CA SOLVE

10 Entries
 
 
5 months ago
Be the first person to recommend this.
Attachments
one year ago
Be the first person to recommend this.

If you work with Files in Netmaster then you might need to read one sequentially from first to last record. This short video explains how to do that easy using NCL-Code.

Attachments
one year ago
Be the first person to recommend this.

If you work with Vartables in Netmaster then you might need to read one sequentially. This short video explains how to do that using NCL-Code.

Attachments
2 years ago
Be the first person to recommend this.

CA SOLVE:Access Session Management and Password Phrases

 

Password phrases are 9 to 100 character strings that are used in place of passwords. External security managers RACF, ...

3 years ago
Be the first person to recommend this.

BCPii is used by the SOLVE:Operations Automation Hardware Interface Service (HIS) to communicate with System Z's      Hardware Management Console (HMC).
 

This link takes the reader ...

3 years ago
Be the first person to recommend this.

Where will you be 5 weeks from today?  You should be at the CADRE Technical Conference in Plano, TX!
 
Last year in Plano the CA Datacom team in conjunction with our user group CADRE, ...

3 years ago
Be the first person to recommend this.

From:The CA Technologies CA NetMaster® for TCP/IP Customers Product TeamSubject:General Availability Announcement of the CA NetMaster® Network Management Interface R12.1 

On behalf ...

3 years ago
Be the first person to recommend this.

Solve or Netmaster region is able to submit a MVS command through SYSCMD operator command.

When the System command is invoked, a security profile is selected from OPERCMDS resource ...

4 years ago
1 person recommends this.

CICS messages are going to CICS log. They are not broadcasted to the subsystems as WTO and cannot be monitored by automation products.

However, it is possible to reroute those messages ...

5 years ago
Be the first person to recommend this.

Review of all SOLVE/Netmaster products indicates that there are no direct vulnerabilities within the products themselves.  However, customers must be diligent in applying any Bash shell ...