Search for tag: "control"
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)Exploring the realms of access control, authentication, and authorization as you attempt to choose the best access control model for your organization? In this video, IBM Distinguished Engineer and… |
|
Data Plane vs. Control PlaneJoin Dan Kawalsky as he explores the fundamental principles of control plane and data plane system architecture design in cloud-based data services platforms. Learn how these principles impact… |
|
IMS OTMA YTIB Flood ControlsAn accumulation of the YTIB OTMA resource can cause an IMS storage exhaustion situation and possible abend 40D in the IMS control region. This video describes how you can configure flood protection… |
|
IMS OTMA Lightweight Tpipe SupportIn IMS V15, the OTMA lightweight transaction pipe (tpipe) enhancement improves the flood control of OTMA transaction pipes by allocating tpipe-related storage on demand and enabling the lightweight… |
|
IMS OTMA Tpipe Flood ControlsThis video describes how OTMA handles transactions between clients and IMS, and then discusses how OTMA protects IMS from runaway resources by using several forms of transaction flood controls. |
|
IMS RACF ACEE Flood Control Enhancement for OTMAWith a large number of OTMA cached accessor environment elements (ACEEs), the default number of hash table entries is inefficient, causing long searches which increases CPU usage. The potentially… |
|
Omitting Objects from a BRMS Control Group BackupThis video shows how to omit items from being saved by a BRMS Control Group by creating a new Control Group which replaces the default *ALLUSR entry with a BRMS List. That list saves *ALLUSR but also… |
|
IBM TS7700 Encryption and Data Protection - 07182023Listen to this replay and learn about the encryption features of the IBM TS7700. This session will include Internal Disk Encryption, external Disk Encryption, Physical Tape Encryption, Encryption… |
|
IBM Spectrum Control - MFA OverviewGet a detailed, hands-on walkthrough of how to configure multifactor authentication (MFA) in IBM Spectrum Control 5.4.10 and later. With MFA, security and IBM Spectrum Control administrators can… |
|
IBM Technology Summit Barcelona: "Almacenamiento en el sector hospitalario. Caso del Hospital Clinic”En #TechSummitBarcelona Pablo Carrillo, Sales Territory de Logicalis Spain, nos presentó el caso del Hospital Universitari Clínic de Barcelona, que da cobertura a más de… |
|
Unit 4, Section 2: Scheduling Control Blocks in More DetailTo understand how IMS uses both control blocks and pools in the application scheduling process, this videos examine those control blocks and pools. The intent is to allow you as systems programmers… |
|
Control Tower overview - Supply Chain Intelligence SuiteLearn how the features of Control Tower in the Supply Chain Intelligence Suite can help supply chain practitioners predict, plan for, and respond to the complex supply chain challenges of… |
|
How To Manage An IBM RPA BotWatch this video to learn how the IBM RPA Control Center helps you manage your environment, track metrics, control your bots and users and more.
From CorpMkt-EiC-JY
|
|
Control & Freedom with IBM Cloud Code EngineLearn how IBM Cloud Code Engine provides SiB Solutions, a logtech start-up, with Control and Freedom to run their containerized workloads. Learn more about IBM Cloud Code Engine. |
|
Set up your Ansible control node for getting started with Ansible for IBM ZThis video demonstrates how to set up your Red Hat Ansible control node for getting started automating processes for IBM Z with Ansible. The resources mentioned can be found at the following links:… |
|