What’s an ESM on z/OS? Why are there three of them? Why does each have such a different personality from the other two? And if I know how to use one of them, is there a way for me to understand the other two more easily? Come to this session, and get ready for a Rosetta stone’s worth of insight into the ways and meanings of RACF, ACF2, and Top Secret Security.
Reg Harbeck
Chief Strategist
Langley, BC Canada
Track
Mainframe Modernized
IMPACT Session Video:
To view the video you must have a CMG membership. Sign up today!For existing members sign in here.
IBM Z Day 1 October 2024 | 8AM - 4PM ET | Agenda Coming Soon!...
Find out moreBenchmarking AI models from an ethical angle involves ensuring that the evaluation processes promote fairness,...
Find out moreIn his talk on "Fake News: easier to detect with sentiment analysis," Sanjaikanth E. Vadakkethil...
Find out more