Mainframe software directory - Dino Software

Return to software directory index

Dino Software Mainframe Software

DINO ANALYSES FOR LEGATO
Category:
DASD/Dataset Management, Storage Management
DAL is a Microsoft Excel application that uses Visual Basic macro instructions to process data from Legato databases. The data represents every backup for which records still exist in the Legato database. The data is obtained via Legato commands in lieu of accessing the Legato databases directly for several reasons. In older versions of Legato, data was stored in several different databases. In newer versions, that technique was changed so it would have been necessary to support multiple techniques to acquire the data. Accessing the database directly brings with it the added complexity of encoded fields whereby each bit may represent something. Not knowing what each bit represents would make it impossible to use the raw data. So issuing commands to a Legato server creates interpreted output regardless of software level, database type, or operating system. DAL was developed to create a picture of a Legato backup environment without having extensive experience with Legato commands in an easy to view format. A spreadsheet was chosen to host the data because of the extensive capabilities of a spreadsheet to further analyze the data. One seemingly limiting factor is the constraint of having only 65,536 rows to accommodate the data records. But this restriction was easily overcome with a small script program to breakup the large file generated by the Legato command into smaller files of up to 65,536 records each. The analysis can then load up to five such files into separate worksheets which are then used to generate the analysis. To run the program is simple. Simply copy the DAL spreadsheet program and the output file from the Legato command to the same directory, set the full path name in cell B2 of the CONTROL Worksheet, and click on the button IMPORT DATA FILES. That's it. When it is finished you can view the various worksheets.

REALTIME DEFRAG
Category:
DASD/Dataset Management, Storage Management
Today the availability and reliability of your organization's data is critical to its success. But finding the time required to keep your systems operating efficiently often strains a data center's resources and its ability to meet service level agreements. In order to utilize available resources more efficiently, more and more computer centers are optimizing their disk space with RealTime Defrag (RTD). RTD is a unique DASD management tool that allows users to have cost-effective, optimal utilization of disk space around the clock. RTD optimizes disk space permanently and automatically without affecting production and online operations. Users achieve considerable savings in terms of space and shorter access times. Batch windows at night and maintenance windows on weekends are freed of defrag runs that often take hours. RTD optimizes all disks according to user instructions - even those that are continuously accessed. In this way, particularly in cases of 24x7 operations, you achieve optimal management of the entire DASD environment. Production continues without interruptions. RTD handles important DASD management tasks such as defragmentation, unused space release, and file extent reduction in one step. Efficient I/O techniques guarantee optimal performance. Applications that run in parallel are unaffected. With RTD's online reports users can monitor exactly how much space is saved and verify its optimal use. RTD can be also customized to production standards. Whether those criteria are storage groups, volume names or file names, file attributes, or SMS classes, parameters can be customized at any time, and the changes take effect immediately.

REORGadon for HSM
Category:
DASD/Dataset Management, Systems Management
The traditional approach to control data set reorganization requires exclusive control of the system. Although not impossible, most 24x7 shops would rather let production processing and other activity continue than incur an outage. HSM is an integral and intertwined part of a z/OS system. Batch reorganization methodology dictates that HSM processing must be stopped on all systems where HSM is using a control data set. No data set RECALLs, migrations, HSM backups, or space management can take place until the reorganization is complete and the HSM address space is restarted. REORGadon for HSM is a unique tool for reorganizing IBM's Hierarchical Storage Manager (DFSMShsm) control data sets (CDS). HSM uses three different control data sets - the Backup Control Data Set (BCDS), the Migration Control Data Set (MCDS), and the Offline Control Data Set (MCDS). The control data sets may be used by HSM in a multi-host environment on single or multiple systems. REORGadon provides HSM control data set reorganization while the files are active and online to HSM, and without having to shutdown and restart HSM. REORGadon also installs without stopping and starting HSM. REORGadon reclaims and reorganizes fragmented space in HSM control data sets and allows the selection and processing of a control data set segment that is "in-use" by HSM on an active single or multi-system environment. This ability represents a huge savings in time and manpower to any company that suffers from oppressive time constraints.

SENTINEL
Category:
Security Management
SENTINEL is a z/OS-based software product that enables companies to actively monitor and manage Enterprise-wide FTP activity. It enables companies to regulate z/OS FTP server usage around the clock and prevent any unauthorized and unwanted activity. In addition to this real-time monitoring of FTP, SENTINEL enhances Data Center automation efforts by integrating FTP usage into the automation plan.

TERADON
Category:
DASD/Dataset Management, Storage Management
TERADON is a unique specialized REPRO MERGECAT utility that can run in batch mode like IDCAMS (but with exponentially faster runtimes and many more options) . . . OR online while the associated data sets remain OPEN. When data sets are OPEN, TERADON mirrors catalog access to ensure the new target catalog is referenced and/or updated correctly. As long as the files remain OPEN . . TERADON continues to perform all the mirroring. TERADON also automatically moves the ALIAS associated with the records that are moved and generates reports to list all the files currently mirrored on completion. Once all the files are CLOSED, mirroring can be disabled; however data sets can remain OPEN for the life of the IPL if required. Without TERADON, the user is typically forced to schedule standalone time to perform the REPRO MERGECAT. With TERADON, online systems can remain active and their files can remain open. Requests for each OPEN file that has had its catalog records moved will automatically be redirected to the new TARGET catalog by TERADON. This ability represents a huge savings in time and manpower to any company that suffers from oppressive time constraints.

T-REX
Category:
DASD/Dataset Management, Storage Management
T-REX provides comprehensive ICF catalog backup and forward recovery capability, diagnosis and repair facilities for effectively managing an ICF catalog environment. Many leading companies must function 24/7 without disruption and meet stringent compliance demands or suffer terrible financial losses and penalties. T-REX ensures they meet these goals by reliably and efficiently addressing all of their catalog needs under one umbrella. T-REX enhances IBM's Access Method Services (IDCAMS) utility through new keyword options and functionality. This dynamic MVS batch facility multi-tasks many of its commands, provides full object support, and can repair any VSAM object (BCS, KSDS, and Variable RRDS) with a broken index within minutes. The product ensures 100% catalog structural integrity through proactive analysis and remediation. It also supports 24X7 catalog availability through its ability to reorganize and repair catalogs while open. T-REX allows companies to recover business-critical information extremely fast, saving hundreds of thousands, if not millions of dollars in down time.

VELOCI-RAPTOR (VR)
Category:
Performance Management
What does VELOCI-RAPTOR (VR) do? - VR is an intelligent, intuitive, performance optimization tool designed to dramatically improve system performance while significantly reducing system overhead by automating tuning activities. VR cuts overhead by optimally allocating buffers for VSAM files to provide the best throughput and response time for I/O requests. It uses 256 LSR buffer pools to speed application processing and provides virtual storage constraint relief by placing control blocks and buffers above the 16MB line. VR ensures optimal tuning and buffer allocation for non-VSAM files while optimizing the use of SAM/E chained scheduling for asynchronous sequential access.

XTINCT
Category:
DASD/Dataset Management, Tape Management
Years ago, disk media was kept inside a glass house, accessed by only a few people and password protected. Even disaster recovery testing at offsite locations didn' t raise much concern for the safety of corporate data. After testing, many would scratch the table of contents and walk away feeling corporate data was reasonably safe. Today, however, is a different story. Terrorism, identity theft, off shoring, outsourcing, litigation, the Internet and the global economy have all highlighted the need for increased data protection. Governments have passed legislation such as Sarbanes-Oxley, HIPPA, HSPD-12, Basel II and Gramm-Leach-Bliley to hold corporations responsible for securing private information under their care. Beyond government standards, industry regulations such as the Payment Card Industry Data Security Standard have further defined the rules and corporations desiring to do business with them. Failure to comply with these standards for data protection can result in large business losses and severe penalties, so it is no longer simply a matter of due diligence to protect data under your control, it is a necessity. XTINCT is a tool for wiping data to ensure the original data is unrecoverable. It provides various security and speed options exist to meet your level of protection. The product can be used when: When moving disks to another location. When disks come off lease and are being returned to the vendor. When disks are being moved to a warehouse. When leaving a backup/recovery site after Disaster Recovery testing. Before re-using disks for a different group within the company. Before scrapping disks.

Return to software directory index