Back to Article List      Back to NaSPA.com

2002 Index of Articles

January 2002

FEATURES

Everything You Always Wanted to Know About Choosing a Password Management Solution
By Kevin Bohan

When an enterprise’s password policies become a controlling force, it is time to implement a solution that relegates passwords to their proper place in the enterprise. While password synchronization or password reset alone can provide significant benefits to any organization that is experiencing password problems, a comprehensive solution that provides both synchronization and reset functionality will yield far greater quality-of-life and bottom-line advantages.

Domain Name Service: The Hidden Security Hole
By Stuart Bailey

The positive side of Domain Name Server attacks is that they are preventable, unlike viruses, which first must be identified and deconstructed before a “cure” can be found. The real key to securing your DNS is recognizing the possible points of vulnerability and then taking action.

Security Essentials: Conducting a Security Audit
By Richard Weber

A security audit is a great way for you to get a complete analysis of your company’s security posture. When properly conducted, an audit provides you with a single source for all of your security concerns, as well as an excellent reference and starting point from which to move forward. Additionally, a security audit allows you to prioritize your security upgrades in conjunction with your budget.

A Thumbnail Guide to System Security for Linux: Part I — Basic Faults and Vulnerabilities
By Adam Thornton

This article, the first in a four-part series, examines some basic security issues that must be considered before you develop a secure system.

ARTICLES

Novell’s iFolder
By John E. Johnston

This article examines the features and functions of iFolder, Novell’s new Net services solution for mobile workers, and demonstrates how each component of this product works.

RNEWS: An ISPF News and Announcement Tool
By Lionel B. Dyck

This article examines RNEWS, a tool the author created to enable administrators to easily and effectively send news to ISPF users.

Effective Cross-Product Utilization: A User Story
By Larry Kahm

This article examines how one site incorporated the features of one product with the features of another to create a useful input file for application programmers to use to determine the cause of production batch problems and for debugging.

COLUMNS

STORAGE STRATEGIES

Extending Your Reach: Extended-Format Datasets
By Steve Pryor

WINDOWS INSIGHTS

Upgrading to Windows XP
By Aram Taleporos

WORKING SMARTER

BY REFERENCE — By Example
By Jim Moore

MVS TOOLS & TRICKS

Does Software Use Depend on Its Cost?
By Sam Golob

ENTERPRISE NETWORKING

The Windows ClipBook Viewer
By John E. Johnston

INDUSTRY INSIGHTS

A Mirror View of Service Management
By Mark Lillycrop


February 2002

FEATURES

Putting a Price on Web-to-Host Usage
By Anna Hunt and Dan Price

Web-to-host technology is enabling more and more administrators to save on connectivity costs while expanding the usability of their host-based applications. With the availability of usage monitoring and metering tools, next generation Web-to-host software provides the sophisticated central administration and control features typically found in enterprise software products.

WAN Emulators: A Technician’s Most Valuable Tool
By Benny Daon

WAN emulation tools enable you to recreate the effects of the WAN in a lab environment for testing and monitoring the performance of mission-critical applications. By utilizing this technology, organizations can protect themselves against failed deployment of new applications and greatly simplify the technical support process.

ARTICLES

How You Can Leverage Open Network and System Management Systems To Cut IT Costs
By Michael Patterson

There is a wealth of open source “free” and inexpensive tools available today. These tools are increasingly being used to augment existing management suites. As these utilities are constantly being improved, many now rival the functionality of commercial products in specific areas.

Assembler Coding in the z/OS Environment: Part I
By Mark Hedges

This article presents several z/OS assembler programming housekeeping samples and examines assembler instructions that highlight the progress of the architectural changes since MVS/370.

A Thumbnail Guide to System Security for Linux: Part II — Hardening the Base Installation
By Adam Thornton

This installment explores how to harden a basic installation of Linux, with particular emphasis on securing network services. The basic theme here is two-fold: Do not run what you do not need, and whenever possible, avoid protocols that pass cleartext passwords.

In Search of Jodie Foster
By Scott Sherer

This article examines a way that you can share the processing power of your home computer to help compile research statistics in the search for extra-terrestrial life.

Web Enabling File and Print Services Using Novell’s iPrint
By John E. Johnston

iPrint provides another glimpse of how Novell and NetWare 6 have truly embraced “Web-enabled” file and print services.

The Convergence of Application Servers and Portals
By Wes Carberry

Both application servers and portals can provide varying degrees of user management, although each has its strengths and weaknesses. Because they do have a few unique features, the most comprehensive solution is a two-tiered approach that combines both products.

COLUMNS

ENTERPRISE NETWORKING

It’s About Time
By John E. Johnston

STORAGE STRATEGIES

Getting Something for Nothing: Releasing Unused Space
By Steve Pryor

The Coding Corner

Using ASP and PerlScript to Retrieve Data from a Unix Server
By Justin McLeavy

WORKING SMARTER

AMBLIST: The Load Module Service Aid
By Jim Moore

Storage INSIGHTS

Connecting People With Data
By Ira Goodman

MVS TOOLS & TRICKS

The New “Review”
By Sam Golob

INDUSTRY INSIGHTS

IT Strategy: What Do the Tea Leaves Say?
By Mark Lillycrop


March 2002

FEATURES

Finding a Cure for Data Transfer Ills: A User Story
By James D. Lee

As this user story demonstrates, the problem of how to transfer data from Point A to Point B can be solved by compressing the data before it is transmitted.

Reaping the Benefits of Disk-to-Disk Network Backup Via SANs: A User Story
By Elizabeth M. Ferrarini

As this user story demonstrates, an effective disk-to-disk (D2D) network backup strategy allows a site to restore files instantly and eliminates all points of failure in the backup process.

ARTICLES

Survival of the Fittest: Choosing the Right Path to Enterprise Application Integration
By Cindy Jutras

Companies today are increasingly being challenged to integrate multiple business applications. This growing need for enterprise application integration (EAI) can be characterized by the number three: There seem to be three general reasons for these new challenges, three levels of integration to consider and three approaches to the problem.

The Corporate Monitoring and Response Program
By Jeffrey Z. Johnson & Craig A. Robinson

Along with the benefits provided by new technology and the significant opportunities available through the Web come new risks. To counter such risks, most corporate risk management programs will need to implement a program to identify, assess and respond to computer-based attacks. A properly defined, implemented and managed monitoring and response program (MRP) is an extremely cost-effective, non-obtrusive, risk mitigation technique.

IBM’s Fault Analyzer Makes Abend Detection a Snap
By Larry Kahm

IBM’s Fault Analyzer lets application programmers find errors quickly and easily. It provides them with message and code descriptions to fully explain the errors that were detected. It gives systems programmers a tool for retaining application dumps with the ability to clean up the fault history file on a regular basis. Fault Analyzer is an attractive potential alternative to other vendor products because it supports core mainframe languages and runs in several key environments.

A Thumbnail Guide to System Security for Linux: Part III — SSL-Wrapping Services: A
Working Example

By Adam Thornton

With the aid of a little Linux wizardry, the author demonstrates how to convert a useful but insecure service to an equally useful, but far more secure service. By simply inserting a transparent SSL proxy into the data stream of the connection, you can encrypt a service without requiring any modification to the application providing that service.

Assembler Coding in the z/OS Environment: Part II
By Mark Hedges

This concluding article explores the use of several facilities in IBM’s High Level Assembler (HLA) that make assembler code easier to design and maintain.

COLUMNS

ENTERPRISE NETWORKING

The Windows 2000 Netsh Command
By John E. Johnston

WORKING SMARTER

Debugging ISPF Dialogs: Part I
By Jim Moore

STORAGE STRATEGIES

It’s Only Logical: Logical vs. Physical Backup
By Steve Pryor

MVS TOOLS & TRICKS

Glossaries
By Sam Golob

THE CODING CORNER

Creating Dynamic Web Charts Using Microsoft Office 2000 Web Components
By Justin McLeavy

INDUSTRY INSIGHTS

Show That Man a Mainframe!
By Mark Lillycrop


April 2002

FEATURES

Four Steps to Faster Batch
By Wes Scott

Batch tuning can be an overwhelming project from the start. However, as this author demonstrates, by keeping a disciplined approach to the tuning process, you can take on the analysis of a complicated system of thousands of jobs and turn it into a very manageable endeavor.

Managing CICS Resources from a Windows Environment: Part I
By Ian Stewart

This is the first of a two-part series in which the author describes an application that allows CICS System Definition file (CSD) resources to be manipulated from a Windows environment.

ARTICLES

The Skinny on SCSI
By John Johnston

There is a great deal of misinformation floating around about SCSI. One of the biggest problems is that various hardware vendors use different names for the same SCSI component. Another problem is that it can be very difficult to determine which type of SCSI hardware you need to support a particular device. This article illustrates the differences between SCSI devices and examines the different names that various hardware and software vendors sometimes use for the various SCSI components.

Migrating from CA Top Secret to RACF: A User Experience
By Chuck Clay

More and more shops are deciding, for whatever reason, to migrate from Computer Associates’ Top Secret to IBM’s RACF. However, there are a numerous technical differences between these two products. This article will attempt to shed some light on what it takes to accomplish such a migration.

A Thumbnail Guide to System Security for Linux: Part IV — Using PAM to Consolidate Authentication Domains
By Adam Thornton

Authenticating and authorizing users to employ services is an entirely different aspect of security. However, this can sometimes turn into an administrative nightmare. This article will help you avoid this from happening.

Simplified Software Management for Windows-Based Systems
By Stephanie Nielsen

Software management and license control is no longer a task that can be “put off until later.” Those failing to
inventory software, keep track of license administration, or maintain updates and upgrades may face serious repercussions.

A Secure VPN
By Barry Cioe

As more and more companies turn to VPNs for deploying services over the public Internet, security becomes critical. To that end, it is important to identify the key characteristics of a secure VPN in order to select the most appropriate solution for a specific business environment.

COLUMNS

MVS TOOLS & TRICKS

CBT Tape Software Packaging
By Sam Golob

WORKING SMARTER

Debugging ISPF Dialogs: Part II
By Jim Moore

STORAGE STRATEGIES

Timely Space Management: Interval Migration
By Steve Pryor

ENTERPRISE NETWORKING

Move Over W2K Server: Here Come the Windows .NET Servers
By John E. Johnston

INDUSTRY INSIGHTS

Time for Free Speech?
By Mark Lillycrop


May 2002

FEATURES

Generation X Meets Tyrannosaurus Rex: Working with XML on the Mainframe
By Larry Kahm

This article describes a new feature in each of two venerable mainframe products: the XMLGEN utility in Compuware Corporation’s File-AID/MVS Release 8.8.1 and the XML PARSE statement in IBM’s Enterprise COBOL for z/OS and OS/390 Version 3 Release 1. The former helps generate XML documents; the latter makes it relatively easy to obtain data from these documents.

Building Remote Access Capability into Business Continuity Plans
By Ellen Minter

Providing users with fast, “virtual” access to applications and information necessary to keep the business running is a crucial yet often-overlooked aspect of an organization’s business continuity plan. Implementing a server-based computing system that supports secure, Web-based application deployment can supply the remote access component of a successful plan.

ARTICLES

Linux Do-It-Yourself: Part I — Designing and Implementing a Firewall Server: Firewall Theory & Design
By Adam Thornton

This new series introduces a practical example of a business and its functional needs, and details the steps necessary to implement a network infrastructure for the business using Linux.

A Secure Infrastructure for WebSphere eBusiness Solutions
By Edwin Lang

There are several security considerations that you must address when designing an online application that operates over the public network.

Managing CICS Resources from a Windows Environment: Part II
By Ian Stewart

This concluding article examines the Windows part of the application and concentrates on the Visual C++ code, which displays the Resource data.

COLUMNS

WORKING SMARTER

Debugging ISPF Dialogs: Part III
By Jim Moore

STORAGE STRATEGIES

Share and Share Alike: VSAM Record-Level Sharing
By Steve Pryor

CODING CORNER

Using global.asa to Tighten ASP/SQL Security
By Justin McLeavy

INDUSTRY INSIGHTS

Where Has All the Data Gone?
By Mark Lillycrop


June 2002

FEATURES

Large-Scale Server Backup Services — Part I: Integrating with Core Infrastructure Services
By John E. Johnston

Implementing any large-scale computer infrastructure service is a daunting task. This holds even truer for the implementation of a large-scale backup service. In order to back up thousands of servers each night, the IT department must deploy a rock-solid backup service. This article examines the most critical components required to deploy a very large-scale backup service.

XP for the Enterprise: The Pros, the Cons and How You Can Make it Operate at Peak Performance
By Dan Osborne

The new features and enhancements to Windows XP make it more reliable, scalable and compatible with existing applications.

ARTICLES

Evaluating Managed Security Services
By Jim McLendon

The decision on whether to seek outside help may not be easy. In fact, in today’s high-threat environment, there are strong arguments for both in-house management and outsourced security management. To find the right approach for your company, it is necessary to consider all viable options.

Legacy eBusiness Enablement: Options for Responding to Today’s Technology
By Cindy Jutras

The author draws an analogy between her experiences in the martial arts world and the business world to illustrate the similarities in both worlds and to demonstrate what you can do if your proprietary legacy systems are preventing you from successfully inter-operating within your corporate hierarchy, or across the supply chain.

Linux Do-It-Yourself: Part II — Designing and Implementing a Firewall Server — The Linux ipfw and portfw Packages
By Adam Thornton

In the continuing saga of Penny the Penguin, this article examines the range of packet filtering technologies available to her, delves into the process of selecting an appropriate technology, and begins to consider how Penny can implement this technology.

Legacy eBusiness Enabling: A Business Decision
By Timothy P. Beck

However enabling is accomplished, it should be achieved as a business decision, with technology as the tool, not the driver. While that may not be a traditional IT mantra, it is increasingly becoming a future reality that benefits both business management and a company’s IT department.

How to Parse Command Line Parameters in REXX
By Lionel B. Dyck

While it is one thing to write a program in REXX, it is an entirely different process to enable the program to take command line arguments. This article demonstrates several different techniques you can use to process command line arguments in your REXX program.

COLUMNS

STORAGE STRATEGIES

Dataset Allocation: The Creative Process
By Steve Pryor

ENTERPRISE NETWORKING

Using Microsoft Excel’s Web Query Function
By John E. Johnston

WORKING SMARTER

Debugging ISPF Dialogs: Part IV
By Jim Moore

CODING CORNER

Scripting the Windows Management Instrumentation Feature
By Justin McLeavy

MVS TOOLS & TRICKS

Driven By Necessity
By Sam Golob

INDUSTRY INSIGHTS

Hold on to Your Mainframers!
By Mark Lillycrop


July 2002

FEATURES

Thin-Clients and NetWare?!
By Scott D. Jones

Who would have thought that NetWare could be the nucleus of x-based thin-clients, a task normally left to a Unix flavored server of some sort, or even Windows NT?

Web Enabling CICS Transactions Using VisualAge for Java: A User Experience
By Chuck Clay

This article will demonstrate how to Web-enable a CICS application using the tools available in VisualAge for Java (VAJ) Enterprise Edition, version 4. It will describe the steps to create a servlet and Java Server Page (JSP) that accesses a CICS transaction via the CICS Transaction Gateway (CTG). Additionally, this article will provide an overview of how to implement servlets and JSPs in WebSphere Application Server (WAS) 3.5 for OS/390.

ARTICLES

Linux Do-It-Yourself: Part III — Designing and Implementing a Firewall Server: Implementing the Firewall
By Adam Thornton

Now that Penny the Penguin has settled on her network architecture, decided what IP ranges she will use, and determined what ports to forward to internal hosts, she needs to create the scripts to turn her Linux host into a firewall.

Overcoming Performance Obstacles
By Calvin Ross

It is possible to realize performance improvements and consistent processing efficiency in the OS/390 and z/OS environment using several methods — methods that do not require additional mainframe-expert staffing resources and methods that can reduce constant battles with application development teams. These methods address and overcome the major causes of performance degradation that typically remain unnoticed until peak processing periods: hidden programming errors, improper or inefficient DB2 database calls, and poor use of VSAM
buffers.

Large-Scale Server Backup Services — Part II: Selecting Infrastructure Components
By John E. Johnston

When developing a large-scale backup system, you must pay special attention to the selection of the infrastructure components that will provide the basis for the backup system. These infrastructure components must complement each other in order to provide the best possible throughput.

Getting in Without Getting Permission How to Override NTFS Permissions to Take Control of All Files in Your System
By Philippe Peirano

Regardless of access rights, you can use the process examined here to override NTFS permissions to take control of all files in your system.

RSA Encryption Explained to “T-REXX” Dinosaurs
By Thierry Falissard

By showing how the REXX language can be used to implement the RSA encryption algorithm, the author demonstrates how versatile REXX is, as well as how easy it is to program RSA in a high-level language.

COLUMNS

CODING CORNER

Perl Nuggets
By Justin McLeavy

MVS TOOLS & TRICKS

Retro MVS Computing
By Sam Golob

STORAGE STRATEGIES

Survival of the Fittest: Dataset Deletion
By Steve Pryor

WORKING SMARTER

Code Reuse
By Jim Moore

ENTERPRISE NETWORKING

Just When You Thought the Browser War Was Over...
By John E. Johnston

INDUSTRY INSIGHTS

Reduce Complexity, Reduce Costs
By Mark Lillycrop


August 2002

FEATURES

Internally Securing a J2EE-Based Application Server
By Edwin Lang

This article examines the capabilities in J2EE that provide robust and flexible authentication and authorization features.

Evolving Backup Strategies for Heterogeneous Networks NAS, SAN, iSCSI, NDMP, DAFS, and More
By Soubir Acharya and Susan G. Friedman

There are many new technologies and tools in the pipeline that will aid in meeting the evolving backup requirements of heterogeneous networks.

ARTICLES

Linux Do-It-Yourself: Part IV — The Domain Name System
By Adam Thornton

At this point, Penny will move to the most vital of her externally visible services, which is name resolution. Once she has name resolution set up correctly for everyone, names will resolve to IP addresses and IP addresses will resolve to names.

Product Launch Point: An ISPF Tool to Simplify Local ISPF Menus
By Lionel B. Dyck

Product Launch Point is a table-driven ISPF menu that you can easily update and maintain while providing your users with a searchable, scrollable and enhanced ISPF menu.

An Ounce of Prevention: How to Detect and Prevent Hard Drive Failures
By Joe Zwers

Unexpected disk failure is an expensive proposition. It is not the cost of the drives themselves, but rather the tech personnel time involved in replacing and reloading the disk that can easily outweigh the hard costs. Add in the user downtime, value of lost information and, in the case of externally facing applications, lost customers, and the damage skyrockets.

IT Mythology: Sorting Out the Facts
By Dan Osborne

While urban legends are a lot of fun to share with friends, when it comes to running a network only the facts will do.

COLUMNS

MVS TOOLS & TRICKS

Positions and the Division of Labor
By Sam Golob

STORAGE STRATEGIES

Bigger Can Be Better: Large Volume Support
By Steve Pryor

CODING CORNER

Deploying Smart Tag Lists Using Microsoft Visual Studio.NET
By Justin McLeavy

STORAGE INSIGHTS

Taking Shelter Under the Storage Virtualization Umbrella
By Ira Goodman

ENTERPRISE NETWORKING

Using Smart Tags
By John E. Johnston

WORKING SMARTER

The Meaning of Portability
By Jim Moore

INDUSTRY INSIGHTS

The Meaning of Portability
By Mark Lillycrop

TOP


September 2002

FEATURES

Being a “Good Corporate Citizen” By Enforcing Security Best Practices
By Jeremy Ward

In order to convince governments that a heavy-handed regulatory approach is not necessary, and to influence the future direction of computer security, businesses must be actively involved in the development and use of security best practices. In effect, this means understanding and adopting the basic principles of the information security lifecycle.

Security Issues During a Business Downturn
By Ken Cavanagh

The enterprises that protect their digital assets will be in a better position to weather whatever economic storms may come their way.

