Features & News


October Inside IBM

IBM’s 10th anniversary of storage management, Tivoli strengthens Global Sign-On, new semiconductor offerings, advanced secure online commerce.

Technology Is The Source Of Your Enterprise Management ROI ... Not!

As the widespread disappointment with Enterprise Systems Management (ESM) projects proves, management technology alone cannot suffice to solve the most pressing enterprise management problems. However, by establishing and enforcing standard management practices and undertaking small ESM projects with clearly-defined goals, managers can beat the odds.

An Outsourcing Trend

Company budgets for outsourcing are going through the roof. And with networks becoming more complex and distributed, organizations are discovering that outsourcing network management can be a tricky and costly task.

DB2 Database Clusters and the New VI Architecture Standard

With the constant demand for enhanced access to ever greater volumes of information at affordable costs, vendors seek to develop new cluster-oriented products to change the face of enterprise computing. Virtual Interface architecture, a distributed messaging specification and supporting architecture, professes the highest speeds with the lowest latency interconnectivity between cluster components.

Enterprise Management – The Next Generation

What’s in store for the future of enterprise management? The focus for the new millennium will be on managing applications and higher-level services, with systems and networks viewed merely as components of the overall applications infrastructure.

ROI or DOA? ERP Deployment Without Workload Management Can Kill the Project

By identifying the need for healthy workload management while in the early stages of enterprise resource planning, corporations can determine their return on investment for migrating to an ERP system.

Fat Clients Get Thinner: Modernize Your Host Access Solution

Organizations look to use the Internet to become more competitive and significantly reduce costs. Web-to-host solutions help modernize the host access method today and provide a framework that allows existing host applications to be a foundation to meet strategic business objectives.



Batch to the Future

Don’t get ready to say “bon voyage!” to batch just yet. For many large companies, the big problem remains of how to deal with a decreasing “batch window,” while the MIPS dedicated to batch is increasing at an alarming rate and leading to batch overrun.

The Internet Meets the Mainframe: Management of 21st Century Mainframe-Centric Networks

At a time when data centers can’t afford the time to manage and maximize a new environment where TCP/IP networks are integrated with standard enterprise-server functionality, companies must determine the network’s current needs as well as future growth, then select a management tool to aid during migration.

The Internet’s Impact on the Role of the Mainframe

The current status of each organization (i.e., where it is in the adoption cycle) will determine which computing model - mainframe-centric, client/server or universal client - will be used. Some companies may have a need for a mixture of all three environments within their corporate IT departments. Find out where you fit and what you need to know.

Parallel Processing with Pl/i

By examining the program from a parallel perspective, application processing time can be cut down. And depending on your needs, either parallel I/O-bound applications or parallel CPU-bound applications may be the solution.

Y2K Testing in a Parallel Sysplex

This discussion focuses on the need to continue running a production Sysplex while testing is being performed, as well as what’s new and what’s possible in the field.

August Industry News

Amdahl's MSF for software cost management, NCR's Data Warehouse Performance Challenge, Best Practices in Enterprise Management Awards, ODBMS supports BEA M3TM OTM technology, Silicon Graphics unveils Cray SV1 series.

IBM "CICS" Java into High Gear

Netfinity, PC DOS 2000, IBM Suites for Windows NT, Symantec, Small Business Computer Telephony, Ready-to-Run R/3 for AS/400e.

Crossing CICS BRIDGES, Part II

In the conclusion of this two-part article, Carol Shanesy explores Receive and Send Commands, Mapping Inputs, ADS, Critical Restrictions, and Intercepts and Syncpoints.