The Arcati Mainframe Yearbook 2021

Total Page:16

File Type:pdf, Size:1020Kb

The Arcati Mainframe Yearbook 2021 ArcatiArcati MainframeMainframe YearbookYearbook 20072021 Mainframe Strategy The Arcati Mainframe Yearbook 2021 The independent annual guide for users of IBM mainframe systems SPONSORED BY: PUBLISHED BY: Arcati Limited 19 Ashbourne Way Thatcham Berks RG19 3SJ UK Phone: +44 (0) 7717 858284 Fax: +44 (0) 1635 881717 Web: http://www.arcati.com/ E-mail: [email protected] © Arcati Limited, 2021 1 Arcati Mainframe Yearbook 2021 Mainframe Strategy Contents Welcome to the Arcati Mainframe Yearbook 2021 ........................................................... 3 Test Automation: The Key to Increasing Velocity, Quality and Efficiency .................... 6 Relationship Advice For You and Your Mainframe ....................................................... 15 Mainframe, Cloud, and the Post-Pandemic IT Landscape ............................................ 19 The 2021 Mainframe User Survey .................................................................................... 25 An analysis of the profile, plans, and priorities of mainframe users Vendor Directory ............................................................................................................... 43 Vendors, consultants, and service providers in the z/OS environment A guide to sources of information for IBM mainframers ............................................ 129 Information resources, publications, social media, and user groups for the z/OS environment Glossary of Terminology ................................................................................................ 135 Definitions of some mainframe-related terms Mainframe evolution ........................................................................................................ 167 Mainframe hardware timeline 1952-2020; mainframe operating system development SPONSORS Action Software 46, 47 Fujitsu 77, 77 BMC Software 6, 56 Key Resources 88, 89 Broadcom 15, 56 Model9 19, 96 Data Kinetics 42, 65 Software Diversified Services 111, 112 Direct Computer Resources, Inc 67, 68 Tone Software 117, 118 ESAi 70, 71 Zetaly 125, 126 Fischer International Systems Corporation 72, 72 2 © Arcati Ltd, 2021 ArcatiArcati MainframeMainframe YearbookYearbook 20072021 Mainframe Strategy Welcome to the Arcati Mainframe Yearbook 2021 We are very grateful – as always – to all those who have contributed this year by writing articles, taking part in our annual user survey, or updating their company profiles. In particular, I must thank the sponsors and advertisers, without whose support this Yearbook would not be possible. 2020 must have been the year that no-one expected in the early hours of 1 January as they celebrated its arrival. According to the Collins Dictionary, the word ‘lockdown’ had a 6,000 percentage increase in usage since 2019 The other pandemic-related words on the dictionary’s list of the top 10 words for 2020 were: ‘coronavirus’, ‘social distancing’, ‘self-isolate’, ‘furlough’, and ‘key worker’, which saw a 60-fold increase in usage over the previous year. Other top-10 words were ‘BLM’ (Black Lives Matter), ‘Megxit’ (the Duke and Duchess of Sussex withdrawing from royal duties), ‘mukbang’ (where a video or webcast host eats lots of food for the entertainment of viewers), and ‘TikToker’ (someone who regularly shares or appears in videos on TikTok). They might perhaps have added phrases such as ‘working from home’, which many office staff have done for large parts of 2020, and ‘you’re still muted’, a phrase I’ve heard so many times on Zoom and Teams calls this year, or ‘the new normal’, which has probably become overused. But in this year of lockdowns and working from home, it’s always good to have news of a new baby in the family. And that’s what we got in the spring when IBM shared the news about its two new mainframe products, the z15 Model T02 and LinuxONE III Model LT2. The highlight of the 2019 z15 Model T01 and Linux-ONE III LT1 was their outstanding feature allowing data to be ‘encrypted everywhere’, both in transit and at rest, without impacting system performance. This used the, so called, Data Privacy Passports. Other standout features were increased physical compute capacity, high availability options, and support for container-based development and applications (using the Red Hat OpenShift Container