News and announcements
What: Technical T3 Class for Linux on System z and z/VM
When: July 9-11, 2013
Where: IBM Research and Development Lab, Schoenaicher Str. 220, D - 71032 Boeblingen, Germany
We are very pleased to announce our 2013 technical Teach-the-Teachers Class in Boeblingen from July 9th - 11th, 2013!
Join us for three days focusing on the latest news and technical topics for Linux on System z and z/VM.
Enrollment and Costs/Fees
The class is free of charge. Travel & Living is on your own.
Please enroll by by sending a note to Stephanie Gherghe at email@example.com.
Limited number of seats!
Registration deadline is June 28, 2013.
IBM System z Technical Sales and System z Business Partners
The class is a 3-day onsite event in the Boeblingen Lab from July 9 to July 11, 2013.
- Linux on System z Current & Future Technology
- z/VM Updates
- Automatic CPU and memory resource management for z/VM Linux guests
- zEC 12 performance update
- HA and Disaster Recovery
- Several Live Demos
- System z Cloud Enablement
Please visit the event page for more information:
The T3 will be taught by Linux on System z and z/VM developers and technical community members from Boeblingen, Endicott and Montpellier.
For questions about this event, please contact: Stephanie Gherghe at firstname.lastname@example.org.
A variety of education, training, and instruction is available at the IBM Innovation Center at Dallas, Texas. Point your broswer to their webpage for information regarding curriculum, dates, and other registration information.
ISV Teleconference for "Coding for System Integrity in z/OS for ISVs" to be held on Thursday, 20 June 2013
System integrity is the attribute of z/OS that prevents its security mechanisms from being bypassed. To maintain system integrity, code that runs authorized on z/OS must adhere to certain rules. Learn the rules and see examples.
Sign up for this informative training session.
Date: Thursday, 20 June 2013
Time: 11:00 a.m. (New York)
In this presentation, Karl Schmitz of the IBM z/OS System Integrity Competency Center will explain those rules and show examples of the types of vulnerabilities introduced when the rules are not followed. This is particularly important if you work on SVC, PC, or APF authorized routines.