Running Jupyter Hub and a Notebook Server Environment in the IBM Open Data Analytics for z/OS Ecosystem - an Operational Perspective
Integrating Your System of Record with Blockchain
Python, Anaconda, and Open Data Science on z/OS
Machine Learning and the Modern Mainframe
Go Behind the Scenes of Machine Learning in Enterprise Data Centers
Accelerate Your Development of Secured Microservices in the Cloud with IBM Cloud Hyper Protect Containers
Practical AI: Paranoia Aside, What Can AI/ML/DL Do for Me?
Deep Neural Networks - Making AI Smarter
Free Software: Measuring Unlimited License Agreements
IBM's Latest Buzz - A Discussion of the Newest of the New Technologies
How IBM Can Proactively Identify z/OS Networking and Application Issues without Tracing
NetView for z/OS for Rookies
Pervasive Encryption: Data in flight - End-to-end encryption options on z/OS
TCP/IP Security Controls on z/OS
Encrypt Your TN3270E Server Traffic!
What's New in NetView for z/OS
Is Your z/OS Network Traffic Properly Encrypted? zERT Has the Answer!
Pervasive Encryption: Data in Flight - z/OS Communications Server Policy Agent
Lab: Pervasive Encryption - IPsec AT-TLS Using Configuration Assistant for z/OS V2R3, Part 1 of 2
Lab: Pervasive Encryption - AT-TLS Using Configuration Assistant for z/OS V2R3, Part 2 of 2
How to Lose a User in 10 Ways: Ignoring Usability and Usefulness in Your Products
Ten Tips for Career Management in z/OS
Motivating Coworkers When You're the Junior Person in the Room
Getting Started with Design Thinking
Building the 21st Century Team
The CIO's Acquisition Guide
Mastering Social Media - The 2018 Edition
How to Make Your Mainframe Millennial-Friendly
The Art and Science of Technical Presentations
Becoming the Professional You That You Published on LinkedIn
So You Want to Be a Technical Leader
Becoming an Extraordinary Leader
Security Opening: z/OS Security Portal, Mainframe Code Based Exploits & What To Do About Them
z/OSMF: What You Need to Know from a Security Administration Perspective
Boiling the Ocean: How to Boil All Your Security Activity Down to One Line Every Day
Peeling Back the Onion: A Security Administrator's Approach to IT Security Regulations
At Risk – Your Batch Data is Exposed
z/OS UNIX Security -- Fight or Flight?
Lab: RACF Database Dangerous Discoveries!
Auditing Cryptographic Keys for Pervasive Encryption and Other Critical Data
Securing Your Crypto Infrastructure
RACF Update: V2R3 and Multi-Factor Authentication
CA Mainframe Data-Centric Security, Your Mainframe Regulatory and GDPR Aid
CA Mainframe Security, It Just Keeps Getting Better!