Back to Article List      Back to NaSPA.com

2003 Index of Articles

January 2003

FEATURES

eBusiness Integration: Leveraging Legacy Systems Using Web Services to Provide a Single Interface for Integrating Legacy Systems
By Diego Alfarache and Anna Hunt

With the flexibility of today’s development tools, you can easily create a Web service that works with a legacy application and delivers host-based data to any other application and Web services. Now, you can leverage your legacy investments by integrating them with other data sources, seamlessly and efficiently.

The Best Freeware Utilities
By Maria Piech

There are several freeware products, both open source and from independent software vendors (ISVs), which have proven themselves to be stable, useful tools. The author takes a look at the more popular ones and presents tips on using these tools.

ARTICLES

An Introduction to the IBM Merge Tool
By Larry Kahm

Sometimes source code differences can get the better of all of us. Here’s a new IBM program product that helps resolve these differences.

Linux Do-It-Yourself: Part IX — Electronic Mail and Mailing List Software
By Adam Thornton

This month, Penny will install a mail transport system, set up several methods by which her users can access their mail, and set up a pair of Web-accessible mailing lists for the benefit of Ice Floe Housing’s customers.

Centralized Information Alerts (CIA) Easing the Security Management Burden by Gathering All Alerts into a Central Location
By Michael Patterson

Proactive system security management requires tools to aggregate, assemble and manage the information available from all of these monitoring devices and alerts.

COLUMNS

MVS TOOLS & TRICKS

Tricks with Tapes: Part II — Tape Copying Tricks
By Sam Golob

WORKING SMARTER

ISPF V5 Potpourri
By Jim Moore

STORAGE STRATEGIES

Problem-Solving with ALLOCxx
By Steve Pryor

CAREER CORNER

How Fight Age Discrimination
By Rick Nashleanas

TOP


February 2003

FEATURES

Penguins in Space: NASA Relies on Linux Clusters to Manage Satellite Data Processing
By Drew Robb

Although Linux clusters are considered new to many fields, scientists at NASA's Jet Propulsion Laboratory have been relying on them to process satellite data about Earth and weather.

Basic Linux DASD Configuration Under z/VM
By Dennis Johnson

An OS/390 systems programmer converts PC servers to Linux instances running on the mainframe, learning much along the way.

ARTICLES

Using the z/OS SNMP MIB to Solve Performance Problems
By Nalini Elkins

Enter the world of SNMP and z/OS MIB and learn which MIB variables to use to successfully troubleshoot problems.

Linux Do-It-Yourself: Part X - Setting up a Web Server
By Adam Thornton

This month Penny will begin to customize her Web presence, installing Apache and making her mailing lists accessible on the Web.

Securing the Last Mile in Corporate Security: Web Applications
By Steve Orrin

This article explores the make-up of Web applications and their vulnerability to attacks and addresses ways to protect the Web application layer.

COLUMNS

MVS TOOLS & TRICKS

Tricks with Tapes: Part III — Using EXCP
By Sam Golob

WORKING SMARTER

Recent Additions to ISPF Services
By Jim Moore

STORAGE STRATEGIES

Where's the Data? Obtaining Information from the Catalog
By Steve Pryor

CAREER CORNER

Overseas Outsourcing: Part I - Understanding the Facts
By Rick Nashleanas

TOP


March 2003

FEATURES

Slay the CPU Cyclops! Schedule your Application for MIPS Reduction Surgery
By Jim Keohane

When CPUs need a boost, performance profilers help improve efficiency. Learn how to speed up code that profilers identify.

Storage Management Portals Bring Order to Storage Chaos
By Nigel Turner

The modern storage environment is a chaotic collection of complexity that spans a multitude of platforms, media and applications. Storage Management Portals are the best means to bring simplifications, as they provide a wide range of features that, while common to systems administration, have until recently been foreign to storage administration.

ARTICLES

Discovering Server Properties with Perl and Windows Management Instrumentation
By Kent Manley

This article examines WMI (Windows Management Instrumentation) using Perl on Win32 systems and gives tips on writing scripts to help you gather information about and manage the network environment.

