Back to Article List      Back to NaSPA.com

1997 Index of Articles

January 1997

SYSTEM STRATEGIES

Applications of TSO CLIST Built-in Variables to System Data Set Names
By Evan Galen

MVS/XA/ESA Problem Solving: Part IV SLIP Traps and GTF Tracing
By Tom Bryant

Year 2000 Conversion: The First Step
By Anne White

Storage: Back to the Future
By G.A. "Andy" Marken

COMPUTER CENTER OPERATIONS

Developing an Effective Disaster Recovery Contingency Plan
By Howard W. Miller

INTEROPERABILITY INSIGHTS

Choosing the Right Tool for Mainframe Data Translation on UNIX
By Tom Philips

Network Vulnerability in the Client/Server Environment: Rate Your Relationship
By Leo A. Wrobel

Networking With Windows NT
By John E. Johnston

Protecting Networks With and Without Firewalls: Part I – The Sniffer Attack
By Mark Bell

How to Manage a 200-Client Network With a Staff of Two – The PC Personality Problem
By William M. Dockstader

COLUMNS

MVS Tools & Tricks

Finding Things
By Sam Golob

Working Smarter

A Tale of Three Profiles
By Jim Moore

VM Toolbox

Charlotte’s Dog
By John D. Kinne

VSE Tools & Techniques

Changes in Return Code Processing
By Leo J. Langevin

Storage Strategies

Putting the Squeeze on Data: MVS/ESA Data Compression Facilities
By Steve Pryor

Opening Windows

Avoiding Mismatched SIMMs
By Al Shing

Enterprise Networking

Windows 95 Service for Directory Services
By John E. Johnston

NetWare News

A Novell and Microsoft Cooperation? Gaining Control of Windows 95’s Clients
By Guy C. Yost

OS/2 Insights

REXX FTP APIs: Part I
By Michael Norton

On a Personal Note

The Arrogance of Power
By Mike Sutton

TOP


February 1997

FEATURES

www.mainframe.com
By Paul R. Robichaux

NETWORKING

Helpful Hints for MIS Manager Supporting Telecommuters and Nomadic Users – Part I: Voice Communications
By Leo A. Wrobel

Protecting Networks With and Without Firewalls: Part II – IP Spoofing and Source Route Attacks
By Mark Bell

SYSTEMS

MVS/XA/ESA Problem Solving: Part V – Guidelines for Understanding an MVS/XA/ESA Standalone Dump
By Tom Bryant

The Oracle DBMS Architecture: A Technical Introduction
By Daniel D. Kitay

COLUMNS

MVS Tools & Tricks

Creative Enqueuing
By Sam Golob

VSE Tools & Techniques

Changes in VSE/ESA Execution Parameter Processing
By Leo J. Langevin

VM Toolbox

Charlotte: Rover’s Master
By John D. Kinne

Working Smarter

A Memorial to the Tutorial
By Jim Moore

Storage Strategies

Putting the Squeeze on Data: MVS/ESA Data Compression Facilities – Part II
By Steve Pryor

Enterprise Networking

Windows 95 Mainframe Connectivity
By John E. Johnston

Internet Resources

ZBServer Pro: An FTP Server to Run on Windows 95 and NT
By Guy C. Yost

OS/2 Insights

REXX FTP API Functions: Part II
By Michael Norton

On a Personal Note

The Forrest Gump Effect
By Mike Sutton

TOP


March 1997

FEATURES

A Letter to Your CIO: Start Your Performance Engine
By Neil Ervin

Client/Server Performance Management
By Howard W. Miller

NETWORKING

Helpful Hints for Telecommuters and Nomadic Users: Part II – Data Communications
By Leo A. Wrobel

Windows 95 Setup From a NetWare Network
By John E. Johnston

Protecting Networks With and Without Firewalls: Part III – TCP Spoofing: The Sequence Number Attack
By Mark Bell