Virtual Enterprise Networks - Building a New Business Infrastructure with Directory and Security Services
By Jamie Lewis and Dan Blum

The heterogeneous nature of today’s network environment in many enterprises complicates supporting external relationships. New business models are driving dramatic changes in systems architecture throughout the enterprise data center, especially concerning security. A new identity and access management infrastructure is emerging to leverage both directory and security services.

ARTICLES

Linux Do-It-Yourself: Part V — The Dynamic Host Configuration Protocol
By Adam Thornton

Now that Penny has her internal systems in place, it is time to focus on the systems outside of her gateway computer. This installment addresses how Penny centralizes her network administration function by using DHCP, the Dynamic Host Configuration Protocol.

Overcoming the Obstacles of Windows 2000 Active Directory
By Joe Zwers

Windows 2000’s Active Directory gives the platform wide appeal but adds significantly to the deployment challenge. However, by using Active Directory, metadirectories and middleware, you can make the directory management task more manageable.

Mainframe Performance Reporting Using RMF Spreadsheet Reporter
By John E. Johnston

This article demonstrates how to implement and use the RMF Spreadsheet Reporter (RMFPP), which is a set of applications and Excel macros that reside on your workstation, to generate charts that graphically illustrate the performance of your mainframe system(s).

Using the LISTING Macro to Produce Reports in Microsoft Word
By Larry Kahm

This article demonstrates how you can use a Microsoft Word macro to process mainframe reports and print them on a local or LAN printer.

COLUMNS

CODING CORNER

Writing Outlook Macros Using Visual Basic
By Justin McLeavy

STORAGE STRATEGIES

Give Me Some Space: LSPACE Processing
By Steve Pryor

MVS TOOLS & TRICKS

Recovery Tools
By Sam Golob

WORKING SMARTER

Initial Edit Macros
By Jim Moore

INDUSTRY INSIGHTS

Keeping the Organization Up and Running
By Mark Lillycrop

TOP


October 2002

FEATURES

The Growing Importance of Business Integrated Batch Scheduling
By Amos Marom and Einat Weiss

Over the years, numerous technologies tried to alleviate the need for batch processing and batch integration. However, the demand for batch integration has increased. Nevertheless, today, batch processing continues to fulfill its traditional role while operating in an increasingly complex environment. This requires a new type of scheduler to manage the batch integration of business transactions and processes across multiple platforms and applications.

Managing the Performance of Integrated IT Environments: 10 Tips for Working Smarter
By Brian Collins

One of the most under-utilized aids in staying ahead of the IT curve is the effective use of monitoring and management solutions. A periodic review of these tools and practices can help organizations not only keep pace with the most dynamic IT environment, but effectively anticipate and accommodate future IT development — all while achieving even higher levels of performance right now.

ARTICLES

Linux Do-It-Yourself: Part VI — Windows File, Print, and Authentication
By Adam Thornton

The task this month is to set up a Windows NT-style domain and configure Penny’s server so that it becomes an authentication source and file-and-printer-sharing nexus.

Using GLUEs and TRUEs in CICS
By Russ Evans

One of the reasons for the enduring popularity of CICS is its ability to be tailored to fit the needs of each shop. This article briefly describes two of CICS’ more powerful customization facilities — Global User Exits (GLUEs) and Task Related User Exits (TRUEs) — and how you can use them to manage events with CICS.

Virus Protection: The Triad of Armor — Part I: The Workstation
By Scott Jones

Virus protection and prevention are important tasks for system administrators. This article, the first in a threepart series, examines how to protect one cornerstone of the IT environment — the workstation — and prevent malicious attacks.

COLUMNS

ENTERPRISE NETWORKING

Centralized Application Logging in a Windows Environment
By John E. Johnston

STORAGE STRATEGIES

Fitting It All In: Expanding Control Structures
By Steve Pryor

CODING CORNER

Microsoft Agent 2.0
By Justin McLeavy

WORKING SMARTER

The Edit Profile Tool
By Jim Moore

MVS TOOLS & TRICKS

Developments in Free MVS Software
By Sam Golob

INDUSTRY INSIGHTS

How Trustworthy is IT?
By Mark Lillycrop

TOP


November 2002

FEATURES

The Virtual Real-time Data Mart: Freeing Mainframe Data from its “Jail”
By Ron Hankison

A Virtual Real-time Data Mart can enable organizations to quickly, easily and cost-effectively utilize their legacydata for more accurate strategic decisions, thus leveraging their investments in mainframe computing.

