Import your existing TCP/IP profile

Import your existing TCP/IP profile

Learn how to import your existing TCP/IP profile into the Network Configuration Assistant Starting with z/OS V2R2, the IBM Configuration Assistant for z/OS Communications Server, also known as the Network Configuration Assistant or NCA, can be used to produce TCP/IP...

read more
Security complacency: is your mainframe at risk?

Security complacency: is your mainframe at risk?

This has been a fine summer. And I’m not talking about the weather: I mean the whopping fines proposed for infringements of the General Data Protection Regulation (GDPR) by Marriott Hotels and British Airways, followed by an even bigger fine in the US for Equifax –...

read more
Summer – the season for cyber attacks

Summer – the season for cyber attacks

Keeping your mainframe secure is probably one of your top priorities. You’re looking at cryptography and introducing multi-factor authentication (MFA). You may even be running SIEM software to keep up-to-date with what’s happening on your mainframe (and elsewhere)....

read more
What is the value of mainframe logs?

What is the value of mainframe logs?

Mainframe logs offer essential insight into how to manage and adapt your z/OS environment. So why aren’t mainframe managers leveraging logs in their day-to-day IT management?  Performance data is usually split among several applications and consists of highly...

read more
50 Years ago in Mainframe Computing

50 Years ago in Mainframe Computing

How many computer platforms could justify a headline like that!? Well, it has been almost 50 years since NASA landed a man on the moon, and brought him safely back to Earth, as directed by President John F. Kennedy in his now famous speech to Congress in May of 1961....

read more
Mainframe Pricing: Endgame

Mainframe Pricing: Endgame

IBM Simplifying Mainframe Software Pricing When you hear the words mainframe software pricing, what do you think of? A common reaction is to ignore it unless you are actively negotiating a new contract with IBM. And even then, the general consensus is that it is...

read more
Breach recovery – the fast and the furious!

Breach recovery – the fast and the furious!

Your organization has had a data breach. You’ve managed to confirm that it’s not a false alarm, it really is an issue. And now you need to recover from it. What do you do? The US Commerce Department’s National Institute of Standards and Technology (NIST) has produced...

read more