Featured
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Recent Articles
Top 10 Key Findings from the 2025 Arcati Mainframe Survey
The 2025 Arcati Mainframe Survey, conducted by Planet Mainframe from November 2024 to January 2025, reveals a landscape in flux as organizations adapt to new technology demands. Data show a split in mainframe strategies, with some organizations expanding to support...
Legal & General’s Pop-Up Mainframe Transformation: People-First Innovation in Action
In today’s enterprise IT landscape, legacy systems remain both a pillar of reliability and a challenge for innovation. According to the 2025 Mainframe User Survey, expected to be released to the public this week, 67% of respondents reported that the majority of their...
Provision On Demand
Part One: What is Provisioning? It's no secret that in this age of digital transformation businesses are looking to build high-quality software for their customers and critical business processes. However, there are several challenges that they face when building...
Mainframe News Out There
Once a month (or so) we like to pick blog articles from other sources that we feel are interesting enough to talk about on the Planet Mainframe blog. Here are this month’s picks: 5 Quick Ways to Speed up Your z/OS Batch Without Application Changes An interesting...
Seamless VSAM data transfer between Host & PC
VSAM files are widely used in CICS applications and it contains critical information with a huge data set. It is always a better idea to keep a backup of these files in your PC for future use. However, we cannot directly copy these VSAM files to PC, hence steps given...
Four Essential Features for a Database Security Strategy to Take on a Growing Threat Landscape
For a considerable time, many organizations have used three to five on-premise databases to manage their workloads, and many teams have tried to funnel every application into using those databases. Today, as the pressure to innovate while keeping costs low...
CICS Security – ADCD and Dallas Z ISV RDP
In RACF security terminology, CICS is a resource manager. Resource manager security can be enabled or disabled. Dallas Z ISV RDP provided CICS security is disabled. Why? CICS manages many resources where enabling security requires decisions about which specific CICS...
zEDC and IBM Sterling Connect:Direct for z/OS
Long before zEDC, IBM Sterling Connect:Direct for z/OS (CDzOS), a managed file transfer product specializing in sending z/OS datasets from one mainframe customer to another, supported compressing a file before transmitting it. It originally only supported simple...
Sign up to receive the latest mainframe information
Upcoming Events
-
-
Virtual CICS User Group | The IT Stairway to Heaven. CICS Testing Pyramid: From Unit to Integration to Production-Like Environment
Zoom - Virtual MeetingEffective testing is essential for building robust systems. Dive deep into a structured approach to the testing pyramid for CICS applications. Using Test4z, we will demonstrate how unit tests form […]
-
Virtual Db2 User Group | January 20, 2026
Zoom - Virtual Meeting -
-
Virtual IMS User Group | February 10, 2026
Zoom - Virtual Meeting -
-
Virtual CICS User Group | March 17, 2026
Zoom - Virtual Meeting
Mainframes by the Numbers
Since you’ve found your way to Planet Mainframe, you probably know that mainframes are the IT workhorses of big business. It’s not an exaggeration to say that it’s hard to even imagine the past several decades of commerce without the mainframe doing its thing, mostly...
Mainframe News for You
Utah’s Office of Recovery Services Moves from COBOL to Cloud in 18 Months Utah’s Office of Recovery Services (ORS) is responsible for both collecting child support payments across the state and ensuring public funds are used appropriately. For 24 years it has relied...
History of Cybercrime and Cybersecurity
For a long time, mainframes seemed like a safe room where a company’s most precious data possessions would be secure. But while mainframes still present unique challenges to bad actors, the days of mainframe impenetrability are most definitely over. Ever since the...
Kyndryl Signs Agreement with UK Tax Authority and More
Kyndryl Signs Agreement with UK Tax Authority to Accelerate and De-risk Modernization in Critical Tax Infrastructure Kyndryl, IBM’s managed infrastructure services business spin-off, has signed an agreement to manage a proportion of HMRC’s (His Majesty’s Revenue and...
Mainframe Security Trivia
For a long time, the perception that mainframes are inherently secure probably made life quite a bit easier for hackers than it really needed to be. Back in the pre-internet world, corporations could probably afford to treat mainframe security as an...
SC Media Honors Rocket Software’s Cynthia Overby for Career in Mainframe Security and more
SC Media Honors Rocket Software’s Cynthia Overby for Career in Mainframe Security SC Media, a publication of the CyberRisk Alliance, has announced its five 2023 Women in IT Security Honorees. Among the five honorees is Rocket Software’s Cynthia Overby, lauded for her...



