=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SEARCH390 | S/390 and Industry News April 10, 2002 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Click here for a white paper. http://search390.com/r/0,,2835,00.htm?SunMicrosystems =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THIS ISSUE | Today's Highlights 1. FEATURES AND TOP STORIES - Ask the Experts: The top 11 ways to invoke CICS with WAS Java - News: IBM to lay off 600 engineers - Tip: "Oh oh": Try SmallTalk in CICS - Best Web Links: System Software 2. IMPORTANT ANNOUNCEMENTS AND LINKS - Poll: Is IBM taking a cavalier approach to security fixes? - Tips Contest: Win a $50.00 Amazon.com gift certificate - The Missing Link: Lara Croft's costume up for grabs _____________________________________________________________ ************* SPONSORED BY SUN MICROSYSTEMS ***************** Are Your Mainframe Costs Too High? Rehost your existing mainframe apps to SUN servers and cut costs dramatically, while keeping code and data largely unchanged. Click here for a white paper with all the details on how to do this. http://search390.com/r/0,,2835,00.htm?SunMicrosystems _____________________________________________________________ TOP 11 WAYS TO INVOKE CICS WITH WAS JAVA | by Jim Keohane Jim Keohane was recently asked the question, "What options are available for connecting Java to CICS through a WebSphere Application Server (WAS)." In the manner of David Letterman, Jim responded with his own top 10 - or in this case - top 11 ways to invoke CICS with WAS Java. >> CLICK for full expert response: http://search390.techtarget.com/ateQuestionNResponse/0,289625,sid10_cid460752_tax285032,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IBM TO LAY OFF 600 ENGINEERS | News: Reuters According to The Wall Street Journal, IBM has notified 600 customer engineers in its Global Services operations in the United States that they will be laid off. The move affected jobs that had been eliminated and employees who had been judged underqualified. According to IBM, the layoffs were a routine "work rebalancing" action that occurred during the regular course of business. >> CLICK for full story: http://news.com.com/2110-1001-877648.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= "OH OH": TRY SMALLTALK IN CICS | by Jim Keohane VisualAge SmallTalk Server for OS/390 (or MVS or z/OS) includes utilities to convert SmallTalk executables (images) into load modules and the Virtual Machines needed to run under CICS, IMS or native. There are cross-development tools (VisualAge for SmallTalk) allowing you to develop on say, Windows or Linux. "But," you ask, "Can it do 99 Bottles of Beer on the Wall as good as C++ or Java?" >> CLICK for the full tip: http://www.search390.com/tip/1,289483,sid10_gci810771,00.html When you have a second, please share your opinion and rate this tip. Also, check out these other great tips submitted by Search390 users: http://search390.techtarget.com/tipsIndex/0,289482,sid10_tax286020_alpD_idx0,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SYSTEM SOFTWARE | Search390 Best Web Links There are some programs that are crucial to running your system. They are more than applications, but not a complete operating system; we've classified them as "System Software." In this Best Web Links category, you can visit "Middleware" to find ways to merge all aspects of business computing, and check out "CICS/Transaction Monitors" for the latest in transaction processing. >> CLICK to view the System Software Best Web Links: http://search390.techtarget.com/bestWebLinks/0,289521,sid10_tax1451,00.html _____________________________________________________________ ============================================================= CRITICAL SECURITY TIPS, TACTICS & TECHNIQUES - FREE ============================================================= It's fairly simple: If something goes wrong with your current security infrastructure, and you're on the hook to face the consequences, it won't be pretty. Don't go it alone! Stop the threat of a hack attack with expert tips, tactics and techniques at the free Security Decisions conference June 19-21 in Chicago, hosted by SearchSecurity. Full conference benefits at: http://ad.doubleclick.net/clk;4012871;5058249;h?http://www.securityconf.com/html/registration.htm _____________________________________________________________ IMPORTANT FEATURES AND LINKS: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TAKE OUR POLL | Search390 Is IBM taking a cavalier approach to security fixes considering the glut of problems it's had with products in recent months? >> CLICK to post your response: http://search390.techtarget.com/poll =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SEARCH390 TIPS CONTEST | Win a $50.00 Amazon.com gift certificate Here's your chance to win a $50.00 gift certificate to Amazon.com. To become eligible to win the free gift, simply share the little tips and tricks that help you do your job faster. If you submit the tip that receives the highest user rating, you win. >> CLICK for more info: http://www.search390.com/tipsPrize/0,289492,sid10_prz812989_cts812984,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= THE MISSING LINK | Lara Croft's costume up for grabs Video game loving geeks can finally realize their virtual-reality fantasies, sort of. While they may never get up close and personal with the real Lara Croft, heroine of the popular Tomb Raider series, they can now bid on the costume worn by her human model counterpart, who's always a big hit at the trade shows. The skin-tight suit includes twin Smith and Wesson replica pistols to complete the effect. (Game-maker Eidos has no comment as to whether the outfit has ever been laundered.) The auction is all for a good cause with proceeds to benefit the UNICEF children's charity. Source: The Register http://www.theregister.co.uk/content/6/24767.html _____________________________________________________________ *********************SEARCH390 CONTACTS********************** BJ RAMA, Site Editor (mailto:[EMAIL PROTECTED]) >> Send in your original articles and best practices. ROBYN LORUSSO, Assistant Editor (mailto:[EMAIL PROTECTED]) >> Send in your white papers and Best Web Links. KATE EVANS-CORREIA, Senior News Editor (mailto:[EMAIL PROTECTED]) >> Send in your news, press releases and poll ideas. TIM KEOUGH, Account Executive (mailto:[EMAIL PROTECTED]) >> Sponsor this or any other TechTarget newsletter. __________________________________________________________ :::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::: Created by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. Unsubscribe from 'News' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://search390.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."
