Search Results:

News

Jun 18

Rapid Value and Exceptional User Experience Deliver Next Generation of Fast, Flexible IT Service Support and Delivery

CA Technologies today unveiled CA Cloud Service Management, a mobile-ready, SaaS-based IT Service Management (ITSM) solution that delivers simplicity and speed across the enterprise.   CA Cloud Service Management is designed with a unique ‘configure, don’t code’ approach that offers implementation in weeks without new development and maintenance resources or complex upgrades.  In fact, service delivery and resource provisioning can be automated in just…

Read Full Article →

Interviews

Jun 18

The 50th anniversary of the IBM mainframe’s introduction was celebrated on April 8, 2014 in an event that was viewed either in person or via live streaming by more than 4,000 attendees worldwide. While there was certainly some reminiscing of the vast accomplishments of the mainframe over the past 50 years, significant time was also spent looking into the future. Enterprise Executive visited with Deon Newman, vice president of IBM System z marketing, shortly after the event to gain his perspective on the first 50 years and the extraordinary future of the mainframe.

EE: The last 50 years have seen a…

Read Full Article →

News

Jun 17

“Intelligent Capping” Dynamically Shifts Workloads That Increase Costs

For decades, IBM mainframe customers have managed mainframe workload capping strategies manually, constantly shifting workload allocations to manage costs and meet business demand. Those days are now over, thanks to the latest mainframe innovation from BMC Software. Available now, “intelligent capping” software from BMC helps IT professionals dynamically optimize utilization for their zSeries mainframes, optimizing monthly license charge (MLC) spend and reducing the need to invest in additional capacity for peak workloads. On average,…

Read Full Article →

News

Jun 16

IBM has began shipping its next generation of Power Systems servers incorporating IBM's POWER8 processor which is available for license and open for development through the OpenPOWER Foundation.  

The new POWER8-based Power Systems result from a $2.4 billion, three-plus year development effort and exploit the innovation of hundreds of IBM patents — underscoring IBM's commitment to providing higher-value, open technologies to clients. IBM designed the new servers…

Read Full Article →

Applications & Databases

Jun 16

DevOps is rapidly gaining ground in organizations that feel intense pressure to operate more efficiently and rapidly deliver new products and services to their customers.

DevOps, short for development and operations, is a new way for IT departments to organize their resources to become more closely aligned with business goals and requirements. DevOps emphasizes the communications, collaboration and integration of software development and operations management within the IT department.

It also represents a strategy for a seamless flow of ideas between business units and corporate IT departments. The overarching goal is to innovate quickly and…

Read Full Article →

Applications & Databases

Jun 13

Static SQL is rigidly formed and usually provides a known access path to data. Dynamic SQL is more flexible, but this flexibility comes with some trade-offs. For example, dynamic SQL brings the potential for more accurate access paths but at the cost of not knowing what that access path will be before the SQL is run.

The differences between static and dynamic SQL are lessening, though. Over the past few DB2 versions, IBM has added options and features that blur the differences between dynamic and static SQL. One of these features provides improved and additional options for…

Read Full Article →

Blog

Jun 13

Now that the Target CEO and CIO have resigned, and the Institutional Shareholder Services (ISS) is calling for 7 of the 10 members of the Target Board of Directors to be removed, it is time to look at where the security of our organizations can be improved to reduce the probability of such an attack on our systems.  It is unclear whether the executive resignations and the call for action against the Board members was the direct result of the security breach, or whether it was because of the disappointing financial results (which of course was somewhat linked to the…

Read Full Article →

Operating Systems

Jun 12

As our systems have evolved, so, too, has our management focus. Beginning with managing a single system resource, to tightly integrated systems and their resources, to today’s focus on service management, this evolution over the past 50 years has built on fundamentals refined over this same period. Many of us have been working with mainframes for so long, there’s a lot we take for granted. One area we often overlook in our transfer of knowledge to new System z systems programmers is the fundamentals of z/OS TCP/IP network management. As a resource, it&rsquo…

Read Full Article →

CICS / WebSphere

Jun 10

How to access CICS transactions from a web browser has been the topic of numerous articles and training sessions. However, if you just want to get your feet wet in the CICS web swamp, where do you start? This is the bare bones story—the absolute minimum—to web-enable a web-unaware (i.e., an application that doesn’t understand HTTP or HTML) legacy CICS application using the CICS 3270 bridge. We won’t delve into explaining HTML, SOAP or any other protocol, as there are numerous resources available on those topics. Also, we won’t…

Read Full Article →

Blog

Jun 9

Mantissa is delivering the third beta of its new z86VM offering targeting the cloud deployment of x86 servers and desktops on IBM System z mainframes. This free version of the z86VM beta includes performance enhancements in the x86 instruction set and file system as well as bug fixes developed since Beta 2 shipped in September 2013.

The z86VM offering is a rather simple deployment of a complex operating system. The product itself consists of two modules, one for Input/Output processing and one for processing the instructions. Combined with a simple profile to create “virtual…

Read Full Article →

Applications & Databases

Jun 9

DevOps isn’t a single technology or a specific methodology. Nor is it a field of computer science or business management. Think of it as a movement toward the seamless integration of enterprise application development and the IT production environment.

The goal of DevOps is to tear down the silos that have separated the worlds of application development and system operations within corporate IT departments. It also represents an effort to more closely align IT and business goals.

The payoff will be to bring about high-quality business solutions that make companies more innovative and…

Read Full Article →

News

Jun 8

Micro Focus, a leading provider of enterprise application modernization, testing and management solutions, has announced that one of Australia’s largest higher education institutions, Deakin University, has successfully deployed its Silk suite of testing tools.

Deakin University is one of Australia’s top ten universities, with 44,000 students, including 8,000 international students, and over 3,600 staff members. Deakin is renowned for excellent teaching, innovative course delivery and a student-focused culture, earning it a first place in student satisfaction in the state of Victoria and third in Australia. The University’s CIO, William Confalonieri, won CIO of the…

Read Full Article →

News

Jun 8

Aspera On Demand Enables the Fast and Secure Transfer of Proprietary Integrated Circuit Designs to and from the Nefelus Cloud Platform

IBM has today announced that Nefelus, a provider of integrated circuit (IC) design tools, has selected Aspera, an IBM company and creators of software that moves the world’s data at maximum speed, to speed the transfer of extremely large design files to, from and through the cloud. This enables IC designers to quickly and securely move proprietary files – which can…

Read Full Article →

Operating Systems

Jun 6

Have you ever wondered if your Linux on System z-specific settings are still correct after a security update or an operating system upgrade? Are you puzzled about what buffer count value should be used with QETH devices for optimal performance? If the answer to these and similar questions is yes, don’t worry, the Linux Health Checker (LNXHC) tool is here to help.   The LNXHC tool is available for Linux on System z distributions and helps identify potential problems that could arise due to deviations from certain Linux on System z best practices.

The LNXHC…

Read Full Article →

Blog

Jun 5

IBM is dead serious about flash storage and they are enabling just about everything for flash: the DS8000 family, San Volume Controller, EasyTier, Real-time Compression (RtC), and more.  Of particular interest to the Entrerprise Systems Media audience should be the recently announced DS8870 all flash enclosure.

Storage in general is changing fast. Riding Moore’s Law for the past two decades, storage users could assume annual drops in the cost-per-gigabyte. It was as predictable as passing GO in Monopoly and collecting $200. But with that ride coming to an end, companies like IBM are looking elsewhere…

Read Full Article →

IT Management

Jun 4

Recently, I was asked to create a seminar on risk avoidance and business continuity planning for software-defined data centers (SDDCs). I found the request vaguely amusing, since I’d been saying for some time that SDDCs were nothing new; that since I entered “data processing” back in the early ’80s, we had always architected data center infrastructure, services and processes to meet the needs of business applications and databases. In other words, we had always had software defining our data center. 

That wasn’t what the SDDC evangelists wanted to hear,…

Read Full Article →

Blog

Jun 2

It’s a tough time to be an US-based technology multinational in China. Sure, there has always been the risk of intellectual property theft and concerns about local copycat companies popping up overnight, but for the most part, those concerns were mostly for companies that make cheap consumer goods, not tech giants like IBM. Sure, the Communist Party of China built a “Great Firewall” to censor the flow of information and monitor domestic traffic for dissent, but this has mostly impacted Internet firms such as Google, which…

Read Full Article →

Security

Jun 2

As computer threats evolve, so, too, do security controls and the standards around them. In 2011, the U.S. National Institute of Standards and Technology (NIST) issued a document titled “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths,” which outlines a path of migration and upgrade for existing network security infrastructure. It specifically recommends changes in algorithm usage and an increase in the key lengths required for cryptographic operations within a particular timeline.

For example, the use of public-key cryptography for connecting two systems securely has used a default key length of 1024…

Read Full Article →

Operations

May 30

The article “Architecting for a Private Cloud: From Caching Framework to Elastic Caching Cloud Platform Service” (available at http://entsys.me/f2ivm) discussed an elastic caching service for private clouds. Interestingly enough, the majority of questions and feedback we received were actually related to the subject of private clouds rather than elastic caching. The spectrum of views and opinions was remarkably wide, including suggestions that private clouds don’t really exist; i.e., clouds can only be public. This article explores the subject of private cloud as well as the drivers and technologies behind it,…

Read Full Article →

Applications & Databases

May 28

Concurrency is a critical performance aspect of any database application. While there are many options available to improve it, one of the more recent features that has quietly made its way into DB2 for LUW and z/OS is concurrent access resolution. This feature can dramatically improve the concurrency and performance of some applications, but it does come with a price. A careful understanding of how concurrent access resolution affects query result sets, how it may impact database size and performance, and when it works and doesn’t work are critical when using this feature. This is especially…

Read Full Article →