=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SEARCH390 | S/390 and Industry News 
April 10, 2002 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Click here for a white paper.
http://search390.com/r/0,,2835,00.htm?SunMicrosystems
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

IN THIS ISSUE | Today's Highlights

1. FEATURES AND TOP STORIES 
   - Ask the Experts: The top 11 ways to invoke CICS with WAS Java
   - News: IBM to lay off 600 engineers
   - Tip: "Oh oh": Try SmallTalk in CICS
   - Best Web Links: System Software
  
2. IMPORTANT ANNOUNCEMENTS AND LINKS
   - Poll: Is IBM taking a cavalier approach to security fixes?
   - Tips Contest: Win a $50.00 Amazon.com gift certificate 
   - The Missing Link: Lara Croft's costume up for grabs 

_____________________________________________________________
************* SPONSORED BY SUN MICROSYSTEMS *****************

Are Your Mainframe Costs Too High? Rehost your existing mainframe
apps to SUN servers and cut costs dramatically, while keeping code
and data largely unchanged. Click here for a white paper with all the
details on how to do this.
http://search390.com/r/0,,2835,00.htm?SunMicrosystems
_____________________________________________________________
TOP 11 WAYS TO INVOKE CICS WITH WAS JAVA | by Jim Keohane

Jim Keohane was recently asked the question, "What options are
available for connecting Java to CICS through a WebSphere Application
Server (WAS)." In the manner of David Letterman, Jim responded with
his own top 10 - or in this case - top 11 ways to invoke CICS with
WAS Java.
 
 >> CLICK for full expert response:
http://search390.techtarget.com/ateQuestionNResponse/0,289625,sid10_cid460752_tax285032,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IBM TO LAY OFF 600 ENGINEERS | News: Reuters

According to The Wall Street Journal, IBM has notified 600 customer
engineers in its Global Services operations in the United States that
they will be laid off. The move affected jobs that had been
eliminated and employees who had been judged underqualified.
According to IBM, the layoffs were a routine "work rebalancing"
action that occurred during the regular course of business. 
 
 >> CLICK for full story:
http://news.com.com/2110-1001-877648.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
"OH OH": TRY SMALLTALK IN CICS | by Jim Keohane

VisualAge SmallTalk Server for OS/390 (or MVS or z/OS) includes
utilities to convert SmallTalk executables (images) into load modules
and the Virtual Machines needed to run under CICS, IMS or native.
There are cross-development tools (VisualAge for SmallTalk) allowing
you to develop on say, Windows or Linux. "But," you ask, "Can it do
99 Bottles of Beer on the Wall as good as C++ or Java?"

 >> CLICK for the full tip:
http://www.search390.com/tip/1,289483,sid10_gci810771,00.html

When you have a second, please share your opinion and rate this tip.
Also, check out these other great tips submitted by Search390 users:
http://search390.techtarget.com/tipsIndex/0,289482,sid10_tax286020_alpD_idx0,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SYSTEM SOFTWARE | Search390 Best Web Links

There are some programs that are crucial to running your system. They
are more than applications, but not a complete operating system;
we've classified them as "System Software." In this Best Web Links
category, you can visit "Middleware" to find ways to merge all
aspects of business computing, and check out "CICS/Transaction
Monitors" for the latest in transaction processing. 

 >> CLICK to view the System Software Best Web Links:
http://search390.techtarget.com/bestWebLinks/0,289521,sid10_tax1451,00.html

_____________________________________________________________
=============================================================
    CRITICAL SECURITY TIPS, TACTICS & TECHNIQUES - FREE
=============================================================
It's fairly simple: If something goes wrong with your current
security infrastructure, and you're on the hook to face the
consequences, it won't be pretty. Don't go it alone! Stop the threat
of a hack attack with expert tips, tactics and techniques at the free
Security Decisions conference June 19-21 in Chicago, hosted by
SearchSecurity. Full conference benefits at:
http://ad.doubleclick.net/clk;4012871;5058249;h?http://www.securityconf.com/html/registration.htm
_____________________________________________________________
IMPORTANT FEATURES AND LINKS: 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TAKE OUR POLL | Search390 

Is IBM taking a cavalier approach to security fixes considering the
glut of problems it's had with products in recent months?

 >> CLICK to post your response: http://search390.techtarget.com/poll

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SEARCH390 TIPS CONTEST | Win a $50.00 Amazon.com gift certificate 

Here's your chance to win a $50.00 gift certificate to Amazon.com. To
become eligible to win the free gift, simply share the little tips
and tricks that help you do your job faster. If you submit the tip
that receives the highest user rating, you win.

 >> CLICK for more info:
http://www.search390.com/tipsPrize/0,289492,sid10_prz812989_cts812984,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
THE MISSING LINK | Lara Croft's costume up for grabs 

Video game loving geeks can finally realize their virtual-reality
fantasies, sort of. While they may never get up close and personal
with the real Lara Croft, heroine of the popular Tomb Raider series,
they can now bid on the costume worn by her human model counterpart,
who's always a big hit at the trade shows. The skin-tight suit
includes twin Smith and Wesson replica pistols to complete the
effect. (Game-maker Eidos has no comment as to whether the outfit has
ever been laundered.) The auction is all for a good cause with
proceeds to benefit the UNICEF children's charity.

Source: The Register
http://www.theregister.co.uk/content/6/24767.html 

_____________________________________________________________ 
*********************SEARCH390 CONTACTS**********************

BJ RAMA, Site Editor (mailto:[EMAIL PROTECTED]) 
 >> Send in your original articles and best practices. 

ROBYN LORUSSO, Assistant Editor (mailto:[EMAIL PROTECTED])
 >> Send in your white papers and Best Web Links.

KATE EVANS-CORREIA, Senior News Editor (mailto:[EMAIL PROTECTED])
 >> Send in your news, press releases and poll ideas.

TIM KEOUGH, Account Executive (mailto:[EMAIL PROTECTED])
 >> Sponsor this or any other TechTarget newsletter.
__________________________________________________________
::::::::::::::::  ABOUT THIS NEWSLETTER   ::::::::::::::::

Created by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2002, All Rights Reserved.

Unsubscribe from 'News'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://search390.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to