Workforce & Training

Earn and share your mainframe badges today!

Earn and share your mainframe badges today!

IBM open badges are making a difference by building your personal brand and advancing your career. With IBM open badges, you can easily and quickly share verified proof of your achievements both within IBM and externally. Where applicable, your IBM credentials are...

read more
Basics of VSAM

Basics of VSAM

This article will take you inside VSAM and explain the environment of Virtual Storage Access Method. VSAM has been around since the 1970s and provides a way of storing large amounts of data for 3 types of access. Random Sequential Skip Sequential VSAM has a number of...

read more
Accelerating Your Db2 Database

Accelerating Your Db2 Database

Your Db2 database The IBM mainframe and its Db2 database is the transaction processing workhorse for the world’s biggest banks, insurers and financial services companies. It was designed to execute their high-intensity transaction processing workloads very...

read more

Latest

Securing CICS with RACF

Securing CICS with RACF

Implementing CICS Security with RACF can be a complex and demanding process. In order to do it to a level that creates a good balance can take time and requires good knowledge and understanding of both CICS and RACF. So I will explain the various steps in securing...

Db2 for z/OS: SEPARATE_SECURITY and SECADM

Db2 for z/OS: SEPARATE_SECURITY and SECADM

 In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem, there is a parameter named SEPARATE_SECURITY. This ZPARM was introduced with Db2 10, and its purpose is to enable a Db2 for z/OS-using...

Quantum Safe Cryptography Overview

Quantum Safe Cryptography Overview

Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum computers will be advanced enough to cut the strength of symmetric key algorithms (such as AES, 3DES and RC4) by half, and...

Hide your privates

Hide your privates

My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!) in a variety of places and I wasn’t very happy about it. I have several different servers that I connect to. There are a few GitHub systems, a Linux system, and of course...

Recover Quickly With Surgical Precision

Recover Quickly With Surgical Precision

Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing data corruption whether through malicious intent, human error or failure of hardware or software. It provides an air gapped backup of the operating...

Sign up to receive the latest mainframe information

This field is for validation purposes and should be left unchanged.

Upcoming Events

Mainframe Artificial Intelligence Quiz

Mainframe Artificial Intelligence Quiz

At Planet Mainframe, we’re spending the month of November focusing on AI and the mainframe. Once viewed as separate worlds, AI and IBM Z now work hand in hand to deliver real-time insights, predictive analytics, and intelligent automation across enterprise-scale...

read more
Data Integrity Award Winners, Workload Automation in Industry Report, and more

NEWS – Granite 4.0, Free Cybersecurity Labs, and more

IBM Announces Granite 4.0 Free (Cybersecurity) Labs! Upcoming IBM Z Day Chase Card Decommissioning All Mainframe Code, with AI Assistance IBM z/OS Core Collection v1.15.0 GA ReleasedIBM Announces Granite 4.0 IBM has introduced Granite 4.0, initiating a new era for its...

read more
TRIVIA – Penetration Testing

TRIVIA – Penetration Testing

Mainframes have long been known for their unmatched reliability and security—but even the most trusted systems can hide surprises beneath the surface. As technology evolves, so do the tactics of those trying to exploit it. Penetration testing (pen testing), or...

read more