Techdocs Library > Auxiliary Material > Conferences >  >

Exploiting JES2 Commands - Session 2669


(Back to "SHARE Winter 2009")

Abstract: In this presentation, the speaker will cover the power and pitfalls of JES2 commands, and will show how they can be used to effectively monitor and manage your JES2 subsystem, devices and workloads. The focus will be on aspects of JES2 operations that are critical to keeping JES2 healthy. Topics will include starting/stopping JES2, message filtering, remote operations and automation.


S2669_JES2Operations.pdf

 

 


Hide details for (Click arrow for page/document specifications.)
Document specifications:


Document Author:

Kathy Walsh


Document ID:

TC000010


Doc. Organization:

WSC IBM Z


Document Revised:

04/02/2019


Product(s) covered:










Category:

Conference







:


Keywords:

JES2 Commands, JES2, Commands, WSC, Hutchinson, Austin, SHARE, SHARE