0% found this document useful (0 votes)
81 views15 pages

IBM Mainframe

Uploaded by

cavaliere.woz23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views15 pages

IBM Mainframe

Uploaded by

cavaliere.woz23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Intikom IBM Mainframe

MIPS – Million Instruct Per Second – adalah pengukuran kecepatan processor untuk banyaknya
instruksi yang dapat di process CPU dalam satu detik.

Tipe processor dapat menandakan jumlah MIPS

Z14-xxx @ xxx mibs

MSU (Million Service Unit) adalah pengukuran untuk banyaknya processing yang bisa dilakukan
computer dalam satu jam. Biasanya MSU dipakai untuk menentukan biaya software license

FICON port storage

CBU atau Capacity Backup menyediakan emergency Processor jika ada suatu kondisi yang
megharuskan processor ini dibutuhkan seperti bencana atau mainframe utama mati. Contohnya
adalah terdapat 10k mibs tetapi yang menyala di DRC hanya 2000 sedangkan yg 8000 di posisi idle
siap diaktifkan bila di perlukan.

OSA (Open Sys adapter) adalah komponen perangkat keras yang menyediakan konektivitas jaringan
dan kemampuan komunikasi untuk sistem mainframe dengan berbagai jenis jaringan terbuka. OSA
memfasilitasi integrasi mainframe dengan jaringan LAN (Local Area Network) dan WAN (Wide Area
Network), serta mendukung berbagai protokol dan teknologi jaringan.

BCA 4 mainframe

WSA Prod1 nyala z15

MBCA Prod2 idle DEV nyala z15

GRHA DR CBU z14

Ziip processor untuk java app

CPC drawer Processor nganggur


LPAR ESAP Core banking – ATM

LPAR ESAQ Cardlink – kartu credit

SYSPLEX saling konek dengan LPAR

LPAR dev – ESAT & ESAU

LPAR uat – ESAX & ESAY

CICS : Customer Information Control System, Gateway untuk ke DB mainframe

1. Apa Itu CICS?

 Sistem Manajemen Transaksi: CICS adalah perangkat lunak untuk mengelola transaksi
aplikasi dalam lingkungan mainframe. Ini memungkinkan pemrosesan transaksi yang sangat
cepat dan aman, sering kali dalam waktu nyata (real-time).

 Berdasarkan Komponen dan Layanan: CICS menyediakan berbagai layanan untuk aplikasi
yang mencakup pemrosesan transaksi, akses database, dan komunikasi antara aplikasi.

2. Fitur Utama CICS

 Pemrosesan Transaksi: CICS dapat memproses ribuan transaksi per detik, memberikan
kinerja tinggi untuk aplikasi yang memerlukan pemrosesan data dalam jumlah besar.

 Manajemen Sumber Daya: CICS mengelola sumber daya sistem dengan efisien, termasuk
memori dan I/O, untuk memastikan performa yang optimal.

 Dukungan untuk Berbagai Bahasa Pemrograman: CICS mendukung berbagai bahasa


pemrograman seperti COBOL, PL/I, Assembler, dan Java, memungkinkan pengembangan
aplikasi dengan fleksibilitas tinggi.

 Keamanan dan Kontrol Akses: CICS menyediakan fitur keamanan yang kuat untuk
melindungi data dan mengontrol akses pengguna serta transaksi.

 Integrasi dengan VSAM dan Db2: CICS dapat berintegrasi dengan berbagai sistem
manajemen database, seperti VSAM dan Db2, untuk mengakses dan mengelola data secara
efisien.

3. Arsitektur CICS

 Transaction Server: Di jantung CICS adalah server transaksi yang menangani eksekusi dan
pemrosesan transaksi. Server ini berinteraksi dengan aplikasi, database, dan sumber daya
lainnya.

 Transaction Processing Regions (TPR): CICS menjalankan aplikasi di dalam Transaction


Processing Regions, yang merupakan unit eksekusi yang mengelola transaksi secara terpisah
untuk memastikan isolasi dan kontrol yang baik.

 Communications Controller: CICS menyediakan kontrol dan manajemen komunikasi antara


aplikasi dan pengguna, termasuk dukungan untuk protokol komunikasi standar.
4. Penggunaan CICS

 Aplikasi Bisnis Kritis: CICS sering digunakan dalam aplikasi yang sangat penting seperti
perbankan, asuransi, dan sistem pemrosesan transaksi besar lainnya.

 Layanan Pelanggan: Banyak perusahaan menggunakan CICS untuk aplikasi layanan


pelanggan, termasuk sistem manajemen informasi pelanggan dan sistem transaksi
penjualan.

 Aplikasi Real-Time: CICS dirancang untuk mendukung aplikasi yang memerlukan pemrosesan
dan respons transaksi dalam waktu nyata.

5. Versi dan Evolusi

 CICS TS (Transaction Server): Versi terbaru dari CICS, CICS Transaction Server, menyediakan
berbagai peningkatan dan fitur baru untuk mendukung teknologi terbaru dan kebutuhan
bisnis yang berkembang.

 Dukungan untuk Cloud dan Integrasi: CICS terus beradaptasi dengan perkembangan
teknologi, termasuk dukungan untuk cloud dan integrasi dengan sistem dan aplikasi modern.

CICS adalah bagian integral dari ekosistem mainframe IBM, memberikan kemampuan pemrosesan
transaksi yang kuat dan andal yang penting bagi banyak aplikasi bisnis kritis. Dengan kemampuannya
untuk menangani beban kerja yang besar dan berbagai fitur canggih, CICS tetap menjadi solusi utama
untuk manajemen transaksi di lingkungan mainframe.

Database BCA z/OS

 IMS (Information Management System) untuk Data transaksi, berbasis hierarki. IMS dapat
menangani transaksi dan data dengan volume besar dan sering digunakan dalam aplikasi
yang memerlukan pemrosesan transaksi yang cepat dan andal.
 DB2 untuk Private data seperti data pengguna dari bank. Db2 for z/OS menawarkan
performa tinggi, skalabilitas, dan fitur keamanan tingkat lanjut. Ini sering digunakan untuk
aplikasi bisnis kritis yang membutuhkan keandalan dan efisiensi tinggi.
 VSAM (Virtual Storage Access Method), adalah metode akses data yang digunakan dalam
lingkungan mainframe IBM, termasuk pada IBM z15. VSAM dirancang untuk mengelola akses
data secara efisien dalam lingkungan mainframe yang mendukung sistem operasi z/OS
(sebelumnya dikenal sebagai MVS). Digunakan untuk Data Transaksi

IBM Software
SYSTEM

 SMF, app system z/OS untuk mencatat semua activity di z/OS


menyediakan informasi penting mengenai operasi sistem, kinerja perangkat keras, dan
penggunaan sumber daya, serta berbagai informasi yang diperlukan untuk pemantauan,
analisis, dan manajemen sistem.
 SDSF, Task managernya z/OS
Untuk memonitor, mengelola, dan menganalisis output dari pekerjaan batch serta log
aktivitas sistem. SDSF menyediakan antarmuka berbasis layar yang memungkinkan pengguna
untuk melihat, mencari, dan mengelola output dari pekerjaan yang telah dieksekusi di sistem
mainframe.
 RACF, Security Server mainframe
1. Manajemen Identitas dan Akses
o Pengelolaan Pengguna
o Kontrol Akses Terperinci
2. Otorisasi dan Akses
o Penetapan Otorisasi
o Pengelolaan Grup
3. Keamanan Data
o Proteksi Data Sensitif
o Enkripsi
4. Audit dan Pelaporan
o Pencatatan Aktivitas
o Laporan Keamanan
5. Kebijakan Keamanan dan Kepatuhan
o Pengaturan Kebijakan
o Kepatuhan
6. Integrasi dan Kompatibilitas
o Integrasi Sistem
o Kompatibilitas
 NetView, untuk melihat VTAM (untuk melihat user yg masuk)
 IMS
 DB2

CHANNEL
 IBM MQ
 CICS
 IBM z/OS Connect EE UNLMT

TOOLS

 Db2 admin
 zSecure Admin, Alert, audit
 IBM z System Automation
 Debug Tool

MONITORING

 OMEGAMON

List APP z Sys BCA

 Integrated Deposit System (IDS) – CICS, IMS


o Pengelolaan Deposit (pecatatan dan pelaporan serta manajemen akun)
o Transaksi
o Kemanan
o Virtualization
 Integrated Loan System (ILS) – CICS, IMS
o Pengelolaan pinjaman (pembuatan dan administrasi pinjaman)
o Pemrosesan transaksi (pembayaran dan penagihan serta perhitungan bunga)
o Analysis report
o Core banking system
 Customer Information System – CICS, DB2
 Cardlink – CICS, VSAM
aplikasi atau sistem yang sering digunakan dalam lingkungan IBM mainframe untuk
mengelola transaksi kartu kredit dan debit serta layanan terkait.
 Memproses Transaksi Kartu:
 Mengelola Akun Kartu:
 Mengamankan Data:
 Transfer/INKASO – CICS, VSAM
merujuk pada solusi atau aplikasi yang berkaitan dengan proses penagihan dan pengelolaan
piutang dalam sistem perbankan atau keuangan. INKASO adalah singkatan dari "Inkasso,"
yang dalam bahasa Jerman berarti "penagihan" atau "pengumpulan piutang."
o Manajemen Piutang
o Proses penagihan
o Integrasi dengan system bank
o Report and analysis
o Keamanan
 International Banking – CICS, VSAM
While talking to the client team about the importance of quantum-safe computing, the team asks
how long the client's data needs to be secured. Which one of the following is the correct response?

 Until the data has no value

What are the four milestones on the way to quantum-safe cryptography?

 Discover & classify data, Crypto inventory, Crypto agility, and Quantum-safe

Your client agrees that some of their data has a long life and they ask you how long it will take to
convert their long-lived data to quantum-safe encryption. How many years can it take?

 5 to 15 years

Your client recently experienced a breach. One of their x86 servers got hacked, and the hacker
modified the server's firmware to always leave the hacker's access open on a reboot. What do you
tell the client about IBM z16's secure boot features to alleviate the client's concern about this
happening again?

 During the boot process of the system, each firmware component will utilize hardware-based
verification, using digital signatures to provide the firmware integrity and help defend against
attacks that attempt to inject malware into the boot process.

What does post-quantum cryptography aim to create?

 Mathematical problems too difficult for quantum computers to solve

Your client is worried about protecting their proprietary data, both now and in the future. You
suggest that they encrypt their data using quantum-safe algorithms. Your client is concerned that
this process will slow down their applications and internal processes. What do you tell your client?

 Plan for minimal impact – the IBM z16 system includes hardware accelerators that offload
the encryption and decryption processing from the CPU

Your client asks what a cyber-criminal would be capable of doing if they had access to a quantum
computer. What do you tell them?

 Manipulate updates and forge transactions through fraudulent authentication, decrypt lost
or harvested confidential historical data, and manipulate legal history by forging digital
signatures

How many IBM Crypto Express cards are included with an IBM z16 system by default?
 0

What are the components of cryptography?

 Data, keys, algorithms and protocols

If an organization has cryptographic agility, what are they able to do that they cannot do without
cryptographic agility?

 Quickly and easily implement/update/replace cryptography without significantly affecting


the rest of the system

Your client uses cryptography across their entire IBM Z environment. The Chief Information
Security Officer (CISO) asks how they can discover and classify their data. You tell the CISO that
IBM has three tools that assist clients in creating the cryptographic inventory: IBM Crypto Analytics
Tool (CAT), IBM Application Discovery and Delivery Intelligence (ADDI) and IBM Integrated
Cryptographic Service Facility (ICSF) Crypto Statistic Monitor. What do these three tools do?

 CAT analyzes information such as crypto keys, functions and configuration settings; ADDI
locates and identifies where crypto is being used within applications; ICSF Crypto Statistic
Monitor provides clients the means to assess their cryptographic usage and determine any
areas that might need attention

Which of the following applications can IBM Application Discovery and Delivery Intelligence
(ADDI) scan to find and examine encryption and decryption calls?

 COBOL

What type of symmetric encryption keys are hardest to break?

 Advanced Encryption Standard with 256 bits (AES-256)

What is needed to decrypt an encrypted data file?

 Algo and key

Your client attempts to end the conversation by saying that cryptography is for the security team
and does not affect the rest of the business. You respond by saying that cryptography impacts
every corner of the digital world. What are some of the areas that cryptography impacts?

