Back to Article List      Back to NaSPA.com

2004 Index of Articles

January 2004

FEATURES

Managing Code Changes
By Joseph Caughman

Learn how Joseph Caughman developed the FUSION code management system to manage the migration of complicated coding changes. This code migration tool uses the existing components of the MVS system, mainly REXX/ISPF and the SUPERC comparison utility. The tool reduces the time spent ‘cutting and pasting’ code from one module version to another and provides a two-tier comparison routine that lets the programmer verify the results of the compare.

A Look at HFS Sharing
By Nico Rizzuto

HFS sharing was introduced with OS/390 V2R9, allowing you to share file systems in read-write mode across several systems and allowing unrestricted access to all data regardless of the filesystem mount point. Let us discover what HFS sharing can do and the advantages of implementing it.

ARTICLES

REXX Concepts and Applications
By Bruce Woodworth

Designed for beginners, this article covers the REXX (Restructured Extended Executor) language in a mainframe environment, offering tips, tools and tutorials to help you write useful REXX execs.

Security's Last Stand: Isolation
By Aubrey Mansfield

This article argues that network security has failed, and that the main factor contributing to that failure is the conflict between security and connectivity, which are opposite sides of the same spectrum. This article offers tips to boost your organization’s network security and explores the advantages of a separated network.

z/OS Report Distribution via Electronic Mail for the z/OS User
By Lionel B. Dyck

As MVS evolved into OS/390 and now z/OS, there has been more interest in getting reports to users without user intervention and without wasting paper. Lionel Dyck shows you how to make report distribution more convenient and gives you tips to save time and money.

Data Integration without the Hassle
By Yves de Montcheuil

Data integration no longer has to be an overwhelming task. Doing your homework will help you. This article presents factors to consider, including traditional approaches, hidden costs, platform considerations, and many other issues to bear in mind when choosing data integration solutions.

Protecting the Bottom Line with Good Planning and the Right Technology
By Bill Margeson

As businesses become more global and continue to embrace the Internet, they face intrusion vulnerabilities. Solid continuity planning, and the necessary technology to achieve it, becomes critical at all levels of the organization. This article addresses ways to avoid the threat of data loss, exploring a solid plan and the latest technology.

Product Showcase: DASD Backup and Administration Automation
By Terry Siegrist

An Automated Solution for Stacking and Recovering Full-Volume and Incremental Backups Using DASD Backup Supervisor.

COLUMNS

TECHNICAL REPORTS

New VMWare: Virtually Seamless
By Jim Justen

WORKING SMARTER

ISPF Edit and Picture Strings
By Jim Moore

MVS TOOLS & TRICKS

"Playing"
By Sam Golob

TOP


February 2004

FEATURES

Curing the Legacy Migraine: Implementing a Successful Migration Plan
By Craig Abramson

A migration project involves a huge amount of planning in order to be successful. This article addresses the many considerations surrounding legacy migration, including deciding on the best method to convert legacy data, determining how to rebuild a component or entire application on the new platform, and other key decisions that need to be made before you get the job done.

Packaging z/OS Open Source (and other) Software for Electronic Distribution
By Lionel B. Dyck

Learn how to package z/OS software from Lionel Dyck. This technique will also work for any package that you want to distribute electronically. Although there are many ways to package your code, this article focuses on one specific technique that Lionel finds helpful.

ARTICLES

Migrating to Windows 2003?
By Larry Cushing

The Gordian Knot of Antivirus Software: A Sad State of Affairs
By Jim Rue

Netstat Statistics Comparison with Perl
By Noah Davids

Product Showcase
By Bob Shimizu

COLUMNS

MVS TOOLS & TRICKS

Modularizing an MVS System - Part One
By Sam Golob

WORKING SMARTER

ISPF Edit - Understanding Edit Bounds
By Jim Moore

SHAREWARE SPOTLIGHT

Help for Information Overload
By Jim Justen

TOP


March 2004

FEATURES

Web Services: Overcoming the Legacy Integration Barriers
Peter Havart-Simkin

Over 80 percent of the information essential to business still resides on legacy systems, including IBM mainframes, Unix servers, DEC VAX minicomputers, IBM AS/400, and others. This article offers a look at legacy integration, some common barriers, how some shops handle it, the role of Web services, and the use of host integration tools so that enterprises can create Web services that work with existing systems.

A z/OS Problem-Solving Methodology: Speeding up the System After Making Use of GRS Wildcard Support
Charles MacNiven and Tobias Dörkes

This article explores what two mainframers did after discovering a performance problem within GRS and MIM during the migration from OS/390 2.10 to z/OS 1.2. They take us step by step as they recognize the problem, identify the major cause of it, and take action to correct it.

