Real World Best Practices with CA Workload Automation AE 11.3.6CA Technologies
The document discusses best practices for using CA Workload Automation AE (CA WA AE). It recommends using Oracle RAC or SQL Server clusters to improve performance, avoiding nested boxes, breaking jobs into small chunks, and other tips. It also discusses best practices for Workload Control Center (WCC), security configuration using EEM, leveraging self-service, and agent upgrade cadence. The presentation aims to provide real-world best practices for optimizing CA WA AE implementations.
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...CA Technologies
This document discusses managing SLAs with CA Workload Automation iDash for CA 7 Edition. It covers defining SLAs for CA WA CA 7 workloads, monitoring the SLAs, and reporting on SLA performance. Key points include best practices for defining SLAs, using the iDash dashboard to monitor current alerts and SLA status, and exploring pre-defined report definitions for downloading SLA trend reports. New features in recent iDash releases that improve SLA management for CA WA CA 7 workloads are also summarized.
Delivering CA Workload Automation from a SaaS PlatformCA Technologies
This document discusses delivering workload automation from a software-as-a-service (SaaS) platform. It describes how workload engines and servers can be hosted in the cloud while maintaining security. The document outlines different SaaS models for workload automation and how a virtual private network (VPN) approach allows multiple tenants to securely share a single workload instance hosted in the cloud. It also addresses considerations for hosting workload dynamically in the cloud.
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...CA Technologies
UPS uses CA Workload Automation ESP Edition to automate their production workload processes. This has helped UPS increase job throughput year-over-year while decreasing job failures and maintaining the same staffing levels. UPS implemented several initiatives using CA Workload Automation ESP such as automated job restarts and force completes to reduce manual interventions. They also developed a production workload automation process model and checklist to standardize their processes. Going forward, UPS aims to further standardize batch job execution, enhance disaster recovery, and increase automation through initiatives like a self-service portal.
Case Study: Ameren Improves Response time to Grid Outages with CA Workload Au...CA Technologies
Ameren uses various CA Workload Automation agent job types to improve their response time to power outages on the electric grid. They use database, web service, and file transfer job types to track linemen in the field and notify customers of service outages. Using standards and practices with job types and Oracle Data Guard for disaster recovery allows Ameren to minimize downtime and quickly restore power. The improved automation has increased efficiency and reduced costs.
Oregon State Data Center Mainframe Software ConsolidationCA Technologies
The State of Oregon consolidated its mainframe scheduling tools by selecting CA Workload Automation ESP Edition. An inter-agency work group evaluated three scheduling tools based on cost, requirements, and agency rankings to select the new tool. Implementing a single scheduling tool reduced annual software costs by $100,000 and complexity by supporting one tool instead of three. The project was completed on time over five months and provided training to staff.
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashCA Technologies
This document discusses the migration of a major financial institution from Terma JAWS to CA Workload Automation iDash. It describes the challenges faced, such as converting SLAs and reports between the different products. A conversion tool was developed to automate migrating users, filters, SLAs and reports. While the initial conversion of configuration items was successful, further manual work was required to refine SLAs and reports. Lessons learned included understanding differences between the products and making assumptions during conversion to handle these differences.
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...CA Technologies
This document provides an overview of using CA Workload Automation (AE) iDash to analyze critical paths in an AutoSys environment. It defines critical path and distinguishes it from critical job lists. It describes how iDash dynamically generates and monitors critical paths, and how Autosys events like job failures impact the critical path. The document also discusses using iDash reports and historical data to optimize job flows and troubleshoot why SLAs are missing.
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsCA Technologies
The document discusses best practices for configuring CA Workload Automation AE (CA WLA AE) to improve efficiency and reduce problems. It covers managing configuration parameters in the scheduling engine and user interface. Topics include database maintenance settings, IP caching, security modes, global variables, Workload Control Center views and performance tuning. The presentation provides guidance on defining user roles and environments to help users be more productive.
Pre-Con Ed: CA Workload Automation AE: Tips and TricksCA Technologies
This document provides a summary of tips and tricks for using CA Workload Automation AE. It discusses how to pass job attributes as environment variables, simplify failback, use job classes for load balancing, and create templates in the Workload Control Center. The presentation also recommends related sessions on topics like critical path analysis, leveraging the AE web services, and disaster recovery planning.
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...CA Technologies
This document discusses moving jobs from SAP, Oracle, and PeopleSoft adapters to the corresponding plug-ins in CA Workload Automation. It provides an overview of the differences between adapters and plug-ins, and describes conversion utilities that can help automate the process of moving jobs. The utilities convert command jobs to new job types, move parameters to attributes, and create properties files. Limitations of converting SAP jobs are also noted.
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
This presentation discusses how CA Workload Automation iDash can help optimize a company's workload automation environment. It notes that workload automation needs to understand business needs, monitor the entire environment, analyze key information, predict potential problems, and fix issues proactively. CA Workload Automation iDash simplifies complex workflows, predicts problems, and provides critical path forecasting. The presentation demonstrates iDash and concludes that it is a critical tool for helping workload automation evolve to meet changing business demands.
