Catalog Advanced Search
-
If you like to solve issues in NetView yourself, then this session is for you. The speaker will provide information on how to get started with troubleshooting in NetView. Additionally, information will be provided on common problems and questions that come into the NetView team.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
Want to learn more about HA/DR on the IBM Z platform? This session will provide an introduction to the key concepts and show how a solution like IBM GDPS can help you meet your business resilience goals.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
In this session Joe will discuss how while mainframes are mocked by rival computing architectures as belonging in the 1960s, Hollywood understands us and promotes the mainframe as the superheroes's IT platform of choice.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
In this session, you will learn how you can evolve your current 2-site synchronous disk mirroring deployments with a best-of-breed, 3-site or 4-site topology for High Availability and Disaster Recovery.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
They will explain that with modern tooling and practices, the learning curve drops significantly, allowing new mainframers to start contributing and increasing the team's productivity faster.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
This session will describe scenarios to help you manage some z/OS Communication Server functions with the NetView program, including automation, notification, and more.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
The Vulnerability Management domain focuses on the process by which organizations identify, analyze, and manage vulnerabilities in a critical serviceâs operating environment.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
XCOM Data Transport API calls can be made using JSON to provide necessary parameters as input to the API as well as the generated responses
-
Register
- Individual Member - Free!
- More Information
-
Register
-
With the rise of cyber attacks and evolving regulations, mainframes are becoming increasingly vulnerable to security breaches. One of the biggest challenges in securing the mainframe is identifying and addressing the categories of vulnerabilities that can be exploited by threat actors.
-
Register
- Individual Member - Free!
- More Information
-
Register
-
After you've implemented the IMS catalog, can you leave it alone or do you have to "maintain" it? Is there anything you should do to get optimal use of the IMS catalog? What kind of security should be implemented? If these questions are keeping you up at night, then come to this session and get enlightened.
-
Register
- Individual Member - Free!
- More Information
-
Register