Skip to main content

Webinars

Jul
29
z/OS
Sponsored Content By Software AG|Jul 29, 2021

Move it or View it? How to Meet Demand for VSAM™, IMS™, Db2® data and More

Discover when to use ETL, ELT, CDC or replication to move data to a data warehouse, application, or business intelligence platform. More information

Move it or View it? How to Meet Demand for VSAM™, IMS™, Db2® data and More

Discover when to use ETL, ELT, CDC or replication to move data to a data warehouse, application, or business intelligence platform. More information

Aug
04
z/OS
Sponsored Content By Micro Focus|Aug 04, 2021

How to Access & Integrate Mainframe Data with RPA

Join us to see how you can leverage mainframe data in your RPA initiatives, increase productivity and reduce costs with RPA, and reduce user errors with the mainframe through automation. More information

How to Access & Integrate Mainframe Data with RPA

Join us to see how you can leverage mainframe data in your RPA initiatives, increase productivity and reduce costs with RPA, and reduce user errors with the mainframe through automation. More information

Aug
10
z/OS
Sponsored Content By BMC Software|Aug 10, 2021

The Evolution of Privileged User Monitoring for Mainframes

Learn how to make sure you can sound the alarm, take immediate action, and halt insider threats, phishing attacks, credential theft or attacks that leverage your mainframe. More information

The Evolution of Privileged User Monitoring for Mainframes

Learn how to make sure you can sound the alarm, take immediate action, and halt insider threats, phishing attacks, credential theft or attacks that leverage your mainframe. More information

Aug
11
AIX
Sponsored Content By HelpSystems|Aug 11, 2021

Malware on Power Systems Servers: Breaking Down the Myths

We'll discuss real-world examples of malware attacks on Power Systems and provide tactics for avoiding infections. Join us to learn where the danger lies and how you can protect your systems. More information

Malware on Power Systems Servers: Breaking Down the Myths

We'll discuss real-world examples of malware attacks on Power Systems and provide tactics for avoiding infections. Join us to learn where the danger lies and how you can protect your systems. More information

Aug
24
z/OS
Sponsored Content By HostBridge Technology and IBM Lab Services|Aug 24, 2021

Is Your IBM Z CICS Health Check Overdue?

Join us for details on what the CICS health check process is, the insights it can reveal, how the process works, how long it takes, and how to go about completing one. More information

Is Your IBM Z CICS Health Check Overdue?

Join us for details on what the CICS health check process is, the insights it can reveal, how the process works, how long it takes, and how to go about completing one. More information

Aug
26
z/OS
Sponsored Content By Rocket Software|Aug 26, 2021

5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation

Join Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations. More information

5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation

Join Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations. More information