Linux Do-It-Yourself: Part XI - Dynamic Content with PHP
By Scott Courtney

This month we will learn how to use the PHP programming language to build dynamic Web content under Apache.

COLUMNS

MVS TOOLS & TRICKS

A Replacement for MCNVTCAT
By Sam Golob

WORKING SMARTER

Testing ENQ/DEQ Serialization with ISRDDN
By Jim Moore

STORAGE STRATEGIES

What's in a Name? Renaming Datasets
By Steve Pryor

CAREER CORNER

Overseas Outsourcing: Part II - An Action Plan
By Rick Nashleanas

PERSPECTIVES IN STORAGE

The Actualities of Virtual Tape
By Ira Goodman

TOP


April 2003

FEATURES

Network Visibility: Selecting and Implementing a Protocol Analyzer
By Douglas Smith

Closely examines the factors to consider when choosing to purchase a network protocol analyzer and the ways in which to leverage such tools for optimal visibility of remote and local wireless/wired networks.

Solving the Shrinking Batch Window Problem
By Calvin Ross

Explores some of the causes of the shrinking batch window issue and offers solutions that can speed backups and improve application batch processing.

ARTICLES

Customizing CICS: Using the System Programmer Interface
By Russ Evans

Provides tips on using the CICS System Programmer Interface to customize transactions.

Choosing an IP Monitor for z/OS
By Tony Amies

Offers techniques to collect and analyze IP monitoring data and addresses the key questions one should ask when evaluating IP monitoring products.

Reading and Writing Data Using REXX EXECIO on OS/390 and z/OS
By Lionel Dyck

Offers tips on reading and writing data using the REXX programming language and the EXECIO command and concludes with some useful resources on REXX.

Linux Do-It-Yourself: Part XII - Dynamic Web Page Content from PHP and MySQL
By Scott Courtney

This month we focus on how to extract data from a MySQL database into PHP Web pages that automatically display the latest information from a sample database containing a product catalog.

Managing Concatenated System Libraries
By Lionel Dyck

Presents an ISPF application that, when used, will help you update members of your system PARMLIB or other concatenated system libraries.

COLUMNS

HOME AUTOMATION

Make My Life Easier, Please. And While You're At It, Make Me the Envy of All Who Know Me!
By Scott Sherer

MVS TOOLS & TRICKS

TSSO Revisited
By Sam Golob

WORKING SMARTER

The Case for Mixed-Case Source COBOL
By Jim Moore

CAREER CORNER

The New Resume
By Rick Nashleanas

STORAGE STRATEGIES

Unique Function - The Common VTOC Access Facility
By Steve Pryor

SHAREWARE SPOTLIGHT

Shake the Microsoft Habit
By Jim Justen

TOP


May 2003

FEATURES

Death, Taxes and Handhelds - Preparing for the Inevitable
By Drew Robb

PDA use is on the rise. This article offers techniques for setting up databases on handheld devices for the modern enterprise.

Wireless Winners: City of Lincoln Develops Handheld Applications to Help Mobile Government Workers
By Christine Harland Williams

See how the city of Lincoln uses PDAs to improve citizen service by allowing government workers to performa variety of time- and paper-saving tasks.

ARTICLES

What to Monitor in IP on z/OS
By Tony Amies

Last month, we explored techniques for collecting IP monitoring data. This month, we will examine what should be monitored in the system.

Linux Do-It-Yourself: Part XII - Processing Web Forms with PHP and MySQL
By Scott Courtney

This month, we'll learn how to accept data entry and selections from an end user HTML form, process the form in PHP, and return the results to the browser as a pure HTML Web page that is compatible with any browser.