ARTICLES

Certifications for Systems Administrators
Shawn Conaway

There is a tremendous increase in the number of certifications available today. Should you get certified? Shawn Conaway explores the reasons why people get certified and takes a close look at the offering of certifications related to operating systems, including Microsoft, Novell, Sun, Apple, Linux, and more.

Report Writer Speedup Tips--Part One
Tom Purnell

Did you realize that how you write your report writer queries has a big impact on how fast they run? Most mainframe shops have at least one report writer utility. Report writers can be a wonderful productivity tool for programmers. They help you quickly put together one-time, ad-hoc reports and are appropriate tools for developing production reports. This article presents techniques you should use when writing your report writer queries to help them run as fast as possible.

Getting the Most out of the Windows Server 2003 Family
Joe Zwers

This article examines the new Windows Server 2003 operating system, its advantages and disadvantages, and how it compares with other operating systems like Linux, NT and Windows 2000. It will also present some add-ons that are designed to help you maximize your investment.

A Look at Unicode and COBOL
Sasirekha Cota, Tata Consultancy Services

Some IT experts have predicted that COBOL would die out, but some new applications are being built in COBOL. Although Unicode is the default in Java, it is now entering the COBOL world only. This article defines Unicode, explains what COBOL offers in terms of Unicode support, factors to consider before using Unicode, and the benefits of using it.

Hacking Exposed: A Book Review
Jim Justen

COLUMNS

MVS TOOLS & TRICKS

Modularizing an MVS System - Part Two
By Sam Golob

PERSPECTIVES IN STORAGE

iSCSI, UiSCSI, WIll We All iSCSI?
By Ira Goodman

WORKING SMARTER

ISPF Edit - The Reset Command
By Jim Moore

CAREER CORNER

Job Searching on the Internet: Pitfalls to Avoid
By Kathy Bornheimer

TOP


April 2004

FEATURES

REXX Concepts and Applications: Writing REXX Utilities
Bruce Woodworth

“REXX Concepts and Applications” in the January, 2004 issue of Technical Support magazine covered REXX from a beginner’s viewpoint. This more advanced article covers the writing of an actual REXX utility. This article features the utility TRAPCMD.REX, a good place to start when you’re trying to automate processes.

Introduction to Disk and File Virtualization
Paul Newton

Disk and file virtualization, built upon storage area network (SAN) technology, can help you cheaply and effectively manage future storage capacity in the enterprise. This article introduces the technology and benefits of disk and file virtualization.

ARTICLES

Report Writer Speedup Tips--Part 2
Tom Purnell

In the March, 2004 issue of Technical Support magazine, we presented six speedup tips to help your report writer queries run faster. We saw how even minor changes in the way you write your query can have a big impact on how fast it runs. This month, we will look at more report writer speedup tips, which are related to efficient file processing.

Security Certifications
Shawn Conaway

Information security spans many different roles and responsibilities. Growth in the available number of security certifications now provides enough variety for IT professionals to choose a certification that best meets their career goals. Why not get a security certification to validate your skills? This article provides details on the many different security certifications available today.

Instant Messaging--Forever Blowing Bubbles
Jim Rue

Many employers realize that Instant Messaging (IM) is often used in ways that increase productivity, and many have embraced one means of IM or another for business purposes. However, while many employers continue to use IM in the workplace, substantial dangers remain. This article provides an in-depth look at this widely accepted technology, including its history, pros and cons and future.

COLUMNS

TECHNICAL REPORTS

A Look at Cole Software's z/XDC™
By chris Blaicher

MVS TOOLS & TRICKS

Modularizing an MVS System: Part Three
By Sam Golob

WORKING SMARTER

ISPF Edit: Fast Cursor Positioning
By Jim Moore

SHAREWARE SPOTLIGHT

Instant Messaging: Can't We All Just Get Along?
By Jim Justen

TECHNO PIONEERS

The Merry Prankster of Computing: Steve Wozniak
By Jim Rue

CAREER CORNER

Creative Materials for the Job Search
By Kathy Bornheimer

TOP


May 2004

FEATURES

The Role of Trusted UNIX in Corporate Computing
By Jeff McGrath

With the increase in system attacks and vulnerabilities, operating system security is more important than ever. The leading UNIX operating system vendors have attempted to provide an additional level of security to sensitive organizations with their “trusted versions.” Trusted versions do provide stronger security, but there are limitations. This article explores trusted UNIX operating system versions and their vulnerabilities.

Logging onto TSO with ISPF on Multiple LPARs in the Same Plex with the Same Userid under z/OS 1.4+
By Lionel B. Dyck

With the availability of z/OS 1.4, IBM has removed one of the restrictions that prevented using the same TSO userid on more than one system within the same JES2 MAS or Sysplex. It is now possible to logon to TSO on more than one LPAR in the same JES2 MAS or Sysplex with the same TSO userid. ISPF does not support this new capability, so while you can logon to TSO on multiple systems, you can only use ISPF on one of them. Lionel Dyck presents several options you have in dealing with these problems.

ARTICLES

Certifications Part Three: Programming Certifications
By Shawn Conaway

Pursuing a programming certification has many benefits, including helping you strengthen your programming skills, getting you programming experience, improving your marketability and maybe even helping you earn more money as a consultant. Shawn Conaway takes a close look at the many programming certifications available in the IT industry today.

Have Skills, Will Travel
By Edward Denzler

Although the job economy has been rocky for the last few years, we may be seeing a light at the end of the tunnel. IT professionals wanting to get on the fast track to jobs need to get in shape now--polishing up skills, getting the training they deserve, and seeing where the openings are. Let's take a look at three areas of IT where opportunities exist for qualified professionals—security, Windows and open source.

Two Heads are Better Than One: A Team Approach to Estimating
By Bob Pyette

Whether you are a systems programmer implementing a new subsystem, an applications programmer rewriting a legacy application, or a systems analyst employing a new process, we all need to estimate projects. This article will help you take some of the guesswork out of estimating and improve the accuracy of the estimates you provide. The method proposed involves some solid estimating principles and suggests that a team approach is needed to achieve the best workload estimate.

Do-It-Yourself: Authenticating Web Users in PHP
By Scott Courtney

We've been looking at many tips and techniques that you can use in PHP. Now we'll learn how to authenticate Web visitors in PHP as a starting point for building a secure, personalized Web site.

COLUMNS

MVS TOOLS & TRICKS

What's Foremost in your Mind
By Sam Golob

WORKING SMARTER

ISPF Edit: Line Labels
By Jim Moore

TECHNICAL REPORTS

Diskeeper 8.0 by Executive Software
By Jim Justen

TECHNO PIONEERS

Toy Story
By Jim Rue

CAREER CORNER

Multiple Ramifications of Offshore Outsourcing: Part One
By Kathy Bornheimer

TOP


June 2004

FEATURES

Cracking Open the Shell: UNIX Commands for the Novice
By Bob Pyette

Even experienced mainframers may need to know some UNIX as part of their day-to-day job. This article will help you familiarize yourself with the UNIX environment. It will introduce some terminology, explore some of the most useful UNIX commands for the novice, and offer practical examples for using them.

Ensuring Your JCL Batch Business is Protected: A Three-Step Approach for Disaster Recovery
By Doug Berg

No one wants a disaster, but knowing that you have a successful disaster recovery plan in place lets you focus on immediate critical business issues without worry. This article takes a close look at the three key areas in a batch operations disaster recovery plan-- documentation, testing and automation--and offers tips on each one.

ARTICLES

Mainframe Security: Challenges and Solutions
By Rob van Hoboken

Security threats to the mainframe are a real threat to the mission-critical services and information typically found in the glass house. This article emphasizes the unique issues surrounding mainframe security, including challenges with staff and what makes mainframes particularly vulnerable. It concludes with recommendations to improve mainframe security.

27/24: The New Challenge in Data Integration
By Dave Richmond

We’ve all heard of 24/7 processing, but how about 27/24 processing? This article presents the challenges surrounding a large mainframe shop using mainly DB2 and VSAM as they search for solutions to their data capture, data volume and latency issues.

IT Employment Trends: Analyzing the 2003 Data and the Future
By Dr. Ed Anthony

The NaSPA 2003 salary survey is now complete. NaSPA board member Dr. Ed Anthony takes time to analyze the results and gather information about the issues our members face in the current IT job market and what these results could mean for the future.

Table Processing Part One: A New Approach
By Mark Yuhas

This first article in a two-part series addresses search routines with a focus on binary search routines. It presents a variety of tips and techniques, including when to map the tree; input, editing and retention of table entries; and sorting table entries.

Tag, You’re It! HTML Markup Made Easier with Cascading Style Sheets!
Larry Kahm

Everyone needs to have their documents look a certain way while keeping their pages easy to modify and the internal processing code down to a minimum. This article explains how and concludes with a demonstration of how CSS can be used to format the HTML in a manner that separates content from presentation.

Book on Disk Storage and the Software Used to Manage it Offers Good Information
By Bruce A. Woodworth

This is a book review regarding disk storage and the software used to manage it.

