Focus on Application Testing
September 18, 2017
This is the third post in this series on system and application testing on enterprise systems. In this post, I discuss the daunting job of being a mainframe application programmer and how he or she goes about testing. The testing scope can cover everything from deployment of a new release of ISV software to a […]
ArticlesMonitoring and Administration Needed for CICS Effectiveness
September 1, 2017
This article focuses on CICS performance across all platforms. On the mainframe CICS is known as CICS Transaction Server (TS), but on other platforms the product is named TXSeries, and for special functions, CICS Transaction Gateway. All products are developed and supported by CICS development, and are designed to interact with each other via facilities […]
ArticlesIBM Uses Low-Cost Sensors to Help Address Climate Change Issues
September 1, 2017
Natural gas is considered by many to be a cleaner energy source. The downside to natural gas is the methane that is a primary component. If it leaks into the air—estimates suggest approximately 1-2 percent leakage is common at production sites—it absorbs the sun’s heat and warms the Earth’s atmosphere. Methane is estimated to be […]
ArticlesCICS Tools Identify Performance Issues
August 1, 2017
This article focuses on CICS performance. On the mainframe CICS is known as CICS Transaction Server (TS), but on other platforms the product is named TXSeries, and for special functions, CICS Transaction Gateway. All products are developed and supported by CICS development, and are designed to interact with each other via facilities such as CICS […]
ArticlesIBM Z Pervasive Encryption Marks a Paradigm Shift for Security
July 17, 2017
Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]
Get Started With CICS Performance and Tuning
July 5, 2017
This article begins with focus on mainframe CICS but as it progresses, the focus shifts to CICS on all platforms, a progression that matches the product’s development. While techniques discussed are initially mainframe-based and oriented to CICS Transaction Server (TS), most principles and concepts apply to all processing platforms; syntax, parameters and implementation specifics may […]
ArticlesWhy Organizations Should Reconsider Their Current Chargeback Systems
April 1, 2017
Imagine Mary, Fred and George are gathered for a budget meeting with Ellen, their company’s CIO, to discuss another budget shortfall. Ellen asks, “What caused this million-dollar shortfall?” George says, “We think it’s related to the decision by accounting to shift one of their major workloads from our Power Systems* platforms to our VMware tower. […]
ArticlesVirtualization’s Past Helps Explain Its Current Importance
February 6, 2017
With VM celebrating 45 years as an IBM product, it’s a good time to look at the history of virtualization technology. Everyone seems to want to take credit for something IBM invented and brought to maturity about 50 years ago. In this two part article, we will chronical the key milestones in the development of […]
ArticlesAccessing the Data in Core Dumps
January 22, 2006
If you're like most UNIX administrators, you probably have a crontab or some other housekeeping program that regularly searches your systems for core dumps, backs them up (maybe), and then deletes them. This leaves you to try to puzzle out their cause from information contained in the AIX error log. Of course, about half the […]