An Enterprise Guide to Windows XP’s Built-in Tools
By Robert Heege

While Microsoft should be applauded for attempting to satisfy the user community by building so many tools into its operating system, these tools are mainly of value to mobile and home office users. When it comes to systems and network management though, you are better served by proven third-party utilities than are specifically designed with the enterprise in mind.

ARTICLES

Linux Do-It-Yourself: Part VII — Backup and Disaster Recovery
By Adam Thornton

This month, Penny will address the issue of preserving data in the event of disk failure. She will select a backup product and implement a strategy.

Tearing Down the Berlin Wall Between Business and IT
By Bill Nash and Dutch Holland, PhD

In many companies, the relationship between business and IT can be strained when both are not on the same page. Business value results could be tremendously improved if the Berlin Wall between a company’s business side and its IT department were torn down.

Project Management & Business Value: Making the Vital Connection
By Bruce Litwin and Chuck Toups

Building high performance teams and successfully completing or “killing” projects is all a matter of establishing the correct environment — with the objectives, goals and measurements to reach them. The transformation of an IT project organization from a support role to a business enabling function is within reach.

Virus Protection: The Triad of Armor — Part II: Protecting the Network Server
By Scott D. Jones

COLUMNS

STORAGE STRATEGIES

Making the Connection: DFSMShsm Fast Subsequent Migration
By Steve Pryor

MVS TOOLS & TRICKS

Thoughts About Assembler Macros
By Sam Golob

WORKING SMARTER

Debugging ISPF Edit Macros: Using Dialog Test
By Jim Moore

ENTERPRISE NETWORKING

Visual Trace
By John E. Johnston

INDUSTRY INSIGHTS

The Best Show in Town
By Mark Lillycrop

TOP


December 2002

FEATURES

Migration Strategies with Transparent Data Migration Facility: A User Story
By Chris Evans

This article examines how the author used a transparent data migration facility tool to perform large-scale data migration.

Fibre Channel SAN Topologies in an Open World: A Primer
By Jim McKinstry

SANs have emerged as a standard architecture for corporate IT environments. Therefore, it is important to understand the technologies behind the architectures, the features and benefits of each, as well as where SANs come from and where they are going.

Outsourcing Provides Options for Backing Up Open Systems Reliably
By Elizabeth M. Ferrarini

Backup Service Providers enable small organizations with limited IT resources to put distributed server backups, restores and media vaulting into the hands of backup experts. Also, BSPs provide organizations with a way to reliably back up servers in remote offices where there are no IT resources, or as a way to rectify an out-of-control backup environment.

ARTICLES

Linux Do-It-Yourself: Part VIII — Installing Hercules and Debian Linux for S/390
By Adam Thornton

This month, Penny’s nerdy cousin, Pfennig, shows you how to install Hercules and then set up a network installation of the Debian Linux distribution on it. In addition, he provides pointers to resources allowing you to run other operating systems on Hercules.

Database Performance Optimization Made Easy
By Diane Beeler and Ignacio Rodriguez

Maintaining database performance and availability is a challenging task. Many events can affect database performance. Once these events occur, it is important to diagnose and resolve these issues quickly and easily. This article examines the steps a DBA can take to handle performance problems.

Virus Protection: The Triad of Armor — Part III: Preventing Viruses from Entering the Network
By Scott Jones

As this article illustrates, you can use one of two methods to prevent viruses from entering your network.

COLUMNS

MVS TOOLS & TRICKS

Tricks with Tapes: Part 1 - Tape Concepts
By Sam Golob

WORKING SMARTER

Mainframe Help on the Internet
By Jim Moore

PERSPECTIVES IN STORAGE

Simplification, Standardization, Centralization: A “tion”-Filled Year
By Ira Goodman

STORAGE STRATEGIES

System-Managed Mystery: How is Storage Managed?
By Steve Pryor

TOP