Blogs

Blog Viewer
Recovery Expert has now introduced the ability to generate both recovery plans and the recovery JCL for a plan in batch.  This comes in handy if you have a need to run a reoccurring job that will build the recovery plans and then execute the results of that recovery plan.  It is also useful when having to build a recovery plan for a large number of objects.  Doing so can sometimes tie up your ISPF session while the plans/recovery JCL is being built.  Now that it can be done in batch it will help free up your TSO session and can be scheduled when the system is not as busy. If “Batch” is selected for the Generation Method, the new panel " Batch Plans Generation ...
0 comments
The mesmerizing digital magician Keelan Leyser uploaded a new video to his YouTube channel where he used artificial intelligence to assist him to perform his mind reading tricks. It has always difficult to explain how Keelan achieves his effects. Originally, Keelan has been known to use smart devices and has been seen pulling objects in and out of the screen of a smart device like an iPad. However, recently Keelan has decided to take things a step further by introducing A.I. into his show to create mind reading effects mentalists and mind readers could only dream about just a few years ago. Traditionally, magicians have kept their mysteries ...
0 comments
another test
0 comments
test blog another
0 comments
T tags taxonomy tcp thin-provisioning throughput tier toc transaction U udp V v5000 v5000e v7000 v9000 vaai volume volume-mirroring vsc vsc-for-storwize vvol W windows windows-10 windows-server-2008 windows-server-2012 windows-server-2016 X Y Z #tags #taxonomy
0 comments
S saas san san-switch san-volume-controller scsi scsi-unmap scu signup smtp snmp spectrum-archive spectrum-cdm spectrum-connect spectrum-control spectrum-copy-data-management spectrum-discover spectrum-protect spectrum-protect-plus spectrum-scale spectrum-storage spectrum-virtualize spectrum-virtualize-for-public-cloud spp ssh ssic stat storage-capacity-unit storage-insights storage-insights-for-spectrum-control storage-insights-pro storage-pool storwize support svc #tags #taxonomy
0 comments
I ibm-cloud ibm-cloud-object-storage ibm-support icos instance installation interoperability interactive io-group iops iot ip-replication isc iser iscsi isp isv4pc J K L latency linux lfts M metadata mib N nvme nvme-of O offering on-premise oracle P product-logo Q qos R rdbms rdma recommendation remote-copy remote-mirroring remote-support remote-support-assistance rhel7 roce rpo rsa rto #tags #taxonomy
0 comments
A a9000 a9000r apd aix all-path-down aws B basic block-storage broadcom brocade C case cdm certificate change-volume cli code-upgrade comparison compression compressed-volume copy-data-management D data-collector data-reduction-pool deduplication deduped-volume deduped-and-compressed-volume demonstration disaster-recovery drp E e-mail easytier editions effective-capacity enclosure ethernet external-storage F fibrechannel filesystem fcoe flashcopy flashsystem flashsystem-900 flashsystem-5000 flashsystem-5010 flashsystem-5030 flashsystem-5100 ...
0 comments
In Dec 2019, the latest offering of IBM Z System Automation was made generally available and included many improved capabilities which support a higher degree of automation while greatly enhancing productivity. Let’s take a closer look. Improved group management To provide an intuitive and modernized operation experience for application groups, System Automation V4.2 introduces the application groups of model 2 to distinguish them from existing application groups that are referred as model 1 groups.   In model 2, preference values are hidden from users, and are transformed into scenarios. Administrators can then choose from a set of predefined ...
0 comments
Hello there. I am Adem Aldemir and I work as IBM Z Software Engineer at IBM Turkey.   🚀 👨🏻‍💻 Notice ❗️ When you enter 'zos.public.jcl(part2)' in TSO Ready prompt,   it processes a background job allocating new personal data sets. So, I lost all my data sets. I completed the first challenge, but I didn't the others again.   I finished all the challenges once and got my Master the mainframe 'Practical Experience' badge. I created a new data set to write this blog. So please pay attention to that command. 😕 CHALLENGE #11 In this challenge, I wrote the necessary commands when you look at the first video, but the ...
0 comments
Hello there. I am Adem Aldemir and I work as IBM Z Software Engineer at IBM Turkey. 🚀 👨🏻‍💻 CHALLENGE #6 In this challenge, we will work on JCL code. On MTM'19 challenge #06 official page, it explained obviously by the MTM team. But I just want to experience when I record to you and to see the issues together with you on the videos. 👾 CHALLENGE #7 Unlike the previous challenge, we will create a data set here and change the JCL code in it. CHALLENGE #8 Here we will deal with data character encoding such as Bits, Nibbles, Bytes, Hexadecimal, EBCDIC, ASCII, and BCD.Thanks to this challenge, ...
