Tech Talk Corner

Visit the Tech Talk Corner during SHARE Providence! Located in the SHARE booth at the SHARE Technology Exchange Expo, each Tech Talk offers unique educational content from exclusive event partners. Talks will spend 10-15 minutes on a topic/solution, complete with a short slide deck.

Note: Agenda is listed in Eastern Time.

Agenda

Monday | Wednesday

Monday, August 7

Time Stage Company Speaker(s) About the Talk
5:15 p.m. - 
5:25 p.m.

1

David Cheng, V. P. of Engineering at Applied Expert Systems, Inc. (AES)

Introduction to CLEVERDetect® for IDS

Intrusion Detection is a very dynamic security activity impacting the network infrastructure.  CLEVERDetect for IDS complements the z/OS Intrusion Detection Services (IDS) by capturing and analyzing all IDS events such as attacks and scanning.  It also reports on FTP Server logon failures and other SAF or subsystem security violation events.  It includes the IDS Policy Explorer that displays active IDS policies in Policy Agent, and LogView that analyzes syslog data generated by TRMD (Traffic Regulation Manager Daemon).  A mobile app is available for browsing security violations and receiving real-time alerts via mobile notifications.

5:30 p.m. -
5:40 p.m.

1

Roger Hammer

Automating Analysis and Business Rules Projects

Is your organization struggling through enterprise z/OS modernization projects? Outdated program analysis technology with excessive manual efforts are likely the root cause. In this presentation, we will demonstrate a Z/OS code comprehension technology based on automated static analysis and sophisticated program slicing. Using CM evolveIT technology, analysis projects that used to take weeks or months to accomplish can now be done in minutes, with a very low error rate. We will look at common analysis problems including dead/redundant code, poorly structured code, and business rule extraction.

5:30 p.m. -
5:40 p.m.

2

Peter Mills

CorreLog VP Development & Support

Fighting the Breach Starts with Seeing the Breach

This Tech Talk session will explore generic use cases of how companies are able to see real-time z/OS security events in their distributed Security Information & Event Management or SIEM systems. It’s not rocket science; these customers are using tools they already own with their mainframe deployment.

5:45 p.m. –
5:55 p.m.

1

Nicole Fagen

VP, Product Management, CA Technologies

Escape the IT War Room and Say Goodbye to Reactive Firefighting

Tired of sitting in front of multiple dashboards, trying to understand norms, setting static alerts and simply reacting to them? How about letting machines watch the dashboards for you, while you do something more interesting? And even better, what if they could process the data, create dynamic alerts that warn of anomalies and filter out false positives. Whether you’re a mainframe performance novice or a seasoned IT ops expert, join us to learn how machine learning algorithms and embedded operational intelligence can help you escape the IT war room.

5:45 p.m. –
5:55 p.m.

2

Jeremy S. Hamilton

Sr. Software Consultant, BMC Software

Mainframe: No Longer Just the Black Box for SOA

While SOA has done a great job exposing mainframe applications as business services through interfacing and “wrapping”; the flexibility, agility, and efficacies of SOA have not been realized on the mainframe itself. Listen to how the Subsystem Service Model has brought SOA to the mainframe.

6:00 p.m. –
6:10 p.m.

1

Colin van der Ross

Consolidate Your z/OS Events with the Rest of the Enterprise

Are you prepared for new regulations possibly requiring z/OS log data to be sent to your Enterprise SIEM?   Insurance, banking, and healthcare companies are being asked to secure critical PII, PCI and other customer data AND log it all into some form of SIEM. Companies must detect when a breach occurs as soon as possible and also have the relevant logs to prove the breach. There are external ways to breach a z/OS system and you may not be aware of them. Being able to prove guilt after the fact is not a solution in light of recent breaches. SIEM and SAF (RACF, ACF2/TSS) security are now givens on any zOS system, but if you think they are enough you’re wrong.

 Colin van der Ross will be providing insight on mainframe breaches and how you can send events to your Enterprise SIEM from z/OS to make sure that if you are ever breached you do have the relevant information to determine the who, what where and how of the incident.  SDS is not just another SIEM z/OS vendor but a company with a history of 35 years developing and supporting mainframe products and customers.

6:00 p.m. –
6:10 p.m.

2

Ed Airey

Meeting the Future Skills Challenge:

The essence of the session is to discuss how to recruit and retain future skills in your enterprise. Build a stronger community through academic and industry engagement.

6:15 p.m. –
6:25 p.m.
1

Colleen Gordon

Mainframe Data Integration Specialist, Luminex

Made for the Mainframe: A FICON-based Approach to File Transfers

A 2017 Mainframe Data Sharing survey revealed that 60% of mainframe data centers continue to rely on unsecure FTP to move data off the mainframe, despite security being their number 1 concern. These clients stated that software licensing costs and staffing constraints are the top reasons why they continue to use FTP. Find out how switching to a native FICON-based approach can enable easy, cost-effective and secure file transmissions.

6:15 p.m. –
6:25 p.m.

2

Peter Thiermann

Automation Analytics

What is Digital Transformation all about? 

 "Ensuring future profitability while creating new business processes and adopting existing business processes to future customer needs". 

Leveraging digital technologies, including modern Digital Business Automation, Workload Automation and Batch Scheduling systems to automate your business- and IT-processes is an essential part of every Digital Transformation initiative. 

As a consequence, more and more people in your organization need to have a precise view how automated business processes are executing and how to improve them. 

apsware provides unique Digital Automation Analytics capabilities in a self-service mode. Vital, easy to understand KPIs are available for everyone in your organization who need to know, e.g. :

  • Have we met our SLAs? 
  • If not, what was the root cause of the delay?
  • How can we shorten the delivery time / critical path of executions?
  • What is the risk on violating future SLAs?

Get an overview how you can benefit from  apsware analytics in your Digital Transformation initiative. 

Booth number 106

www.apsware.com

6:30 p.m. –
6:40 p.m.
1 Hitachi Data Systems To Be Announced To Be Announced
6:30 p.m. –
6:40 p.m.
2 Innovation Data Processing 06.jpg Pat Fitzsimmons

Learn how INNOVATION’s CLOUDVTB can: Reduce your Tape Storage Costs, improve your Disaster Recovery Preparedness and allow your tape data to be Tape Hardware-Independent.

CLOUDVTB is a new solution that allows you to copy z/OS tape data sets to an 
on-premise private Cloud, and/or public Cloud, reducing your tape footprint, providing device independence for today and the future.

6:45 p.m. –
6:55 p.m.

1

Dell EMC

Paul Scheuer

Your Quick Guide to Dell EMC Mainframe Innovation This Week

Its’s been a very exciting year of technological innovation for Dell EMC with the introduction of our fastest DASD Array yet, the VMAX950F and Cloud Connectivity with DLm Virtual Tape. Join us for quick overview of these announcements and hear more about our in-depth technical sessions to better understand how Dell EMC is advancing mainframe storage.

6:45 p.m. –
6:55 p.m.
2 Innovation Data Processing 06.jpg Pat Fitzsimmons

10 for 10 –Ten Reasons to use the z/OS Mainframe for Data Protection of Linux on z Systems Data.

Come get the skinny on data protection from Innovation, the FDR folks, on their FDR/UPSTREAM for file level data protection for Linux on z Systems.

 

The z/OS mainframe with its unmatched RAS (reliability, availability and serviceability), outstanding I/O bandwidth, and well-restricted and protected environment provides an excellent platform for data protection — especially if that client data already is resident on the z/OS mainframe!


Wednesday, August 9

Time Stage  Company Speaker(s) About the Talk
12:10 p.m. – 
12:20 p.m.

1

IntelliMagic

To Be Announced

To Be Announced

12:10 p.m. –
12:20 p.m.

2

Tom Delany, Fischer Systems Project Manager

TapeStreamFX Tech Talk

Data abundantly overflows. Storage is a necessity.

TapeStreamFX  replaces physical tape offering the following:

 

1) TN3270 console interface with three user levels Operator, Admin, Maint

2) 3480/3490 support - NO operating system changes - Up to 256 devices using 16 logical control units

3) Multiple vault selection (tape vaults) - at the device level 

4) Compressed data format using 64-bit CRC

5) Support for NAS/SAN : OR Any storage device that you are able to map from Windows)

6) Rewind/Unload Script initiation at the device level using REXX, CMD, PS

7) SCRATCH management from the host

8) up to 4 channels supported

9) Import/Export utilities ( AWS )

 

Do more with your Virtual Tape Library, let us tell you how with TapeStreamFX

12:25 p.m. –
12:35 p.m.

1

Steve Pryor

Managing FTP and more with z/OS Exits

z/OS provides and its many subsystems provide exit points that allow installations to tailor and customize functions to suit individual needs. The speaker will discuss DTS Software’s Easy-Exit product, which eliminates the need for highly technical exit coding skills and allows access to additional data and functionality using simple to understand and implement Policy Rules, with specific attention and examples to managing the z/OS FTP Client and Server exits.

12:25 p.m. –
12:35 p.m.
2 Lowell Higley, Senior Principal Product Manager, CA Technologies

Meeting SLA’s with Dynamic Capacity Intelligence

Every mainframe organization is being challenged to do more with less – all while maintaining service level agreements, adding new workloads and staying under budget. Join us to learn how dynamic capacity intelligence can help you meet or exceed your SLA targets, free up capacity and lower your monthly license charge (MLC) costs.

12:40 p.m. –
12:50 p.m.
1

Peter Mills

CorreLog VP Development & Support

Fighting the Breach Starts with Seeing the Breach

This Tech Talk session will explore generic use cases of how companies are able to see real-time z/OS security events in their distributed Security Information & Event Management or SIEM systems. It’s not rocket science; these customers are using tools they already own with their mainframe deployment.

12:40 p.m. –
12:50 p.m.

2

AlignOps, LLC

Gil Peleg - Model9 Founder & CEO

Next Generation Mainframe Backup and Recovery

Traditional mainframe backup solutions lock users into a proprietary tape architecture and costly CPU and Storage resources. 

They are complex to operate, require specific expertise for basic operations and leave users uncertain about recoverability.  

As data keeps growing and skilled mainframe specialists keep retiring, the market needs solutions that reduce operational costs, increase reliability and are simple to use. 

Model9 lets users manage their backups with full computing and storage flexibility by offloading backup, archive and space management processing to zIIPs and enabling a tapeless backup architecture while using a less experienced workforce and without compromising on data integrity and backup reliability. 

Hear more about next generation Mainframe recovery solutions.

12:55 p.m. –
1:05 p.m

1

Peter Enrico

Scott Chapman

To Be Announced

12:55 p.m. –
1:05 p.m
2

Ray Overby

A DEMO OF A MAINFRAME OPERATING SYSTEM EXPLOIT

Today's current security focus is on the network and application layer. However, in our experience, this has led to an imbalance in the focus, where more time is spent on applications leaving the operating system by the wayside. All it takes is one zero day vulnerability in the z/OS operating system layer to bypass everything you have done and are doing to secure your data. The purpose of this TechTalk is to engage in a discussion about what companies are doing to secure their large enterprise systems using the z/Assure® Vulnerability Analysis Program. Join Key Resources to learn why it is important to secure all layers of the mainframe and see a quick demo of an actual exploit of the operating system.