Featured Blog
Rocket Software’s Acquisition of B.O.S. Enhances Hybrid Cloud Modern[...]
September 6, 2023 In 2023, organizations worldwide will continue to develop and implement modernization plans, with digital transformation spending estimated to reach $1.6 trillion globally. Wh[...]
April 11, 2019
Timestamp data, while very common and important, is not easy to store and use at the current UniVerse versions. You must convert it to two fields in UniVerse file and use the I-Type[...]
April 10, 2019
Data breaches are on the rise, and mainframes are increasingly targeted because of the wealth of sensitive, essential data they hold. Despite the massive risk, we often see that[...]
March 27, 2019
The security threats we’re dealing with today are worlds apart from what was common decades ago. External hacking threats are constantly evolving and becoming more sophisticated, and as[...]
March 20, 2019
Application lifecycle management can get pretty tricky when your proven, business-critical application is doing its job and the cost/value of a hardware/operating system upgrade[...]
March 13, 2019
UNIDATA HASHED FILES AND OVERFLOW
In this first section we are going to discuss the two main types of UniData Hashed File (Static and Dynamic) and we’re going to discuss the two types of[...]
March 6, 2019
Part 3 of 3
This blog post offers best practices related to implementing and using Replication, as part of a High Availability/Disaster Recovery (HA/DR) strategy. In Part 3, I’ll[...]
February 22, 2019
Enterprises need a strong security foundation, especially when it comes to protecting their mission-critical mainframes. Mainframers rely on Enterprise Security Managers (ESMs) –[...]
February 20, 2019
If you use the U2 ODBC and/or JDBC client with UniData v8.2.1, you need to ensure that all accounts use schema v6.0 files. If they do not, the applications will not work with your[...]
February 6, 2019
Part 1 of 3
This blog post offers best practices related to implementing and using Replication, as part of a High Availability/Disaster Recovery (HA/DR) strategy. In Part 1, I[...]