Chicken Soup for Administrators: Part I – Putting it All Into Perspective
By Guy C. Yost

SYSTEMS

Assessing Year 2000 Conversion Project Costs
By C.E. Scott

The Tip of the Iceberg: RAMAC Virtual Array – Part I
By Chris Evans

Building a Backup VSE System on ESARES and ESAWK1
By Anthony L. Kelley

COLUMNS

MVS Tools & Tricks

Harnessing Macro Power: Part I
By Sam Golob

Working Smarter

Please EXCLUDE Me
By Jim Moore

VM Toolbox

More Tools for the Toolbox
By John D. Kinne

VSE Tools & Techniques

Special SYSLOG I/O
By Leo J. Langevin

Storage Strategies

Picking the Winning Numbers: System-Determined Blocksize
By Steve Pryor

Enterprise Networking

NPRINTER Replacements
By John E. Johnston

OS/2 Insights

Creating "Thin" Clients
By Michael Norton

Opening Windows

Uncomplicating Online Services
By Al Shing

On a Personal Note

Show Me the Money!
By Mike Sutton

TOP


April 1997

FEATURES

Integrating File Transfers in Mixed TCP/IP and SNA Networks
By Charles A. Mills

File Transfer: Key to Successful Offloading of Mainframe Development
By Douglas D. Troxel

SYSTEMS

Tuning DSNDB07 Temporary Files
By Eric Harper

Sysplex Management: Sysplex-Enabled Tools vs. Traditional Tools
By John S. Clements

The Tip of the Iceberg: RAMAC Virtual Array – Part II
By Chris Evans

Safeguarding Open Systems Storage
By Steve Pryor

VM Now and Into the Future: An Interview with Ron Thomson of IBM
By John D. Kinne

NETWORKING

ISDN: Innovations Subscribers Do Need: Part I
By Leo A. Wrobel

Choosing a WAN Router
By Henry H. Wong and Dr. Francis Huang

Windows NT 4.0 NetWare Gateway Services
By John E. Johnston

COLUMNS

MVS Tools & Tricks

Harnessing Macro Power: Part II
By Sam Golob

Working Smarter

Killer Online Help Apps: MVS/Quick-Ref and BookManager
By Jim Moore

VM Toolbox

Sampling the Cornucopia: Programs From the IBM VM Download Page
By John D. Kinne

VSE Tools & Techniques

How to Access Your Online Data From a Web Page
By Leo J. Langevin

Storage Strategies

Keeping Data in Line: Inline Backup
By Steve Pryor

Enterprise Networking

Using Pre-Built Java Applets
By John E. Johnston

OS/2 Insights

Understanding IBM’s Lotus Notes
By Michael Norton

Internet Insights

Good Proxy Servers, Almost Shareware
By Guy C. Yost

Opening Windows

Working Out the Bugs: The Microsoft Network Software Upgrade
By Al Shing

On a Personal Note

Private Bowe
By Mike Sutton

TOP


May 1997

FEATURES

Leveraging Mainframe Applications Over TCP/IP Networks: An Alternative to Point-to-Point Channel Extension
By Ed Nash

The Paper Wonderland: PC-to-Mainframe Print Distribution
By Julio A. Hernandez

PC-to-Mainframe Connectivity Using a 3745 Token Ring Adapter
By Scott Ruggles

SYSTEMS

Document Imaging and Workflow Management
By Howard W. Miller

Optimizing VSE/ESA on a PC Server System/390
By Jeffrey C. Barnard

NETWORKING

ISDN: Innovations Subscribers Do Need: Part II
By Leo A. Wrobel

Protecting Networks With and Without Firewalls: Part IV – Email Forgery and Other Mail Threats
By Mark Bell

NetWare Client 32 for Windows 95
By John E. Johnston

COLUMNS

MVS Tools & Tricks

It’s a Bird, It’s a Plane, It’s SUPRNAME
By Sam Golob

Working Smarter

Cook Me Up a Batch of EDITs: Part I
By Jim Moore

VM Toolbox

XMENUVM: A CMS Interface
By John D. Kinne

VSE Tools & Techniques

The Talking Tape Drive
By Leo J. Langevin

Storage Strategies

Changing Times: OpenEdition HFS Files
By Steve Pryor

Enterprise Networking

Upgrading NetWare Directory Services Modules
By John E. Johnston

OS/2 Insights

The Domino Effect
By Michael Norton

Opening Windows

Recovering Windows NT Server and Workstation
By Al Shing

On a Personal Note

The Lost Art of Clemency
By Mike Sutton

TOP


June 1997

FEATURES

Countdown to the Year 2000 at SunGard Securities Systems: A Journey in Multi-Platform Project Management
By Clark Kender

Why We’re Not Working on the Year 2000: Common Myths and Misconceptions
By Gerhard Adam

Formulating Your Battle Plan for Year 2000 Conversion Project Costs
By C.E. Scott

Year 2000: Business and Legal Ramifications
By Gerhard Adam

SYSTEMS

MVS/ESA Problem Solving: IBM Informational APARs
By Tom Bryant

NETWORKING

An Introductory Approach to Network Problem Determination
By Ivan H. Shefrin and Liam G.F. Hammond

Chicken Soup for Administrators: Part II – Dealing With Vendors and Developers to Meet Business Needs
By Guy C. Yost

Capacity Planning for Web-Based Internet Business Services
By Eric D. Ho and Michael E. Matchett

COLUMNS

MVS Tools & Tricks

Timing Out
By Sam Golob

VM Toolbox

JavaScript From VM
By John D. Kinne

Working Smarter

Cook Me Up a Batch of EDITs: Part II
By Jim Moore

Storage Strategies

Year 2000 Issues in Storage Management
By Steve Pryor

VSE Tools & Techniques

Using the CPUID to Control JCL Processing
By Leo J. Langevin

Enterprise Networking

LDAP Services for NDS
By John E. Johnston

OS/2 Insights

Innoval’s Surf’nREXX
By Michael Norton

Internet Insights

Graphical Trace Route Utilities
By Guy C. Yost

On a Personal Note

Simple Eloquence
By Mike Sutton

Opening Windows

Restoring Windows NT Server to a Different Platform
By Al Shing

TOP


July 1997

SPECIAL FEATURE

1997 Buyers’ Guide

SYSTEMS

Where is It? Examining REXX WHEREIS
By Eric Harper

OpenEdition MVS and the Bourne Shell – A User Experience: Part I
By Evan Galen

Managing CICS Resource Definitions
By Richard Tsujimoto

MVS/ESA Problem Solving: IPCS VERBEXIT Commands
By Tom Bryant

NETWORKING

Protecting Your Network With and Without Firewalls: Part V – DNS Attacks
By Mark Bell

Security Issues for Common Work Tools: Part I – Fax and Email Systems
By Leo A. Wrobel

COLUMNS

MVS Tools & Tricks

Old Code
By Sam Golob

VM Toolbox

Covering Your Buffer
By John D. Kinne

Working Smarter

How to SAVE Time and FIND Things
By Jim Moore

Storage Strategies

Changing Times: OpenEdition HFS Files – Part II
By Steve Pryor

VSE Tools & Techniques

The VSE List
By Leo J. Langevin

Enterprise Networking

Web Image Maps
By John E. Johnston

OS/2 Insights

Building the Perfect Beast
By Michael Norton

Opening WIndows

Installing a NetWare Client on Windows NT
By Al Shing

On a Personal Note

Dumb, Dumber, and Dumbest
By Mike Sutton

TOP


August 1997

FEATURES

Disaster Recovery Implementation and Testing: A User Experience
By Tom Lashley

Testing, Testing, 1-2-3: The Critical Step in Year 2000 Conversion Projects – Part I
By James S. Huggins and C.E. Scott

IntranetWare Client for Windows NT
By John E. Johnston

SYSTEMS

Large System Instruction Timings
By Richard N. Hevener

OpenEdition MVS and the Bourne Shell: A User Experience – Part II
By Evan Galen

Small Systems Caching: Does it Improve Performance?
By Jim Conway

The Death of the PC?
By Mark Bell

NETWORKING

Protecting Your Network With and Without Firewalls: Part VI – Securing Intranets and Internal Networks
By Mark Bell

Chicken Soup for Network Administrators: Part III – For Technology’s Sake
By Guy C. Yost

Security Issues for Common Work Tools: Part II Voice Mail Systems and Cellular Phones
By Leo A. Wrobel

COLUMNS

MVS Tools & Tricks

Profiles in Creativity
By Sam Golob

Working Smarter

Member List Tricks
By Jim Moore

VM Toolbox

The Year 2000 and Looking at Spool Space
By John D. Kinne

VSE Tools & Techniques

Introduction to 31-bit Programming
By Leo J. Langevin

OS/2 Insights

Building the Perfect Beast: Part II The OS/2 Install Routine
By Michael Norton

Storage Strategies

Making Room for More Data ICKDSF VTOC Functions
By Steve Pryor

Enterprise Networking

PPP Using NetWare Connect
By John E. Johnston

Opening Windows

The Economics of PCs
By Al Shing

On a Personal Note

Snippets of Slime
By Mike Sutton

TOP


September 1997

FEATURES

Extending Existing Security Systems to Include Remote Locations
By Gordon Bennett

Synchronizing Security Information Across MVS/VM Systems
By Ed Blunt

The 10 Golden Rules of Network Security
By Chip Mesec

Using NetWare 4 Auditing
By John E. Johnston

SYSTEMS

Testing, Testing, 1-2-3: The Critical Step in Year 2000 Projects – Part II
By James S. Huggins and C.E. Scott

OpenEdition MVS and the Bourne Shell: A User Experience – Part III Troubleshooting OpenEdition MVS Shell Problems
By Evan Galen

Year 2000 Solutions for Recovering Lost Source Code
By Leland G. Freeman

NETWORKING

UNIX, Windows NT, and NetWare – A Comparative Analysis: Part I
By Guy C. Yost

COLUMNS

MVS Tools & Tricks

Systems Programmer Creativity
By Sam Golob

Working Smarter

ISPF V4: Rolling With the Changes
By Jim Moore

VM Toolbox

The 1997 VM Workshop Tools Tape
By John D. Kinne

VSE Tools & Techniques

Using $JOBACCT for Unit Record Cleanup
By Leo J. Langevin

Storage Strategies

Choosing Your Targets: Recall Volume Selection
By Steve Pryor

Enterprise Networking

Pretty Good Privacy (PGP) 5.0
By John E. Johnston

NT Insights

Installation Issues and Configuration Concerns
By Guy C. Yost

On a Personal Note

Foot in Mouth … and Other Extremities
By Mike Sutton

OS/2 Insights

Building the Perfect Beast: Part III – Customization
By Michael Norton

Opening Windows

Starting Clean With a New Windows Machine
By Al Shing

TOP


October 1997

FEATURES

Year 2000 Compliance: New DFSORT Features
By Michael H. Carroll

Effective Enterprise Data Access to Legacy Systems
By Tim Kessler and Karen Durward

SYSTEMS

Common Mistakes in Business Resumption Planning: Part I
By Leo A. Wrobel

Year 2000 Date Impact Analysis
By Fred Schuff

The SHOWDSNS ISPF Dialog
By Jim Moore

NETWORKING

NT Migration: A User Experience
By Ira Berkowitz

UNIX, Windows NT, and NetWare: A Comparative Analysis – Part II
By Guy C. Yost

Protecting Your Network With and Without Firewalls: Part VII – Avoiding the Maginot Line
By Mark Bell