COLUMNS

MVS TOOLS & TRICKS

CBT Tape: New Contributions
By Sam Golob

WORKING SMARTER

ISPF Edit: Useful Edit Techniques
By Jim Moore

PERSPECTIVES IN STORAGE

Information Lifecycle Management (ILM) Hits Its Stride
By Ira Goodman

SHAREWARE SPOTLIGHT

Save Your Money and Save Your Data
By Jim Justen

CAREER CORNER

Multiple Ramifications of Offshore Outsourcing: Part Two
By Kathy Bornheimer

TECHNO PIONEERS

Dollar Bill Gates
By Jim Rue

TOP


July 2004

FEATURES

Looping for Performance: A Tuning Methodology
By Greg Scriba

The loop control structure is the most often used control structure in programming today. This article suggests using the loop structure in our daily performance analysis to find the largest users of a system resource. It will introduce a simple method of “looping” through the SMF data and present a new means of quickly getting through the data and turning it into information.

ARTICLES

Table Processing Part Two: A New Approach
By Mark Yuhas

This second article in a two-part series addresses more steps in the methods of table processing. In this step-by-step article, we will examine how to create the tree structure using general and specific cases, how to verify the mapping, and how to generate the source.

A Step-by-Step Guide to Sysplex
By Arun Kumaar Ramachandran

Sysplex, or system complex, is a set of MVS (rather OS/390 or z/OS) systems that cooperate to process workloads. This article is designed for beginners who wish to learn how to implement sysplex. We will begin with a brief introduction to sysplex, explore its benefits, and show how to implement it.

A Modern Approach: Using Disk-based Backup as a Compliment to Tape-based Backups
By Steve Fairbanks

Whether to use tape or disk-based backup solutions has been an ongoing issue for many companies. This article explores the possibility of retaining the cost-effectiveness and investments made in tape without having to sacrifice the speed, convenience and ease of disk-based backup and recovery.

Integrating Mainframe and Mid-Range Host Applications with SOA and the .NET Framework
By Peter Havart-Simkin

The .NET framework and Windows 2003 server offer the ideal platform for building new mid-tier applications based on a Services-Oriented Architecture (SOA). One of the challenges is to leverage existing host-based applications in these new applications, as existing business processes are a fundamental part of SOA. This article will examine the options available today to bring existing host applications into SOA.

Tag, Youre It! HTML Markup Made Easier with Cascading Style Sheets
By Larry Kahm

Everyone needs to have their documents look a certain way while keeping their pages easy to modify and the internal processing code down to a minimum. This article explains how and concludes with a demonstration of how CSS can be used to format the HTML in a manner that separates content from presentation.

Mainframes Ride ZIP into the Security Game
By S. Tait Hamiel and Ron Perrotta

Successful business rely on their systems to capture data on customers, their buying patterns and their preferences. Suppliers and manufacturing systems are automated and sophisticated, giving businesses the ability to use manufacturing efficiencies to gain a competitive advantage. With the emphasis on technology and data, security has become a pressing issue for business and organizations large and small. Encryption applications provide the enterprise with the means to transparently enforce security policy, without requiring changes to current business processes or end-user behaviors.

Book Shows That Network Security Can Be Achieved Without Ulcers
By Ray Bagby

This author gives a "very good" rating to the book "Network Perimeter Security: Building Defense In-Depth" by Cliff Riggs instructing readers how network security can be achieved without ulcers or tearing out your hair.

COLUMNS

TECHNO PIONEERS

Douglas Engelbart: Inventor of the Computer Mouse and Other Internet Technologies
By Dr. Judy Serwatka

MVS TOOLS AND TRICKS

Measuring and Accessing Tape Data
By Sam Golob

WORKING SMARTER

How ISPF Edit Works
By Jim Moore

TECHNICAL REPORTS

Personal Firewalls; your last Bastion? ZoneAlarm Pro 5.0.59
By Jim Justen

CAREER CORNER

Successful Interviewing Tips
By Kathy Bornheimer

TOP


August 2004

FEATURES

Reduce Your Spam Now!
By Jill Jones

By using a variety of anti-spam techniques, business can and will minimize spam and its costs-reduced productivity, burdened IT resources, and end-user frustration. By staying on top of spammer activities and adjusting your multi-method approach accordingly, you’re sure to stop spam in its tracks.

ARTICLES

New Life for Big Iron
By Peter Cousins

Today, many mainframe applications remain isolated in an increasingly heterogeneous IT landscape. In the not too distant future, maintenance and development of these systems will give rise to problems, not the least of which are related to the aging IT workforce. A way out of the dilemma is the transformation of mainframe application into network-centered services, which can be seamlessly integrated into a decentralized, distributed architecture.

ISPF Edit Spelling Checker
By Lionel B. Dyck

For the mainframe user there have been spelling checkers available as ISPF Edit commands that used an external program, either Script (DCF) or SAS, to do the spell checking and then report back the results. As of May 2004, there is now a free, open source (under the GPL License), spelling checker for ISPF Edit that comes with a list of over 10,000 words and works fairly well.

The Overlooked Security Exposuer: Inappropriate File Use - And How to Address It
By Jenny Periolat

If you have just one opening in your network security, you and your network operations are vulnerable. An opening that is often overlooked is unmanaged use of files and applications. Popular applications like peer-to-peer and instant messaging often proliferate unchecked, as employees install them on the networks. This article discusses the use of file-use-filtering as an affordable, critical extension to their desktop security agent.

What’s Your Security Risk Threshold?
By John Wilson

The increase in complex cyber attacks, along with mounting regulatory requirements, has prompted many organizations to install sophisticated firewalls and intrusion detection systems to keep hackers out and sensitive data secure. While there is a clear incentive for organizations to use sophisticated risk management methodologies in their security posture, clearly quantifying IT risks and reducing capital requirements can be a daunting process. Securing the IT infrastructure has never been a more vital component of day-to-day risk management practices.

What Organizations and Employees Should Know about Information Security
By Adesh Rampat

Organizations must conduct an ongoing training awareness program in procedures and policies to ensure that the corporation’s security policy requirements are being met. This article looks at the most critical areas that both employees and organizations need to examine to ensure that information is safeguarded.

Achieving the Right Level of Technology Through Capacity Planning
By Drew Robb

This article discusses what Capacity Planning is and why it is important to building networks without over-rating forecasts or philosophical visions. 

Laughlin Memorial Hospital Discovers a Treatment for Password Problems: Appliance-Based SSO
By Burt Ridge

Regulatory compliance, the proliferation of passwords and increased help desk costs associated with password policies have escalated Single Sign-On (SSO) to the top of the IT ‘to do’ list. See how this hospital implemented a successful SSO solution.

Fighting Malicious Code
By Bruce Woodworth

Bruce Woodworth reviews Malware by Ed Skoudis, a book loaded with information about protecting work stations and networks against malicious software.

COLUMNS

MVS TOOLS & TRICKS

Anatomy of an MVS Battlewagon
By Sam Golob

WORKING SMARTER

Newer ISPF Techniques
By Jim Moore

CAREER CORNER

Successful Interviewing Tips
By Kathy Bornheimer

TOP


September 2004

FEATURES

Sysplex Set Up with z/VM 4.4
By Ed Arnold and Al Kline

The objective of this article is to explain how to quickly implement a bare-bones guest sysplex environment under z/VM 4.4. Specifically, if you are coming from a non-sysplex environment, this article explains how to enable a basic sysplex system in order to more easily gain an understanding of a sysplex environment.

ARTICLES

Enhancing CLIST, REXX Exec, and ISPF Panel Development
By Lionel B. Dyck

How often, when you are developing or updating CLISTs, Execs, or ISPF Panels, have you wanted an easy way to verify that your updates work? How many times, while working on an assembler program, have you wanted to assemble the program while still in ISPF Edit. This article will present a tool called TRYIT, which can be used to test your JCL, CLISTs, your REXX Execs, your ISPF Panels, and to assemble your assembler programs.

EULA Dancers – End User License Agreements Protect Software Companies from You
By Jim Rue

This article explores the purposes of End User License Agreements and what you should know about them.

The Service Oriented Host (SOH): Your Mainframe Can Participate in the New Services-driven Environment, Just Don’t Take Short-Cuts on the Road to Reusability
By Ron Nunan

There is a lot of excitement around the service oriented architecture (SOA) but also a lot of frustration in the glass house. Beginning with Web Services, mainframes are under attack by lines of businesses that want to extend critical host data and applications out to known and unknown user groups. Beyond the security threats involved with enabling wider mainframe access, there is the issue of how to “transactionalize” your mainframe in the first place. This article explores some of the methods for moving your mainframe safely toward participation in the SOA. The focus is on the merits of different approaches as they relate to the nature of your host applications and the goals of your enterprise.

Security Administration Systems Scare Ghost Accounts
By Dean Veros

This article explores the issue of ghost accounts, accounts that remain active and enabled long after the owner has left the company, and the consequences these have for businesses.

Building An IT Security Roadmap
By Eric Raisters and Donovan Deakin

Today’s electronically wired world is fraught with cybercrime, forcing companies to give more attention to IT security than ever before. The task of securing IT infrastructure – to prevent and recover from attacks and defend against threats – presents complex challenges. There is a great deal of practical thinking and work that companies can do themselves to secure their infrastructure and mitigate risk, and this article discusses these possibilities.

