Blog
FEATURED POST
DTS Webinar Recap: We’ve Got a Problem — An Introduction to z/OS® Dumps and Debugging Tools
In large enterprises, the most complex and mission-critical business applications are entrusted to z/OS because of its unrivaled security and reliability. In any complex environment, however, unexpected errors and unplanned failures are bound to occur. When they do…
DTS Webinar Recap: Understanding IBM® z/OS® Disk Metadata: Catalogs, VTOCs, VVDSs, Indexes, and More!
The way that DASD (direct access storage device) data is stored on z/OS® is very different from distributed/open systems. An understanding of just how z/OS datasets are created, located, accessed, and deleted is as important…
DTS Webinar Recap: Secure Data for Everyone – Pervasive Encryption and z/OS® Storage Management
Data security is making the news these days far too often, and for all the wrong reasons. Because the data in your IBM® z/OS® system is the most valuable and useful data in the enterprise, it is also the data cybercriminals…
Enabling Event Analysis to Spot Unusual Access Patterns With DTS Software’s ACC Monarch
The Direct Access Device Space Manager (DADSM) handles key functions in z/OS that dictate much of what happens to a dataset during its lifecycle. Creation and deletion are the most obvious, but this component can also extend a dataset to a new volume, release unused…
Breaking Down Sequential Data Sets and Their Limitations on z/OS®
Unlike Partitioned data sets, which are useful if you have a bunch of different types of data that you want to keep all in a single data set, or VSAM data sets, which are useful for more sophisticated types of access by key or by relative record, sequential data sets are the…
Cyber Forensics — How Storage Plays a Critical Role in Security and Regulatory Compliance
Mainframe storage has changed a lot over the years, and the amount of it available in terms of both memory and disk/tape has grown substantially. Although this gradual progression has over time liberated mainframers from many…
Dive Into DTS Software’s “Mysteries of SMS” Webinar Series
In Spring 2021, DTS Software CTO Steve Pryor hosted four different webinars designed to walk attendees through the ins and outs of the four major SMS constructs: the Data Class, Storage Class, Management Class, and Storage Group. Pryor has been designing and…
USE CASE: How ACC Monarch Can Help As You Migrate Away From Obsolete Programs
Allocation Control Center (now ACC Monarch) was one of DTS Software’s very first products, and it’s difficult to describe exactly what it does because the potential use cases are so varied. In essence, ACC Monarch enforces a set of user-defined rules, or policies, somewhat…
Shoring Up Security with SIEM
In 2005, Gartner’s Mark Nicolett and Amrit Williams described a new breed of security tool combining Security Information Management (SIM) with Security Event Management (SEM). Today, the Security Information and Event Management (SIEM) market exceeds $4 billion — a figure that’s expected to grow to $5.5 billion by 2025 — and these capable tools are…