COLUMNS

MVS Tools & Tricks

Why Not Run a Batch Job?
By Sam Golob

Storage Strategies

Keeping the Door Open for Data: Avoiding Lockouts
By Steve Pryor

Working Smarter

What’s Changed in ISPF Version 4? View and REFLISTs
By Jim Moore

VM Toolbox

Editing Non-VM Files on CMS
By John D. Kinne

VSE Tools & Techniques

Mining ORE from VSE
By Leo Langevin

Enterprise Networking

UNIX-to-NetWare Printing
By John E. Johnston

NT Insights

Disaster Recovery
By Guy C. Yost

OS/2 Insights

Building the Perfect Beast: Part IV – A Beast With Personaility
By Michael Norton

Opening Windows

Buying a New PC
By Al Shing

TOP


November 1997

FEATURES

Virtual Tape: Spice for the Seasoned Professional
By Brian Diven

What Exactly Did ESCON Do For Tape Performance? A Case Study
By Win Bowman

SYSTEMS

Writing an Aging Utility for Year 2000 Testing
By Fred Schuff

Triggering MQSeries Channels in Distributed Systems
By Wayne Bucek

Common Mistakes in Business Resumption Planning: Part II
By Leo A. Wrobel

East Meets West Revisited Technology Advances Slower Than Expected Since Communism’s Fall
By Lisa Hold

NETWORKING

UNIX, Windows NT, and NetWare: A Comparative Analysis – Part III
By Guy C. Yost

The Novell Application Launcher
By John E. Johnston

COLUMNS

MVS Tools & Tricks

Helping Keep Your System Up
By Sam Golob

Working Smarter

ISPF Version 4 Potpourri
By Jim Moore

VM Toolbox

Where to Find It: Accessing LISTSERV Lists
By John D. Kinne

VSE Tools & Techniques

Adding Messages to VSE
By Leo J. Langevin

Consultant’s Corner

"Oops! Sorry!" Doesn’t Help When Mistakes Can Cost Millions
By Reed Booker

Storage Strategies

System-Managed Exception: The ACS Exits
By Steve Pryor

NT Insights

Understanding NT Domains
By Guy C. Yost

OS/2 Insights

Out With the New, in With the Old
By Michael Norton

Enterprise Networking

Do You Need a Sniffer?
By John E. Johnston

On a Personal Note

Appraisals 101
By Mike Sutton

TOP


December 1997

SYSTEMS

Implementing IBM’s Language Environment: Part I
By Craig Collins and Dave Christianson

Remote Access for a P/390 OS/390 System: Part I – Research and Evaluation
By Rex Widmer

(Remote Access for a P/390 OS/390 System: Part II - Implementation and Deployment of the Solution
By Rex Widmer - January 1998)

Vendor Performance Ratings: Why Your Results May Differ – Part I
By Cheryl Watson

Common Mistakes in Business Resumption Planning: Part III –Avoiding Deadly Mistakes
By Leo A. Wrobel

NETWORKING

Frame Types: Sorting Out the Confusion
By Mark Bell

COLUMNS

MVS Tools & Tricks

Remembering TSSO
By Sam Golob

Working Smarter

ISPF Version 4 Command Tables
By Jim Moore

VM Toolbox

Thank You
By John D. Kinne

VSE Tools & Techniques

Stop That Job!
By Leo J. Langevin

SHAREing Information

Transporting Files Between MVS and MVS, or Between MVS and a Workstation
By Lionel B. Dyck

Storage Strategies

Putting SMS in Charge: SMS Control Datasets
By Steve Pryor

NT Insights

NT Domains and Wide Area Networking
By Guy C. Yost

OS/2 Insights

Java for OS/2
By Michael Norton

Enterprise Networking

Do as I Say, Not as I Do
By John E. Johnston

On a Personal Note

Who’s Your Customer?
By Mike Sutton

Opening Windows

Shopping for a Hard Disk
By Al Shing

TOP