ebook img

ISD news and views PDF

20 Pages·1997·1.1 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview ISD news and views

— 279 AApril•|.^/^3(n^v<.'io 3 0|8|l6iii4li|iii1|i0Jii0il4ilili»3il0'l>0'l7ill'6 Volume 14 1 . Number 10 1997 Published by Information Services Division J^ A Newsletter Dedicated to Information Technology in the State ofMontana MT PRRIME Why is visioning necessary? First, it allows us to identify the benefits which can be derived by ^\^jCtA S WLCOlS•Hk1o^M^^l2lnv^B^ reengineering these processes. Second, the vision of COLLEESiSflhese processes should work will help drive our «^Y m procurement process. Finally, visioning allows us to J^yf\fl i. p C( ]^^Q tap the knowledge ofkey state personnel to make I our processes more efficient. In addressing this group, MONTANA &TATE US^'^'^overnor Racicot recently wrote, "There are MT PRRIME (the Project to numerous requirements for a successful software Reengineer the Revenue and p^r.. installation ofthe scope envisioned by Information Management "^^si^.^ MT PRRIME. The most important Environment) has met ^^'^**^:j^_ requirement is active and with initial legislative '^^ meaningful involvement by state » approval. As ofthis . employees. We need to leverage writing (March 12), t|ie your knowledge ofour core proposal has receivecP business processes to take unanimous approval from advantage of the efficiencies the House Long Range Planning availablewith new technology." Committee. Ifapproved by the legislature, the project INSIDE would replace our existing core business systems with state-of-the-art commercial software; a giant "Quicken" for state government, ifyou will. In MTPRRIMEGetsLegislativeNod..„ I CalendarofEvents _ 2 addition, the project would initiate a central revenue Year2000SoftwareTools 2 collection center in the Department ofRevenue. Year2000Testing „ 4 DisasterRecoveryPlanning 4 Visioning Studies Underway METNETGoestoCourt! S Doing"IT'Right 6 Chargesfor ManualJobScheduling 6 Mid-tierSecurity 7 Deloitte and Touche Consulting Group is currently Tape ManagementSystem Upgrade 8 assisting the State with visioning several key business OS/390 9 processes. Three visioning subcommittees are NetConnectandWinFrame- ISDOffersaNewMethodofRemoteAccess 10 reviewing these processes: MainframeDatasetNamesand PC FileTransfers 12 ITMG Meeting 1 1) Payroll and Benefits, chaired by Mark Cress CustomerSupportCenter AddsHours 12 2) Budgeting, chaired by Bill Salisbury ZIPITips 13 Portable ZIPlOfficeMail Exchange Failure 13 3) Purchasing and Accounts Payable, co-chaired by RunaWindows95ScreenSaverAnytime! 14 Connie Griffith and Marv Eicholtz WordPerfectTECHTips IS BuildingReportsinApproach 3.0 15 These processes were chosen for scrutiny primarily WindowsTipsoftheMonth 17 E-Mail RFPUpdate 17 because they've been identified as having great Training Calendar <^. 1 l^.u.'ntial fnr imnrnvpmpnf EnrollmentApplication 1 Editor's Notes 20 ISD News^Views: Darlene V- Dixie^ DonX- Maggie -\- Barbara -- — Marilyn ^Kathy VickiW^Melody____ .^ ^ I Patcharin Last To File News<yViews April 1997 2000 Starting February 3rd, and continuing until early Year April, Deloitte and louche consultants and state personnelwill beworkingfull-timegathering Software Tools information and assisting the Visioning Subcommittees in the development of their process visions. They may have visited your offices already. If you have questions or suggestions, contact Mark, The major advantages in using Year 2000 software Marv, Connie, or Bill, or call the Project Team at MT tools are that they substantially reduce the time PRRIME Visioning Headquarters, extension #7623. required to complete certain Year 2000 project tasks, and they provide an assurance ofaccuracy that is not RFP Development Has readily matched ifdone manually. Many oftoday's Year 2000 software tools are the result of Begun enhancements to maintenance tools that have been in the marketplace for a number ofyears. The MT PRRIME Steering Committee has begun The general categories ofYear 2000 tools include: development ofthe RFP which will be released toward the end ofApril, contingent on legislative Inventory approval. The