Title: TechTarget
a weekly newsletter fromTechTarget
search390This Week
June 09, 2003 >> Receive this email as text  >> About this email 
 In this Issue

>> From the editor: Glimpse into the future of the data center
>> Featured Topic: Data Center Futures
>> Expert Technical Advice: Jim Schesvold, z/OS expert
>> Site Highlights:
* Targeted s/390 and zSeries white papers
* How well can you talk shop?
* Securing Network Print Jobs on the Mainframe

 From the Editor:

by Mark Brunelli, Site Editor

Be sure and check out our featured topic this week for complete coverage of TechTarget's Data Center Futures conference.

Industry experts were on hand at the conference to tell us how to navigate the maze of emerging technologies, how to plan your physical data center and what to expect from the major IT vendors over the next few years.

When you're done catching up on all the coverage, be sure and send me an e-mail with your thoughts. I'd like to know which new technologies you think are worth an investment, and which ones you think are pure hype. I can be reached anytime at [EMAIL PROTECTED].

Until next time...
Mark Brunelli
Site Editor, Search390.com


 Featured Topic:

Data Center Futures
by Mark Brunelli, Site Editor

This week Search390.com offers complete coverage of TechTarget's Data Center Futures conference. Industry experts were on hand at the conference to tell us how to navigate the maze of emerging technologies, how to plan your physical data center and what to expect from the major IT vendors over the next few years.

Read more about this topic

 Expert Technical Advice:

Featured Expert Jim Schesvold, President, Best Customer Solutions, Inc.

Category: z/OS
Jim will answer questions about migrating OS/390 and z/OS to more current releases, in such areas as installation and migration alternatives, paths, tasks, tradeoffs and tools. He'll also help with project planning and management for a z/OS upgrade. Click here to ask Jim a question now.
Read Jim's responses to previous questions

This Week: In the forums
>> Learning how to Web-enable legacy applications
Search390.com's Web integration expert, Jim Keohane, has several tips for those wishing to learn the increasingly popular art of Web-enablement.

>> Webcast highlight -- Exploring the power of grid computing
How well do you understand grid computing? Are you updated on the latest research breakthroughs and enterprise advancements? Stay on the forefront of the IT community -- tune-in to this Webcast and listen as renowned expert Ian Foster outlines how grid computing may change the way you do business.

Tip of the Week:
Use WAS LDAP for admin tasks
WebSphere Application Server's (WAS) lightweight directory access protocol (LDAP) registry has proven to be a boon to WAS administration. Take the task of managing user rights and permissions in WAS 4.0. You might first be inclined to use the Java Naming and Directory Interface (JNDI) to make changes of this kind in your LDAP registry. Exploited in this fashion, however, JNDI doesn't give you an easy way of assigning WAS roles for users, which means that any changes that you want to make need to be committed on a per-user basis. This approach can quickly become onerous. Alternately, you can use either XMLConfig or wscp to connect to JNDI and manage user rights and permissions programmatically. But an approach of this kind assumes that you're proficient in the use and syntax of XMLConfig or wscp. Users new to WAS could, then, be out of luck. There is another way, however.
>> Read the complete tip

 Site Highlights

Targeted s/390 and zSeries white papers
Our white paper library features hundreds of titles on z/OS JCL, COBOL, CICS, z/OS migration and more.
Browse the Search390.com white paper library now

How well can you talk shop?
Are you lost in a swirl of mainframe-specific acronyms and abbreviations? Visit the Search390.com Glossary and get definition for hundreds of s/390 and z/OS terms.
Click here to visit the Search390.com Glossary
Securing Network Print Jobs on the Mainframe
Tune-in to this webcast now and learn how encrypting output at the source protects confidential data
This webcast highlights strategies for analyzing and implementing protective measures for output on s/390, tactics for blocking access to print jobs traveling throughout the enterprise and ways to ensure sensitive data is compliant with HIPAA and other federal regulations.
Sponsored By: Levi, Ray & Shoup


Sign up today
Select newsletters you would like to receive from the list below.
News
WebSphere Tips
Data Center Futures
E-mail
  
Not a member? We'll activate your membership with your subscription.

s/390 news & tips
Search390.com newsletters feature the latest industry headlines and most critical technical tips. Enter your email address above to sign up for select newsletters instantly, or click below to browse our full collection.
More info


The wrong choice
Visit SearchEnterpriseLinux.com today to read our "Wrong Choice" series covering companies that had a chance to migrate to Linux and why their choice was the wrong one.
Read it today

Webcast library
Browse Search390.com's webcast library and access expert sessions on web-enablement, grid computing and more.
Check it out



A B O U T   T H I S   N E W S L E T T E R
Created by TechTarget
TechTarget - The Most Targeted IT Media
Copyright 2003, All Rights Reserved.

To unsubscribe from Updates on new site content:

>> Simply Reply to this Email with REMOVE within the Body or Subject
-OR-
>> Go to: http://search390.techtarget.com/register
   - Log in to edit your profile.
   - Click on the link to Edit email subscriptions.
   - Uncheck the box next to the newsletter you wish to unsubscribe from.
   - When finished, click "Save Changes to My Profile".

Reply via email to