 Critical applications and databases, on-premises and cloud infrastructure, businesses,


schools, governments, healthcare
Your client has data across their entire organization in databases and on file systems. They want to
discover and classify their data. What does the client need to do?

 Scan the environment to determine where their data (structured and unstructured) resides
and then classify that data

Your client is worried about their data (now and in the future) so you have suggested that they
encrypt their data to protect it. The client asks what encryption algorithm they should be using now,
to be as safe as they can while waiting for the world to settle on some standards for being quantum
safe. What algorithm do you tell them to use?

 AES-256

The cryptographic accelerators (Central Processor Assist for Cryptographic Function or CPACF) on
the IBM z16 system provide hardware-accelerated encryption and decryption of data. Which one
of the following does IBM z16 hardware-accelerated encryption protect?

 At rest and in motion

During a client meeting, the client Chief Technology Officer (CTO) tells you that they are not
concerned about quantum computers because all their data is encrypted. What is your response?

 Data encryption is not the only use case for cryptography in an enterprise

A classical computer represents a basic unit of information with a binary digit or “bit”, which can
have a state of 0 or 1. A quantum computer represents a basic unit of information with a qubit.
What are the possible states of a qubit?

 0, 1, or a superposition of multiple possible states; for example, ⅓ of zero and ⅔ of 1

You are talking with your client about building an application cryptographic inventory. The client
tells you that they are using cryptography across their IBM Z landscape. What tool can the client
use to capture the inventory?

 IBM Application Discovery and Delivery Intelligence

While in a client meeting, the client mentions that they are using numerous Public Key
Infrastructure (PKI) solutions and services across their organization. What should the client do to
stay ahead of the quantum curve?

 Update all their PKIs as new algorithms and standards evolve

The nature, capability, and availability of quantum computers is unknown. To be prepared, what
must classical systems be able to do?
 Make them self safe overtime

Your client asks if there are any use cases for quantum-safe encryption that are NOT addressed.
What examples do you give?

 Communications/network security, distributed ledgers, core banking

Which of the following is the correct list of the things that a cryptographic inventory should
contain?

 Certificates, encryption protocols, algorithms, key lengths, and key servers

Which of the following statements is FALSE as it relates to IT Automation on IBM Z?

 Red Hat Ansible does not support existing mainframe automation products.

To be impactful, IBM's Mainframe Application Modernization Point-of-View (POV) must reach all but
which ONE of the following audiences?

 Mainframe System Administrators.

You're talking to a client that is looking to accelerate their application modernization journey. What is
one of the best ways to accelerate the application modernization journey?

 Leverage application discover tools to better understand current applications.

You're talking to a client that asks how IBM Cloud differentiates from other hyperscalers. How do you
reply?

 IBM Cloud differentiates with its built-in security, z/OS developer experience, and
sustainability by leveraging IBM Z technologies.

Which of the following areas is IBM Z collaborating on with public cloud providers?

 Application migration and enterprise DevOps.

Which of the following best defines application modernization entry points?

 Project-based starting points that align to client needs and deliver near term value.

Which of the following types of applications is IBM Z a "best fit" for?

 Mission-critical secure transaction processing.

Why are industry-based solution architectures important to illustrate in discussions with clients?

 They highlight the cumulative benefit of executing the different entry points in support of
transformation initiatives.

You're talking to a client that asks how much more value they can expect to see with hybrid cloud
and IBM Z together vs public cloud alone. How do you reply?
 2.5x

How many appendices are available to help you customize your application modernization client
presentation?

 11

You're talking to a client that asks how much growth IBM Z has seen in the last decade. How do you
reply?

 3x

Which of the following areas is IBM Z NOT currently working on with AWS and Azure?

 Lift and shift of mainframe applications to the cloud.

You're talking to a client that's considering implementing a hybrid cloud approach for their
mainframe applications. Which of the following insights do you share with the client?

 A hybrid cloud approach to mainframe applications is faster, lower cost, and less risk than
migration to public cloud alone.

In the Mainframe Application Modernization on IBM Z level 2 course which of the following areas
is NOT covered in customization of the Application Modernization story?

 A deeper dive on the IBM Z Software products.

Which of the following is NOT a grouping of application modernization patterns?

 AIOps

Which of the following is FALSE as it relates to AI on IBM Z?

 You have to train the AI model on IBM Z to deploy it there.