RFP will provide a detailed list ofthe Impact Analysis types ofsoftware support we need, but not a 'laundry Conversion lpirsto'ceosfsrweiqluliriendclfuudnectisocnrailpitteyd.dPeamrotnsotfrtahteioenvsalwuhatiicohn Testing Miscellaneous will allow us to contrast the differences between existing(PPP,SBAS, PAMS,etc.)and futuresystems. After qualifying vendors, we will visit public sector sites where their software is installed. This is a time consuming but interesting process, and one which will give us the opportunity to fully review the proposed systems. (A & Formore informationcontactDaveAshleyat 444-2032 orEdGlennoftheISDSystemsSupport S Bureauat444-2916,ZIP!,[email protected]. UJ Calendar of Events Inventory April 2 Inventory tools can substantially reduce the time Information Technology Managers Group (ITMG) required tocomplete this task,and theyalsoguaranteea 8:30-10:30am,Rm HI,MetcalfBuilding thoroughnessand accuracythatarevital tothe remainder ofthe process. A software product that is May7 missed during the inventory process could be I8n:3f0o-r1m0a:t3i0onamT,eRchmno1l1o1,gyMeMtacanlafgBeurisldGirngoup (ITMG) ptohtreonutgiahloluytditshaestprrooujsecti.fit remains undiscovered MaI8:ny3f0o1r-3m1a0t:3i0onamT,eRchmno1l1o1,gyMeAtdcvalifsoBruyilCdionugncil (ITAC) Tefhnuenvrciteriooannrmeewniitntsvheintnhtaoatrynexatirosrotloswinfsoaprnecalotlrrgusamon,fitzwfaaotrrieoenx.amSpolme,e May 20 system software or load module libraries only, while SummitNet Executive Council (SEC) others are more comprehensive (source and load 2:00 pm, DPHHS Auditorium libraries and JCL). ^^^ April 1997 News<yViews Impact Analysis nosourcecodecurrentlyexists.TheSource Recovery Companyoffersaservicewherebytheyre-createsource codefrom theload module.Thisproductworks for The purpose ofthis type oftool is to quantify the COBOLsource,COPYbooks,Assembler,andCICS extent ofthe date problem in application systems. maps.Useofthis product/servicedoes notresult in the This information becomes the basis for formulating 100%verbatim re-creationoftheoriginalcodebutisan compliance strategies and developing a work plan to appealingsolution ifthealternativeisre-writingthe implement the required changes. programfromscratch. The more basic impact analysis tools search source Tool Selection code for character strings that might be indicative of datefields(e.g.YY,year,date).Thisisoftenan iterative Considerations processbecausetheinitial runwilllead tothediscovery othfesfoimeleddnaatemefi(eel.dgs.wBiRt-h54n9o),oabsviwoelulsadsatseomreefe"rfeanlsceein Some considerations when evaluating tools include positives"(asearch for"date" selects"update"aswell). the following: Additional functionality that is found in the more What is the hardware platform on which the sophisticated products include parsing and data flow tool runs? Ifit's the same as the application analysis. These products attempt to interpret date execution platform, the advantages are faster references via their usage in a program and processing and ease ofdata access and iterative schematically trace the flow and operations testing. Ifthe tool platform is different than the m performed on all date fields. execution platform (e.g. the tool runs on the PC, 3pi*- while the application runs on the mainframe), the Conversion advantages are that you're not paying for -3 mainframe CPU time and it may have a better user interface (e.g. GUI). In the example cited, the (0 Conversion tools automate the physical expansion of disadvantages would be slower processing and the files/databases to include 4-digit years and/or the inconvenience ofhaving to download data. a insertion ofwindowing logic into application porfoagurtamosm.atTihoenreofisprsoicgneidfuircaalnt(vwairnidaboiwliintgy)intootlhse.dSeogrmeee Irseqtuhierrees?anFyorpreerxeaqmupilsei,tethseofCtwOaBreOLthaAtnatlhyesttool Z tools will only display the program code line 2000 inventory tool requires MS Access for containing a date reference. The user can then reporting. (A manually type in whatever change is desired. More What development environments does the tool sophisticated tools provide for the automatic insertion support? Most tools are not