Search for tag: "manager"
Security definition validation for CICS TSWhen you deliver CICS application changes into production, are you manually identifying required security changes? Check out security definition validation (SDV) for CICS TS. It contributes towards… |
|
Assessing MQ Buffer Manager HealthAutomated assessments of MQ Buffer Manager metrics help prevent outages and highlight key metrics for analysis. |
|
Assessing MQ Log Manager HealthAutomated assessments of key MQ Log Manager metrics facilitate proactive analysis and prevention of outages by identifying areas that may warrant investigation. |
|
MQ Message Manager Metrics Supplemented by Accounting DataMQ Statistics data from Message Manager helps create an MQ activity profile. Adding MQ Accounting data isolates message activity drivers by connection type and originating address space. |
|
MQ Statistics: Log Manager and Buffer Manager MetricsExamples of how MQ Statistics data provided by the Log Manager and Buffer Manager components can be used to identify opportunities for improved performance and efficiency. |
|
Take Your CSM to the Next Level: What's New in IBM Copy Services Manager 6.3.10 & 6.3.11 - 07092024Come join the Advanced Technology Group and Randy Blea, IBM Copy Services Manager Architect, to learn more about the new features available in IBM Copy Services Manager (CSM) 6.3.10.0 and 6.3.11.0!… |
|
IBM Copy Services Manager V6.3.9.0 & DS8900F R9.4 Updates 01-30-2024Come learn from Randy Blea, IBM Copy Services Manager Architect, about the new features available in IBM Copy Services Manager (CSM) 6.3.9.0 and the Advanced Technology Group DS8000 Subject Matter… |
|
Tools to progress and ease the modernization journeyA key component of a company’s modernization journey is having the right tools for the job. IBM’s File Manager for z/OS and Fault Analyzer for z/OS work together to help your organization… |
|
IBM FlashSystem Virtualize 8.6 Policy Based Replication- DR with Copy Services Manager, Safeguarded Copy and other snapshotsThis video provides a complete, end to end setup and demo of Policy Based Replication in Disaster Recovery [DR] with both Safeguarded and regular Snapshots using both internal and Copy Services… |
|
IBM FlashSystem Virtualize 8.6 Policy Based Replication- HA with Copy Services Manager, Safeguarded Copy and other snapshotsThis video provides a complete, end to end setup and demo of Policy Based Replication as High Availability [HA] with both Safeguarded and regular Snapshots using both internal and Copy Services… |
|
IBM Copy Services Manager Quarterly Update v6.3.8.0 - 10172023Listen to Randy Blea, IBM Copy Services Manager Architect, about the new features available in IBM Copy Services Manager (CSM) 6.3.8.0. These new features include auto logouts for users after a… |
|
IBM Cyber Resilience Solution for MS-SQL Databases using SCDM and QRadar with SGCTejas Sapkar and Shashank Shingornikar show an excellent overview of how IBM's Cyber Resilience Solution for MS-SQL can work as a functional demo, by leveraging SafeGuarded Copies on… |
|
Unit 10, Section 2: OSAM data sets and bufferingThis video provides an overview of OSAM data sets and OSAM buffer pools, and how these components affect IMS TM performance. |
|
Unit 10, Section 1: VSAM data sets and bufferingThis video provides an overview of VSAM data sets, which come in several varieties: key-sequenced data sets (KSDS) and entry-sequenced data set (ESDS). The video also discusses how to tune VSAM… |
|
Unit 9, Section 3: Identifying the source of excess IWAIT timeThis video describes the following IMS Monitor reports that can be used to analyze an IMS IWAIT problem:Program summary report Program I/O report Call Summary report |
|
Unit 9, Section 2: IRLM overview and how to reduce program elapsed timesThis video describes IRLM, IRLM startup parameters such as SCOPE and PC, and how these components affect performance. |