Network Security for the z/OS Systems Programmer; Part 1 of 2 Tags: Proceedings, 2016, SHARE in San Antonio 2016 With IT budgets shrinking and roles expanding within an organizations... Learn more
z/OS Communications Server Security Using Policy Agent Tags: Proceedings, 2016, SHARE in San Antonio 2016 Policy Agent is required for the following z/OS support: • Quality of... Learn more
NetView for z/OS: New Directions Tags: Proceedings, 2016, SHARE in San Antonio 2016 For years; NetView for z/OS has provided the network and system... Learn more
Introduction to Mainframe Network Management Tags: Proceedings, 2016, SHARE in San Antonio 2016 There are a ton of management tools available to help your mainframe... Learn more
z/OS Communication Server Intrusion Detection Services Tags: Proceedings, 2016, SHARE in San Antonio 2016 There are many types of intrusion detection systems being deployed... Learn more
The Three Headed Dog Ate My SSH Keys! - Using OpenSSH in a Single Sign-on Corporate Environment with z/OS; Windows and Linux Tags: Proceedings, 2016, SHARE in San Antonio 2016 Kerberos is an integral part of Windows Active Directory and is also... Learn more
OpenSSH for z/OS: New Features and Functions Tags: Proceedings, 2016, SHARE in San Antonio 2016 IBM has announced that OpenSSH will be included as a base element in... Learn more
Network Trace Analysis Tags: Proceedings, 2016, SHARE in San Antonio 2016 Network traffic analysis at the packet level is critical to diagnosing... Learn more
A Practical Guide to Career Management Tags: Proceedings, 2016, SHARE in San Antonio 2016 This presentation is designed for people who want to take control. It’s... Learn more
How to Thrive in a Chaotic; Changing Business World. Tags: Proceedings, 2016, SHARE in San Antonio 2016 Change happens. Sometimes you RESIST it; sometimes you ACCEPT it;... Learn more
You Have Been Asked to Present - Now What? Tags: Proceedings, 2016, SHARE in San Antonio 2016 Presentations; we sit through them all the time. We know a good one... Learn more
Top Interviewing Tips You Need to Know Now (and How Some Will Help You with the Job You Already Have) Tags: Proceedings, 2016, SHARE in San Antonio 2016 Times have changed. Where jobs were once plentiful and it was easy to... Learn more
The Art and Science of Technical Presentations Tags: Proceedings, 2016, SHARE in San Antonio 2016 Do you have to drag people to your presentations? Does your audience... Learn more
Mentoring 101 Tags: Proceedings, 2016, SHARE in San Antonio 2016 Education in our business only goes so far. If people are going to... Learn more
Architecting Your Career - Teching Your Way to the Top Tags: Proceedings, 2016, SHARE in San Antonio 2016 Does it seem like everyone is getting ahead except for you? Are you... Learn more
So You Want to Be a Software Architect? Tags: Proceedings, 2016, SHARE in San Antonio 2016 A Software Architect is an individual contributor role in most... Learn more
Mainframe Skills - The Myth and the Reality Tags: Proceedings, 2016, SHARE in San Antonio 2016 People unfamiliar with z Systems think that you need different skills... Learn more
Promoting Your Technical Career by Leveraging Business Results Tags: Proceedings, 2016, SHARE in San Antonio 2016 A technical career can be challenging. Ultimately; technical positions... Learn more
Stress is IT Tags: Proceedings, 2016, SHARE in San Antonio 2016 What's all the fuss about stress? Doesn't some stress just make you... Learn more
RACF Command Tips Tags: Proceedings, 2016, SHARE in San Antonio 2016 How do I get rid of the RACF-bit on a dataset when there is no discrete... Learn more
Using RACF's UNIXPRIV Class Tags: Proceedings, 2016, SHARE in San Antonio 2016 Permission to certain UNIXPRIV class profiles can provide users with... Learn more
LongTail: FOSS ssh Honeypot and Analytics Software Tags: Proceedings, 2016, SHARE in San Antonio 2016 LongTail is both a honeypot and a set of programs that analyze ssh... Learn more
The Top Ten Security Vulnerabilities in z/OS Security Tags: Proceedings, 2016, SHARE in San Antonio 2016 In this session we will discuss the need to be proactive in auditing... Learn more
Why Complex Passwords Should Be Fact and Not Fiction Tags: Proceedings, 2016, SHARE in San Antonio 2016 All three Enterprise Security Managers provide a number of options to... Learn more
Best Practices for Securing Privileged Accounts Tags: Proceedings, 2016, SHARE in San Antonio 2016 New risk factors and compliance requirements are making mainframe... Learn more