exhaustive in their ofpre-defined windowing macros into the program support ofprogramming languages. For tools logic. offering "limited" support ofspecific languages, make sure the limitations are known and Testing acceptable. What is the ability ofthe tool to either import data from an upstream tool or export data into Texhiissteids ofonreyteoaorlssparroevaidwehetrheepfruondctuicotnsaltihtaytnheaevdeed for a" downstream tool? What are the resource requirements to install Year 2000 testing. These include tools that provide for test data generation, file comparisons, interactive and execute the tool? debugging, and date simulation. What is the learning curve in becoming proficient in using the tool? Miscellaneous Tools What information/reports are generated and how useful are they? (source recovery) Is there a requirement that the tool is packaged with consulting services? Itthaits tgheenreeraalrleyathfeewciprrcoudmusctatnicoen ipnrolgarrgaemsorfgoarniwzhaitcihons The vast majority ofcommercially available Year 2000 tools are for mainframe applicafion NewsO'Views April 1997 ^^^^ environments (COBOL, PL/1, CICS, IMS). Tools for A detailed explanation ofTICTOC in BATCH, PC/LAN-based development environments are often CICS, and with XPEDITER can be found in MVS packaged with a requirement that the vendor provides QuickRef In ISPF just enter "QW TICTOC" on the • the service ofrunning your code through their command line to display the text or, from the MVS ( software. Be wary oftools that have this "package" QuickRef Main Menu select Item TICTOC from requirement, it can be an indication that the product withinTopic"T." is not entirely "bug-free" or ready for a production environment. For more information contact Glenn Stroop ofthe Systems Support Bureau at 444-2910, ZIP!, or E-Mail Remember that no single tool provides a complete at [email protected]. solution and most importantly, NO TOOL ISA SILVER BULLETSOLUTION. Tools can improve Disaster productivity through improved accuracy, speed, and completeness, but all tools still require a manual Recovery validation effort. Planning For more information contact Dan Sidor ofthe Year 2000 Project Team and ISO's Policy, Development and Customer Relations Bureau at 444-2029, ZIP!, or E-Mail at [email protected]. What is a disaster?A disaster occurs when damage is severe enough to render normal data processing Year 2000 Testing ISD just acquired TICTOC from ISOGON Corporation. TICTOC software allows you to run different jobs and applications with different "virtual" dates and times. On a job-by-job basis, you can specify what date the "system date" will be when the job requests "date" information. This lets you test how programs will run in the future, for example on January 1, 2000, without affecting other jobs running at the same time and without requiring operator intervention. Use TICTOC to test a job by adding a fewJCL statements to your batch job. Specify the virtual date with: VIRTDATE=2000/01/01 Use TICTOC to test your CICS transactions by entering the Transaction ID you want to test and the "virtual" date in the TICTOC Primary Option Menu. Some software products have expiration dates that don't allow the software to execute after a set date. One ofthese products is Finalist, the address certification software from Pitney Bowes. Ifyou attempt to use TICTOC with Finalist it will abend capabilityinadequateorincapable. Disasters comein with a message indicating that the product has many forms and levels ofseverity. They may be expired. §^}^ April 1997 NewsO"Views natural, technological or civil (human) in nature; they plan. The current focus is on initial contingency maybeshort-termorlong-term;and they maybelocal, management plans for a variety ofdisaster scenarios. regional, nationalorglobal in scope. Agency plans will be coordinated with ISD's and DES's plans to ensure smooth execution following a Wffy and how do weplanfor disasters? Careful major disaster. planning and preparation are essential to successfully respond to, and recover from, a disaster. Business Thanks go out to each agency for their attention and Continuity Planning is the first step and it involves participation in these disaster recovery planning the development and testing ofplans to ensure team efforts. and recovery services to customers, both internally and externally. Business Continuity Planning is made For those agencies who have not yet been scheduled up ofthree elements; risk assessment, crisis for training in plan development, orwho have not management and contingency management. Risk provided a disaster recovery contact person, please assessment is the formal process ofidentifying and contact these Computing Policy & Development evaluating risks, critical functions and priorities of Section staff: Leslie Cummings at 444-2469, ZIP!, or those Sanctions, skills, activities, time frames, and E-Mail at [email protected]; or Brett Boutin at resources necessary to ensure business continuity. 444-0515, ZIP!, or E-Mail at [email protected]. Crisis management is planning for the survival of METNET Goes the business unit, team and organization as a whole. Its goal is to prevent loss oflife, reduce injuries and minimize property damage. Contingency to Court! management is planning recovery and continuation ofcustomer critical business functions following a service interruption. Its focus is to recover services ttfhohaletlnoswruiepntpguornratdtiocsrainsttoiecrram.lalcusprtoocmeedrurfeusncatsiosnosonfirasst,paosnsdible Th1ha9r9n7ed,eletdrheecbeyMntEusTleiNgnagElTMprEsoTycseNteEedmiTngwsvaisdheauovs!eedObnebeynFteshbuercucMaeorssnyftu2al5ln,ya District Court to accept a plea ofguilty to two counts During the months of ofmitigated FebruaryandMarch,ISD deliberate Disaster Recovery homicide Coordinators have been from a meeting with agency patient, disaster recovery accompanied representatives and Disaster by her Emergency Services (DES) attorney, at coordinators to facilitate Warm Springs disaster planning. Agencies State Hospital have been provided with via video templates and supporting conferencing. materials to aid them in the The plea was development oftheir entered by the specific backup and patient at the recovery needs. Each Warm Springs METNET agency is encouraged to site develop a disaster recovery before District plan for their IT Judge Jeffrey environment to include: a) Sherlock, risk assessment; b) crisis presiding management plan; c) from a contingency management temporary plan (specific data center courtroom at recovery needs); and d) the Helena overall business continuity College of Technology ^ News Views April 1997 ^^^^(h^ METNET site. According to her doctor, the ManagersGroup,with input from theNetWare defendant was in no condition to be transported to ManagersGroup. either Townsend or Helena to make her plea. Without METNET, the situation would have been The guide discusses the responsibility ofstate costly or nearly impossible. The transportation costs employees regarding information technology—the forthedefendantalonewould haveexceededcostsby "IT" in the title. IT is defined not only as hardware morethan $500. and software resources, but also the data created or generated by IT processes. Readers will learn proper, Recently, the Lewis & Clark County Attorney's secure and legal use ofthe state's IT resources. office used the system on two separate occasions. The first involved a witness in FortWorth, Texas and a Some oftopics discussed are: unauthorized access, defendant in Choteau, Montana. Several attempts to unlawful use ofa computer, security, care ofdata, set a trial date failed when last-minute scheduling virus scanning, software licensing, passwords and state conflicts appeared from one ofthe parties. The standards. The appendices contain pertinent sections County Attorney's office turned to video ofMontana code for reference as well. conferencing. Three systems were connected: Sprint Suggestions for future generations ofthe publication Video Networkforthewitness in FortWorth,Texas, are welcome. Contact Wendy Wheeler of ISD's REACH Telemedicine Network for the defendant in Customer Relations Section at 444-2856, ZIP!, or E- Choteau, Montanaand METNETInteractiveVideofor Mail at [email protected]. For copies, please contact the DeputyCountyAttorneyand CrimeVictims the