COLUMNS

HOME AUTOMATION

Introducing Alexa
By Radi Shourbaji

MVS TOOLS & TRICKS

The CBT Overflow Tape
By Sam Golob

WORKING SMARTER

Typing Avoidance
By Jim Moore

CAREER CORNER

Stupid Resume Tricks
By Rick Nashleanas

STORAGE STRATEGIES

The Mysterious Media Manager
By Steve Pryor

SHAREWARE SPOTLIGHT

Essential Palm Ware
By Jim Justen

TOP


June 2003

FEATURES

A Firewall Log Analysis Primer
By Corey Merchant

Firewalls can often be important intrusion detection and forensic tools and may have more to tell you security-wise than any other type of system. We'll learn the importance of log analysis and examine today's most popular firewalls - Check Point Firewall I, Cisco PIX and NetScreen.

Securing your Network Perimeter: Check Point FW-I vs. Cisco PIX
By Robert Sharp and Richard E. Weber

This article evaluates two of the industry's most popular firewall platforms - Check Point NG FireWall-I/VPN-I (Virtual Private Network) and Cisco PIX (Private Internet Exchange).

The Blended Threat: Preventing Computer Security's New Nemesis
By Cosmo Battinelli

Viruses have become much more destructive than ever before by combining or blending a number of dangers together. The CodeRed and Nimda worms are examples of these new kinds of blended threats. Learn what you can do to protect your company's data against blended threats.

ARTICLES

ISPF Capabilities via FTP - Without TSO
By Jeff Gallagher

Before, we didn't have the ability to do ISPF-type functions using FTP to access desired files at the host site. Learn how a new software product, ISPF/ftp, gives us the capability.

Linux Do-It-Yourself: Part XIV - A Virtual Shopping Cart Using PHP Session Variables
By Scott Courtney

This month, we'll see how to use session variables in PHP to create an efficient virtual "shopping basket" for the Web site. Let's begin by understanding three things: why we need session variables, how they work in PHP, and why this is a good approach to implementing a Web shopping basket.

COLUMNS

MVS TOOLS & TRICKS

Exploring MVS SAMPLIBS
By Sam Golob

PERSPECTIVES IN STORAGE

Quick SANs of Security
By Ira Goodman

WORKING SMARTER

COBOL and Assembler - Acquiring the SMF-ID
By Jim Moore

CAREER CORNER

Proving What You're Made Of
By Rick Nashleanas

SHAREWARE SPOTLIGHT

Free Security Software
By Jim Justen

TOP


July 2003

FEATURES

Job Scheduling is not Just for Job Schedulers
By Bob Pyette

Use of automated job-scheduling systems has been common in the mainframe world since the early 1980s. While many companies limit the use of the job-scheduling system to job schedulers and operations staff, others are seeking new ways to re-purpose their job-scheduling system. This article explores some of these different ways and shows you how to exploit the technology, reduce costs and maximize your return on investment.

Free Windows-Based Security Tools for Assessing and Monitoring Security on Your Network Resources
By Richard E. Weber

Make the most out of free Windows security tools. This article offers an analysis of ten free tools that will help you monitor and secure your network.

ARTICLES

Linux Do-It-Yourself: Part XV - Easy E-Commerce with PHP
By Scott Courtney

Building on the previous articles in the series, the author will demonstrate how to build PayPal forms using PHP and MySQL and how to extract data from the catalog.

Market Demands Drive XML Middleware
By Brian C. Reed

Can XML and middleware logically fit together into a new category called XML middleware? Let's explore how these technologies affect the IT industry.

Image is Everything: Deploying Software and Maintaining System Stability at Allstate Insurance
By Dan Osborne

In this article, we'll look at the dispersed state of the network at Allstate Insurance, which has thousands of offices spread throughout the country - great for business, but a disaster in the making for IT. Learn how Allstate's methods and use of disk imaging keeps the network stable and moves software out to remote sites.