0 comments
Introduction :  This blog post is a brief guide to help you complete the challenges included in “Master the Mainframe” contest part 2, prepared by Baris Aran. Some Useful Information: -If you are using Mac, and ISPF is frozen with this sign around the bottom left: -Press “ kntrl ” button to make things work again. —————————————————————————————————————————————————————————————————————————————— -Almost whenever you see “ *** ” as the last statement on the current page, you should press enter to continue. —————————————————————————————————————————————————————————————————————————————— -Whenever you see Z##### in these ...
0 comments
Originally updated on  September 27, 2017 by  SwathiBN Reviewer :  Vincent Tkac, STSM for Sterling B2B Integrator Group.   XML validation without a DTD results in unwanted error messages to be written out to the noapp.log.timestamp file                                              We often notice the noapp log file fills up fast with error messages. A sample excerpt of the error messages is shown below.   [2017-05-25 05:10:12.062] ALL 000000000000 GLOBAL_SCOPE [Error] :1:46: Document root element "result", must match DOCTYPE root "null". [2017-05-25 05:10:12.506] ALL 000000000000 GLOBAL_SCOPE [Error] :1:46: Document ...
0 comments
Originally updated on August 17, 2017 by  Liviu Rode-an Single Consumer in IBM Sterling B2B Integrator cluster with MQ Introduction FIFO processing is a critical requirement in several markets including transportation and logistics.  FIFO or "First In First Out" processing means that messages are processed strictly in the order they were received.  For example a sequence like: PO Create, PO Change, PO Change and PO Cancel must not be executed out of oder where the PO Cancel is seen first, ignored as invalid and then the PO is later Created.     The simple way to handle FIFO requirements is to single thread but that ...
0 comments
Hello there. I am Adem Aldemir and I work as IBM Z Software Engineer at IBM Turkey. 🚀 👨🏻‍💻 CHALLENGE #1 Hey, Ready to start? 😃 Okey. Let’s get start. 👋🏼 Actions Below actions are must to complete the challenge 1. Enter  time  to display time and date Enter  netstat home  to display system IP address Enter  listc  to display a current list of your personal data sets Enter  submit 'zos.public.jcl(part2)'  to process a background job allocating new personal data sets Enter  listc  to display a current list of your personal data sets Enter  submit 'zos.public.jcl(tsojcl)'  to process a background ...
0 comments
Originally updated on  January 10, 2018 by  BipinChandra Written & Edited By Naveen Suryawanshi & Bipin Chandra Introduction: In today's world, multiple businesses need to communicate with each other to meet their needs. As the transactional communication between different applications grows, there is a proportional growth in the data that needs to be stored by each of them There could be certain limitations/use cases with each application/enterprise which could force them to find an alternate plan for their data storage. For e.g. a. Low scale enterprises not having enough bandwidth to accommodate for storing ...
0 comments
Although being a highly unlikely occurrence, IT departments need to spend resources to ensure that their business critical data and applications can be successfully recovered in the event of an unplanned failure of their production site. Minimizing data loss is the highest priority but it can be at a tradeoff with application availability. Typically, following an unplanned outage, the entire data center can be restarted at the disaster recovery (DR) site but this can take several hours or longer before the applications are available.   What is sometimes overlooked is how to maintain application availability for a far more likely scenario, a planned outage ...
0 comments
You may have seen some of my social media posts on how to incorporate your passions and purpose into your job. Recently, I gained valuable insights from several of my speaking engagements around the world, as well as from a very good friend and colleague, Dux Raymond Sy, Chief Marketing Officer from AvePoint , and refined my thoughts into a snackable checklist. 1. Define Your Vision Be an AND not an OR. What’s Your Passion? Do You have a Purpose? Dux and I are both ANDs. We are not ORs. Everyone should see themselves as ANDs. For example, I define myself as a tech for good advocate, digital transformation leader, Founder, Board Member, entrepreneur, ...
0 comments
A few quick updates as you head into the well-deserved weekend. Happy Friday, everyone! New in-person event March 10, 7-10pm in Indianapolis, IN:  IndyPy Mixer: IBM Workshop - Bias in Machine Learning Recording available February 13:  DL Master Class III - Model Performance, Quantization, & Hyperparameter Search Reminder Last days to merge teams (today) and enter the WiDS Datathon 2020 competition (Monday, February 24):  Just do it! WiDS Datathon 2020 last days to register – And WiDS Excellence in Research Award
0 comments
Network Security/Data Security Security isn't only a problem for large companies.   Every company is at risk of being hacked. In fact, small businesses are at greater risk because many of them don't even have a security policy.   Complacency is not a defense. The average ransom asked in the recent WannaCry ransomware attack was $1,300 – hackers are targeting smaller businesses.  Data Backup Issues (i.e., you don't do it) Data backup is something that every business should do, every business says that they have a plan for, and that many small to medium businesses DON'T do. That's a mistake.   In conjunction with issue number one, security, a ...
0 comments