Skip to main content

Sort by
Articles

Focus on Application Testing

Joseph Gulla

September 18, 2017

This is the third post in this series on system and application testing on enterprise systems. In this post, I discuss the daunting job of being a mainframe application programmer and how he or she goes about testing. The testing scope can cover everything from deployment of a new release of ISV software to a […]

Articles

Monitoring and Administration Needed for CICS Effectiveness

Jim Schesvold

September 1, 2017

This article focuses on CICS performance across all platforms. On the mainframe CICS is known as CICS Transaction Server (TS), but on other platforms the product is named TXSeries, and for special functions, CICS Transaction Gateway. All products are developed and supported by CICS development, and are designed to interact with each other via facilities […]

Articles

IBM Uses Low-Cost Sensors to Help Address Climate Change Issues

Jim Utsler

September 1, 2017

Natural gas is considered by many to be a cleaner energy source. The downside to natural gas is the methane that is a primary component. If it leaks into the air—estimates suggest approximately 1-2 percent leakage is common at production sites—it absorbs the sun’s heat and warms the Earth’s atmosphere. Methane is estimated to be […]

Articles

CICS Tools Identify Performance Issues

Jim Schesvold

August 1, 2017

This article focuses on CICS performance. On the mainframe CICS is known as CICS Transaction Server (TS), but on other platforms the product is named TXSeries, and for special functions, CICS Transaction Gateway. All products are developed and supported by CICS development, and are designed to interact with each other via facilities such as CICS […]

Articles

IBM Z Pervasive Encryption Marks a Paradigm Shift for Security

Evelyn Hoover

July 17, 2017

Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]

Articles

Get Started With CICS Performance and Tuning

Jim Schesvold

July 5, 2017

This article begins with focus on mainframe CICS but as it progresses, the focus shifts to CICS on all platforms, a progression that matches the product’s development. While techniques discussed are initially mainframe-based and oriented to CICS Transaction Server (TS), most principles and concepts apply to all processing platforms; syntax, parameters and implementation specifics may […]

Articles

Why Organizations Should Reconsider Their Current Chargeback Systems

Roger Rogers

April 1, 2017

Imagine Mary, Fred and George are gathered for a budget meeting with Ellen, their company’s CIO, to discuss another budget shortfall. Ellen asks, “What caused this million-dollar shortfall?” George says, “We think it’s related to the decision by accounting to shift one of their major workloads from our Power Systems* platforms to our VMware tower. […]

Articles

Virtualization’s Past Helps Explain Its Current Importance

Bob Rogers

February 6, 2017

With VM celebrating 45 years as an IBM product, it’s a good time to look at the history of virtualization technology. Everyone seems to want to take credit for something IBM invented and brought to maturity about 50 years ago. In this two part article, we will chronical the key milestones in the development of […]

Articles

Accessing the Data in Core Dumps

Mark J. Ray

January 22, 2006

If you're like most UNIX administrators, you probably have a crontab or some other housekeeping program that regularly searches your systems for core dumps, backs them up (maybe), and then deletes them. This leaves you to try to puzzle out their cause from information contained in the AIX error log. Of course, about half the […]