A Crash Course on Wireless Technology
By Elizabeth M. Ferrarini

This article provides information on the utility of wireless technologies for businesses.

COLUMNS

MVS TOOLS & TRICKS

Administering SYS1.BROADCAST
By Sam Golob

WORKING SMARTER

TSO Commands - REXX, CLIST and Assembler
By Jim Moore

TECHNICAL REPORTS

Defrag Manager 3.0 by Winternals Software
By Jim Justen

PERSPECTIVES IN STORAGE

No SAN should be an Island
By Ira Goodman

CAREER CORNER

Growth Industries to Target for Job Search/Career Progression
By Kathy Bornheimer

TECHNO PIONEERS

Larry Ellison - The Last of the Railroad Barrons
By Jim Rue

TOP


October 2004

FEATURES

XML and the Mainframe: Perfect Together
By Rohit Mital

One of the biggest ongoing challenges faced by many companies is the unlocking of the data that still resides in the mainframe so that it can be reused. Existing data is often valuable for making better and timelier decisions and for maximizing a company’s information assets no matter where they reside. The goal is to appropriately share host-based data with customers, suppliers, employees, government agencies and others – all while creating a minimum of new architecture, overhead and infrastructure. To do this most effectively, it’s time to rethink the old techniques and apply them in original ways. One approach, which has been used successfully, is to access the mainframe data by means of an industry-specific XML model used as a global, virtual data layer. Not only can XML help create a logical source from which to begin sharing data among all who need it, XML’s pre-defined vocabulary and information constructs often represent best practices that are just waiting to be implemented, at little or no cost

ARTICLES

Managing and Deploying Software in a Linux Environment
By Mark Post and Rick Troth

According to industry analysts, Linux is the fastest growing operating system, today, as more and more companies are beginning to exploit the cost-effectiveness, stability and scalability of running applications in this type of environment. With the proliferation of Linux, the option of using Open Source software has also increased dramatically. While there are obvious benefits associated with the implementation of Linux and Open Source software, this type of environment also presents businesses with unique deployment and management challenges, especially for those used for mainframe management.

New Approaches for Solving the Data-on-Demand Dilemma
By James Markarian

How an architected approach for mainframe data access and changed data capture takes the complexity cost and risk out of data on demand.

Calling z/OS UNIX Kernel Services
By Steve Comstock

Today, not only is z/OS UNIX available in every shop running z/OS, it is required to be up and running for z/OS to be functional. This means a programmer can call UNIX services from programs written in Assembler, COBOL, PL/I, C, etc. Some of these services are useful even for non-UNIX applications. For example, you can call a "sleep" routine to put your application in a wait state, for a number of seconds, without having to call an Assembler subroutine.

Enterprise Storage Counts on Linux for Data Protection
By Elizabeth M. Ferrarini

Linux is quickly securing a foothold in enterprise data centers as major vendors such as IBM and Oracle throw their weight behind this open source operating system. Increasingly, organizations are adding Linux systems into their environments. In the process, they are incorporating Linux servers into their storage strategies. Storage vendors are following close behind, while interconnect vendors and management software vendors race to catch up.

Using APIs to Write Successful Programming
By Greg Van Pelt

Application programmers write programs that people use for business tasks, such as accounting or payroll, whereas systems programmers write programs such as compilers, operating systems, or servers that let the application programmers to their job. An API is an Application Programming Interface. When a product provides several services or features and an application programmer wants to use these services, the programmer needs a way to ask the product for what he or she wants. This is where an API comes in.

Firefox Browser - It's Not MSIE!
By Jim Rue

The introduction of XML and ASPs opened Pandora’s Box, and virtual home invasion has been a fact of life ever since. But that may be about to change. Firefox, a successor to the Netscape browser, seems to be a rising star

Guidelines for Checking Out Leaks In Your Organization's Security Systems and Programs
By Elizabeth M. Ferrarini

Good information security preparedness requires more that bulletproff data centers and networks. You need to have a sold process in place to detect and highlight any potential problems within the enterprise, within both internal and external corporate networks, and with employees, as well as with IT vendors. A variety of security audits and security assessments done routinely each year can prevent unauthorized entry into an organization’s valuable network and data center systems. This article describes the different types of security audits and security assessments you need to do and the deliverables you need to provide to management.

Outsourcing Backup & Disaster Recovery
By But Stoddard

Most executives are familiar with traditional tape or disk backup and as a result, most companies employ one of these for their data protection and often outsource parts of this process. However, an essential component to any fail-safe disaster recovery or business continuity plan is having an effective and secure off-site backup and recovery solution. Tapes become useless if they’re left on-site and a fire destroys the company or if an employee takes them home every night and is unable to retrieve them when necessary. Luckily, with many recent technological advances in the area of storage and storage management there are a number of new technologies and services available which can better address data protection as compared to traditional solutions.

