Provision On Demand Part 3: The Future of Automated Provisioning on z/OS
The Future of Automated Provisioning on z/OS Welcome back for part three of this provisioning automation blog series. In this…
Top 10 Steps to Building the Right Indexes
One of the constant struggles with Db2 development, and indeed developing for any relational DBMS, is designing and creating appropriate…
Provision on Demand Part 2: IBM and Red Hat Ansible
Check out part one: What is Provisioning? to get caught up. Welcome back for part two of this provisioning automation…
Provision On Demand
Part One: What is Provisioning? It’s no secret that in this age of digital transformation businesses are looking to build…
Mainframe News Out There
Once a month (or so) we like to pick blog articles from other sources that we feel are interesting enough…
Seamless VSAM data transfer between Host & PC
VSAM files are widely used in CICS applications and it contains critical information with a huge data set. It is…
Four Essential Features for a Database Security Strategy to Take on a Growing Threat Landscape
For a considerable time, many organizations have used three to five on-premise databases to manage their workloads, and many teams…
CICS Security – ADCD and Dallas Z ISV RDP
In RACF security terminology, CICS is a resource manager. Resource manager security can be enabled or disabled. Dallas Z ISV…