Platform). The Arcati Mainframe Yearbook 2021 This year’s z15 Model T02 and LinuxONE III LT2 Mark Lillycrop Publisher: products included those same features, but were Editorial Director: Trevor Eddolls Contributors: BMC, Deborah Carbo, Model9 different in their size and capacity. They came as 19” single-frame, air-cooled platforms. And © 2021, Arcati Limited. both can be configured with between four and 65 processor units (PUs) and from 64GB to 16TB of All company and product names mentioned in this publication remain the property of their respective memory. Both can fit in cloud data centre racks owners. and can have a second drawer – if more capacity is required. And the processors run at 4.5GHz. This Yearbook is the copyright of Arcati Limited, and That offers customers flexibility in what they buy may not be reproduced or distributed in whole or in part without the permission of the owner. A licence for internal to suit their particular business computing needs. e-mail or intranet distribution may be obtained from the publisher. Please contact Arcati for details. In addition, both systems support IBM’s pre- packaged Cloud Paks. These include a secured © Arcati Limited, 2021 3 Arcati Mainframe Yearbook 2021 Mainframe Strategy Kubernetes container and containerized IBM middleware designed to let customers quickly use enterprise-ready containers. IBM has standard Cloud Paks for data, application integration, automation, and multi-cloud management and security. This will help customers develop, deploy, and manage cloud-native applications for the z15 family. Perhaps the biggest talking point with these models is IBM Secure Execution for Linux, a hardware- based security technology that creates isolated Trusted Execution Environments (TEEs) that restrict access to busines-critical or sensitive data, but still allow administrators and developers to perform their jobs. Secure Execution is a way to mitigate insider threats to enterprise data. Basically, Secure Execution provides a KVM-based (Kernel-based Virtual Machine) virtual machine that is fully isolated and protected from the hypervisor with encryption keys that only the IBM Z hardware and firmware have access to. You can, perhaps, think of the z15 Model T02 and LinuxONE III LT2 as the Business Class versions of the z15 Model T01 and LinuxONE III LT1. Security has been a major issue this year with staff working from home seemingly more relaxed about clicking on email links or downloading attachments. This has given bad actors access to their computer and then their corporate network, and then, possibly, their mainframe, using login information taken from keylogging software installed on that home PC. The Ponemon Institute conducted research for IBM Security to produce the annual “Cost of a Data Breach Report 2020”1. They interviewed 3,200 individuals from 17 countries or regions and found 524 breached organizations. From that they found that the average cost of a data breach is $3.86 million. However, the average cost in the USA was $8.64 million. 80 percent of breached organizations stated that customer personally-identifiable information (PII) was compromised during the breach – which could lead to fines from GDPR. Worryingly, the average time to identify and contain a breach was a whopping 280 days. Healthcare was the most expensive industry affected by a breach, costing companies, on average $7.13 million. The report also suggested that security automation – where organizations used technologies such as AI, analytics, and automated orchestration – was the most effective technique to mitigate data breach costs. Their figures showed an average total cost reduction by using security automation of $3.58 million. Most years, we’d be talking about IBM mergers and acquisitions. This year it has acquired Spanugo (a provider of cloud cybersecurity posture management solutions), and WDG Automation to add to its AI-based enterprise automation. Perhaps the biggest news is its plans to split up. It has said that in 2021, it will be spinning off some of its lower-margin lines of business into a new company and focusing on higher-margin cloud services. The new spin-off is currently being referred to as ‘NewCo’. The idea is that IBM “will focus on its open hybrid cloud platform, which represents a $1 trillion market opportunity”, and NewCo “will immediately be the world’s leading managed infrastructure services provider”. NewCo will include IBM Global Technology Services’ existing managed infrastructure clients. BMC Software has managed to acquire Compuware (perhaps, best known for its DevOps products), and RSM Partners (best known for their security work). Syncsort changed its name to Precisely. And Rocket Software acquired both ConnectiQ (best known for mainframe Robotic Process Automation (RPA)) and WebConnect (known for mainframe terminal emulation software) from UK-based ActiveOps.. 4 © Arcati Ltd, 2021 ArcatiArcati MainframeMainframe YearbookYearbook 20072021 Mainframe Strategy Apart from all the words associated with the lockdown, there haven’t been many associated with IT. Added to our glossary this year are Fully Homomorphic Encryption (FHE), Zero Trust Network Access (ZTNA), BaaS, Robotic process automation (RPA), and DataOps. Fully Homomorphic
Recommended publications
  • Security on the Mainframe Stay Connected to IBM Redbooks
    Front cover Security on the IBM Mainframe Operating system and application security IBM Security Blueprint and Framework IBM mainframe security concepts Karan Singh Lennie Dymoke-Bradshaw Thomas Castiglion Pekka Hanninen Vincente Ranieri Junior Patrick Kappeler ibm.com/redbooks International Technical Support Organization Security on the IBM Mainframe April 2010 SG24-7803-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (April 2010) This edition applies to the IBM System z10 Enterprise Class server, the IBM System z10 Business Class server, and Version 1, Release 11, Modification 0 of z/OS (product number 5694-A01). © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 IBM Security Framework. 4 1.1.1 People and identity . 5 1.1.2 Data and information. 5 1.1.3 Application and process . 5 1.1.4 Network, server, and endpoint . 5 1.1.5 Physical Infrastructure . 6 1.2 Framework and Blueprint . 7 1.3 IBM Security Blueprint. 7 Chapter 2. Security of the IBM Mainframe: yesterday and today . 13 2.1 Operating systems . 14 2.1.1 z/OS operating system family . 14 2.1.2 z/VM Hypervisor family .
    [Show full text]
  • 8. IBM Z and Hybrid Cloud
    The Centers for Medicare and Medicaid Services The role of the IBM Z® in Hybrid Cloud Architecture Paul Giangarra – IBM Distinguished Engineer December 2020 © IBM Corporation 2020 The Centers for Medicare and Medicaid Services The Role of IBM Z in Hybrid Cloud Architecture White Paper, December 2020 1. Foreword ............................................................................................................................................... 3 2. Executive Summary .............................................................................................................................. 4 3. Introduction ........................................................................................................................................... 7 4. IBM Z and NIST’s Five Essential Elements of Cloud Computing ..................................................... 10 5. IBM Z as a Cloud Computing Platform: Core Elements .................................................................... 12 5.1. The IBM Z for Cloud starts with Hardware .............................................................................. 13 5.2. Cross IBM Z Foundation Enables Enterprise Cloud Computing .............................................. 14 5.3. Capacity Provisioning and Capacity on Demand for Usage Metering and Chargeback (Infrastructure-as-a-Service) ................................................................................................................... 17 5.4. Multi-Tenancy and Security (Infrastructure-as-a-Service) .......................................................
    [Show full text]
  • Brand Model St Category Lvl Side Cut Radius Msrp Atomic
    BRAND MODEL ST CATEGORY LVL SIDE CUT RADIUS MSRP ATOMIC Beta Race 10.22 Titanium RC N GS Race E 99 62 90 22@193 $1,099.00 ATOMIC Beta Ride 10.20 Titanium CXC N All mountain E 105 68 96 20@180 $1,099.00 ATOMIC Beta Race 9.16 Hyper Carbon SL RC N SL Race E 105 62 94 16@180 $999.00 ATOMIC Beta Race 9.24 Hyper Carbon RC N SL Race E 94 62 85 24@183 $999.00 ATOMIC Beta Ride 10EX N All mtn X Wide A 115 87 110 25 $999.00 ATOMIC Beta Ride 9.20 V Carbon N all mountain A 106 66 90 20@180 $999.00 ATOMIC Beta Race 9.14 Hyper Carbon SL VC N SL Race A 105 62 94 14 $899.00 ATOMIC Beta Race 9.20 Race Carver VC N GS Race A 106 62 95 18@190 $899.00 ATOMIC Beta Free Zone 10.11 VB N extreme carve E 125 65 108 11 $899.00 ATOMIC Beta Ride 9.22S N all mtn X wide I/A 110 72 102 22 $899.00 ATOMIC Beta Ride 9.22 Super Lite N all mtn X wide I/A 110 72 102 22 $899.00 ATOMIC Heli Star U powder A 135 115 125 42 $899.00 ATOMIC Beta Carv/x 9.26 Hyper Carbon N carving I/A 97 62 88 26 $899.00 ATOMIC Beta Free Zone Bump N twin tip I/E 103 70 94 16 $799.00 ATOMIC Beta Carv/x 9.18 Carbon N carving I/A 105 62 94 18 $799.00 ATOMIC Powder Ride N powder A 128 104 118 32 $799.00 ATOMIC Beta Ride V8.20 N all mtn I/A 106 66 90 20 $799.00 ATOMIC Beta Carv/x 9.18L N carving I/A 105 62 94 18 $799.00 ATOMIC Beta Carv/x 9.14 Hyper Carbon N carving I/A 106 62 94 14 $699.00 ATOMIC Beta V 8.20 Carbon N sport carving I/A 100 64 84 20 $599.00 ATOMIC Beta Free Zone 9.10 VB N extreme carve I/E 111 65 96 10 $599.00 ATOMIC Beta V 8.20L Carbon N sport carving N/A 100 64 84 20 $599.00 ATOMIC Beta
    [Show full text]
  • In-Game Communications Analysis As an Indicator of Recognition Primed Decision Making in Elite Australian Rules Football Umpires
    Neville, T.J., Salmon, P.M. Look Who’s Talking - In-game Communications Analysis as an Indicator of Recognition Primed Decision Making in Elite Australian Rules Football Umpires Look Who’s Talking - In-game Communications Analysis as an Indicator of Recognition Primed Decision Making in Elite Australian Rules Football Umpires Timothy J. NEVILLEa,b, Paul M. SALMONa a University of the Sunshine Coast Accident Research, The University of the Sunshine Coast, Sippy Downs, Queensland, Australia b Joint and Operations Analysis Division, The Defence Science and Technology Organisation, Canberra, Australia ABSTRACT Officials in sport operate in a naturalistic environment making rapid decisions under stress. In sport, decision making research has identified consistent results between the three different ‘variations’ of the Recognition Primed Decision (RPD) model. This paper presents the findings from a study applying the RPD model to the decision making of Australian Rules Football (AFL) umpires. Method: Audible communication instances from AFL Field umpires were transcribed. The data was coded into ‘decision moments’; each decision moment was analysed to identify if the decision conformed to one of the three RPD model variations. Results: Within the 6025 communication instances 887 decision moments were identified. 78% of the decision moments were classified as Variation 1, 18% as Variation 2 and 3.5 % as Variation 3. Discussion: Decision making in AFL umpires is characterized by a similar RPD breakdown as decision making by players in sport.
    [Show full text]
  • Serve the Member, Grow the Game
    Serve the Member, Grow the Game 2020 Colorado PGA Member Directory Updated April, 2020 2 2020 Colorado PGA Member Directory | www.coloradopga.com Colorado PGA Section Information 4 2020 Colorado PGA Member Directory | www.coloradopga.com Colorado PGA Leadership Officers and Board REACH Trustees West Chapter Ben Welsh, PGA Spencer Zinn | Chairman President | 2019-2020 CCO - West Edge Energy Officers and Board Frost Creek Club John Andrew Jeff Boyer, PGA Brigadier General USAF - Retired President | 2019-2020 Jim Hajek, PGA Eagle Ranch Golf Course Vice-President | 2019-2020 Tom Bauerle Fossil Trace Golf Club Owner - Colorado Golf and Turf Luke Brosterhous, PGA Dan Bennett Secretary | 2019-2020 Cathy Matthews-Kane, PGA Catamount Ranch and Club Secretary | 2019-2020 Investor/Partner -Southwest Greens Country Club of Colorado John Bond Ed Marzec, PGA VP Sales/Mktg - Garb Inc. - Golf Honorary President | 2019-2020 Ty Thompson, PGA Country Club of the Rockies Honorary President | 2019-2020 Anne Broholm - CEO - Ahead Crosshairs Consulting Phil Brown BOARD OF DIRECTORS President/Founder - Six Points Con. Tom Apple, PGA | 2019-2020 BOARD OF DIRECTORS Country Club of the Rockies Mark Bacheldor, PGA | 2020-2022 Dr. Stephen Davis UCCS PGA Golf Management Owner - Cheyenne Mt. Dental Alice Plain, PGA | 2018 - 2020 Brad Dombaugh Vail Golf Club Jeff Boyer, PGA | 2019-2021 CEO - PSA Worldwide Corp., Inc. Eagle Ranch Golf Club Todd Schafersman, PGA | 2020-22 Barbara Faulkenberry - Ind. Director The Bridges Golf & CC Bob Doyle, PGA | Past District 9 Dir. Life Member Walt Glover CFO - U.S. Olympic Endowment Kenny Thayer, PGA | 2019-2020 Beaver Creek Golf Club Kyle Heyen, PGA | Past District 9 Dir.
    [Show full text]
  • IBM Zenterprise 114 Technical Guide
    Front cover IBM zEnterprise 114 Technical Guide Explains virtualizing and managing the heterogenous infrastructure Describes the zEnterprise System and related features and functions Discusses zEnterprise hardware and software capabilities Bill White Octavian Lascu Erik Bakker Parwez Hamid Fernando Nogal Frank Packheiser Vicente Ranieri Jr. Karl-Erik Stenfors Esra Ufacik Chen Zhu ibm.com/redbooks International Technical Support Organization IBM zEnterprise 114 Technical Guide September 2011 SG24-7954-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. First Edition (September 2011) This edition applies to the IBM zEnterprise 114. © Copyright International Business Machines Corporation 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . .xv The team who wrote this book . .xv Now you can become a published author, too! . xviii Comments welcome. xviii Stay connected to IBM Redbooks publications . xviii Chapter 1. Introducing the IBM zEnterprise 114 . 1 1.1 zEnterprise 114 highlights. 3 1.1.1 Models . 4 1.1.2 Capacity on Demand . 5 1.2 zEnterprise 114 models . 5 1.2.1 Model upgrade paths . 6 1.2.2 Concurrent processor unit conversions. 7 1.3 System functions and features . 7 1.3.1 Overview . 7 1.3.2 Processor . 8 1.3.3 Memory subsystem and topology . 9 1.3.4 Processor drawer . 9 1.3.5 I/O connectivity, PCIe, and InfiniBand . 10 1.3.6 I/O subsystems . 10 1.3.7 Cryptography .
    [Show full text]
  • IBM Highlights, 1985-1989 (PDF, 145KB)
    IBM HIGHLIGHTS, 1985 -1989 Year Page(s) 1985 2 - 7 1986 7 - 13 1987 13 - 18 1988 18 - 24 1989 24 - 30 February 2003 1406HC02 2 1985 Business Performance IBM’s gross income is $50.05 billion, up nine percent from 1984, and its net earnings are $6.55 billion, up 20 percent from the year before. There are 405,535 employees and 798,152 stockholders at year-end. Organization IBM President John F. Akers succeeds John R. Opel as chief executive officer, effective February 1. Mr. Akers also is to head the Corporate Management Board and serve as chairman of its Policy Committee and Business Operations Committee. PC dealer sales, support and operations are transferred from the Entry Systems Division (ESD) to the National Distribution Division, while the marketing function for IBM’s Personal Computer continues to be an ESD responsibility. IBM announces in September a reorganization of its U.S. marketing operations. Under the realignment, to take effect on Jan. 1, 1986, the National Accounts Division, which markets IBM products to the company’s largest customers, and the National Marketing Division, which serves primarily medium-sized and small customer accounts, are reorganized into two geographic marketing divisions: The North-Central Marketing Division and the South-West Marketing Division. The National Distribution Division, which directs IBM’s marketing efforts through Product Centers, value-added remarketers, and authorized dealers, is to merge its distribution channels, personal computer dealer operations and systems supplies field sales forces into a single sales organization. The National Service Division is to realign its field service operations to be symmetrical with the new marketing organizations.
    [Show full text]
  • Footwear IP Digest Oct 2014
    From: FDRA [email protected] Subject: Footwear IP Digest Oct. 2014 Date: January 12, 2015 at 2:18 PM To: [email protected] Having trouble viewing this email? Click here September 2014 Legislation There was no new legislation introduced. Litigation Adidas AG v. adidasAdipure11pro2.com, 2014 U.S. Dist. LEXIS 131706 (S.D. Fla. Sept. 18, 2014). Synopsis: A federal court grants Adidas and Reebok a final default judgment against dozens of websites purveying counterfeit Adidas and Reebok footwear, ordering a permanent injunction against the sites. Deckers Outdoor Corp. v. J. C. Penney Company Inc., 2014 U.S. Dist. LEXIS 126266 (C.D. Cal. Sept. 8, 2014). Synopsis: A federal court grants JC Penney's motion to dismiss Deckers's claims for false designation of origin, willful patent infringement, and unfair competition but denies its motion to dismiss Deckers' claim that JC Penney infringed its UGG boot patent. Coach, Inc. v. 3D Designers Inspirations, 2014 U.S. Dist. LEXIS 136933 (C.D. Ill. Sept. 29, 2014). Synopsis: A federal court grants Coach a default judgment against 3D Designers Inspirations, a small- scale retailer, for selling counterfeit Coach products, awarding Coach monetary and injunctive relief. Deckers Outdoor Corp. v. Ozwear Pty Ltd., 2014 U.S. Dist. LEXIS 132169 (C.D. Cal. Sept. 18, 2014). Synopsis: A federal court grants Deckers' a default judgment against Ozwear, an internet retailer based in Australia, for infringement of its UGG trademark and UGG boot patent, awarding Deckers statutory damages under the Lanham Act and a permanent injunction. USPTO Utility patents issued in the month of September: Utility patents issued in the month of September: Pat.
    [Show full text]
  • Using IBM System Z As the Foundation for Your Information Management Architecture
    Front cover Using IBM System z As the Foundation for Your Information Management Architecture Redguides for Business Leaders Alex Louwe Kooijmans Willie Favero Fabricio Pimentel Information management challenges Strengths of IBM System z for information management Exploring the IBM Smart Analytics Optimizer for DB2 for z/OS V1.1 Executive overview Many companies have built data warehouses (DWs) and have embraced business intelligence (BI) and analytics solutions. Even as companies have accumulated huge amounts of data, however, it remains difficult to provide trusted information at the right time and in the right place. The amount of data collected and available throughout the enterprise continues to grow even as the complexity and urgency of receiving meaningful information continues to increase. Producing meaningful and trusted information when it is needed can only be achieved by having an adequate information architecture in place and a powerful underlying infrastructure. The amounts of data to mine, cleanse, and integrate are becoming so large that increasingly the infrastructure is becoming the bottleneck. This results in low refresh rates of the data in the data warehouse and in not having the information available in time where it is needed. And even before information can become available in a BI dashboard or a report, many preceding steps must take place: the collection of raw data; integration of data from multiple data stores, business units or geographies; transformation of data from one format to another; cubing data into data cubes; and finally, loading changes to data in the data warehouse. Combining the complexity of the information requirements, the growing amounts of data, and multiple layers of the information architecture requires an extremely powerful infrastructure.
    [Show full text]
  • Arxiv:2011.01874V1 [Cs.SI] 8 Oct 2020 Extracting the True User Intent from the Noise Is a Daunting Task
    Contextualisation of eCommerce Users Hassan Elhabbak Benoît Descamps Digital Advanced Analytics Digital Advanced Analytics Adidas International,Amsterdam Adidas International,Amsterdam Netherlands, 1101 BA Netherlands, 1101 BA [email protected] [email protected] Elisabeth Fischer Data Science Chair Julius-Maximilians Universität W’urzburg´ Germany, 91074 [email protected] Sakis Athanasiadis Digital Advanced Analytics Adidas International,Amsterdam Netherlands, 1101 BA [email protected] Abstract A scaleable modelling framework for the consumer intent within the setting of e-Commerce is presented. The methodology applies contextualisation through embeddings borrowed from Natural Language Processing. By considering the user session journeys throughough the pages of a website as documents, we capture contextual relationships between pages, as well as the topics of the of user visits. Finally, we empirically study the consistency and the stability of the presented framework. 1 Introduction Millions of users interact daily on global e-Commerce websites yielding billions of data points. Understanding the users’ intent is a key step towards personalising their consumer journeys. However, arXiv:2011.01874v1 [cs.SI] 8 Oct 2020 extracting the true user intent from the noise is a daunting task. Every single user interaction is unfortunately not necessarily representative of a user’s visit. Click interactions are known to be noisy and highly biased as shown in the case of recommendation Aslanyan & Porwal (2018). Despite the above, these interactions have been found to be valuable sources of implicit feedback Joachims et al. (2007). In this work, we take a few steps to address this challenge, aiming to provide a definition of consumer intent within an e-Commerce setting.
    [Show full text]
  • IBM 3090 Processor Complex: Planning and Installation Reference
    ----- - ---- :S: - -i""-;-"""i: Large Technical Systems Bulletin Technical Support D. D. Boos B. E. Kasch National Technical Support Washington Systems Center GG66-3090-01 November 1987 Washington Systems Center Gaithersburg, MD Technical Bulletin IBM 3090 Processor Complex: Planning and Installation Reference D.D.Boos B. E. Kasch GG66-3090-01 November 1987 The information contained in this document has not been submitted to any formal IBM test and is distributed on an "as is" basis without any warranty either expressed or implied. The use of this information or the implementation of any of these techniques is a customer responsibility and depends on the customer's ability to evaluate and inte­ grate them into the customer's operational environment. While each item may have been reviewed by IBM for accuracy in a specific situation, there· is no guarantee that the same or similar results will be obtained elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own ris.k. Reference to PTF numbers that have not been released through the PUT process does not imply general availability. The purpose of including these reference numbers is to alert IBM CPU customers to specific information relative to the implementation of the PTF when it becomes available to each customer according to the normal IBM PTF distribution rules. Performance data contained in this document was determined in a controlled environ­ ment; and therefore, the results which may be obtained in other operating environ­ ments may vary significantly. Users of this document should verify the applicable data for their specific environment.
    [Show full text]
  • LESLIE ATKINS, Individually and D/B/A LESLIE ATKINS COMMUNICATIONS, Plaintiff, V. BENSON J. FISCHER, Et Al., Defendants. UNITED
    Case 1:98-cv-00800-CKK Document 277 Filed 08/29/05 Page 1 of 54 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA LESLIE ATKINS, individually and d/b/a LESLIE ATKINS COMMUNICATIONS, Plaintiff, Civil Action No. 98-800 (CKK) v. BENSON J. FISCHER, et al., Defendants. MEMORANDUM OPINION (August 29, 2005) Plaintiff Leslie Atkins, d/b/a Leslie Atkins Communications, Inc., brought this action against Defendants Benson J. Fischer, the Fischer Organization, Inc., and the Fischer Brewing Company, Inc. (collectively, “Defendants”), alleging copyright infringement in the commercial use of six-pack carrier and bottle designs for a product called “Redneck Beer” in violation of the Copyright Act of 1973, 17 U.S.C. § 102, and Section 43(a) of the Lanham Act, 15 U.S.C. § 1125(a). Currently before the Court is Plaintiff’s Motion for Finding that Defendants and Their Prior Counsel, Stanley Goldschmidt, Esquire, Attempted to Perpetrate a Fraud Against This Court and For an Award of Appropriate Sanctions, the separate Oppositions filed by Defendants and Mr. Goldschmidt, and Plaintiff’s Combined Reply. Also pending before the Court is Mr. Goldschmidt’s Motion for Sanctions Against Plaintiff for Violation of Federal Rule of Civil Procedure 11, and Plaintiff’s subsequent Opposition. Upon a searching examination of the parties’ respective filings, all attached exhibits, the relevant case law, and the entire record herein, the Court shall grant-in-party and deny-in-part Case 1:98-cv-00800-CKK Document 277 Filed 08/29/05 Page 2 of 54 Plaintiff’s motion and shall deny Mr.
    [Show full text]