Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Virtual Sequential Access Method

RSS Feed   
Virtual Sequential Access Method Reports
 
BMC Software Hybrid Copy Techniques
sponsored by BMC Software, Inc.
WHITE PAPER: Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage.
Posted: 17 Apr 2009 | Published: 17 Apr 2009

BMC Software, Inc.

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 17 Jun 2019 | Published: 18 Jun 2019

ComputerWeekly.com

Focus: Open source
sponsored by ComputerWeekly.com
EGUIDE: Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

ComputerWeekly.com

AI and Its Role in Software Development
sponsored by Crowd Machine
RESOURCE: Read the following blog post to examine AI's capabilities, how AI could benefit your enterprise, and AI's future role in software development.
Posted: 13 Aug 2019 | Published: 25 Mar 2019

Crowd Machine

Applying Software-Defined Security to the Branch Office
sponsored by Versa Networks
WHITE PAPER: The end goal of deploying software-defined security (SD-Security) for your branch offices is to have additional layers of security for better defense-in-depth, when and where you need them. Read this white paper to learn how you can apply SD-security to your branch office.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

Versa Networks

CW ANZ – Jan 2019: Keeping pace with microservices
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
Posted: 11 Jan 2019 | Published: 11 Jan 2019

ComputerWeekly.com

Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

ComputerWeekly.com

Applying Secure Design Patterns to Microservices Development
sponsored by WhiteHat Security
VIDEO: From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code.
Posted: 25 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

How Logitech Used a Low-code Platform to Replace Thousands of Lotus Notes-Based Apps
sponsored by OutSystems
CASE STUDY: In this e-book, find out how Logitech adopted a low-code development platform to replace legacy, difficult-to-deploy apps based on Lotus Notes.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

OutSystems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement