Application Performance and Tuning
May 14, 2019
As the original author of “CICS Performance Bulletin” published by IBM Dallas System Center, and co-author of the subsequent IBM “CICS TS Performance Guide” in conjunction with IBM Hursley CICS TS Development, performance and tuning has been a big part of my job. I’ve performed more CICS performance studies than I can count, and almost […]
ArticlesREST, SOAP, Microservices, Monitoring and Management
March 25, 2019
There are different aspects of the “outside in” approach, specifically Representational State Transfer (REST) and Simple Object Access Protocol (SOAP).
ArticlesTime to Look at System Maintenance and Replacing Equipment
February 1, 2019
Once a year, it’s important to review the hardware that’s installed—and also the levels of the software that’s installed on those servers. It’s important to stay as current as possible to ensure you have the best security and performance. It’s also critical to be on hardware and software that is still in service. This means […]
ArticlesEnabling Open-Source Continuous Delivery Pipelines
January 1, 2019
IBM Z* Open Development is an entry-level toolset for z/OS* development teams who plan to transform their software delivery practices around a common, automated delivery pipeline. It provides the essential link Z developers need to join a platform neutral, continuous integration and deployment pipeline that’s inclusive of z/OS application components. Neat and Lean Developers must […]
ArticlesThe Right KPIs for Mainframe DevOps
November 1, 2018
To compete in fast-moving, disruption-prone digital markets, enterprises must aggressively embrace DevOps on the mainframe. DevOps is becoming increasingly important, and without it—along with associated agile best practices—delivery on these digital initiatives will be too slow and infrequent to keep pace with escalating customer expectations. To successfully drive adoption of DevOps on the mainframe, IT […]
The Significance of Cybersecurity
August 27, 2018
The foil to cybercrime is cybersecurity—the protection of internet-connected systems including hardware, software and data from cyberattacks.
ArticlesThe Challenge of Making Technical Decisions
August 1, 2018
One of the largest clients I’ve worked with over the years was a paper producer that owned numerous paper mills in Wisconsin that had lost most of their IT staff. It continuously produced several paper types, and if IT operations stopped for more than eight hours, mills would shut down. When a mill shut down, […]
ArticlesThe Significance of Computer Architecture
July 30, 2018
Computer architecture is a powerful idea that influences modern IT.
ArticlesFRAIKIN Group Develops a Flexible Thin-Client Environment
July 1, 2018
UP CLOSE Customer: FRAIKIN Group Headquarters: Colombes, France Business: Fleet-vehicle provider Challenge: Lowering client-side costs while also improving user services Solution: Embracing Google hardware and cloud software to streamline its front-end computing environment, while also maintaining 3270 TE access to IBM Z Hardware: An IBM-owned and hosted IBM Z server; Google Chrome devices Software: SysperTec […]
ArticlesHow DevOps and the IBM Z Digital Transformation Model Accelerate Innovation
July 1, 2018
As consumers’ demands and expectations of technology continue to change and advance, organizations must evolve to keep up. Those that aren’t innovating might be left behind with consumers moving on and competitors moving in. Staying ahead requires transformation. Organizations need a digital transformation strategy in place while providing value to customers. The developer community is […]