Which of the following are benefits of enterprise DevOps?

 Increased business agility and improved developer productivity.

You're talking to a client that asks which IBM Software offering enables API creation and z/OS
development on public clouds. How do you reply?

 IBM Z and Cloud Modernization Stack.

You're talking to a client that wants to optimize the cost and performance of their existing
applications. What do you propose?

 Maintain IBM Z hardware and software currency.

What is the primary objective of the content covered in the Mainframe Application Modernization
on IBM Z level 2 course?

 Help sellers customize IBM's Mainframe Application Modernization point-of-view


presentation to meet your client's situation.

Passport Advantage clients should select IBM Z part numbers unless which of the following
statements is TRUE?
 They have no intention of using the software on or with IBM Z.

What is IBM's solution to efficiently share real-time mainframe information?

 IBM Z Digital Integration Hub.

Why is IBM focused on creating reference architectures with IBM Cloud, AWS, and Azure?

 It demonstrates to clients the level of technical collaboration that IBM is leading.

You're talking to a client about simplifying access to applications and data. What do you recommend
as a good strategy?

 Implement an open API strategy.

Which of these is an application modernization entry point?

 Enhance and modernize applications.

IBM Z Software Foundation Level 1 Quiz


Which of the following statements is true about the CICS Transaction Server?

 It is a highly efficient and optimized environment for running transactions.

Which of the following statements about integrated pipeline is correct?

 The IBM Z pipeline must be different from those core technologies used elsewhere within
the organization, but the IBM DevOps for IBM Z portfolio brings a lot of value to IBM Z
clients.

What is the purpose of the Middleware?

 Insulates the application from the physical environment increasing the programmer's
productivity.

Which of the following is correct about Db2?

 Db2 delivers business insights faster while helping to reduce costs; enables easy access,
scale, and application development for the mobile enterprise.

Which of the following security solutions protects resources by granting access only to authorized
users of the protected resources, retains profile information about users and refers to these profiles
when deciding who should be permitted access?

 RACF

Which of the following statements correctly highlights a compiler's characteristic?

 Compilers optimize programs to perform using fewer resources, boosting developer


productivity, by exploiting hardware advances without requiring special coding or source
code changes.

Which of the following represents the focus of enterprises related to software development and
delivery?
 Enterprises need continuous software delivery and management. This enables organizations
to innovate more rapidly to capitalize on new market opportunities.

Which of the following statements about AIOps is correct?

 In many enterprises, IBM Z is and will remain at the center of business-critical function,
which means it must also be central to an AIOps adoption effort.

IBM MQ provides a safe place for messages between applications. Which answer is correct related to
IBM MQ?

 IBM MQ offers asynchronous messaging. Applications or servers being down doesn't mean
that messages are lost.

Which of the following statements is true about APIs?

 An API is a software-to-software interface. The mainframe APIs expose the data that is
requested from other APIs that are in the cloud or in other mobile applications.

Which of the following statements is correct about the IBM Z operating systems?

 IBM Z Operating System or z/OS has been around in one form or another since the 1960s
and applications developed back then can still run on the latest version of z/OS.

Which of the following statements is correct related to IBM Z and a client's hybrid cloud strategy?

 IBM Z must be an integral part of a client’s hybrid cloud strategy. By integrating with IBM Z,
clients will realize the full value of the platform, leveraging a highly resilient and secure
environment that is cost-efficient as it scales.

Which of the following statements is correct related to securing IBM Z?

 The mainframe (IBM Z) always operates in a stand-alone environment, which protects it form
common vulnerabilities.

Which of the following statement about Cyber Resiliency is correct?

 Cyber Security is not enough to be able to operate during, adapt to, and recover from cyber
events or attacks. Business continuity and cyber security need an integrated approach to key
areas such as access management, incident response, and disaster recovery.

Clients need to integrate a broad set of practices and capabilities to navigate the complexity of
operations management and accelerate their journey to IBM Z AIOps. What are the three areas that
these practices and capabilities are organized into?

 Detect, Decide, and Act

IBM Z Foundations Level 1 Quiz


IBM embedded a chip inside the IBM z16 that's specially designed to accelerate AI inferencing,
ensuring that IBM Z could scale with inferencing on AI without impacting a client’s Service Level
Agreements (SLA). Which chip is this?