COLUMNS

TECHNO PIONEERS

The Contributions of Robert Overton Evans
By Jim Rue

MVS TOOLS & TRICKS

Work and Play
By Sam Golob

WORKING SMARTER

The STATUS AREA Revisited
By Jim Moore

SHAREWARE SPOTLIGHT

Automate Your Way to Leisure!
By Jim Justen

CAREER CORNER

Standing Out From the Crowd in the Interview Process
By Kathy Bornheimer

TOP


November 2004

FEATURES

Holiday Gift Ideas for the Techie
By Shawn Conaway

A collection of high tech and fun gift ideas that are sure to make the techie on your shopping list smile!

ARTICLES

High Speed Transaction Recovery
By Craig S. Mullins

Availability is the Holy Grail of database administrators. If your data is not available, your applications cannot run, and therefore your company is losing business. Lost business translates into lower profitability and perhaps a lower stock valuation for your company. These are all detrimental to the business, so the DBA must do everything in his power to ensure that databases are kept on line and operational. This has been the duty of the DBA since the days of the first DBMs.

XML and the Mainframe: Perfect Together – Part Two
By Rohit Mital

This continuation of the article that appeared in October’s Technical Support focuses on different XML use cases, some of the best practices that have grown up around its adoption, and how you and your company can get started.

Making Wide-Area WiFi Work with an Outdoor Wireless Network
By Dave Park

The adoption of wireless local area networks (WLAN) has exploded in the last few years, but what the market expects from these networks is not always in line with the current capabilities of technology. Network operators are discovering that current wireless networking options that are suitable for small hot spot deployments don’t scale well enough to meet larger network requirements. To address wide-area Wi-Fi requirements, a different kind of wireless networking product and architecture are needed, and this article explores this technology.

Centralized Network Security Management
By Eric Haley

Enterprise IT professionals are responsible for maintaining the operability of hundreds of machines on a network and, at the same time, depended upon for ensuring that an organization’s network remains secure and stable. This can be a laborious task, but remote control applications enable users to control one computer in a remote location, with their own computer, just as if they were seated at the remote computer. More specifically, they enable users to connect directly to the desktop of a remote computer and view and control that computer with the local computer’s monitor, keyboard, and mouse; providing an excellent return on investment by allowing for quicker resolutions to software dilemmas.

Utility to retrieve SMS information
By Yash Pal Samnani

Many times, mainframe application programmers need details of datasets catalogued in Storage Management System (SMS). The reasons they would need this are myriad. They may want these details for study of existing applications, for analysis and re-design, for performance improvement, for knowing the capacity usage of the mainframe. A facility that is very well available is TSO by using ‘Dataset List Utility’ (Option 3.4) and that is sufficient to solve the concerns of the programmers.

How to Keep a Tried-and-True Data Center Up to Date
By Elizabeth M. Ferrarini

Maintaining older data centers and gauging equipment update needs is important for any organization, and this article provides tips to keep your data center current and up to date.

Securing IM
By David Geer

IM, or instant messaging, was no more secure when it first appeared on the scene as IRC. As with Windows-based applications and other highly popular software, security issues have grown in large part due to IM’s vast proliferation and not because of the insecure nature of the software alone. This article explores this lack of security, and what can be done about it.

Tape Technology and Storage Area Networks: A Winning Combination
By Debra Redmond, Rick Sellers, Bruce Master

Enterprises of all sizes have recognized the data storage challenges that Storage Area Networks (SANs) can solve, and SANs are playing a critical role in enterprise technology strategies for improving performance and simplifying storage management. Tape is a cornerstone of any enterprise storage plan, and because of tape’s central role in the protection strategy of the enterprise, SANs bring both urgency and new importance to the development of a long term tape storage plan.

COLUMNS

MVS TOOLS & TRICKS

PDS and PDSE
By Sam Golob

WORKING SMARTER

Using the BROWSE Command of DDLIST
By Jim Moore

TECHNICAL REPORTS

Send in the Clones Symantec Norton Ghost 9.0
By Jim Justen

TECHNO PIONEERS

Carly Fiorina - The Most Powerful Woman in Business
By Jim Rue

CAREER CORNER

Educational and Work Experience Parameters for IT Professionals
By Kathy Bornheimer

TOP


December 2004

FEATURES

DB2 UDB for z/OS V8 and UNICODE: It’s No Tower of Babel
By Jim Schesvold

DB2 UDB for z/OS Version 8 is the largest, most profound, highest impact version in the product’s history. One of the largest modifications in DB2 V8 is the implementation of Unicode. While earlier versions of DB2 had Unicode capability, DB2 V8 has extensively integrated character conversion into nearly every aspect of the product.

