Back to Article List      Back to NaSPA.com

2001 Index of Articles

January 2001

FEATURES

Evaluating CWS as a Web Enablement Solution: Part I
By Jim Leinbach

Web-to-Host Technology in Real World Applications
By Anna Hunt

Bringing Web-to-Host into the Enterprise
By Steve Bireley

ARTICLES

Getting Started with Microsoft Internet Information Services (IIS) 5.0
By John E. Johnston

Perl for Windows NT Administrators
By Robert Mangold

An Introduction to NetWare 5.1 Web Services
By Susan Eisenhard

Enterprise Printing with Linux: Part I - The Basics of Linux and Generic Unix Printing Systems
By Adam Thornton

COLUMNS

MVS TOOLS & TRICKS

Tapes and Their Labels
By Sam Golob

STORAGE STRATEGIES

Running in Place - Static Conversion to SMS
By Steve Pryor

WORKING SMARTER

Colorful Editing Revisited
By Jim Moore

ENTERPRISE NETWORKING

The Microsoft .NET Enterprise Servers
By John E. Johnston

e-BUSINESS IN THE ENTERPRISE

A Perspective on CPS and CP: Part II
By Guy C. Yost

VSE TOOLS & TECHNIQUES

Changing the Time on a VSE System
By Leo J. Langevin

NT/2000 INSIGHTS

Securing Your Windows 2000 Web Site
By Aram Taleporos

INDUSTRY INSIGHTS

Distributed I, Centralized T
By Mark Lillycrop

TOP


February 2001

FEATURES

Network Data Management Protocol (NDMP) and Network Attached Storage (NAS) Protect the Bottom Line
By Ira Goodman and Susan G. Friedman

Storage Management from MVS to "z" - New Features in OS/390 Release 2.10 and Beyond
By Steve Pryor

ARTICLES

Evaluating CWS as a Web Enablement Solution: Part II - Creating Web-Aware Applications for CWS
By Jim Leinbach

Using BeOS to Ease the Installation, Support and Troubleshooting of Linux on Intel Desktops
By David Goeke

Understanding Line Data Formats
By David Staal

Practical Uses for the NetWare Enterprise Web Server
By Susan Eisenhard

Enterprise Printing with Linux: Part II - Advanced Printing and S/390 Resources
By Adam Thornton

COLUMNS

MVS TOOLS & TRICKS

Defining Dataset Characteristics
By Sam Golob

STORAGE STRATEGIES

What Level is Your Playing Field? -- Getting System Information
By Steve Pryor

WORKING SMARTER

SDSF/ISPF Primer: Part I
By Jim Moore

ENTERPRISE NETWORKING

Using a Simple Trick to Make Your Web Site Stand Out
By John E. Johnston

VSE TOOLS & TECHNIQUES

Writing Your Own REXX Functions - Simplified
By Leo J. Langevin

NT/2000 INSIGHTS

Microsoft Small Business Server -- Emphasizing the "Small" in "Small Business"
By Aram Taleporos

INDUSTRY INSIGHTS

The Best and Worst of Times?
By Mark Lillycrop

TOP


March 2001

FEATURES

A Spotlight on Batch Tuning
By Avi Kohn

Microsoft Directory Synchronization Services
By Susan Eisenhard

ARTICLES

The First Step in Mainframe Cryptography: TN3270E with SSL
By Thierry Falissard

Who Are Your IT Customers Anyway?
By Guy C. Yost

Mainframe Performance Tuning: Fear and Loathing vs. Substantial Benefits - Part 1
By Howard Beale

Is C# for Real?
By John E. Johnston

Enterprise Mail Servers: Part I - Incoming Mail
By Adam Thornton

An Introduction to REXX for OS/390 Users
By Lionel B. Dyck

COLUMNS

MVS TOOLS & TRICKS

ISPF Interfaces for MVS Programs
By Sam Golob

STORAGE STRATEGIES

Running a Tight Ship: Concerns in Storage Administration
By Steve Pryor

SDSF/ISPF Primer: Part II
By Jim Moore

VSE TOOLS & TECHNIQUES

Writing a REXX Function to Set a STEM
By Leo J. Langevin

NT/2000 INSIGHTS

SQL Server 2000: Data Center Certified
By Aram Taleporos

INDUSTRY INSIGHTS

What Has the Web done for Us?
By Mark Lillycrop

TOP


April 2001

FEATURES

Examining Business Transaction Services in CICS TS Release 3
By Jim Moore

Accessing a SQL Database From a Web Application
By John E. Johnston

ARTICLES

Managing a VSE Console Under VM From a Remote Location
By Dan Askew

Mainframe Performance Tuning: Fear and Loathing vs. Substantial Benefits - Part II
By Howard Beale

Enterprise Mail Servers with Linux: Part II - Supporting POP3 Clients
By Adam Thornton

SDSF: Add-ons to Enhance the User Experience
By Lionel B. Dyck

COLUMNS

MVS TOOLS & TRICKS

The Art of Zap
By Sam Golob

STORAGE STRATEGIES

What's Real? Device Formats and Data Types
By Steve Pryor

Useful ISPF Tips
By Jim Moore

VSE TOOLS & TECHNIQUES

Paging Via VSE
By Leo J. Langevin

NT/2000 INSIGHTS

Whistler and Windows XP: The Next Generation of the Windows Desktop
By Aram Taleporos

INDUSTRY INSIGHTS

Storage Management: Making Data Work
By Mark Lillycrop

TOP


May 2001

FEATURES

The Solid-State Disk Comes of Age in Storage Area Networks
By Woody Hutsell

Virtual Tape: IBM and StorageTek Offerings - An Update
By Lloyd Christensen

ARTICLES

Enterprise Mail Servers with Linux: Part III - Remote Mailbox Access Using IMAP
By Adam Thornton

Managing Your Desktop Backup
By John E. Johnston

Recycling System Programs
By Bob Reinke

How to Route VM Hosted Linux Through TCP/IP: A User Experience
By Paul Newton

COLUMNS

MVS TOOLS & TRICKS

Using Systems Programmer Tools with Application Programmer Authority
By Sam Golob

STORAGE STRATEGIES

What's in a Name? Standards Naming and Coding Conventions
By Steve Pryor

The Language Environment Debug Tool
By Jim Moore

ENTERPRISE NETWORKING

How to Create an Animated GIF
By John E. Johnston

VSE TOOLS & TECHNIQUES

Delivering PDF Documents from VSE
By Leo J. Langevin

NT/2000 INSIGHTS

Windows XP: Whistler Professional Beta 2
By Aram Taleporos

INDUSTRY INSIGHTS

Keeping up with Performance
By Mark Lillycrop

TOP


June 2001

FEATURES

Microsoft .NET in the Enterprise: An Integration Focus
By Harald G. Nehring

Microsoft's .NET strategy, Microsoft's architecture for generating new Internet-based applications, defines the way future Windows applications for the enterprise will be built.

Using Perl WIN32::ODBC to Populate a Microsoft SQL Server Database
By John E. Johnston

The steps illustrated in this article will show you how to automatically populate a Microsoft SQL Server database using Perl. Perl is used to extract and parse information from a command line utility. SQL data manipulation statements will then be issued from the Perl script to update a SQL database table.

ARTICLES

What Does the z/Architecture Mean to Mainframe Users?
By Steve Thompson

The new IBM z/Architecture, which includes the z/OS and the z/900 series machines, provides many new features and takes mainframe computing to a whole new level.

Enterprise Directory Servers: Part I -- What is an Enterprise Directory and How To Design a Directory Tree
By Adam Thornton

This article concentrates on the planning and organizational steps necessary to create a Lightweight Directory Access Protocol (LDAP)-based directory service.

How the Environmental Record Editing and Printing Program (EREP) Can Help You Solve Problems Quickly
By Tom Bryant

By creating your own EREP library of various jobs, you can isolate OS/390 problems quickly, saving more time for other tasks. This article examines the different types of EREP jobs and when to run each, and provides several problem-solving tips.

COLUMNS

MVS TOOLS & TRICKS

Figuring Out That Module
By Sam Golob

VSE TOOLS & TECHNIQUES

VSE Development on Your PC
By Leo J. Langevin

STORAGE STRATEGIES

The Golden Oldies: IEHLIST
By Steve Pryor

WORKING SMARTER

Microsoft Windows Techniques in Mainframe Emulators
By Jim Moore

ENTERPRISE NETWORKING

Using Perl to Write to the Windows NT/2000 Event Log
By John E. Johnston

NT/2000 INSIGHTS

Windows 2000 Terminal Server Licensing
By Aram Taleporos

INDUSTRY INSIGHTS

High-End Linux -- At What Price?
By Mark Lillycrop

TOP


July 2001

FEATURES

XML-Enabling CICS Applications for e-Business
By Russ Teubner

A new generation of host integration products solves the problems of screen scraping and data recognition by converting returned host data into XML for use by other server applications. Using XML preserves the business logic of the host applications and provides an industry-standard means of exchanging data between host applications and any other XML-enabled applications.

Java 2 Enterprise Edition: The Fountain of Youth?
By Al DeVito and Michael Ross Murphy

This article examines how a software developer used J2EE to make the features of its mainframe software product, which was developed several years ago, available through a web browser.

ARTICLES

Enterprise Directory Servers: Part II - Installing and Configuring OpenLDAP on Linux/390
By Adam Thornton

This installment focuses on how to implement Acme's enterprise directory within its framework.

Network Storage Resource Management Secrets From the IT Departments of Major Corporations
By Elizabeth M. Ferrarini

These case studies examine how leading IT departments of major corporations use storage resource management tools to handle space constraints. These tools allow IT professionals to distribute shared storage, keep storage usage under control, and educate users on shared storage strategies.

Configuring IBM's WebSphere Application Server
By John Baird

IBM's WebSphere Application Server provides the ability to run e-Business applications from within the S/390 or z900 platform. It executes within the HTTP Server and provides support for connecting to existing Enterprise Information Systems such as CICS, IMS and DB2.

Linux vs. Windows 2000: The Pros and Cons
By Erik Hughes

During the past year, Linux has elbowed its way to the front of public attention, bringing with it numerous supporters as well as detractors. However, is Linux the best solution for everyone?

Product Review: VMware Workstation, Version 2.03 for Windows NT/2000
By Guy C. Yost

This review evaluates VMware Workstation, which is designed to allow multiple workstation operating systems to run on a single physical workstation. Unlike most product reviews, however, this review focuses on the business case, return on investment (ROI), and vendor marketing claims.

COLUMNS

ENTERPRISE NETWORKING

Winrep: The Windows Report Tool
By John E. Johnston

NT/2000 INSIGHTS

Migrating Servers to New Hardware - Some Aspirin Please
By Aram Taleporos

WORKING SMARTER

Bit-Testing the Signature Bytes of an LE/COBOL Load Module
By Jim Moore

VSE TOOLS & TECHNIQUES

VSE/ESA: A Look at the Present and Future A Recap of the the z/VM, VSE and Linux on IBM Enterprise Servers Technical Conference
By Leo J. Langevin

PERSPECTIVES IN STORAGE

Is Tape Dead? What's Old is New
By Ira Goodman

MVS TOOLS & TRICKS

EBCDIC to ASCII
By Sam Golob

STORAGE STRATEGIES

Big Blocks and Big Iron -The Large Block Interface
By Steve Pryor

INDUSTRY INSIGHTS

"Hetero-Genius" Systems
By Mark Lillycrop

TOP


August 2001

FEATURES

Computer Security in the Small Business Environment
By Nat Maple

Computer security is an issue for all businesses, large or small. By understanding the small gaps in their security systems as well as the solutions available for addressing such risks, small businesses can deploy the same enterprise-class protection that their corporate counterparts enjoy.

Inside a Microsoft Security Flaw
By John E. Johnston

It is imperative that security administrators implement the latest patches to correct problems and minimize security risks. Security administrators can also protect their systems by using software products that can help identify possible network security exposures.

ARTICLES

To Lease or To Buy? That is the Question
By James P. Murtagh, Ph.D.

Leasing offers many benefits and can provide IT managers with a cost-effective way to finance IT projects.

How to Manage Job Workload Across Multiple Applications and Platforms
By Denise Villari

Today's business environment has created a demand for a new era of enterprise job scheduling to control production job workload and schedule complex business processes across multiple applications and platforms.

Understanding Workload Manager: Basic Metrics
By Gerhard Adam

This article examines some of the basic Workload Manager (WLM) metrics used to define service objectives, including Importance Levels, Service Objectives, and the Performance Index.

Enterprise Directory Servers: Part III -- Getting Data Into and Out of OpenLDAP
By Adam Thornton

This article examines LDAP Data Interchange Format (LDIF) files and how to populate your database with the entities you define in them. The author also investigates some client tools so that you can begin to use with the database that you have created.

COLUMNS

ENTERPRISE NETWORKING

Cross-Platform Printing: Unix to Windows 2000
By John E. Johnston

WORKING SMARTER

Reader Feedback
By Jim Moore

MVS TOOLS & TRICKS

Assembler Programming Revisited
By Sam Golob

STORAGE STRATEGIES

Fixing it Yourself: PATCH Commands
By Steve Pryor

VSE TOOLS & TECHNIQUES

SDL Swapping is Alive and Well
By Leo J. Langevin

NT/2000 INSIGHTS

Windows XP Server: When and Why?
By Aram Taleporos

INDUSTRY INSIGHTS

The Mainframe: A Strategic Platform for the Future?
By Mark Lillycrop

TOP


September 2001

FEATURES

How to Tell Your ASP (Active Server Page) from a Hole in the Ground: Part I —
Setting up the Back End

By Mark Rider

This article, which presents a real-world example of a data-driven Web site that uses Active Server Pages (ASPs), describes the structure of a database and demonstrates how you can create your own database by defining data types to populate your tables and how you can restrict access to the information contained in this database.

Optimizing Your JCL for Efficient Resource Utilization
By Linda Custer

With JCL optimization, there is consistency and uniformity for efficient batch processing and maintenance. Optimizing the JCL will provide an opportunity for gaining performance improvements and fully utilizing computer and people resources.

ARTICLES

Enterprise Directory Servers: Part IV — LDAP Client Tools
By Adam Thornton

This month’s installment examines a standalone LDAP client for Linux and briefly sketches out a way to build a Web interface to LDAP using the Apache http server, mod_perl, and Perl’s LDAP modules.

Five Steps for Developing a Software Deployment and Management Strategy
By Graeme Greenhill

Software management can provide a long-term fix to persistent support problems that constantly drain technical support assets. A well-executed software deployment and management strategy can save substantial technical support time, effort and dollars.

A Step-by-Step Approach to Using Windows 2000 Folder Redirection
By John E. Johnston

Windows 2000, in conjunction with Active Directory, provides Folder Redirection, which enables the network administrator to redirect certain folders from the end user’s desktop to a Windows 2000 server. This feature helps to ensure that important data that would normally reside on the end user’s workstation is backed up with your normal server backup process.

Monitoring HFS Performance with DFSMS 1.5: Part I
By Clark L. Kidd

The heart of the OS/390 UNIX file system is the Hierarchical File System (HFS). Although DFSMS 1.5 vastly improved HFS performance and added some new controls for tuning these data sets, most of these new controls have not been well documented and explained. This article examines the basic HFS internal structure and some of the significant performance and operational improvements that were added by DFSMS 1.5.

Linux on S/390 or zSeries: Getting Started
By Lionel B. Dyck

How do you learn enough about Linux to install and begin using it? This article will attempt to help you with that process. Although this article will not give you all the information you need to be an expert, after reading this, you should have an idea of what you can do and where to begin.

