Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

VTAM

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Virtual Telecommunications Access Method
DEFINITION: VTAM (Virtual Telecommunications Access Method) is an IBM application program interface (API) for communicating with telecommunication devices and their users. VTAM was the first IBM program to allow programmers to deal with devices as "logical units" without having to understand the details of line protocol and device operation. Prior to VTAM, programmers used IBM's Basic Telecommunications Access  … 
Definition continues below.
VTAMReports
151 - 175 of 944 Matches Previous Page  | Next Page
Computer Weekly – 11 November 2014: Migrating away from Windows Server 2003
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as Microsoft prepares to end support for the popular Windows Server 2003 operating system, we assess the risks. We hear from IT leaders delivering benefits from enterprise social media use to improve staff collaboration. And we look at criticisms from Oracle users about software licensing. Read the issue now.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

ComputerWeekly.com

Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now.
Posted: 11 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Computer Weekly – 18 November 2014: Cloud providers are coming to Europe
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, more cloud providers are building datacentres in Europe in response to data protection concerns – we examine the latest developments. Microsoft is embracing the cloud and decoupling Office from Windows – we look at the implications for corporate IT. And we analyse the rise of desktop as a service. Read the issue now.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

ComputerWeekly.com

Computer Weekly – 19 November 2013: Software-defined networking explodes
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing.
Posted: 21 May 2012 | Published: 22 May 2012

ComputerWeekly.com

Computer Weekly - 7 February 2012: IT investment priorities
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we examine exclusive research into the investment priorities of UK IT decision-makers, which shows virtualisation, Windows 7 and security as the top areas for spending this year. We analyse the changing nature of database architecture; and the BBC’s Chief Technology Officer talks about IT plans for the broadcaster.
Posted: 06 Feb 2012 | Published: 07 Feb 2012

ComputerWeekly.com

Computer Weekly 15 November 2011: Read this week's issue of the UK's leading technology publication, with all the latest news, analysis and opinion for IT managers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now.
Posted: 14 Nov 2011 | Published: 11 Nov 2011

ComputerWeekly.com

Computer Weekly 24 January 2012: Has Microsoft succeeded with Trustworthy Computing?
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we mark the 10th anniversary of Microsoft’s Bill Gates announcing the Trustworthy Computing initiative, and ask if it has made IT more secure. We look at what Oracle’s latest developments mean for its software users running rivals’ servers, and conclude our Buyer’s Guide to IT consumerisation. Download the issue now.
Posted: 23 Jan 2012 | Published: 24 Jan 2012

ComputerWeekly.com

Computer Weekly – 10 December 2013: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and also select 10 rising stars to look out for in 2014. We look back at the big changes in the datacentre environment this year. And we examine the growing popularity of agile development. Read the issue now.
Posted: 09 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Computer Weekly – 19 February 2013: Software Developers in demand
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at why companies are struggling to attract the right talent for in-house IT. We investigate why CIOs are not happy with Oracle's Fusion strategy. And betting company William Hill tells us how mobile technology has changed the high street bookmaker. Read the issue now.
Posted: 18 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Computer Weekly – 23 April 2013: Time runs out for Windows XP – what should you do?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with less than a year until Microsoft ends support for Windows XP, we examine the options for the many firms still using the operating system. The PC market has seen a record slump in sales - what does it mean for the IT industry? Plus, we evaluate progress in moving software to the cloud. Read the issue now.
Posted: 22 Apr 2013 | Published: 23 Apr 2013

ComputerWeekly.com

Computer Weekly – 25 February 2014: Banking with dinosaurs – the legacy IT crisis in financial services
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the IT problems at high-street banks, and learn how outsourcing led to the loss of key legacy IT skills. We ask what role wearable technology could have in enterprise IT. And we take an in-depth look at the tools for using Microsoft Azure for building hybrid clouds. Read the issue now.
Posted: 24 Feb 2014 | Published: 25 Feb 2014

ComputerWeekly.com

Computer Weekly – 26 November 2013: Embracing wearable technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the London researchers developing multi-sensory communications via wearable mobile devices. We report from the Gartner Symposium on how CIOs are turning away from traditional IT suppliers. And we look at the role of the IT leader in 2020. Read the issue now.
Posted: 25 Nov 2013 | Published: 26 Nov 2013

ComputerWeekly.com

Computer Weekly – 28 May 2013: The Ministry of Defence gets agile
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how agile development is helping the UK Ministry of Defence deliver complex military software. The CIO of the Lotus Formula One team explains the importance of data analytics to winning races. And we look at the IT innovation challenges facing financial services firms. Read the issue now.
Posted: 28 May 2013 | Published: 28 May 2013

ComputerWeekly.com

Computer Weekly – 3 December 2013: The future of local government IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how visionary IT leaders in local government plan to transform the delivery of digital public services. Our latest buyer's guide looks at the technology challenges of the internet of things. And do businesses dealing with tech-savvy consumers need a new approach to IT management? Read the issue now.
Posted: 02 Dec 2013 | Published: 03 Dec 2013

ComputerWeekly.com

Computer Weekly – 5 November 2013: Windows Server 2012 R2 reviewed
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the latest release of Microsoft's Windows Server software, and assess its new features for cloud, virtualisation and device management. We visit Chinese networking giant Huawei to hear its business challenges over US security. And we look at the options for financing IT purchases. Read the issue now.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

ComputerWeekly.com

Computer Weekly – 7 January 2014: The end of Windows XP: What it means for you
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at why IT giants like Microsoft and Google are building datacentres in the Nordic region, and what this could bring to CIOs. Windows XP support ends in just 3 months – our buyer's guide examines what you need to do. And the CIO of Ikea talks about international multichannel retail. Read the issue now.
Posted: 06 Jan 2014 | Published: 07 Jan 2014

ComputerWeekly.com

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now.
Posted: 07 Jan 2013 | Published: 08 Jan 2013

ComputerWeekly.com

Concurrent Computing for SCA Applications: Achieving Scalability in a Service-oriented Application Environment
sponsored by Rogue Wave Software
WHITE PAPER: The SCA specifications define a programming model for assembling software services in a service-oriented architecture that offers great flexibility and agility.
Posted: 21 Jul 2008 | Published: 01 Jan 2007

Rogue Wave Software

Configuration and Change Management for IT Compliance and Risk Management
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements.
Posted: 08 Jan 2009 | Published: 01 Nov 2007

Tripwire, Inc.

Configuration Auditing – The Next Critical Step in Compliance
sponsored by nCircle
WHITE PAPER: In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

nCircle

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech
151 - 175 of 944 Matches Previous Page    5 6 7 8 9 10    Next Page
 
VTAM DEFINITION (continued): …  Method (BTAM) to communicate with devices that used the binary synchronous (BSC) and start-stop line protocols.VTAM became part of IBM's strategic Systems Network Architecture (SNA) which in turn became part of the more comprehensive Systems Application Architecture (SAA). As the computer industry turned to open standard architectures, IBM began to deemphasize its proprietary architectures in favor of becoming a participant and leader in developing open standard architectures. However, most of its customer base retains a large investment in legacy applications and system skills based on VTAM, … 
VTAM definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement