Real World Best Practices with CA Workload Automation AE 11.3.6CA Technologies
The document discusses best practices for using CA Workload Automation AE (CA WA AE). It recommends using Oracle RAC or SQL Server clusters to improve performance, avoiding nested boxes, breaking jobs into small chunks, and other tips. It also discusses best practices for Workload Control Center (WCC), security configuration using EEM, leveraging self-service, and agent upgrade cadence. The presentation aims to provide real-world best practices for optimizing CA WA AE implementations.
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...CA Technologies
This document discusses managing SLAs with CA Workload Automation iDash for CA 7 Edition. It covers defining SLAs for CA WA CA 7 workloads, monitoring the SLAs, and reporting on SLA performance. Key points include best practices for defining SLAs, using the iDash dashboard to monitor current alerts and SLA status, and exploring pre-defined report definitions for downloading SLA trend reports. New features in recent iDash releases that improve SLA management for CA WA CA 7 workloads are also summarized.
Delivering CA Workload Automation from a SaaS PlatformCA Technologies
This document discusses delivering workload automation from a software-as-a-service (SaaS) platform. It describes how workload engines and servers can be hosted in the cloud while maintaining security. The document outlines different SaaS models for workload automation and how a virtual private network (VPN) approach allows multiple tenants to securely share a single workload instance hosted in the cloud. It also addresses considerations for hosting workload dynamically in the cloud.
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...CA Technologies
UPS uses CA Workload Automation ESP Edition to automate their production workload processes. This has helped UPS increase job throughput year-over-year while decreasing job failures and maintaining the same staffing levels. UPS implemented several initiatives using CA Workload Automation ESP such as automated job restarts and force completes to reduce manual interventions. They also developed a production workload automation process model and checklist to standardize their processes. Going forward, UPS aims to further standardize batch job execution, enhance disaster recovery, and increase automation through initiatives like a self-service portal.
Case Study: Ameren Improves Response time to Grid Outages with CA Workload Au...CA Technologies
Ameren uses various CA Workload Automation agent job types to improve their response time to power outages on the electric grid. They use database, web service, and file transfer job types to track linemen in the field and notify customers of service outages. Using standards and practices with job types and Oracle Data Guard for disaster recovery allows Ameren to minimize downtime and quickly restore power. The improved automation has increased efficiency and reduced costs.
Oregon State Data Center Mainframe Software ConsolidationCA Technologies
The State of Oregon consolidated its mainframe scheduling tools by selecting CA Workload Automation ESP Edition. An inter-agency work group evaluated three scheduling tools based on cost, requirements, and agency rankings to select the new tool. Implementing a single scheduling tool reduced annual software costs by $100,000 and complexity by supporting one tool instead of three. The project was completed on time over five months and provided training to staff.
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashCA Technologies
This document discusses the migration of a major financial institution from Terma JAWS to CA Workload Automation iDash. It describes the challenges faced, such as converting SLAs and reports between the different products. A conversion tool was developed to automate migrating users, filters, SLAs and reports. While the initial conversion of configuration items was successful, further manual work was required to refine SLAs and reports. Lessons learned included understanding differences between the products and making assumptions during conversion to handle these differences.
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...CA Technologies
This document provides an overview of using CA Workload Automation (AE) iDash to analyze critical paths in an AutoSys environment. It defines critical path and distinguishes it from critical job lists. It describes how iDash dynamically generates and monitors critical paths, and how Autosys events like job failures impact the critical path. The document also discusses using iDash reports and historical data to optimize job flows and troubleshoot why SLAs are missing.
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsCA Technologies
The document discusses best practices for configuring CA Workload Automation AE (CA WLA AE) to improve efficiency and reduce problems. It covers managing configuration parameters in the scheduling engine and user interface. Topics include database maintenance settings, IP caching, security modes, global variables, Workload Control Center views and performance tuning. The presentation provides guidance on defining user roles and environments to help users be more productive.
Pre-Con Ed: CA Workload Automation AE: Tips and TricksCA Technologies
This document provides a summary of tips and tricks for using CA Workload Automation AE. It discusses how to pass job attributes as environment variables, simplify failback, use job classes for load balancing, and create templates in the Workload Control Center. The presentation also recommends related sessions on topics like critical path analysis, leveraging the AE web services, and disaster recovery planning.
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...CA Technologies
This document discusses moving jobs from SAP, Oracle, and PeopleSoft adapters to the corresponding plug-ins in CA Workload Automation. It provides an overview of the differences between adapters and plug-ins, and describes conversion utilities that can help automate the process of moving jobs. The utilities convert command jobs to new job types, move parameters to attributes, and create properties files. Limitations of converting SAP jobs are also noted.
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
This presentation discusses how CA Workload Automation iDash can help optimize a company's workload automation environment. It notes that workload automation needs to understand business needs, monitor the entire environment, analyze key information, predict potential problems, and fix issues proactively. CA Workload Automation iDash simplifies complex workflows, predicts problems, and provides critical path forecasting. The presentation demonstrates iDash and concludes that it is a critical tool for helping workload automation evolve to meet changing business demands.
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesCA Technologies
The document discusses various job types available in CA Workload Automation Agent (CA WA AE). It provides examples of configuring different agent plugins like database, proxy, etc. and modifying the agentparm.txt file. It also demonstrates how to set up the owner attribute and job security for different job types like FTP, WBSVC, JMSPUB, HTTP etc. The document aims to provide a deep dive into the various agent job types in CA WA AE and how to install plugins, configure the agent and set up job security.
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentCA Technologies
The document discusses upgrading from the Universal Job Management Agent (CA UUJMA) to the CA Workload Automation System Agent. It provides an overview of how each agent works, including how they submit and track distributed workloads, their security features, and how they are configured in CA Workload Automation CA 7. The document also reviews the architectural differences between the two agents and how to migrate workload from the UUJMA to the System Agent.
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
This document discusses ways to improve performance and structure policies for Embedded Entitlements Manager (EEM) using CA Workload Automation. It recommends defining a security matrix, leveraging naming conventions, implementing group membership, using different policy methodologies, and testing the implementation. The presentation agenda includes defining infrastructure, group membership, policy methodology, and testing. It also recommends related sessions and demos.
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
The document discusses Wobtrigs and File Triggers in CA Workload Automation ESP Edition. It provides an overview of how Wobtrigs and File Triggers work at the event and application level. The key points covered include how to define and monitor Wobtrigs and File Triggers, best practices for using them, how to handle errors, and considerations for remote file systems and high availability scenarios. The document compares Wobtrigs and File Triggers, noting when each method is most appropriate.
Pre Con Ed: Optimize Cloud Services and Operations With CA Process AutomationCA Technologies
This document summarizes a presentation about how CA uses CA Process Automation to optimize cloud services and operations on AWS. The presentation discusses how CA Process Automation helps with cloud adoption, migration, and operations through automating tasks like compliance, governance, security, capacity management and cost optimization. Specific use cases demonstrated how CA implemented automated controls for compliance, cost optimization and operations management on AWS.
Pre-Con Ed: What’s New With Workload Automation DE R12?CA Technologies
The document summarizes the new features and enhancements in CA Workload Automation DE r12 and r12.1. Major changes include improved internationalization with Unicode support, a new web-based self-service client, enhanced database and installation functionality, additional job types for Hadoop integration, and various operational improvements.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE Edition. It discusses customizing the desktop client by setting defaults, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips to help attendees more effectively use scheduling, reporting, and other features of CA Workload Automation DE.
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AECA Technologies
This document summarizes a presentation about planning for disaster recovery of CA Workload Automation environments. It discusses defining disasters, where to locate disaster recovery sites, the differences between high availability and disaster recovery configurations, and considerations for implementing disaster recovery. The presentation also recommends related sessions and must-see demos at the CAWorld conference.
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...CA Technologies
The document discusses using the ESPmgr utility to send messages from an agent to a CA Workload Automation system. It provides examples of using ESPmgr to control workload objects by changing their state or performing actions like inserting jobs. It also describes how ESPmgr can be used to create custom third-party integrations by setting state values and user status fields on workload objects.
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...CA Technologies
The document discusses how to use CA Workload Automation Service Governor ESP Edition and CA Workload Automation High Availability ESP Edition to improve workload management and business continuity. It describes how critical path analysis can identify jobs most critical to meeting SLAs, and how Service Governor can prioritize these jobs to shorten completion times. It also explains how High Availability uses IBM Sysplex clustering to provide automatic failover and ensure uninterrupted job streaming if the primary ESP system fails.
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...CA Technologies
The document discusses new features in CA NetMaster 12.2 for managing mainframe and network performance. It describes a new mainframe team center user interface that provides a modernized view of monitoring tools and collaborative activities. It also discusses new predictive analytics capabilities to detect abnormal patterns earlier in order to avoid issues and fix problems faster using machine learning algorithms. Additional updates include support for shared memory communications and an improved network management user interface.
Pre-Con Ed: Upgrading CA Workload Automation DE to R12CA Technologies
The document discusses the two methods for upgrading CA Workload Automation DE (CA WA DE) from version 11.3 to release 12 (R12): the in-place upgrade method and the traditional migration method. The in-place upgrade upgrades the server in the same directory, requiring minimal downtime. The migration method installs a new server instance and migrates artifacts, variables, and history to the new server, preserving the previous version for fallback. The document provides details on the processes and advantages of each method.
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
This document provides an overview of new features and enhancements in CA Workload Automation ESP Edition 11.4. Key updates include improved zIIP processor support, performance metrics, Mainframe 2.0 compliance, and integration with CA OPS/MVS Event Management. Continuous delivery is used to deliver ongoing enhancements through incremental updates. Over 35 enhancements have already been delivered via PTF to the 11.4 base release.
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksCA Technologies
The document discusses various ways to optimize CA Workload Automation ESP Edition procedures and applications to reduce manual intervention and streamline batch workflows. It covers topics like using schedule criteria in natural language, dueout processing techniques, templates, configuration options like concurrent event processing and procedure caching. The presentation provides examples and explanations for each topic to demonstrate how to simplify and automate complex scheduling requirements.
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...CA Technologies
This document provides an overview of using CA Workload Automation (AE) iDash to analyze critical paths in an AutoSys environment. It defines critical path and distinguishes it from critical job lists. It describes how iDash dynamically generates and monitors critical paths, and how Autosys events like job failures impact the critical path. The document also discusses using iDash reports and historical data to optimize job flows and troubleshoot why SLAs are missing.
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsCA Technologies
The document discusses best practices for configuring CA Workload Automation AE (CA WLA AE) to improve efficiency and reduce problems. It covers managing configuration parameters in the scheduling engine and user interface. Topics include database maintenance settings, IP caching, security modes, global variables, Workload Control Center views and performance tuning. The presentation provides guidance on defining user roles and environments to help users be more productive.
Pre-Con Ed: CA Workload Automation AE: Tips and TricksCA Technologies
This document provides a summary of tips and tricks for using CA Workload Automation AE. It discusses how to pass job attributes as environment variables, simplify failback, use job classes for load balancing, and create templates in the Workload Control Center. The presentation also recommends related sessions on topics like critical path analysis, leveraging the AE web services, and disaster recovery planning.
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...CA Technologies
This document discusses moving jobs from SAP, Oracle, and PeopleSoft adapters to the corresponding plug-ins in CA Workload Automation. It provides an overview of the differences between adapters and plug-ins, and describes conversion utilities that can help automate the process of moving jobs. The utilities convert command jobs to new job types, move parameters to attributes, and create properties files. Limitations of converting SAP jobs are also noted.
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
This presentation discusses how CA Workload Automation iDash can help optimize a company's workload automation environment. It notes that workload automation needs to understand business needs, monitor the entire environment, analyze key information, predict potential problems, and fix issues proactively. CA Workload Automation iDash simplifies complex workflows, predicts problems, and provides critical path forecasting. The presentation demonstrates iDash and concludes that it is a critical tool for helping workload automation evolve to meet changing business demands.
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesCA Technologies
The document discusses various job types available in CA Workload Automation Agent (CA WA AE). It provides examples of configuring different agent plugins like database, proxy, etc. and modifying the agentparm.txt file. It also demonstrates how to set up the owner attribute and job security for different job types like FTP, WBSVC, JMSPUB, HTTP etc. The document aims to provide a deep dive into the various agent job types in CA WA AE and how to install plugins, configure the agent and set up job security.
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentCA Technologies
The document discusses upgrading from the Universal Job Management Agent (CA UUJMA) to the CA Workload Automation System Agent. It provides an overview of how each agent works, including how they submit and track distributed workloads, their security features, and how they are configured in CA Workload Automation CA 7. The document also reviews the architectural differences between the two agents and how to migrate workload from the UUJMA to the System Agent.
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
This document discusses ways to improve performance and structure policies for Embedded Entitlements Manager (EEM) using CA Workload Automation. It recommends defining a security matrix, leveraging naming conventions, implementing group membership, using different policy methodologies, and testing the implementation. The presentation agenda includes defining infrastructure, group membership, policy methodology, and testing. It also recommends related sessions and demos.
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
The document discusses Wobtrigs and File Triggers in CA Workload Automation ESP Edition. It provides an overview of how Wobtrigs and File Triggers work at the event and application level. The key points covered include how to define and monitor Wobtrigs and File Triggers, best practices for using them, how to handle errors, and considerations for remote file systems and high availability scenarios. The document compares Wobtrigs and File Triggers, noting when each method is most appropriate.
Pre Con Ed: Optimize Cloud Services and Operations With CA Process AutomationCA Technologies
This document summarizes a presentation about how CA uses CA Process Automation to optimize cloud services and operations on AWS. The presentation discusses how CA Process Automation helps with cloud adoption, migration, and operations through automating tasks like compliance, governance, security, capacity management and cost optimization. Specific use cases demonstrated how CA implemented automated controls for compliance, cost optimization and operations management on AWS.
Pre-Con Ed: What’s New With Workload Automation DE R12?CA Technologies
The document summarizes the new features and enhancements in CA Workload Automation DE r12 and r12.1. Major changes include improved internationalization with Unicode support, a new web-based self-service client, enhanced database and installation functionality, additional job types for Hadoop integration, and various operational improvements.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE Edition. It discusses customizing the desktop client by setting defaults, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips to help attendees more effectively use scheduling, reporting, and other features of CA Workload Automation DE.
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AECA Technologies
This document summarizes a presentation about planning for disaster recovery of CA Workload Automation environments. It discusses defining disasters, where to locate disaster recovery sites, the differences between high availability and disaster recovery configurations, and considerations for implementing disaster recovery. The presentation also recommends related sessions and must-see demos at the CAWorld conference.
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...CA Technologies
The document discusses using the ESPmgr utility to send messages from an agent to a CA Workload Automation system. It provides examples of using ESPmgr to control workload objects by changing their state or performing actions like inserting jobs. It also describes how ESPmgr can be used to create custom third-party integrations by setting state values and user status fields on workload objects.
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...CA Technologies
The document discusses how to use CA Workload Automation Service Governor ESP Edition and CA Workload Automation High Availability ESP Edition to improve workload management and business continuity. It describes how critical path analysis can identify jobs most critical to meeting SLAs, and how Service Governor can prioritize these jobs to shorten completion times. It also explains how High Availability uses IBM Sysplex clustering to provide automatic failover and ensure uninterrupted job streaming if the primary ESP system fails.
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...CA Technologies
The document discusses new features in CA NetMaster 12.2 for managing mainframe and network performance. It describes a new mainframe team center user interface that provides a modernized view of monitoring tools and collaborative activities. It also discusses new predictive analytics capabilities to detect abnormal patterns earlier in order to avoid issues and fix problems faster using machine learning algorithms. Additional updates include support for shared memory communications and an improved network management user interface.
Pre-Con Ed: Upgrading CA Workload Automation DE to R12CA Technologies
The document discusses the two methods for upgrading CA Workload Automation DE (CA WA DE) from version 11.3 to release 12 (R12): the in-place upgrade method and the traditional migration method. The in-place upgrade upgrades the server in the same directory, requiring minimal downtime. The migration method installs a new server instance and migrates artifacts, variables, and history to the new server, preserving the previous version for fallback. The document provides details on the processes and advantages of each method.
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
This document provides an overview of new features and enhancements in CA Workload Automation ESP Edition 11.4. Key updates include improved zIIP processor support, performance metrics, Mainframe 2.0 compliance, and integration with CA OPS/MVS Event Management. Continuous delivery is used to deliver ongoing enhancements through incremental updates. Over 35 enhancements have already been delivered via PTF to the 11.4 base release.
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksCA Technologies
The document discusses various ways to optimize CA Workload Automation ESP Edition procedures and applications to reduce manual intervention and streamline batch workflows. It covers topics like using schedule criteria in natural language, dueout processing techniques, templates, configuration options like concurrent event processing and procedure caching. The presentation provides examples and explanations for each topic to demonstrate how to simplify and automate complex scheduling requirements.
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...CA Technologies
This document discusses best practices for setting up CA Workload Automation ESP Edition (CA WLA ESP) applications across multiple environments. It recommends using naming standards and symbolic libraries to automate the migration of CA WLA ESP procedures from development to production. This helps minimize manual work and ensures procedures remain in sync across environments. It also suggests leveraging software change management tools like global variable tables and triggers to further automate the process.
Common Challenges in DevOps Change ManagementMatt Ray
This document discusses common challenges in DevOps change management. It emphasizes that infrastructure should be defined as code and version controlled. The Chef repository contains cookbooks and other components that define infrastructure as code. Tools like Spiceweasel can generate commands to build infrastructure from files. Nodes should be treated as ephemeral and provisioned from a base configuration using roles rather than being manually configured. Environments help manage versioned infrastructures defined in the Chef repository for different stages. The Chef community is available for help on IRC, mailing lists and GitHub.
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...CA Technologies
The document discusses best practices for using JavaScripts in CA Workload Automation. JavaScripts can be invoked at the Event, Application, and Job level to automate tasks and set properties. Key points include:
- JavaScripts are commonly used as pre-processors at Event trigger time or post-processors at job run time.
- JavaScripts can be defined in the Event, Application, or Job definitions and invoked from the JavaScript Repository or embedded.
- Properties like job names and frequencies must be set at Event trigger time while arguments can be set at run time.
- Prefixes like ESP, APPL, and WOB determine the scope of symbolic variables set by JavaScripts.
This document is a curriculum vitae for Anuj Gupta that outlines his professional experience and technical skills. It summarizes that he has over 7 years of experience as an IT consultant providing strategic guidance to clients. He has worked as a team leader and senior engineer on various projects for companies like Newgen Software, Infosys, RBS Services, and Airtel. His technical skills include languages like Java, XML, and SQL as well as frameworks like Hibernate, RESTful web services, and Hadoop. He also has experience in data analytics using tools like R, machine learning algorithms, and natural language processing.
This joint webinar with Neebula Systems CTO Ariel Gordon and DBmaestro CTO Yaniv Yehuda highlights the critical features in best practices and tools that are required to address the new challenges to your organization.
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016Manideep Konakandla
The document provides an agenda for a presentation on breaking and securing Docker container environments. The presentation covers introducing containers and Docker, risks areas for containers like images and runtimes, how to break and secure images, runtimes, daemons, and hosts. It also discusses securing the entire container pipeline including communication and registries. The presentation concludes with discussing the future of container security and references.
DevOps and the Importance of Single Source Code Repos Perforce
Companies are increasingly moving to DevOps practices to streamline product development and delivery. In this presentation DevOps author and evangelist Gene Kim will discuss how version control has moved from a development concern to a fundamental practice for everyone in the value stream, especially Operations. He will discuss the importance of the single, shared source code repository in high performing technology organizations.
He will discuss the research he has done over the last 16 years about the top predictors of DevOps performance, and how best to overcome the cultural and workflow friction that can exist between Development teams and Operations.
He will discuss the research he has done over the last 16 years about the top predictors of DevOps performance, and how best to overcome the cultural and workflow friction that can exist between Development teams and Operations."
Snapchat is a popular social media app among millennials and college students. The document proposes using Snapchat stories and in-story advertisements on college campuses to promote Verizon's "Life of Verizon" Snapchat account and recruit students. It outlines the basics of Snapchat, why it's an effective platform, example solutions, a budget of $44,000 with most spending on a week-long in-story ad campaign at the University of Arizona, and metrics to measure the success of increased interest in jobs.
Case Study: Verizon Wireless: Chasing the Yellow Before They Turn RedCA Technologies
In the age of the application economy, Verizon shows one way they strive to earn user loyalty. By correlating network and application metrics and gaining network and application performance insights, Verizon is able to homogenize behaviors across organizations and focus on fault prevention rather than decreasing time to fix after the fault has already occurred.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
This hands-on lab will provide experience with CA Workload Automation advanced integration agents for Hadoop, Informatica, and MSSQL Server. Attendees will learn about the capabilities of these agents and use them to create automated business processes. The lab overview outlines creating a business process using agent job types, initiating the process, and troubleshooting any failures.
The document discusses Verizon's history of partnership with government agencies dating back to the 1980s, providing services such as connecting agencies to the internet, voice communications, and mobile services. It highlights Verizon's expanding services including IoT, cloud, cybersecurity, and 5G networks. Customer testimonials praise Verizon's understanding of agencies' needs and ability to provide realistic solutions. The document proposes that Verizon and government agencies can work together to create digitally advanced agencies that gain new insights through partnerships and agility.
Verizon Communications is an American broadband and telecommunications company that started in 1983. It provides fixed-line data, voice, and television services as well as wireless voice and data. Verizon launched its FiOS fiber optic internet, television, and telephone services beginning in 2005 and acquired several companies to expand its business services offerings.
Best Practices with CA Workload Automation AutoSys (AE)CA Technologies
In this session we will cover the CA Technologies recommended configuration and architectures for CA Workload Automation AusoSys (AE) , including the scheduling engine, agents, security and graphical user interface (GUI). These best practices are designed to help maximize performance and minimize maintenance and issues.
For more information, please visit http://cainc.to/Nv2VOe
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...CA Technologies
In this session you will learn not only about the new features and capabilities of CA Workload Automation ESP Edition but also about ways to reduce manual intervention, and streamline your batch and online systems for increased efficiencies. Kim Gilmore, Lead Technical Consultant at Telus joins John Rooney, CA Technologies to talk about ways to optimize and improve job flows.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: Using Process Automation in CA Service Catalog to Deliver Service...CA Technologies
This document summarizes a presentation about how Evertec uses CA Service Catalog, CA Process Automation, and CA Service Desk Manager to automate and streamline service delivery. The combination of these tools allows administrators to easily create new services in the catalog that integrate with the service desk. 98% of new service requests are now fulfilled through automated workflows without involving developers, allowing Evertec to quickly deploy new services while reducing costs and improving customer satisfaction.
Case Study: Citrix Adopts DevOps Principles to Gain Efficiency and Speed Soft...CA Technologies
Excited by the promise of DevOps and Continuous Delivery principles, Citrix turned to CA Release Automation to get them started. Learn how Citrix was able to speed application deployment times by 80% and address key pain points with their manual and scripted processes, while working to shift their culture to better embrace DevOps principles.
For more information, please visit http://cainc.to/Nv2VOe
End-to-End Continuous Delivery with CA Automic Release Automation and CA Serv...CA Technologies
End-to-End Continuous Delivery with CA Automic Release Automation and CA Service Virtualization
For more information on Automation, please visit: http://ow.ly/swr750fQDmv
The Why, Where and How of Service Virtualization AdoptionCA Technologies
This session will cover major questions many of CA Technologies customers have once they have decided to adopt service virtualization: Now what? Where do I start? How do I implement and maintain the service virtualization practice within my organization? What are the “dos" and "do nots” that other customers have learned? And even, how to grow the service virtualization adoption within my organization?
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementCA Technologies
Learn how to build basic ITSM process workflows. Examples will use flows relevant to common service management processes.
For more information, please visit http://cainc.to/Nv2VOe
The document discusses the future of workload automation in the application economy. It describes how workload automation solutions need to evolve from basic job scheduling to dynamic service delivery across physical, virtual, and cloud environments. The document also outlines several capabilities that CA Workload Automation is developing to provide greater simplicity, visibility, and agility for managing workloads across distributed enterprise environments.
Automate and Accelerate Software Development Time and Deliver Superior Busine...CA Technologies
This session focuses on how CA Endevor® Software Change Manager (CA Endevor® SCM) meets the software change management requirements and helps boost efficiency in the mainframe environment.
This session highlights the most recent product enhancements and some exciting plans for the future.
For more information, please visit http://cainc.to/Nv2VOe
CA Workload Automation release 12.0 offers many exciting enhancements. Stop by and experience, in this hands-on lab, CA Workload Automation iDash r12, CA Workload Automation AutoSys (AE) r12 and the new CA Workload Automation Agent Monitor r12. Experts will be there to help you walk through the enhancements in a hands-on lab environment. You will leave with a better understanding and appreciation for these new capabilities.
For more information, please visit http://cainc.to/Nv2VOe
The CA Workload Automation ESP Edition (CA WA ESP Edition) team has released some enhancements in-stream ahead of the new r12 release. This talk will review these enhancements and give examples of how to use these new features to enhance your workload automation service to your customers. For more information, please visit http://cainc.to/Nv2VOe
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT MonitoringCA Technologies
It’s simple. It’s fast. It’s productive. Deploying an IT monitoring solution has never been easier when you follow the IT monitoring playbook from U.S. Cellular. Learn how U.S. Cellular reduced project costs related to infrastructure management by 50 percent while getting 80 percent of the monitoring requirements knocked out for projects without intervention. This case study will also touch on how U.S. Cellular retired its IBM Tivoli deployment six months ahead of schedule.
For more information, please visit http://cainc.to/Nv2VOe
Customer Use Case: Real-World Automation in RetailCA Technologies
The document discusses how a global retailer uses CA Workload Automation DE to automate enterprise processes. It summarizes the retailer's usage of the software for daily tasks, deployments, testing and standards. It also discusses how the retailer upgraded from version 11.3.3 to 12.0 of the software in under 30 minutes with no issues. The retailer has also implemented automated monitoring, self-service training for users, and uses the new web GUI for easy visibility.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE. It discusses customizing the desktop client by setting defaults for objects, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips and tricks and recommends related sessions to attend.
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...CA Technologies
This document summarizes a session at CAWorld 2016 that encouraged open discussion of customer-driven requirements for CA Workload Automation products. The session focused on reinforcing CA's commitment to developing easy to use and powerful solutions through transparency and continuous customer engagement throughout the development and deployment process. Attendees were invited to share product-specific ideas for how CA Workload Automation could help their organizations meet business needs, whether through enhancements to existing products or new features.
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...CA Technologies
This document summarizes a session at CAWorld 2016 that encouraged open discussion of customer-driven requirements for CA Workload Automation products. The session focused on reinforcing CA's commitment to developing easy to use and powerful solutions through transparency and continuous customer engagement throughout the development and deployment process. Attendees were invited to share product-specific ideas for how CA Workload Automation could help their organizations meet business needs, whether through enhancements to existing products or new features.
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...CA Technologies
This document summarizes a presentation about how CA Process Automation can help bridge the gap from alert suppression to mean time to resolution (MTTR) through enterprise orchestration. It discusses key IT trends, defines problems with current incident management processes, and how CA Process Automation introduces repeatability, consistency, and automation to improve MTTR. The presentation demonstrates how CA Process Automation integrates systems and orchestrates processes to streamline incident response and management. Customer case studies show how CA Process Automation helped lower costs and improve efficiencies.
The document provides an overview of Siemens Enterprise Communications including:
1) Company directions focus on helping customers lower costs, improve customer relationships and sales, and increase agility.
2) The portfolio includes voice, networking, applications and services to help customers improve business processes and reduce operating and transaction costs.
3) Siemens has a leading global position in various markets and over 1 million enterprise customers worldwide.
Operationalizing Enterprise Adoption of DevOps in the Application EconomyCA Technologies
Anuj Gulati presented on how enterprises can successfully adopt DevOps. He discussed customer case studies where DevOps implementation improved efficiency and reduced costs. Gulati outlined a methodology for rolling out DevOps in phases, starting with discovery and prioritization of projects before implementing changes. The methodology aims to establish a center of excellence to guide enterprise-wide DevOps adoption over time.
More than Technology - The Culture of DevOpsBob Sokol
This document provides information about a presentation on DevOps culture. It includes details about the speaker, Don Demcsak, and his background. The presentation discusses challenges with traditional IT structures and how DevOps transforms people, processes, and tools to break down silos and enable continuous delivery of updates. It provides examples of metrics used to measure success and cases studies from DevOps implementations.
Global headquarters in Bedford, MA USA with regional headquarters in Europe (UK) and Asia (Japan). Founded in 1992 originally as Hammer Technologies, Empirix leads the market in service quality assurance solutions for new IP communications. Empirix helps customers ensure quality of experience, avoid outages, minimize downtime impact, and gain returns through improved satisfaction and reduced costs.
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
The document discusses how establishing digital trust can help companies become digital enterprises. It outlines barriers that companies face in areas like ensuring resources, assuring systems, delivering digital experiences, verifying people, and protecting data. The document provides best practices and CA technologies that can help companies optimize their platforms, assure systems through tools like AI and automation, deliver digital experiences through DevSecOps, verify people with identity management, and protect data with discovery tools. Following these practices can help companies transform to digital enterprises by establishing digital trust.
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashBluebash
Understand the differences between MCP vs A2A vs ACP agent communication protocols and how they impact AI agent interactions. Get expert insights to choose the right protocol for your system. To learn more, click here: https://www.bluebash.co/blog/mcp-vs-a2a-vs-acp-agent-communication-protocols/
מכונות CNC קידוח אנכיות הן הבחירה הנכונה והטובה ביותר לקידוח ארונות וארגזים לייצור רהיטים. החלק נוסע לאורך ציר ה-x באמצעות ציר דיגיטלי מדויק, ותפוס ע"י צבת מכנית, כך שאין צורך לבצע setup (התאמות) לגדלים שונים של חלקים.
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfAlkin Tezuysal
As the demand for vector databases and Generative AI continues to rise, integrating vector storage and search capabilities into traditional databases has become increasingly important. This session introduces the *MyVector Plugin*, a project that brings native vector storage and similarity search to MySQL. Unlike PostgreSQL, which offers interfaces for adding new data types and index methods, MySQL lacks such extensibility. However, by utilizing MySQL's server component plugin and UDF, the *MyVector Plugin* successfully adds a fully functional vector search feature within the existing MySQL + InnoDB infrastructure, eliminating the need for a separate vector database. The session explains the technical aspects of integrating vector support into MySQL, the challenges posed by its architecture, and real-world use cases that showcase the advantages of combining vector search with MySQL's robust features. Attendees will leave with practical insights on how to add vector search capabilities to their MySQL systems.
Jeremy Millul - A Talented Software DeveloperJeremy Millul
Jeremy Millul is a talented software developer based in NYC, known for leading impactful projects such as a Community Engagement Platform and a Hiking Trail Finder. Using React, MongoDB, and geolocation tools, Jeremy delivers intuitive applications that foster engagement and usability. A graduate of NYU’s Computer Science program, he brings creativity and technical expertise to every project, ensuring seamless user experiences and meaningful results in software development.
Neural representations have shown the potential to accelerate ray casting in a conventional ray-tracing-based rendering pipeline. We introduce a novel approach called Locally-Subdivided Neural Intersection Function (LSNIF) that replaces bottom-level BVHs used as traditional geometric representations with a neural network. Our method introduces a sparse hash grid encoding scheme incorporating geometry voxelization, a scene-agnostic training data collection, and a tailored loss function. It enables the network to output not only visibility but also hit-point information and material indices. LSNIF can be trained offline for a single object, allowing us to use LSNIF as a replacement for its corresponding BVH. With these designs, the network can handle hit-point queries from any arbitrary viewpoint, supporting all types of rays in the rendering pipeline. We demonstrate that LSNIF can render a variety of scenes, including real-world scenes designed for other path tracers, while achieving a memory footprint reduction of up to 106.2x compared to a compressed BVH.
https://arxiv.org/abs/2504.21627
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...Impelsys Inc.
Web accessibility is a fundamental principle that strives to make the internet inclusive for all. According to the World Health Organization, over a billion people worldwide live with some form of disability. These individuals face significant challenges when navigating the digital landscape, making the quest for accessible web content more critical than ever.
Enter Artificial Intelligence (AI), a technological marvel with the potential to reshape the way we approach web accessibility. AI offers innovative solutions that can automate processes, enhance user experiences, and ultimately revolutionize web accessibility. In this blog post, we’ll explore how AI is making waves in the world of web accessibility.
6th Power Grid Model Meetup
Join the Power Grid Model community for an exciting day of sharing experiences, learning from each other, planning, and collaborating.
This hybrid in-person/online event will include a full day agenda, with the opportunity to socialize afterwards for in-person attendees.
If you have a hackathon proposal, tell us when you register!
About Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
Domino IQ – Was Sie erwartet, erste Schritte und Anwendungsfällepanagenda
Webinar Recording: https://www.panagenda.com/webinars/domino-iq-was-sie-erwartet-erste-schritte-und-anwendungsfalle/
HCL Domino iQ Server – Vom Ideenportal zur implementierten Funktion. Entdecken Sie, was es ist, was es nicht ist, und erkunden Sie die Chancen und Herausforderungen, die es bietet.
Wichtige Erkenntnisse
- Was sind Large Language Models (LLMs) und wie stehen sie im Zusammenhang mit Domino iQ
- Wesentliche Voraussetzungen für die Bereitstellung des Domino iQ Servers
- Schritt-für-Schritt-Anleitung zur Einrichtung Ihres Domino iQ Servers
- Teilen und diskutieren Sie Gedanken und Ideen, um das Potenzial von Domino iQ zu maximieren
Domino IQ – What to Expect, First Steps and Use Casespanagenda
Webinar Recording: https://www.panagenda.com/webinars/domino-iq-what-to-expect-first-steps-and-use-cases/
HCL Domino iQ Server – From Ideas Portal to implemented Feature. Discover what it is, what it isn’t, and explore the opportunities and challenges it presents.
Key Takeaways
- What are Large Language Models (LLMs) and how do they relate to Domino iQ
- Essential prerequisites for deploying Domino iQ Server
- Step-by-step instructions on setting up your Domino iQ Server
- Share and discuss thoughts and ideas to maximize the potential of Domino iQ
Soulmaite review - Find Real AI soulmate reviewSoulmaite
Looking for an honest take on Soulmaite? This Soulmaite review covers everything you need to know—from features and pricing to how well it performs as a real AI soulmate. We share how users interact with adult chat features, AI girlfriend 18+ options, and nude AI chat experiences. Whether you're curious about AI roleplay porn or free AI NSFW chat with no sign-up, this review breaks it down clearly and informatively.
Data Virtualization: Bringing the Power of FME to Any ApplicationSafe Software
Imagine building web applications or dashboards on top of all your systems. With FME’s new Data Virtualization feature, you can deliver the full CRUD (create, read, update, and delete) capabilities on top of all your data that exploit the full power of FME’s all data, any AI capabilities. Data Virtualization enables you to build OpenAPI compliant API endpoints using FME Form’s no-code development platform.
In this webinar, you’ll see how easy it is to turn complex data into real-time, usable REST API based services. We’ll walk through a real example of building a map-based app using FME’s Data Virtualization, and show you how to get started in your own environment – no dev team required.
What you’ll take away:
-How to build live applications and dashboards with federated data
-Ways to control what’s exposed: filter, transform, and secure responses
-How to scale access with caching, asynchronous web call support, with API endpoint level security.
-Where this fits in your stack: from web apps, to AI, to automation
Whether you’re building internal tools, public portals, or powering automation – this webinar is your starting point to real-time data delivery.
Discover 7 best practices for Salesforce Data Cloud to clean, integrate, secure, and scale data for smarter decisions and improved customer experiences.
Improving Developer Productivity With DORA, SPACE, and DevExJustin Reock
Ready to measure and improve developer productivity in your organization?
Join Justin Reock, Deputy CTO at DX, for an interactive session where you'll learn actionable strategies to measure and increase engineering performance.
Leave this session equipped with a comprehensive understanding of developer productivity and a roadmap to create a high-performing engineering team in your company.
Down the Rabbit Hole – Solving 5 Training RoadblocksRustici Software
Feeling stuck in the Matrix of your training technologies? You’re not alone. Managing your training catalog, wrangling LMSs and delivering content across different tools and audiences can feel like dodging digital bullets. At some point, you hit a fork in the road: Keep patching things up as issues pop up… or follow the rabbit hole to the root of the problems.
Good news, we’ve already been down that rabbit hole. Peter Overton and Cameron Gray of Rustici Software are here to share what we found. In this webinar, we’ll break down 5 training roadblocks in delivery and management and show you how they’re easier to fix than you might think.
13. 13 @CAWORLD #CAWORLD
Best Practices
Mainframe Proclib Naming Standard
Mainframe Proclibs contain Application names are limited to 8 characters and are defined with the following format:
IPSNESP.AAA.PROCLIB.VISL
Where:
IPSNESP – Does not change
AAA - Characters are defined as the 3 alpha character code
PROCLIB – Does not change
VIS – Does not change
L – Mainframe Location Code
Example:
IPSNESP.CMD.PROCLIB.VISN
| |
Application North
Application/Event/Proclib Standardized Names Example
16. 16 @CAWORLD #CAWORLD
Dev-Ops
Step 2: Create Stop File Trigger Application
APPL OTAECFT
/* This appl contains all OTA EAST CFT jobs*/
FILE_TRIGGER OTAE_STOP_FT
/* Triggers OTA EAST Stop Event $VZWXOTA.OTAESTOP
RUN DAILY
AGENT OTAEAST
FILENAME '/ota/data/adm_ota/otaStopEastESP' CREATE NOCHANGE(1) CONTINUOUS($VZWXOTA.OTAESTOP)
DUEOUT EXEC 23:59 EASTERN
NOTIFY OVERDUE ALERT(GLB5)
Stop and Start Setup
17. 17 @CAWORLD #CAWORLD
Dev-Ops
Step 3: Create Stop Application
APPL OTAESTOP
/* This appl will set OTA_EASTBATCH to 0*/
JOB STOP.EASTOTA_BATCH TASK SELFCOMPLETING
/* This link job will stop the OTA East batch jobs.*/
RUN DAILY
RELEASE ADD(Cleanup_Stop_Start_Files.OTAEAST_STOP)
ESP RESDEF OTA_PRD_DATA_OTA_EASTBATCH SET AVAIL(0)
NOTIFY PNODE(COMPLETE) ALERT(SHTR)
ENDJOB
UNIX_JOB Cleanup_Stop_Start_Files.OTAEAST_STOP
/* This script will cleanup the ESP Stop/Start dummy files created to stop/start OTA batch
RUN DAILY
AGENT OTAEAST
USER adm_ota
SCRIPTNAME /ota/data/adm_ota/cleanupESP.sh
ENDJOB
Stop and Start Setup
18. 18 @CAWORLD #CAWORLD
Dev-Ops
Step 4: Create Start Continuous File Trigger Application
APPL OTAECFT
/* This appl contains all OTA EAST CFT jobs*/
FILE_TRIGGER OTAE_STRT_FT
/* Triggers OTA EAST Start Event $VZWXOTA.OTAESTRT
RUN DAILY
AGENT OTAEAST
FILENAME '/ota/data/adm_ota/otaStartEastESP' CREATE NOCHANGE(1) CONTINUOUS($VZWXOTA.OTAESTRT)
DUEOUT EXEC 23:59 EASTERN
NOTIFY OVERDUE ALERT(GLB5)
ENDJOB
Stop and Start Setup
21. 21 @CAWORLD #CAWORLD
CA WA ESP Edition and CA Endevor®
Step 1: Creation of the CA Endevor® Environment
The CA Endevor® Administrator in coordination with our Scheduling team defined the CA Endevor® environment. The CA Endevor® environment
contains the following: 1 Environment, 1 System, 27 Subsystems, 2 stages and 2 types (APL) for application and (SYM) for Global Variables/Symlib
members.
CA Endevor® Setup
Environment
EPSWLS
System
EPS
Subsystem
AAA00 (AAA = 3 Character
Application code)
Stage
Stage 1: PSTG
Stage 2: PROD
Type
Type 1: APL
Type 2: SYM
Step 2: Creation of the Package Shipment Rules
Since the CA Endevor® software is required to be installed on our development mainframe, we needed a process to send the updated applications to
the production mainframe proclibs. The CA Endevor® Administrator created Package Shipment rules to allow this to occur. Once the CA Endevor®
package is executed, the CA Endevor® with CA WA ESP elements are then ‘shipped’ to our production proclibs.