capability, we created a…

Read Full Article →

News

Jul 21

CA TSOPLUS™ customers facing “End of Life” and “End of Support” can migrate to a fully supported replacement environment with TASKLIB+ and Launch Express from Relational Architects International (RAI). “RAI is working directly with CA Technologies and CA TSOPLUS™ customers to ensure a seamless and transparent migration for users” said Carl Feinberg, CEO of Relational Architects International (RAI).

TASKLIB+ and Launch Express together offer a complete solution and methodology for managing ISPF applications and the dialog libraries they require (including load libraries). “z/OS shops can dramatically improve…

Read Full Article →

Operating Systems

Jul 21

IBM introduced significant enhancements in ISPF version 7.1 for z/OS 2.1, which was released in September 2013. Let’s take a look at these new options, commands and settings as well as some changes to MVS/JCL.   

UNIX Directory Lists

ISPF option 3.17 and the UDLIST command produce a z/OS UNIX directory list with an eight-character input field to the left, in front of the directory or file name (see Figure 1). The line command field on UNIX directory lists has characteristics similar to both data set lists and member lists, which were discussed…

Read Full Article →

CICS / WebSphere

Jul 18

Storage violations in CICS are unpredictable, notoriously difficult to identify and resolve, and can cause data corruption and region failure. For this reason, it’s important to learn the common causes of storage violations and what enhancements IBM has made to CICS that reduce the potential for storage violations.

The term “storage violation” has a very precise definition in CICS and is related to control blocks that existed prior to the new architecture introduced in CICS/ESA. In early releases of CICS, the control blocks that tracked task-related storage lived within the storage area…

Read Full Article →