Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

IBM MVS

RSS Feed    Add to Google    Add to My Yahoo!
IBM MVS White Papers (View All Report Types)
 
Robust Infrastructure for SOA: A Technical Introduction to WebSphere Application Server V6.1
sponsored by IBM Software Group
WHITE PAPER: IBM WebSphere Application Server, Version 6.1 is the foundation of the IBM WebSphere software platform and is the key building block for a Service Oriented Architecture (SOA).
Posted: 16 Nov 2006 | Published: 01 Nov 2006

IBM Software Group

Reduce CPU Usage with 'SMART' SQL
sponsored by BMC Software, Inc.
WHITE PAPER: This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9.
Posted: 30 Nov 2009 | Published: 30 Nov 2009

BMC Software, Inc.

The IBM DB2 Analytics Accelerator for z/OS, V2.1
sponsored by IBM
WHITE PAPER: The survival of a business is directly related to how quickly they can make strategic decisions. This white paper explores an analytics accelerator that expedites complex queries, allowing you to respond quickly to changing conditions.
Posted: 09 Jul 2012 | Published: 01 Oct 2011

IBM

Dynamic Initiators That Give You the Control You Need
sponsored by MVS Solutions
WHITE PAPER: This paper discusses the initiator requirements, and how ThruPut Manager optimizes and automates batch job queuing and initiation.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

MVS Solutions

Mainframe Performance Management: A New Twist
sponsored by CA Technologies.
WHITE PAPER: Read this white paper featuring mainframe expert Wayne Kernochan to gain insight on insight on performance management software - specifically as it relates to the mainframe - and on why this technology is more important now than ever before.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

CA Technologies.

OMEGAMON Extended Insight- Analysis: Where is your application spending time?
sponsored by IBM
WHITE PAPER: The limited amount of infomation provided by traditional DB2 for z/OS monitoring makes it difficult and time-consuming to isolate problems within the multiple layers of today's Java, CLI (SAP), and .NET applications. Read this paper to discover a monitoring alternative that provides the detailed information needed for modern applications.
Posted: 14 Feb 2012 | Published: 31 Dec 2011

IBM

The CIO's Guide to Mainframes: Evaluating Sourcing Strategies to Mitigate Risk
sponsored by Windsor Group
WHITE PAPER: Discover in this guide how to formulate a sourcing strategy for your mainframe, starting with a baseline to identify how your decisions will affect staff, budgets, compliance, and cost, and align your outcome to current needs and future direction.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

Windsor Group

5 Key Business and Technology Needs Being Met by SDN and NFV
sponsored by MASERGY
WHITE PAPER: As the business landscape transforms, IT departments need to understand how emerging technologies like software defined networking and network function virtualization can meet business needs. Access this white paper to discover 5 key business and technology challenges that are being met by SDN and NFV.
Posted: 16 Mar 2016 | Published: 02 Mar 2016

MASERGY

Forget Hand-Coding: 5 Development Challenges to Consider
sponsored by OutSystems
WHITE PAPER: In this white paper, you'll explore 5 development challenges to consider when using hand coding over a RAD platform as a development method. Learn why apps typically require 10x more work today, and tools that make development times faster and more simplified.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement