Blog

zIIPing Along

Despite the benefits - zIIP processors are typically less expensive to purchase and also run at full speed on sub-capacity CPU models - zIIP processor usage may not always be what one hopes for.

Read more
Blog

z/OS Performance Monitoring Best Practices for 2020

These best practices for z/OS performance monitoring will take your mainframe management from reactive and costly to proactive and efficient in no time.

Read more
Webinar

2020 Vision into z/OS Infrastructure Operation and Availability

More than ever before there is a need to see faster, farther, and deeper into the operation and performance of z/OS infrastructure areas. View this webinar to learn how.

Watch Webinar
Blog

Avoiding High Asynchronous Replication Response Times on z/OS Disk

What to do when you have ongoing exceptions for high asynchronous replication response times on one of your primary disk subsystems.

Read more
Blog

Managing the Gap in IT Spending and Revenue Growth in your Capacity Planning Efforts

Capacity planning is important, but don’t let the importance of future capacity needs for the budget drive you to overlook opportunities to building a bridge toward better performance and longer term efficiencies.

Read more
Blog

Throwing out the Rolling Four-Hour Average with Tailored Fit Pricing, Enterprise Consumption

The Rolling 4-Hour Average (R4HA) is a measurement of your average speed, over four hours; Tailored Fit Pricing measures precisely how far you drove.

Read more
Blog

Observability, Availability, Scalability and White Box Analytics

In this blog, we describe what observability means, how it relates to availability, how it impacts scalability and how IntelliMagic Vision fits into the observability landscape.

Read more
Video

Intelligent Analysis of TCP/IP z/OS Encryption Readiness Technology Summary Data

TCP/IP’s z/OS Encryption Readiness Technology (zERT) feature provides a single source of data to determine which traffic to and from your site is cryptographically protected by protocols like TLS, SSH, and IPSec, and which is not protected.

Watch video
Video

How to Use IBM’s zERT to Identify Unencrypted Connections

The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections.

Watch video