COLUMNS

PRODUCT SHOWCASE

EBSCO Industries: Quality Assured
A Case Study

MVS TOOLS AND TRICKS

Athleticism In Systems Programming
By Sam Golob

WORKING SMARTER

A Mixed -Case Edit Macro
By Jim Moore

STORAGE STRATEGIES

Transacting 21st Century Business with Transactional VSAM.
By Steve Pryor

CAREER CORNER

The Frustration Factor
By Rick Nashleanas

SHAREWARE SPOTLIGHT

Low-Cost Performance Tools for Windows NT
By Jim Justen

SECURITY CORNER

HIPAA Standards
By Rich E. Weber

TOP


August 2003

FEATURES

CICS Transaction Server V2.2 and Threadsafe
By Russ Evans

One of the many features of CICS Transaction Server V.2.2 has been the potential of significant CPU reduction for CICS/DB2 transactions that can be made "threadsafe." Ensuring that a program is threadsafe is difficult, however, because the concept is so new in the CICS environment. This article defines what threadsafe means at the program level and explores the most significant enhancement to CICS - the Open Transaction Environment (OTE).

Stand Out from the Crowd: A Look at Certifications
By David Cannon

As an IT professional, your challenge is to stay ahead in this ever-changing industry. Let's take a look at some of the certifications you might want to consider to help you get ahead and stand out from the crowd.

ARTICLES

How Many Channels? Part one: The Effects of FICON on Channel and Device Performance
By Tom Aurand

The introduction of FICON into the mainframe arena promises significant relief of bandwidth constraints between processor and local peripherals as well as boost in performance and distance. This article will compare the properties of FICON and ESCON and explore the general effects on I/O subsystem performance.

Do-It-Yourself: Introduction to OpenLDAP
By Scott Courtney

What is Lightweight Directory Access Protocol (LDAP)? How does it work, and how can it be used to centralize employee and system information? This article explains LDAP in simple terms and uses the OpenLDAP software to illustrate a hands-on implementation of a company directory.

Emerging Enterprise Desktop Backup Solutions: What You've Been Waiting For
By Todd Mitchell

Backing up enterprise desktops and laptops is a common concern of many IT professionals today. What factors should you consider when determining which enterprise client backup solutions are the best fit for your enterprise? this article presents several key factors to keep in mind.

Are Wireless Applications Ready for Prime Time? Many Say Yes, But Development Hurdles Could Slow Progress.
By John McCormack

Many businesses are moving toward wireless computing, a move that requires a well-defined wireless applications program. In this article, we will address some of the benefits and challenges businesses face as they choose wireless applications.

Product Showcase
By Phil Norcross

Managing TCP/IP Using the New Browser-Based VIP Network Performance Monitor for z/OS 

COLUMNS

MVS TOOLS & TRICKS

Novel Ideas
By Sam Golob

WORKING SMARTER

Language Translation: Part 1.
By Jim Moore

STORAGE STRATEGIES

Keeping Up with the Changes: ACS Routines, Affinity and Dataset Stacking
By Steve Pryor

SHAREWARE SPOTLIGHT

Let Shareware Help You Get in Tune: Part 2
By Jim Justen

CAREER CORNER

What Else Can I Do?
By Rick Nashleanas

TOP


September 2003

FEATURES

Simple Network Vulnerability Testing
By Eric Uner

IT administrators have become too dependent on perimeter defenses. Instead, they should regularly run vulnerability scans against their networks. This article addresses the importance of testing and analyzing your network for security.

I Thought my Network was Secure!
By Richard Williams

In this article, the author asks you to consider the reality of insider risks and threats. Learn tips on protecting your data and systems, including developing a spreadsheet to help you create comprehensive access and restrictions from the “inside out.”

Securing Instant Messaging
By Carey Nachenberg

Instant Messaging (IM) is quickly gaining popularity with the public and with corporate America. Unfortunately, IM was not designed with security in mind. This article addresses IM’s vulnerabilities and offers suggestions to help corporations keep their IM environments secure.

NaSPA Present at Richard Clarke's Keynote Address in Orlando Florida
By Jenny Kasza

NaSPA staff recently had the exciting opportunity to meet Richard Clarke, an internationally known authority on cybersecurity, national security, homeland security and counter-terrorism. Clarke, in his keynote address, somberly warned that we cannot rely on the government to save the critical infrastracture; we have to do it ourselves.