ISD Administrative Office at 444-2700. Assistantin Helena.TheCountyAttorney'sstaff officiated at the video conference from the Helena Charges for College ofTechnology site. The resulting video tape ofthe entire proceeding was played for a jury during Manual Job the trial later that week. The estimated cost savings exceeds $1300.' Scheduling The second use by the Lewis & Clark County Attorney's office involved an emergency room physician in Butte who identified pictures shown over Lastspringand summer, 12classeswereconducted to the graphics camera from the Deputy County trainapproximately 150programmers,I/Otechnicians, Attorney in Helena. Again, the end result was a video and systems specialistsonthe insandoutsofControl- M tape to play for the jury in an upcoming trial. The andControl-R.Thesearetheschedulingand rerun/ County Attorney's office estimated that this video restartapplicationsforbatch processingon the method oftestimony saved the taxpayers in excess of mainframe.All ofourcustomerswhohaveavailed S300. themselvesofthisproducthavebeenverypleasedwith performance,throughput,reliabilityandconvenience. Interactive video is proving itselfuseful and cost Allareexperiencingshorterrun times fortheircomplex effective in saving Montana taxpayers over $2100 in schedules,instant notificationoferrorsand problems, just these three instances. and asingleinterfaceto locateproblemsand dealwith solutions. InJuly 1996,thefirstcustomercontrolled For more information contact Dennis Mix ofthe and defined application,CAPS,wasactivatedon thejob TelecommunicationsBureau at444-7887,ZIP!,or schedulerand ran in production mode.Convenience, E-MailatdmixS'mt.gov. increased productivity, and reliability have been the driving forces behind the increasing utilization ofthe Doing "IT* Right job scheduler. The new driving force to convert your production processing to the job scheduler is saving New Publication Available money. Money is that five letter word that, when mentioned, usually means you have to dig deeper into empty pockets to pay more for something. Guess Doing "IT'Right is a guide to properly using and what! The meaning hasn't changed. However there is protecting Montana's Information Technology an out. resources. The guide was developed by the Training Subcommittee of the Information Technology Mm^fMf^i April 1997 NewsfiyViews ISD has always had a charge for I/O control services offeradditionalclassesto teachyou howtousethejob of$20.00 per hour. That rate applies to customers schedulerandwewillworkwithyouonaone-to-one who requested ISD to assume the responsibility to basistoassistyou inqconvSertin^gyourschedule.Thejob submit, monitor, schedulerclass and check the requirestwodays output oftheir andisconductedat job streams. For theUniversityof MontanaHelena jobs to be Collegeof processed during the offshifts, we Technology's have many I : facility.Therewill customers who : betwoclasses submit their jobs : presented inApril. and provide us a ;Thedatesofthese schedule to follow. I classesareApril 16- We then release jU^ 17andApril24-25. these jobs in the Classesbeginat8:30 stated sequence, monitor them, and check ifthe amand run till4:30 pmeachday.Thereisnofeefor output ofthese jobs to ensure normal completion of theclassand instructionmaterialsareprovided.In all jobs on that schedule. Ifnecessary, we call in addition,personnelfromISDareavailabletoassistyou support personnel to resolve problems. Although this inconvertingyourcurrentmanualproduction manual scheduling service falls within the $20.00 an schedulestotheautomatedjobschedulerandwillwork hour I/O control service, to date, we have not withyou inanywaywecantohelpyoutakeadvantage charged for it. Prior to the implementation ofthe job ofthistool.Westronglyrecommendthatyou attend scheduler, we were not able to provide this service any theclassifatall possible. other way and it would be a hardship on customers to staffadditional shifts just so they could monitor their Ifyou have questions or ifyou would like to register own jobs through the night. for one ofthe classes, contact Mike Krings ofthe Computing Operations Bureau at 444-1815, ZIP!, or The success we have experienced with the job E-Mail at [email protected]. You will need to provide scheduler and the fact that it can do all the I/O yourname,phoneextension,LOGONID,and request controller functions we have done manually, at whichclassyouwishtoattend. Evenifyoucannot machine speed (180 miUion instructions a second), attendoneoftheseclassesbuthaveproduction has prompted us to begin applying the I/O control schedulestoconvert,pleasecontactMike. services rate for the offshifts. This policy change will take effectJuly 1, 1997. We will charge all customers Mid-tier Security still on a manual schedule system the $20.00 fee. This feewill be charged for wall time, for any and all time we manually monitor a job or job stream, with a one The security philosophy for any information system hour minimum charge. For example, ifyour must embrace the three fundamental elements of processing runs for about an hour or less, five days a confidentiality, integrity, and availability. It is the week, your approximate annual cost is $5,000. Do intention ofISD that these issues be addressed and you have a job stream that's running a little longer maintained in the Mid-tier environment just as they than that? Let's look at a job stream which typically are in the mainframe and network environments. begins running at 5:30 pm each evening and doesn't conclude until 9:30 pm Monday through Friday. The Department ofAdministration, Information Whoa! You're looking at a $20,000 annually. Keep in Services Division is responsible for centralized mind, this fee is in addition to the computer management and coordination ofstate policies for processing costs for the jobs. security ofdata and information technology resources and shall: Frankly, we don't want to collect this fee. We don't want you to pay this fee. We want you to get your (a) Establish and maintain the minimum security production schedules on the job scheduler thereby standards and policies to implement the avoiding this fee. To accomplish this goal, we will ^^^ News&•Views April 1997 department responsibilities, including physical ForOracle DBAsupportcontact DaveHowseof security of central computer facilities. Systems Development Support, at 444-1593, ZIP! or E-Mail [email protected],orTonyNobleat (b) Establish standards and guidelines to assist 444-2922,ZIP! [email protected]. agencies in carrying out their responsibility to Tape assure adequate security for all data and information technology Management resources. The mid-tier hardware which ISD supports will reside System Upgrade in the same secure environment as the mainframe system. That environment has controlled physical accocnetsrso,ll2e4dhaotumrosxph7erdea,yaonpderactoinosntaalntsuUpPpoSrt, A new release of the CA-1 Tape Management System (Uninterruptible Power Supply) backup plus daily (prToMvSi)deismaabnoyutetnohabneceimnsetnatllsed.ovTehrisprreevlieoausse (r5e.l2e)asweisl.l data backup. Most ofthese enhancements will be seen only by the tape librarians and operators but a few will affect the Waphpelincaptuirocnhassofitnwgaroef,f-thae-qsuhaelliffOiredacOlreadcalteabDaBseA general TMS user. should be included on the review committee to ACCODE PARAMETER determine ifthe software conforms to State ofMontana security standards and policies. In addition to specifying data set retention byway of Any application to be developed and run on a the JCL LABEL parameter, certain dates can be production server must first be reviewed with the expressed using theJCL ACCODE parameter. (In SDS section of Database Administration. Oracle our MVS operating system environment the database objects ownership and responsibilities will ACCODE parameter is ignored for SL tapes but, be defined before development begins. Oracle with release 5.2, TMS will intercept this parameter to application developers must work closely with the see ifany ofthe following codes are supplied.) DBAs toensurea secureapplicationdesign using Oracle's privilege, role, profile, and audit capabilities. Note: "x" can be any letter ofthe alphabet. Single Account databases will not be allowed. That is, ACCODE=xCAEXPDT Specifies that the everyone logging on or using an Oracle database must value specified in theJCL LABEL= parameter is a have, and use, their own ID. true expiration date and not a CA-1 EXPDT keyword. Database access request forms will be developed for every application and must be provided to the DBA ACCODE=xCAKEYWD Specifies that the section by an authorized agency representative in value specified in the JCL LABEL= parameter is a order to gain access to the Oracle database. CA-1 EXPDT keyword and not an explicit expiration date. This applies only ifthe value specified is a valid Other standards that apply to enterprise information CA-1 EXPDT keyword value. systems statewide will be enforced on the mid-tier platform. Those standards include user number ACCODE=xCACATLG Same as assignment and password standards. LABEL=EXPDT=99000 or the CA-1 EXPDT keyword CATALOG or CATLG. It is the objective ofany policy or guideline to prevent the intentional or unintentional modification, ACCODE=xCANORES Same as destruction or disclosure, or misuse ofdata and LABEL=EXPDT=98000 or the CA-1 EXPDT information technology resources. keyword FOREIGN. For information on security related issues contact ACCODE=xCAPERM Same as Mick Plovanic ofthe Computing Operations Bureau LABEL=EXPDT=99365 or 99366 or the CA-1 at 444-2571, ZIP!, or E-Mail to [email protected]. EXPDT keyword PERMANENT or PERM. ^ ^^Sth- April 1997 News Views ACCODE=xCAUSER Same as LABEL=EXPDT=88000 or the CA-1 EXPDT OS/390 keyword USER/000. These are additions to the current CA-1 supported JCL, not changes. Therefore, anyJCL currently in This is the first ofa series ofarticles on the new functionality that will be available with the next use will still be supported by the new CA-1 release. release ofMVS/ESA...which is now referred to as MReOalDtime expiration date processingfor wOhSi/c3h90.areOSp/a3c9ka0geisdrteaolgleythaerg.roOuSp/3o9f0IiBnMclupdreosducts data sets. standard IBM products such as MVS/ESA, ISPF, JES2, Language Compilers, SDSF, TCP/IP, TSO, For data sets created with DISP=MOD, CA-1 now VTAM. It also includes many new products which uses the highest expiration date found between the are not currently on the mainframe. These products existing Tape Management Catalog (TMC) are: Bookmanager Read; a family of DF/SMS information, the userJCL, or the CA-1 default products which include Network File Systems, retention(currentlysettofivedays). Hierarchical File System, Hierarchical Storage Manager (HSM); a family ofTCP/IP products which Vault management include CICS Sockets, Kerberos DES, Network Print Facility, OpenEdition MVS Applications; LAN (While this is a librarian enhancement, it may be Server; LANRES; C/C++ compiler; VisualLift RTE; helpful for users to keep it in mind.) The new release Open System Adapter Support facility (OSA/SF); of CA-1 will allow tape volumes to be automatically SOMobjects; Softcopy print; VTAM AnyNet and a vauked based on the number ofdays passed since the large family ofOpenEdition products which include volume has been used. Look for a future article Application Services, System Services, DCE, and explaining this feature in more detail. DCE DFS. & Online CA-1 panels Asmentioned inanearlierNews Viewsarticle, OS/390conforms toX/OPENXPG4UNIX The main inquiry panel ofthe TMS online system Specification(UNIX95)branding.TheOpenEdition has a few more fields displayed. These pertain mainly Support ofOS/390 will allow the transparent to tape robotics which are currently not being used exchange ofdata, easy portability ofapplications and on the State ofMontana mainframe. All fields from cross-network management of data and applications. the 5.0 release ofCA-1 are displayed in the 5.2 release Support has also been added for XPG4-compliant panels. version of the UNIX-to-UNIX Copy Program (UUCP), a group ofprogram directories and files that The install ofthis new release is scheduled for some can be used to communicate with any UNIX system time in early April. NotificaUons will be distributed that is running a version ofthe UUCP. This function to all known mainframe users. can be used to automatically transfer files and requests for command execution from one UUCP site to For more informafion contact Bill Ramsay ofthe another. The OS/390 Internet BonusPak supplied by Computing Operafions Bureau at 444-2902, ZIP! or IBM will allow for the installation ofa Web server on E-Mail to [email protected]. OS/390. .