ARTICLES

An ABC of IEBCOPY/IEBGENER Troubleshooting
By Roy Murphy

IEBCOPY is a mainstay of the custom processes written for code promotion on the z/OS platform. Although simple to use and code, a variety of error situations can arise when using IEBCOPY, such as invalid/missing member name, invalid/missing input/output dataset, etc. Although most of the resulting error codes and messages are easily interpreted, there are some codes and messages returned where it is not obvious what the actual problem is, and these will be highlighted in this article. This article will describe the results that you will see when each of the above errors occurs, and also provides guidelines on what to do when you see an error that you have not seen before when using the utility.

Next Generation Remote Device Support: A New Spin on Today’s Virtual Networks
By Dave Boulos

Outsourcing, globalization, the mobile work place; today’s IT departments must support technicians around the world in disparate business sites, provide access to the company’s precious remote devices, and determine the best option among a myriad of methods for doing so – dial-up, frame relay, and VPN. In order to thrive in today’s “do more with less environment,” enterprises look more closely at a host of value-add services from Service Management Organizations (SMO’s), such as Managed Service Providers (MSP) and Original Equipment Manufacturers (OEM).

Book Review: Official (ISC)2 Guide to the CISSP Exam
By Shawn Conaway

 

Who is Minding Your JCL? Eliminating Destructive Forces Acting On Your JCL
By Rober Basmaciyan

Ever since IBM invented Job Control Language (JCL) as the primary method for controlling the batch processes to run mission-critical production applications, it has maintained its place as the foundation of data processing for most large companies. This is because for every on-line application, there is a back end process to support it. As on-line applications grow in number, there is nearly as much growth in the amount of work that is supported by JCL in batch mode. Even though the nature of the batch work has changed somewhat over the years, the importance and criticality of it has not diminished. In fact, the argument can be made that it has increased.

Setting Up zFS For Use With ShopZSeries
By Edward Arnold

For a systems programmer, having a real application that uses zFS is a great way to learn about its function, capabilities, and requirements. When converting my process for receiving PTFs to ShopZSeries, I found a perfect “production” use for zFS. When creating a bitmap for the service inventory for uploading to ShopZSeries and for the subsequent downloading of maintenance I used the zFS file system for storing files instead of an HFS. This article will illustrate how zFS is completely interchangeable HFS.

NaSTEC 18.1 Recap
By Rachael Zimmermann

A recap of NaSTEC 18.1, held in Chicago at the Radisson Hotel.

Google Hits the Bigtime with New Programs and Services, Mostly Free
By Jim Rue

Sometimes it seems as if the best that advancing technology and innovation have to offer are overshadowed by the machinations of the economic system. Big investment money seems forever eager to suck the soul out of any new venture for the sake of maximizing profits. Occasionally, a new firm prospers on their own terms, growing and thriving while defying conventional wisdom. Google has been one of those rare companies, and it’s inspiring to see that a couple of grad students can take the world by storm without being evil.

Disk-based Backup and Restore: Reaching the Next Level
By Alexandre Delcayre

Escalating data growth, shrinking backup windows, overburdened IT staff, and overtaxed budgets … the problems facing storage administrators are all too familiar. Despite familiarity with these problems, for many, the solution remains as elusive as ever. This article outlines and compares conventional disk-based back up and restore methods with new disk-based techniques including the virtual tape library.

More Holiday Gift Ideas for the Techie
By Shawn Conaway

Here are some great gift ideas for you or your friends and family. These gadgets range from expensive to reasonable, from simple to cutting edge, and from practical to just plain fun. After reading, you may want to get something for yourself or maybe even something for your favorite ÜberGeek.

Keeping IT Inventory Without Losing One’s Mind
By Oleg Zabolotny

It’s next to impossible to find a business that does not have computers. For most companies IT matters, so they buy more PCs, more equipment and more software just to stay in business. Large networks with hundreds of PCs are the rule, rather than the exception. Pretty soon managers start asking themselves – How do I keep track of all this IT stuff? Can you use IT to inventory IT?

COLUMNS

MVS TOOLS & TRICKS

Ideas
By Sam Golob

SHAREWARE SPOTLIGHT

The Office is Now Open…
By Jim Justen

WORKING SMARTER

ISPF Edit—CUT and PASTE
By Jim Moore

CAREER CORNER

Preparing for 2005
By Kathy Bornheimer

TOP