Workforce & Training

Accelerating the role of women in IT

Accelerating the role of women in IT

For International Women’s Day, Vertali’s Linda McGrath reflects on the changing fortunes of women in the sector When I started in this industry almost three decades ago, the world was a very different place in terms of perceptions of gender, and gender balance in the...

read more
Basics of VSAM

Basics of VSAM

This article will take you inside VSAM and explain the environment of Virtual Storage Access Method. VSAM has been around since the 1970s and provides a way of storing large amounts of data for 3 types of access. Random Sequential Skip Sequential VSAM has a number of...

read more
Accelerating Your Db2 Database

Accelerating Your Db2 Database

Your Db2 database The IBM mainframe and its Db2 database is the transaction processing workhorse for the world’s biggest banks, insurers and financial services companies. It was designed to execute their high-intensity transaction processing workloads very...

read more

Latest

Db2 for z/OS: SEPARATE_SECURITY and SECADM

Db2 for z/OS: SEPARATE_SECURITY and SECADM

 In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem, there is a parameter named SEPARATE_SECURITY. This ZPARM was introduced with Db2 10, and its purpose is to enable a Db2 for z/OS-using...

Quantum Safe Cryptography Overview

Quantum Safe Cryptography Overview

Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum computers will be advanced enough to cut the strength of symmetric key algorithms (such as AES, 3DES and RC4) by half, and...

Hide your privates

Hide your privates

My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!) in a variety of places and I wasn’t very happy about it. I have several different servers that I connect to. There are a few GitHub systems, a Linux system, and of course...

Recover Quickly With Surgical Precision

Recover Quickly With Surgical Precision

Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing data corruption whether through malicious intent, human error or failure of hardware or software. It provides an air gapped backup of the operating...

How to solve the Data Privacy issue for test data

How to solve the Data Privacy issue for test data

You may be aware of data privacy regulations such as Europe’s GDPR (General Data Protection Regulation) or California’s CCPA (California Consumer Privacy Act) that, among other things, ban you from using production data with personally identifiable information, such...

Sign up to receive the latest mainframe information

This field is for validation purposes and should be left unchanged.

Upcoming Events

Mainframe Artificial Intelligence Quiz

Mainframe Artificial Intelligence Quiz

At Planet Mainframe, we’re spending the month of November focusing on AI and the mainframe. Once viewed as separate worlds, AI and IBM Z now work hand in hand to deliver real-time insights, predictive analytics, and intelligent automation across enterprise-scale...

read more
Data Integrity Award Winners, Workload Automation in Industry Report, and more

NEWS – Granite 4.0, Free Cybersecurity Labs, and more

IBM Announces Granite 4.0 Free (Cybersecurity) Labs! Upcoming IBM Z Day Chase Card Decommissioning All Mainframe Code, with AI Assistance IBM z/OS Core Collection v1.15.0 GA ReleasedIBM Announces Granite 4.0 IBM has introduced Granite 4.0, initiating a new era for its...

read more
TRIVIA – Penetration Testing

TRIVIA – Penetration Testing

Mainframes have long been known for their unmatched reliability and security—but even the most trusted systems can hide surprises beneath the surface. As technology evolves, so do the tactics of those trying to exploit it. Penetration testing (pen testing), or...

read more
TRIVIA – Cybersecurity Month

TRIVIA – Cybersecurity Month

For many of us, October is about falling leaves, shorter days, and cooler weather. It also happens to be Cybersecurity month, the time when we dial in on the never-ending (and ever-evolving) task of securing the mainframe. Mainframes have a reputation for being...

read more