 Telum chip

Which IBM LinuxONE 4 model is a lower cost, simply configured version for smaller client businesses
who want to swiftly onboard a Linux platform?

 IBM LinuxONE 4 Express

IBM is constantly innovating the IBM Z and IBM LinuxONE platforms and continues to focus on the
design principles in every iteration of the mainframe to ensure they are ahead of market
expectations. What are these design principles?

 Performance, capacity, data privacy & protection, resiliency, dedicated workload,


accelerators, sustainability, stack optimization, and simplification

How many years has Linux been an integral part of the IBM Z platform?

 24 years

You have likely used an IBM Z mainframe when you completed which of the following tasks?

 Withdrawn cash from an ATM

IBM exports IBM Z to 73 countries around the globe and utilizes it across how many industries?

 28

What is the IBM Z integrated and comprehensive cyber resiliency approach to mitigate risk and cost?

 Identify, Protect, Detect, Respond, and Recover

What are the key characteristics of IBM Z and IBM LinuxONE?

 Reliability, availability, serviceability, virtualization, clustering, scalability, and security

Who gave IBM z16 and IBM LinuxONE 4 sustainability awards?

 SEAL

IBM is working with their business partners and clients to boost the mainframe skill set in the
market. What are the three approaches?

 Build a sustainable workforce, open standards and tooling, and Industry standard

IBM watsonx Code Assistant for Z is a generative AI that accelerates mainframe application
modernization. What are the capabilities included to modernize mainframe COBOL applications?

 Application discovery, auto refactoring to business services, transformation of COBOL code to


Java, and auto-generated tests to validate new Java code

Which of the following is the reason that IBM Z is different?


 Performance, continuous availability, security, scalability, manageability, sustainability, and
total cost of ownership

A client who is interested in purchasing IBM LinuxONE for their workload consolidation but is
concerned about energy efficiency asks you how much reduction in energy consumption can be
anticipated from the system. What would you say in response?

 75%

At Mass General Hospital, IBM shot a proton beam into one of the chips in the IO cards, replicating a
soft failure. IBM performed this test to ensure the firmware detected that the error occurred. What
is the name of this test?

 Proton Beam testing

Clients and IBM service personnel interact with an IBM z16 via different interfaces. What is the name
of interface used by IBM service personnel?

 Support Service

Quiz [SA L1]


How does the opportunity team know if a Technical and Delivery Assessments (TDA) is required for a
given IBM Product?

 Ask product brand representative

In which geography do Business Partners have a fee-based option where IBM will perform the
Technical and Delivery Assessments (TDA) on their behalf?

 US

When do Enterprise License Agreements (ELAs) have a TDA requirement?

 When a project has been defined or a Proof of Concept (PoC) is in place

Who is ultimately responsible for the completion of the Action Items created during the Technical
and Delivery Assessments (TDA)?

 Opportunity Owner

IBM Software requires which types of Technical and Delivery Assessments TDAs?

 Pre-sale only

What level of Solution Assurance review is usually required for IBM Z and IBM LinuxONE?

 Expert

What are Solution Assurance reviews called?

 Technical and Delivery Assessments (TDA)

Do Business Partner opportunities follow the same Worldwide Solution Assurance requirements as
IBM opportunities?
 Yes, but only if IBM performs the review

How can you provide feedback to the Solution Assurance team?

 Use the IMPACT feedback function or send an email to SAAdmin@us.ibm.com

Can Solution Assurance review team members (Quality Practitioner and SMEs) be directly involved in
the opportunity?

 No, they must maintain Separation of Duties (SoD)

Who is ultimately responsible for the timely execution of the Technical and Delivery Assessments
(TDA)?

 Opportunity Owner

What does M – ALL on the Infrastructure Trigger Criteria list mean?

 Mandatory for all proposals and/or installs

What are the two types of Technical and Delivery Assessments (TDAs)?

 Pre-sale and pre-install

IMPACT is the strategic Solution Assurance tool. What functionality does IMPACT NOT provide?

 Client financial health review

Per the standard Solution Assurance process will IBM Quality Practitioners organize and facilitate
Business Partner Technical and Delivery Assessment (TDA) reviews?

 No, Business Partner’s are responsible for conducting TDAs on their opportunities with their
resources

You might also like