Tech Talk

The Need For Erase


By Bill Wilkie, Dino-Software (5-minute read)
An interesting scenario challenging the security of temporary data sets and sort work areas was brought to our attention, so we are conducting some market research on the subject and request readers to weigh in with their opinions.

etj_vr51

ETJ First Impression: VR 5.1


VELOCI-Raptor Release 5.1 – Enabling Applications to Perform at Their Peak
By Denny Yost, ETJ Magazine (5-minute read)
With a significant percent of Fortune 500 size organization’s running on mainframe systems, their value and importance are critical to the continued success of the enterprise. Yet, running these applications in the most efficient manner possible to speed execution time and minimize resource usage continues to be challenging if the proper steps are not taken.  A key area of focus is always determining and setting the best buffering environment for an application when accessing VSAM and non-VSAM data.  Read More

Managing HSM

Proactively Controlling the Swarm
By Jeremy Schilke, Dino-Software (4-minute read)
Perhaps the “per byte” price of storage has dropped, but due to the sheer rate and volume by which data is produced and retained, the reality is that the overall effort and cost has not lessened. Furthermore, collecting, organizing, protecting and then ensuring accessibility...  
Read More . . . 

DINO-UDM-Welcome300


 

ETJ First Impression: UDM

Reduces Costs, Eases Storage Management Through a Single Pane of Glass
By Denny Yost, ETJ Magazine (5-minute read)
The Challenges – Today, most Fortune 500 size companies have an abundance of mission-critical data to manage that continues to grow at a seemingly never-ending pace. At the same time, z/OS storage management personnel with decades of experience are retiring and less experienced personnel are agonizing under the load of trying to manage this data while attempting to quickly gain the vast experience needed to manage these environments. Read more . . .
Buffer-Optimization-Chart

Mysteries of Buffer Optimization Solved!

A Good Buffering Product Does It Automatically – and Does It All the Time
By Bill Hitefield, Dino-Software (12-minute read)
In some respects, IBM’s access methods (especially VSAM) are like software black boxes – you pass a request to them, they go off into the Enchanted Forest, and sometime later, data is either retrieved or written by your application. As application developers, we have some modicum of control over when, why, and how often we make requests to the access method. It is that second part of the process, the “sometime later,” that we view as a part of application performance that we seemingly have no means of influencing. Read More . . .