ARTICLES

How Many Channels? Part two: The Effects of FICON on Channel and Device Performance
By Tom Aurand

In a previous article, we compared the properties of FICON with ESCON and examined the general effects on I/O subsystem performance. In this article, we will formulate a method for designing an optimized FICON implementation based on measurements taken from the existing ESCON configuration.

Achieving Economies of Scale in Network Management
By Drew Robb

Economies of scale now make it possible for small- and medium-sized companies to realize the benefits of network management. Learn how one service provider took advantage of current technologies to bring cost-effective network management to its clientele.

Seven-Step Methodology for Managing and Monitoring PeopleSoft ERP Applications
By Robert Groth

In recent years, PeopleSoft Enterprise Resource Planning (ERP) applications have become more widespread and complex. This article provides a methodology for managing and monitoring PeopleSoft ERP applications and putting in place a system that ensures peak performance.

Product Showcase: MacKinney Systems is Turning Heads
By Rusty Swift

COLUMNS

MVS TOOLS & TRICKS

A Fresh Look at the Pds Command Package
By Sam Golob

WORKING SMARTER

Language Translation: Part 2.
By Jim Moore

SHAREWARE SPOTLIGHT

Creating Your Own Networking Swiss Army Knife
By Jim Justen

CAREER CORNER

A Shift in the Job Market
By Rick Nashleanas

TOP


October 2003

FEATURES

How Well Are You Really Leveraging and Deploying Your Software
By William J. Torelli, Jr.

Is your software properly implemented and utilized to its fullest extent? This article provides a detailed assessment process to help you evaluate the efficiency of your software and, in turn, your data center operations.

Developing Web-Enabled REXX Applications on OS/390
By S. Craig Blanchard

REXX is a desirable language for developing some Web-based applications delivered from IBM's HTTP Server on OS/390. This article features several techniques that demonstrate the mechanics of Web-enabled REXX programs at a basic level.

OS/390 and z/OS Freeware Collection
By Lionel B. Dyck

Every systems programmer has a collection of software tools that they rely on. Lionel Dyck shares several of the free software tools for OS/390 and z/OS, written in the REXX programming language, that he has developed over the years.

ARTICLES

Getting Started with DB2 Application Tuning - Part One
By Jim Schesvold and John Irwin

Enabling the Mobile Workforce with Web-to-Host Technology
By Donovan Deakin

Product Showcase: FDR/UPSTREAM - Guardians to zLinux Penguins

COLUMNS

TECHNICAL REPORTS

New "Technical Reports" Column in Technical Support Magazine
By Jenny Kasza

PERSPECTIVES IN STORAGE

Nascent NAS
By Ira Goodman

MVS TOOLS & TRICKS

A Philosophy of MVS Utility Design: Power vs. Safety
By Sam Golob

WORKING SMARTER

Productive ISPF Miscellany
By Jim Moore

STORAGE STRATEGIES

A Robot with Personality? The SMS-Managed Manual Tape Library
By Steve Pryor

CAREER CORNER

A New Equilibrium
By Rick Nashleanas

SHAREWARE SPOTLIGHT

Powerful and Free Tools for Network Analysts
By Jim Justen

TOP


November 2003

FEATURES

Blood Center Archival Records Management - A Radical Approach
By John B. Holder

Many blood centers across the U.S. are required to maintain donor record forms (DRF), resulting in the storage of literally hundreds of thousands to millions of pieces of paper for 10 years. Learn how IT staff at this blood center developed an optical records management system using off-the-shelf components and software at a fraction of the cost of vendor-supplied software and hardware solutions.

Five Things SAN Architects Need to Know About Building a Storage Network Backbone
By Rob Strechay

Today’s storage area networks (SANs) mix elements of storage and application management with high-speed networking. This mix is challenging to organizations implementing long-term SAN strategies. This article will address five major requirements that SAN architects will need to know when building a SAN.

Serial ATA Brings New Value to the Storage Marketplace
By Erik Logan

With storage needs increasingly on the rise, how do you find storage that meets the enterprise’s needs? The answer is the Serial ATA (SATA) standard. SATA is based directly on the ATA standard but has an entirely new bus architecture based on a serial point-to-point link. This article explores the many advantages that SATA has over the current ATA standard.

ARTICLES

The State of Art in Network Autodiscovery
By Andrew Burger

Network autodiscovery allows you a better understanding of network devices and their connectivity. This article addresses the steps necessary to discover, manage and increase the reliability of your network.

Getting Started with DB2 Application Tuning - Part Two
By Jim Schesvold

Part One of this article explained the steps necessary to identify and isolate DB2 application performance constraints. Now that you’ve isolated the problem and determined that it’s DB2-related, you’ll learn approaches and techniques to solve it.

Implementing Re-Use of Internal Components via Enterprise Chamge Management (ECM)
By David Hazlett

In this article, the author explains the benefits of ECM technology and concludes with tips on how your organization can implement a successful re-use program through ECM.

What to Put on your Tuning Fork for a Healthier SQL Server
By Juan Carlos Angel

Is your SQL server working as effectively as possible? This article helps you determine the health of your SQL server and offers tips on maximizing its performance.

Product Showcase: APIAS - The Solution to z/OS Security, Connectivity and Port Management for TCP/IP

COLUMNS

MVS TOOLS & TRICKS

Making Life Complicated
By Sam Golob

WORKING SMARTER

Killer Online Apps Revisited
By Jim Moore

CAREER CORNER

2004 US Job Market is Looking Dreary, But You Can Buck the Trend
By Rick Nashleanas

TECHNICAL REPORTS

Nessus 2.0.8
By Jim Justen

TOP


December 2003

FEATURES

Securing z/OS FTP Server with Control and Data Encryption
By Paul Newton

Today's IT personnel want to learn how to secure business data and intellectual property with easy-to-follow instructions. This how-to article explains the process of implementing z/OS FTP server encryption using several TLS/SSL enabled clients.

ISPF Command Tables for the Average User
By Lionel Dyck

ISPF command tables allow for quick and easy access to frequently used ISPF applications from any ISPF panel. Designed for the systems programmer as well as the average user, this article presents and overview of the standard ISPF tables and will address some add-on tools to provide greater access to the command tables.

ARTICLES

Distributed Trust: Getting Ready for Web Services
By Edwin Lang

How can we use Web services, a widely embraced technology, in a way that makes sense for us long term? This article addresses this very question, framing Privilege Management Infrastructure (PMI) in terms of Web services and from the perspective of standards such as the Security Assess Markup Language (SAML).

Gris Computing Using the Sun Grid Engine
By David Geer

What is grid computing and what can it offer? This article presents the benefits of and theory behind the technology of grid computing and concludes with how-to information on performing an installation.

NaSTEC 17.1 A Success!
By Jenny Kasza

Learn more about NaSPA’s technical education conference, which was held on October 25, 2003 in the Chicago area. This article includes summaries of the presentations.

Hacking 2000
By Jim Rue

If you don’t already modify the system registry, maybe you should consider it. Registry hacks are essential to solving many problems on Windows 2000 and Windows PCs in general, and this article presents tips to help you through the process.

COLUMNS

MVS TOOLS & TRICKS

Everybody's Different
By Sam Golob

WORKING SMARTER

Language Translation - REXX To Assembler
By Jim Moore

PERSPECTIVES IN STORAGE

Clustering and High Availability in a 24x7 World
By Ira Goodman

STORAGE STRATEGIES

Looking at Storage Differently - the DB2 STOSPACE Utility
By Steve Pryor

SHAREWARE SPOTLIGHT

Saved From the Recycling Bin
By Jim Justen

CAREER CORNER

Career Counseling for IT Recruiters
By Rick Nashleanas

TOP