An Audit A Day Keeps the Lawyers at Bay!

Download PDF

Session title: An Audit A Day Keeps the Lawyers at Bay!

Session abstract: Audit and Compliance is one of the big challenges companies  are facing these days. With GDPR and a bunch of other laws either in force or “coming soon to an auditor near you” it is time to bite the bullet and start working with the auditor not against. Continue reading “An Audit A Day Keeps the Lawyers at Bay!”

The zGui (r)evolution – First hands on experience and best practices

Download PDF

Session title: The zGui (r)evolution – First hands on experience and best practices

Session abstract: The evolution of the mainframe had a variety of GUI approaches, some lasted for a while, some never took off at all. However, it was never THE COMMON ecosystem used by all products and all vendors. At the 2018 SHARE, IBM, Rocket Software and CA Technologies announced ZOWE – THE z ecosystem to securely manage, control, script and develop. Of course, an announcement is probably not the final truth, but from what I’ve already seen and used I’m more than enthused. Continue reading “The zGui (r)evolution – First hands on experience and best practices”

zIIP Experiences – Exploitation, Not Abuse

Download PDF

Session title: zIIP Experiences – Exploitation, Not Abuse

Session abstract: With the constant focus on controlling MIPs consumption on today’s mainframe, IT staffs are being pressed to get every cycle possible out of their System z Integrated Information Processor (zIIP) specialty engines and the now defunct System z Application Assist Processors (zAAP). Continue reading “zIIP Experiences – Exploitation, Not Abuse”

Tridex Db2 z/OS – March 21st 2019 agenda

8:30 – 9:00 Continental Breakfast (provided by IBM/IDUG)
9:00 – 9:15 Benefits of Attending the IDUG North America Conference – Charlotte, NC
Jim Reed, Program Director, IBM Enterprise Analytics
9:15 – 10:30 From Virtually Constrained to Really Overcommitted
Adrian Burke, Open Group Master Certified IT Specialist on the Db2 SWAT team
10:30 – 10:45 Break
10:45 – 12:00 zIIP Experiences – Exploitation, Not Abuse
Adrian Burke, Open Group Master Certified IT Specialist on the Db2 SWAT team
12:00 –1:00 Lunch (provided by IBM/IDUG)
1:00 – 2:15 ZOWE – The zGui (r)evolution – First Hands On Experiences and Best Practices
Ulf Heinrich, Director of Solutions Delivery, SEGUS
2:15 – 2:30 Break
2:30 – 3:45 An Audit A Day Keeps The Lawyers At Bay
Roy Boxwell, Senior Software Architect, SEGUS
3:45 Drawing for free pass to IDUG North America Conference in Charlotte, NC
Provided by IBM

Db2 for z/OS Migration Planning and Early Experiences

Download PDF – Part I, Part II

Session title: Db2 for z/OS Migration Planning and Early Experiences

Session abstract: This session will cover: share lessons learned, surprises, pitfalls; provide hints and tips; address some myths; provide additional planning information; provide usage guidelines and positioning on new enhancements; Help customers migrate as fast as possible, but safely. Continue reading “Db2 for z/OS Migration Planning and Early Experiences”

Tridex Db2 z/OS – November 15th 2018 agenda

Download PDF

8:30 – 9:00 Coffee (provided by IBM)
9:00 – 10:15 John Campbell, IBM
Db2 for z/OS: JCs Greatest Hits, War Stories, and Best Practices – Part I
10:15 – 10:30 Break
10:30 – 11:45 John Campbell, IBM
Db2 for z/OS:  JCs Greatest Hits, War Stories, and Best Practices – Part II
11:45 – 12:45 Lunch (provided by IBM)
12:45 – 2:00 John Campbell, IBM
Db2 for z/OS Migration Planning and Early Experiences – Part I
2:00 –  2:15 Break
2:15 –  3:30 John Campbell, IBM
Db2 for z/OS Migration Planning and Early Experiences – Part II

Security for a Modern Mainframe Database Environment

Download PDF

Session title: Security for a Modern Mainframe Database Environment

Session abstract: IBM’s mainframe security is well known for being hacker resistant. However, the deployment of technology depends on a combination of people, process and technology. Some of those processes, like authentication, begin on desktops and mobile devices that are outside the mainframe security controls and most susceptible to theft, key logging and other means to enable unauthorized personnel to access mainframe systems. Continue reading “Security for a Modern Mainframe Database Environment”