^^ ^ News Views April 1997 10 Treelcehansieca2lofSeOrvSi/ce3s90isacnudrriennttelgyrawtoirnkgiontgheornveinnsdtoarlling RDeOmSo,teWiunsedroswasre3p.rx,ovWiidenddowiwtshc9l5i,enotrsWofitnwdaroew(sforNT products with this new release. The majority of based home/portable PCs) that communicates via software (IBM and other vendor) installed on the new modem with an NT based WinFrame application operating system will be YEAR 2000 compliant. IBM server. The WinFrame client software allows users products upgraded in this new release are: DF/SMS with limited hardware resources (as low as a 286 with DFP 1.3; GDDM 3.2; Highlevel Assembler 1.2; ISPF DOS) to become WinFrame clients with reasonable 4.2; JES2 5.2; MVS/ESA 5.2.2; SDSF 1.6; TSO/E 2.5; performance. ISD is providing a centralized VTAM 4.3. Other vendor products which will be WinFrame server that allows usage ofthe above upgraded are: CA-1 5.2; CL/Supersession 1.47; CMF mentioned applications, or agencies can opt to install 5.2.2; Comparex 8.2; DMS/OS 9.0; MXG 14.14; and their own WinFrame servers to meet specific SpyrnocdSuocrttio3n.6.onSotmheecoufrrtehnetseopperroadtuicntgs swiylsltebme. pUustersinto aNpOphTcaptrioovnidneeeidss.reOmnoteefcuonncttrioolnotfhiasrseemrovitceeudsoere'ss will be notified in advance ofthese upgrades and any officeorhomePC. Usersareinstead strongly enhancements they introduce. encouraged to move files from local drives to shared file servers which will not only make those files For more information contact Robin Anlian ofthe accessible through WinFrame, but provides backups Computing Operations Bureau at 444-2898, ZIP!, or on a regular basis. E-Mail to [email protected]. Cost for these services is being implemented in two tiers. Agencies who are granted rights to the NetConnect and enterprise modem pool and/or NetWare Connect services will be charged $10.00 per month per user. WinFrame ISD Agencies who choose to use the ISD WinFrame - Application server will be charged an additional $5.00 New per month per user. These charges are designed to Offers a allow for recovery ofthe costs involved in providing telephone lines, modems, servers, software, Method of administrative support, and help desk support 6:00 am to 10:00 pm M-F and on Saturday 8:00 am - noon. Remote Access The phone number for the enterprise modem pool is a Helena local phone number. Any long distance charges are the responsibility ofthe user. To gain authorization to use the ISD NetConnect and/or ISD is making a new method ofremote connectivity WinFrame servers a Remote Access Form must be available to end users. This capability is being filled out and forwarded to the ISD Help Desk. That pmroodviedmedptohorloucgonhneucsteivoiftyNeatnwdarNeeCtownarneecNtD(Sto provide f(soernmd ias arveaqiuleasbtlefofrrotmhethfeorImSDtoHWelIpNFDeRsAkMvEiUaSZEIPR!) authentication) and Citrix WinFrame servers (to or at the end ofthis article. This form should be filled provide centralized application out and authorized services). This should be of by the appropriate interest to agencies that have Agency Network employees who have a need for * - _ * Administrator and/ remote access to ZIP'.Office, or Supervisor, and WordPerfect, Lotus 1-2-3, and forwarded to the Mainframe Access. Of ISD Help Desk at particular note is the use of ZIP! (again to ZIPIOffice, instead of Portable ZIP!, which provides a WINFRAMEUSER) or via deadhead mail (ISD significant improvement in response time, ease ofuse, HELPDESK). functionality, and reliability for e-mail. The applications run on the WinFrame server, with the For further information on NetWare Connect/ same access to the NDS tree a user normally gets WinFrame remoteaccess, contactPeteWisemanof when logging into the network on an office PC. Network Operating Systems Support at 444-9665 ([email protected]) or Denny Knapp of End User Systems Support at 444-2072 ([email protected]).

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.