COLUMNS

NT/2000 INSIGHTS

Caffeine-Free Microsoft
By Aram Taleporos

STORAGE STRATEGIES

A File by Any Other Name Dataset and Catalog Aliases
By Steve Pryor

ENTERPRISE NETWORKING

Obtaining a Core Dump from a NetWare Server
By John E. Johnston

WORKING SMARTER

Quick and Simple SORT Tips: Part I
By Jim Moore

VSE TOOLS & TECHNIQUES

Accessing ICCF Information with REXX/VSE
By Leo J. Langevin

MVS TOOLS & TRICKS

Navigating the CBT Tape Collection
By Sam Golob

INDUSTRY INSIGHTS

Turn That Light Out!
By Mark Lillycrop

TOP


October 2001

FEATURES

How to Use Novell Script for NetWare
By John E. Johnston

This article demonstrates how to set up and use Novell Script for NetWare (NSN) from within a Web page, using the NSN Shell, directly from the NetWare Server Console, and as a Netware Loadable Module (NLM).

Installing Samba on Linux for S/390 and zSeries: Part I — An Introduction to Samba
By Adam Thornton

Samba is obviously a boon to organizations with heterogeneous environments containing both Linux (whether S/390-based or not) and Windows machines. Samba enables both file and print sharing and Windows-style authentication, so it becomes an easy and effective way to leverage resources on large systems for transparent access from Windows clients.

ARTICLES

Telling Your ASP (Active Server Page) from a Hole in the Ground:
Part II — Displaying the Database Information

By Mark Rider

This installment demonstrates how to display the information you created in Part I using Active Server Pages (ASPs) and Structured Query Language (SQL).

Monitoring HFS Performance with DFSMS 1.5 - Part II
By Clark L. Kidd

With the background provided in Part I, you should now be prepared to examine some common HFS performance problems, and determine how to detect and correct them.

TDS Brings TCP/IP Management in Out of the Rain
Vital Signs VisionNet Lets Telecom Provider Generate Up-to-Date Reports on its TCP/IP Stack
By John Kador

Installing Linux on a S/390 in LPAR Mode: A User Experience
By Chris Delap

This article, which is based on an actual Linux S/390 implementation install, provides the installation basics and describes the effort required for a vanilla Linux system install to DASD.

Improving Windows 2000 Performance with Disk Defragmentation
By Stephanie Greschuk

With more and more companies adopting the Windows 2000 operating system for their enterprise, defragmentation technology is playing an increasingly vital role in maintaining systems at peak performance.

COLUMNS

STORAGE INSIGHTS

Plan Ahead: A Backup Needs Questionnaire
By Ira Goodman

ENTERPRISE NETWORKING

Automatic Email Reporting
By John E. Johnston

STORAGE STRATEGIES

Tying Things Up: Serialization Issues in Backup and Recovery
By Steve Pryor

WORKING SMARTER

Quick and Simple SORT Tips: Part II
By Jim Moore

VSE TOOLS & TECHNIQUES

Protecting Your VSE Site from Hackers
By Leo J. Langevin

MVS TOOLS & TRICKS

Learning About MVS from SMF Records and the IBM Manual
By Sam Golob

INDUSTRY INSIGHTS

Where Software Leads, Services Will Follow
By Mark Lillycrop

TOP


November 2001

FEATURES

Remote Control Enhances User Support
By David Scott

While anytime-anywhere computing is a boon for both employees and businesses, it can also bring unique challenges for support personnel. Remote control software helps address these challenges, as it represents one of the most effective alternatives to traditional support methods by enabling IT professionals to do more than simply visualize a user’s PC.

Resolving Dial-in Support Problems
By Dale Murphree

Remotely supporting clients in a reliable manner can be cumbersome for many support professionals. This article examines the considerations for implementing remote access and examines ways to resolve some of the problems that dial-in support personnel may face.

Curing the Remote Access Headache
By Richard Whitehead

A server-based computing architecture provides a proven, cost-effective foundation for remote access and management. Deployed in conjunction with a VPN, a server-based computing solution enables single-point administration, support and monitoring of remote users and centralized application management; accommodates broad diversity in devices and connections; and reduces costs through increased IT efficiency.

ARTICLES

Installing Samba on Linux for S/390 and zSeries: Part II — File Sharing and Printing with Samba
By Adam Thornton

This month’s article examines file and print sharing via Samba, and provides a glimpse of how authentication can work in a mixed Windows/Linux environment.

Dialog-Based C++/MFC Programming for Beginners
By John E. Johnston

Learning to program Windows applications using Visual C++ and the Microsoft Foundation Class (MFC) library can be difficult. However, this tutorial provides the tips and tricks necessary to simplify this process.

Report Distribution in a VSE Environment: A User Story
By Dan Askew

This article examines three free solutions the author came up with to make mainframe reports distributed to the user via FTP, email or HTTP appear like network printed or Web-oriented documents.

Telling Your ASP (Active Server Page) from a Hole in the Ground: Part III — More Security and Display Options
By Mark Rider

This article, the last in this series, presents some queries that will enable you to add information to the database using ASP, and some scripts that help keep the site a little more secure.

COLUMNS

ENTERPRISE NETWORKING

Using the Windows NT/2000 Alerter Service to Send Email Alerts
By John E. Johnston

MVS TOOLS & TRICKS

TSO Basics: Revisited
By Sam Golob

WORKING SMARTER

Moods for Moderns: COBOL Old and New
By Jim Moore

WINDOWS INSIGHTS

Got Remote Email?
By Aram Taleporos

STORAGE STRATEGIES

What’s Up Doc? The Event Notification Facility
By Steve Pryor

INSIGHTS

A Mainframe By Any Other Name
By Mark Lillycrop

TOP


December 2001

FEATURES

Writing to the Windows 2000 Event Log from a Win32 Console Application
By John E. Johnston

Writing records to the Windows Event Log can be a very convenient way to track the success or failure of a given process.

Storage Virtualization: The Next Big Wave in Storage
By Bob Lai

Storage virtualization is a powerful concept for storage. It provides the basis for opening up proprietary storage designs as well as adding storage features across vendor boundaries. It benefits enterprises with lower costs of ownership while providing a single image of storage for the enterprise. Its framework for future storage innovations makes it an ideal platform.

ARTICLES

JES2 and a Million Jobs: A JES2 Migration Story from an ISV Viewpoint
By Mike Puiu

As this author highlights, the version of JES2 that ships with z/OS 1.2 has some very significant changes, both internal and external.

Relocating Data Using DF/DSS
By Tom Bryant

The author demonstrates how to dump, restore and use the copy-with-rename procedure on data sets and groups of data sets, and examines the JCL comments of the coding samples that he has provided.

Dynamic File Allocation with COBOL
By Ed Watson

With the advent of COBOL 2.2.0 and Language Environment (LE), the COBOL compiler has finally entered the 21st Century. It is now possible to perform dynamic file allocation within a COBOL batch program without calling an external SVC99 routine.

How to Create a Disaster Recovery Plan Before Trouble Strikes
By Elizabeth M. Ferrarini

Using this template as a guide, the key individuals in your organization can prepare a disaster recovery plan that is aimed at restoring all critical business functions.

Installing Samba on Linux for S/390 and zSeries: Part III — Replacing Microsoft Primary Domain Controllers with Samba
By Adam Thornton

This concluding article examines the necessary steps to replace a Windows NT Domain Controller with Samba.

How to Set Up a Network Management System Without Breaking the Bank
By Stephanie Greschuk

As this case study demonstrates, an understanding of the basic steps involved in getting the network management system up and running will help an administrator prepare for and manage the software after installation.

COLUMNS

STORAGE STRATEGIES

Are You Being Served? The Amazing DEVSERV Command
By Steve Pryor

WORKING SMARTER

A Classic Legacy
By Jim Moore

ENTERPRISE NETWORKING

Cool New Stuff in NetWare 6
By John E. Johnston

MVS TOOLS & TRICKS

Virtual Tapes
By Sam Golob

INDUSTRY INSIGHTS

Taking Control of e-Commerce
By Mark Lillycrop

TOP