Penny Pinching vs. Growing Workloads -- How is it Possible?
Enterprise Network Management and Security
Unlocking the Power of CA NetMaster’s SmartTrace Facility
"Silver Bullets" for Common NetView for z/OS Questions and Issues
Shared Memory Communications: Security Considerations
End to End Encryption Options on z/OS
z/OS OpenSSH Comparison to IPsec and AT-TLS
z/OS Communications Server Security Using Policy Agent
Safe and Secure Transfers with z/OS FTP
Network Security for the z/OS Systems Programmer, Part 2 of 2
Network Security for the z/OS Systems Programmer, Part 1 of 2
Is NetView for z/OS Active or on Standby with Your GDPS Active/Active Sites?
z/OS Communication Server Intrusion Detection Services
How IBM Can Identify z/OS Networking Issues without Tracing
Social Media and the Workplace - One Size Fits All
Roundtable Discussion: Getting the Most from Your Mentor
The Product Is You! A Deep Dive into Career Planning
The Product Is You! A Practical Guide to Career Management
So You Want to Be a Technical Leader
The Changing Face of the IBM Academic Initiative Program
You Have Been Asked to Present - Now What?
Retirement Planning for Baby Boomers, Millennials and the Next Gen - Your Second Act
It's Not What You Know - It's Who You Know - A Guide to Job Hunters
Password Rules and Beyond - Exploring the ESM Password Environment
PAGENT & RACF: Security from within the Black Box and Beyond
SHARE Live! - Cloud Computing - Security Remains an Issue, So Ensure Your Umbrella is Ready
Experiences with Two Factor Authentication (2FA) on z/OS
SHARE Live! - High Expectations: Our Systems Are (or Could Be) as Secure as Airplanes
Kerberos or Cerberus - The Three Headed Monster of Mainframe Security, Penetration Testing and Hacking
HFS Unload Utility: IRRHFSU
RACF Monitoring & Reporting
What is PCI DSS and how does it affect me with PCI DSS 3.2 being moved up?
Lab: Operational Key Management Using ICSF
Preparing for a Security Audit? Introducing Key Tracking, Key Validity and Key Archival Using ICSF (Integrated Cryptographic Service Facility)
Crypto 101: Meet Alice and Bob
Lab: As Cool as ICE: Using ICETOOL with RACF Data
RACF IRRXUTIL, System REXX, and the IBM Health Checker for z/OS: A Perfect Combination!
A Holistic Approach to Mainframe and Enterprise Security
Encryption? Yeah, We Do That
A New Look at Mainframe Hacking and Penetration Testing
RACF for Dummies – Presented by a Dummy
World Wide Legal Update on Security, Regulatory Compliance, Auditing and Privacy
DB2 for z/OS and WLM Interaction: Understanding the Basics
DB2 Physical and Logical Recovery Work Together
Restoring 43TB and Applying 2.2 Billion DB2 Log Records Within 4 Hours, and Proving It on a Live Production System!
Modern DB2 for z/OS Physical Database Design