Despite the benefits - zIIP processors are typically less expensive to purchase and also run at full speed on sub-capacity CPU models - zIIP processor usage may not always be what one hopes for.
z/OS Performance Monitoring Best Practices for 2020
These best practices for z/OS performance monitoring will take your mainframe management from reactive and costly to proactive and efficient in no time.
2020 Vision into z/OS Infrastructure Operation and Availability
More than ever before there is a need to see faster, farther, and deeper into the operation and performance of z/OS infrastructure areas. View this webinar to learn how.
Avoiding High Asynchronous Replication Response Times on z/OS Disk
What to do when you have ongoing exceptions for high asynchronous replication response times on one of your primary disk subsystems.
Managing the Gap in IT Spending and Revenue Growth in your Capacity Planning Efforts
Capacity planning is important, but don’t let the importance of future capacity needs for the budget drive you to overlook opportunities to building a bridge toward better performance and longer term efficiencies.
Throwing out the Rolling Four-Hour Average with Tailored Fit Pricing, Enterprise Consumption
The Rolling 4-Hour Average (R4HA) is a measurement of your average speed, over four hours; Tailored Fit Pricing measures precisely how far you drove.
Observability, Availability, Scalability and White Box Analytics
In this blog, we describe what observability means, how it relates to availability, how it impacts scalability and how IntelliMagic Vision fits into the observability landscape.
Intelligent Analysis of TCP/IP z/OS Encryption Readiness Technology Summary Data
TCP/IP’s z/OS Encryption Readiness Technology (zERT) feature provides a single source of data to determine which traffic to and from your site is cryptographically protected by protocols like TLS, SSH, and IPSec, and which is not protected.
How to Use IBM’s zERT to Identify Unencrypted Connections
The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections.