
SHARE Wants Your Feedback
-
Product not yet rated
Complete a short survey to provide your feedback on future topics and speakers you'd like to see on SHARE'd Knowledge
-
Register
- Individual Member - Free!
- Student Member - Free!
- Emeritus Member - Free!
- Broadcom Member - Free!
- More Information
-
Register
Getting Started
Search the Catalog
Upcoming Webinars
Recommended For You
Recommendations are made based on your interests. To update your interests, visit your Profile.
-
Product not yet rated
"Why, sometimes I've believed as many as six impossible things before breakfast." - The White Queen: Lewis Carroll (1832-1898), "Alice's Adventures in Wonderland." What's your approach to creating your replacement? How do you safely combine volatile ingredients like "youthful exuberance," "limited experience," "extraordinary privilege," and "40-plus adjacent LPARs" without setting the entire laboratory on fire? What if you need a library's worth of training materials, and all you have is a nearly empty bookshelf? How do you maintain a fail-safe environment for yourself and your peers while simultaneously providing a learning environment where it's safe for trainees to fail? Join me in this case study of onboarding and training next-generation z/VM engineering talent. We'll look at strategies and tactics for providing training resources, successfully growing a globally-dispersed team, and methods used to build a productive working and learning environment that is simultaneously fail-safe and safe to fail.
-
Register
- Individual Member - Free!
- Student Member - Free!
- Emeritus Member - Free!
- Broadcom Member - Free!
- More Information
-
Register
-
Product not yet rated
IBM Z has a 40+ year history in security and cryptography starting with the design of the Lucifer cipher in 1974 (which became the Data Encryption Standard, DES algorithm) to today, with enablement of Quantum Safe Cryptography for the IBM z16. IBM z16 introduces new capabilities in IBM Z hardware, operating systems and middleware to provide quantum safe encryption and more. This session will cover new features in the IBM z16 Crypto Ecosystem, including z/OS Cryptographic Services (ICSF), in support of data protection.
-
Register
- Individual Member - Free!
- Student Member - Free!
- Emeritus Member - Free!
- Broadcom Member - Free!
- More Information
-
Register
-
Product not yet rated
To some folks, the MVS System Trace probably looks like "Matrix" code but, like so many other things on our platform, it's actually intended to be human readable and the information it contains is priceless -- whether you've suffered an abend, are in a hard loop, have a performance issue, or just want to understand what's going on while a program is running. The presenter will discuss how to glean information from the MVS System Trace in various common scenarios and will provide useful advice for configuring both the system and your program to ensure the MVS System Trace has everything you and your software vendors need to debug even the most challenging issue.
-
Register
- Individual Member - Free!
- Student Member - Free!
- Emeritus Member - Free!
- Broadcom Member - Free!
- More Information
-
Register
Access Date | Quiz Result | Score | Actions |
---|