SHARE’D KNOWLEDGE

image

Conference Recordings

Search by Format
Search by Type
Sort By
Search by Keyword
  • Product not yet rated Contains 1 Component(s)

    When you operate an enterprise data center, downtime is the enemy. Taking downtime to replace hardware or even moving from one data center to another is a massive disruption to business as usual. Most projects require months of planning and careful orchestration of every detail, but there is no getting around physics. At some point, you have to move data from point A to point B. This is when having a powerful migration toolkit in your back pocket makes all the difference in the world. We will discuss: 1. How to leverage tooling to minimize service disruption 2. Using your tools to consistently manage your resources for maximum benefit 3. Address data erasure processes with minimal risk and maximum assurance.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/18/2023

    zERT Policy Enforcement allows you to configure policy rules to take actions in real time based on the observed cryptographic attributes of inbound and outbound z/OS TCP connections. As part of this support the Network Configuration Assistant (NCA) provides new, advanced function for configuring zERT policy enforcement. In this presentation you will learn how to get the most out of NCA's zERT support, including quickly and efficiently defining zERT rules and using reusable rules and rule sets to group your zERT rules into logical, hierarchical buckets that are easy to manage and coordinate.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/18/2023

    This presentation will be an intro guide around the API Development lifecycle, Restful APIs, YAML, Swagger, and OpenAPI. It is intended as a starter guide for individuals looking to learn more about APIs and some best practices for development.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/18/2023

    With z/OSMF 3.1 WLM Policy Advisor, IBM will provide you a new z/OSMF app to support you with your WLM service definition analysis. The z/OS WLM Policy Advisor will assists you to better protect your business-critical work from performance degradations by preventing system administrators or programmers from defining inadequate WLM policies. Each policy in the WLM service definition can be checked against best practice rules, the findings will be visualized and explained. The active WLM policy can be analyzed with respect to SMF performance data, recommendations and explanations are provided if problems are identified.Customers who use the WLM Policy Advisor to examine their WLM service definition will observe the following benefits: proactive problem determination and prevention, simplification of WLM policy definition task and support while facing diminishing z/OS skills. This session is recommended for zNextGen (zNG) members, and those new to the System z platform.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/18/2023

    IBM z/OS Security Server/RACF has been continuously enhanced for decades to help keep z/OS applications secure. Attend this session to learn about all the latest updates in RACF so you can start taking advantage of them on your systems right away.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/18/2023

    Join us in discovering the many options to ensure we keep the mainframe the most securable platform around. This is not your old mainframe, you have MFA, Quantum encryption, advanced reporting, privileged user controls, all at your finger tips. We will discuss these ACF2 and Top Secret options and potential future customer requests.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/18/2023

    Companies that are the most successful in their DevOps journey, focus not only on DevOps tooling, but also on promoting a DevOps culture. This session with focus on what DevOps is, and look at examples of DevOps practices, such as VSM (Value Stream Mapping) intended to further a Companies DevOps Culture.

  • Product not yet rated Contains 1 Component(s)

    During this session, leaders from BMC, Broadcom, EPS, IBM, IntelliMagic and RocketSoftware will demo how they have raised the level of observability into the mainframe! Each use case will address a performance challenge. The leaders will then participate in a panel sharing their point of view on observability and answering your challenging questions. Frank Kyne with Watson & Walker will be facilitating the session.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/17/2023

    In this session, our speaker will show how while mainframes are mocked by rival computing architectures as belonging in the 1060s, Hollywood understands us and promotes the mainframe as the superheroes's IT platform of choice. From Will Smith, Jeff Goldblum, and countless others tat have saved the world against aliens, dinosaurs or supervillains, these are the true hero in every Hollywood plot! This presentation is either going to get an award for being the funniest thing SHARE has ever presented, or else the speaker is going to get the record lowest score and the most number of social media dislikes for being extremely unfunny. Either way folks seeing it hopefully won't forget it. With any luck they'll remember it for the right reasons and come away reflecting on what motived them to enter mainframe computing and have a fresh to-do list of movies to catch up with and music tracks to listen to next time they're struggling to read a syslog or debug an abend.

  • Product not yet rated Contains 1 Component(s) Recorded On: 08/17/2023

    With the introduction of z196 in 2010, the Large System Performance Reference (LSPR) was significantly enhanced to be based on a measure of a workload's intensity of use of a processor's memory hierarchy. Since then the methodology has seen much validation and continues to be used up through the latest IBM Z processors. This session will discuss the theory behind the Relative Nest Intensity (RNI) metric and its basis in data gathered using CPU MF. Its application to capacity sizing will be illustrated by contrasting the performance of the latest IBM Z processors. Topics include processors, cache and memory topology, SMT, subcapacity models, and workload variability.