Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

VTAM

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Virtual Telecommunications Access Method
DEFINITION: VTAM (Virtual Telecommunications Access Method) is an IBM application program interface (API) for communicating with telecommunication devices and their users. VTAM was the first IBM program to allow programmers to deal with devices as "logical units" without having to understand the details of line protocol and device operation. Prior to VTAM, programmers used IBM's Basic Telecommunications Access  … 
Definition continues below.
VTAMReports
176 - 200 of 902 Matches Previous Page  | Next Page
Cut Costs Like AWS
sponsored by VMTurbo
WHITE PAPER: This exclusive whitepaper offers up some strategies for maximizing savings in your virtualized environment.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

VMTurbo

CW Buyer's Guide: Government IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page Computer Weekly Buyer's Guide takes you through the UK government's open source initiatives and explains how they could benefit your business.
Posted: 22 Oct 2012 | Published: 05 May 2012

ComputerWeekly.com

CW Buyer's Guide: Software-defined networking
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

SearchSecurity.com

CW Buyer's Guide: Windows 8
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page buyer's guide looks at the implications of Windows 8 for corporate IT.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

ComputerWeekly.com

CW Buyers Guide: Software as a Service
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how a CIO can best integrate Saas with existing on-premise software, the restrictions behind Saas and why consulting expert service providers is a good idea.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

ComputerWeekly.com

CW Special Report on CA Technologies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special independent report from Computer Weekly, updated for 2014, gives you the facts on CA, its strategy, products and services and financial performance.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

CW+: IDC Report - How to manage documents in the enterprise
sponsored by ComputerWeekly.com
WHITE PAPER: In recent years C-level executives in many of the world's largest and most successful organizations have been forced to introduce a wide range of cost-cutting measures as macroeconomic forces continue to create a challenging and uncertain trading environment.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

CW+: Manage your work more effectively with The Power of Slow
sponsored by ComputerWeekly.com
WHITE PAPER: Borrowed from the Japanese term for “chatter,” pecha kuchahas been praised as the new way to communicate in business.
Posted: 20 Oct 2011 | Published: 27 Oct 2010

ComputerWeekly.com

Data Deduplication: Types and Benefits
sponsored by Dell Software
EGUIDE: In this e-guide, learn from expert Rachel Dines, an analyst with Forrester Research, the differences between software and hardware backup deduplication, post process vs. inline deduplication as well as fixed and variable-block length dedupe.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Dell Software

Customer Perspectives on the Benefits of a Collaborative Process to Deliver Software Quality
sponsored by IBM
WHITE PAPER: This Hurwitz and Associates whitepaper shares the successes, challenges and future plans of three companies - Sogeti Group, Accident Compensation Corporation (ACC), and Scotiabank.
Posted: 11 Sep 2009 | Published: 11 Sep 2009

IBM

Customer Relationship Management - Integration for a Customer Centric View
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper provides a valuable list of factors for executive management, IT decision makers and sales professionals to consider when planning a successful CRM integration project.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Sage (UK) Limited

Customers Achieve Extreme Performance at Lowest Cost with Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: This white paper contains a sampling of real business results that organizations in a variety of industries worldwide have achieved by implementing Oracle Exadata. Read now to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation

Dashboard Software Buyers Guide
sponsored by LogiXML
WHITE PAPER: This paper will guide you through the process of understanding organizational requirements, which will dictate which software is the best fit to meet your needs and accomplish your goals. Based on these organizational requirements, we provide an evaluation checklist to evaluate various solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

LogiXML

Data Center Operational Efficiency Self-Assessment
sponsored by IBM
ASSESSMENT TOOL: Participate in this quick five minute self-assessment to find out which areas in your data center infrastructure could use operational efficiency improvement.
Posted: 03 Mar 2014 | Published: 31 Dec 2012

IBM

Data Warehousing and Business Intelligence for IBM System z
sponsored by IBM
WHITE PAPER: In this paper you will read about how IBM offers not only a flexible, scalable, cost-effective mainframe platform - the IBM System z™ - but also delivers a portfolio of innovative business intelligence and data warehousing solutions for the mainframe.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

IBM

Database Middleware: Struggling with Performance?
sponsored by Progress DataDirect
WHITE PAPER: Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses.
Posted: 03 Feb 2011 | Published: 03 Feb 2011

Progress DataDirect

DataSheet: Rational Quality Manager
sponsored by IBM
DATA SHEET: IBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

IBM

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012

Intel

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Defending Data on iOS
sponsored by WatchDox
WHITE PAPER: Learn why – despite the relatively secure nature of the system – it is vital to include iOS in your data security policies. Uncover best practices for securing data on these consumer-owned smartphones and tablets as well as a variety of options to help you achieve this.
Posted: 15 Jun 2012 | Published: 14 Jun 2012

WatchDox

Dell Cuts IT Work, Tightens Security, Improves Performance with New Software
sponsored by Dell, Inc. and Intel®
CASE STUDY: Dell is planning to upgrade its 100,000 desktop and portable computers to the Windows® 7 operating system to reduce desktop management costs and enhance data security. Read this case study to learn more about Dell's business needs as well as the features and benefits achieved from Microsoft's solutions.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

Dell, Inc. and Intel®

Dell High Availability Solutions Guide for Microsoft Hyper-V
sponsored by Dell and Microsoft
WHITE PAPER: This Dell High Availability Solutions Guide for Microsoft Hyper-V introduces different options to implement HA for Hyper-V environments.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Dell and Microsoft

Dell High Availability Solutions Guide for Microsoft Hyper-V
sponsored by Dell, Inc.
WHITE PAPER: This Dell High Availability Solutions Guide for Microsoft Hyper-V introduces different options to implement HA for Hyper-V environments.
Posted: 28 Jan 2010 | Published: 11 Dec 2008

Dell, Inc.
176 - 200 of 902 Matches Previous Page    6 7 8 9 10 11    Next Page
 
VTAM DEFINITION (continued): …  Method (BTAM) to communicate with devices that used the binary synchronous (BSC) and start-stop line protocols.VTAM became part of IBM's strategic Systems Network Architecture (SNA) which in turn became part of the more comprehensive Systems Application Architecture (SAA). As the computer industry turned to open standard architectures, IBM began to deemphasize its proprietary architectures in favor of becoming a participant and leader in developing open standard architectures. However, most of its customer base retains a large investment in legacy applications and system skills based on VTAM, … 
VTAM definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement