Search for tag: "access"
New features in IBM z/OS DFSMS Cloud Data Manager V1.2: sharing z/OS data through cloud storageIBM z/OS DFSMS Cloud Data Manager (DFSMScdm) helps you leverage your cloud storage from z/OS. With support for writing z/OS data to cloud storage at scale, and reading data from cloud into z/OS,… |
|
Introduction to IBM z/OS DFSMS Cloud Data Manager: sharing z/OS data through cloud storageIBM z/OS DFSMS Cloud Data Manager (DFSMScdm) helps you leverage your cloud storage from z/OS. With support for writing z/OS data to cloud storage at scale, and reading data from cloud into z/OS,… |
|
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)Exploring the realms of access control, authentication, and authorization as you attempt to choose the best access control model for your organization? In this video, IBM Distinguished Engineer and… |
|
What’s new with next-generation DataStage: AI-powered integration for modern data workloadsLearn from IBM’s team of SMEs about the new features they are building in next-generation DataStage, such as generative AI capabilities, support for table formats, remote engines, and more. |
|
IBM COS FA Upgrade to CteraIBM COS File Access transition and upgrade to Ctera global file access with data in place. |
|
Introducing IBM Cloud trusted profilesLearn about how you can use trusted profiles to reduce the time and effort to manage access for federated users in your organization. Learn more: What makes a good trusted profiles strategy?…
From IBM Cloud Platform
|
|
Controlling access by using tags in IBM CloudAs an account administrator in IBM Cloud, you can create tags to control access to your resources and your team's projects can grow without requiring updates to your IAM policies. Incorporating…
From IBM Cloud Platform
|
|
How Cirata automates massive datasets to IBM watsonxLearn how Cirata makes continuous ingestion data from other platforms to watsonx in this demonstration. To learn more about watsonx, especially watsonx.data, visit here… |
|
Modernized Insurance Application with HATSThis video shows an example of how IBM Host Access Transformation Services (HATS) can modernize your existing host applications into modernized web and RCP based applications. |
|
IBM TS7700 Encryption and Data Protection - 07182023Listen to this replay and learn about the encryption features of the IBM TS7700. This session will include Internal Disk Encryption, external Disk Encryption, Physical Tape Encryption, Encryption… |
|
Integrate Microsoft 365 for HACP EEThis video will show you how to integrate Microsoft Office into Host Access Client Package Extended Edition (HACP EE). This allows users to send green screen content from Host On-Demand into… |
|
IBM Security® Verify DemoUnternehmen sollten sich nicht zwischen Sicherheit und einem hervorragenden Benutzererlebnis entscheiden müssen. Mit IBM Security® Verify ist beides möglich. Nutzer… |
|
Demo di IBM Security® VerifyLe organizzazioni non devono essere costrette a scendere a compromessi tra la sicurezza e una customer experience di qualità. Con IBM Security® Verify possono avere entrambe le cose. I… |
|
Démo. IBM Security® VerifyLes organisations ne devraient pas avoir à choisir entre la sécurité et une expérience utilisateur de qualité. Avec IBM Security® Verify, elles peuvent avoir… |
|
Demo de IBM® Security VerifyLas organizaciones no deberían verse obligadas a elegir entre la seguridad y una gran experiencia de usuario. Con IBM® Security Verify, puede tener ambas. Los consumidores pueden… |