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesCA Technologies
The document discusses various job types available in CA Workload Automation Agent (CA WA AE). It provides examples of configuring different agent plugins like database, proxy, etc. and modifying the agentparm.txt file. It also demonstrates how to set up the owner attribute and job security for different job types like FTP, WBSVC, JMSPUB, HTTP etc. The document aims to provide a deep dive into the various agent job types in CA WA AE and how to install plugins, configure the agent and set up job security.
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentCA Technologies
The document discusses upgrading from the Universal Job Management Agent (CA UUJMA) to the CA Workload Automation System Agent. It provides an overview of how each agent works, including how they submit and track distributed workloads, their security features, and how they are configured in CA Workload Automation CA 7. The document also reviews the architectural differences between the two agents and how to migrate workload from the UUJMA to the System Agent.
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
This document discusses ways to improve performance and structure policies for Embedded Entitlements Manager (EEM) using CA Workload Automation. It recommends defining a security matrix, leveraging naming conventions, implementing group membership, using different policy methodologies, and testing the implementation. The presentation agenda includes defining infrastructure, group membership, policy methodology, and testing. It also recommends related sessions and demos.
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
The document discusses Wobtrigs and File Triggers in CA Workload Automation ESP Edition. It provides an overview of how Wobtrigs and File Triggers work at the event and application level. The key points covered include how to define and monitor Wobtrigs and File Triggers, best practices for using them, how to handle errors, and considerations for remote file systems and high availability scenarios. The document compares Wobtrigs and File Triggers, noting when each method is most appropriate.
Pre Con Ed: Optimize Cloud Services and Operations With CA Process AutomationCA Technologies
This document summarizes a presentation about how CA uses CA Process Automation to optimize cloud services and operations on AWS. The presentation discusses how CA Process Automation helps with cloud adoption, migration, and operations through automating tasks like compliance, governance, security, capacity management and cost optimization. Specific use cases demonstrated how CA implemented automated controls for compliance, cost optimization and operations management on AWS.
Pre-Con Ed: What’s New With Workload Automation DE R12?CA Technologies
The document summarizes the new features and enhancements in CA Workload Automation DE r12 and r12.1. Major changes include improved internationalization with Unicode support, a new web-based self-service client, enhanced database and installation functionality, additional job types for Hadoop integration, and various operational improvements.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE Edition. It discusses customizing the desktop client by setting defaults, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips to help attendees more effectively use scheduling, reporting, and other features of CA Workload Automation DE.
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AECA Technologies
This document summarizes a presentation about planning for disaster recovery of CA Workload Automation environments. It discusses defining disasters, where to locate disaster recovery sites, the differences between high availability and disaster recovery configurations, and considerations for implementing disaster recovery. The presentation also recommends related sessions and must-see demos at the CAWorld conference.
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...CA Technologies
The document discusses using the ESPmgr utility to send messages from an agent to a CA Workload Automation system. It provides examples of using ESPmgr to control workload objects by changing their state or performing actions like inserting jobs. It also describes how ESPmgr can be used to create custom third-party integrations by setting state values and user status fields on workload objects.
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...CA Technologies
The document discusses how to use CA Workload Automation Service Governor ESP Edition and CA Workload Automation High Availability ESP Edition to improve workload management and business continuity. It describes how critical path analysis can identify jobs most critical to meeting SLAs, and how Service Governor can prioritize these jobs to shorten completion times. It also explains how High Availability uses IBM Sysplex clustering to provide automatic failover and ensure uninterrupted job streaming if the primary ESP system fails.
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...CA Technologies
The document discusses new features in CA NetMaster 12.2 for managing mainframe and network performance. It describes a new mainframe team center user interface that provides a modernized view of monitoring tools and collaborative activities. It also discusses new predictive analytics capabilities to detect abnormal patterns earlier in order to avoid issues and fix problems faster using machine learning algorithms. Additional updates include support for shared memory communications and an improved network management user interface.
Pre-Con Ed: Upgrading CA Workload Automation DE to R12CA Technologies
The document discusses the two methods for upgrading CA Workload Automation DE (CA WA DE) from version 11.3 to release 12 (R12): the in-place upgrade method and the traditional migration method. The in-place upgrade upgrades the server in the same directory, requiring minimal downtime. The migration method installs a new server instance and migrates artifacts, variables, and history to the new server, preserving the previous version for fallback. The document provides details on the processes and advantages of each method.
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
This document provides an overview of new features and enhancements in CA Workload Automation ESP Edition 11.4. Key updates include improved zIIP processor support, performance metrics, Mainframe 2.0 compliance, and integration with CA OPS/MVS Event Management. Continuous delivery is used to deliver ongoing enhancements through incremental updates. Over 35 enhancements have already been delivered via PTF to the 11.4 base release.
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksCA Technologies
The document discusses various ways to optimize CA Workload Automation ESP Edition procedures and applications to reduce manual intervention and streamline batch workflows. It covers topics like using schedule criteria in natural language, dueout processing techniques, templates, configuration options like concurrent event processing and procedure caching. The presentation provides examples and explanations for each topic to demonstrate how to simplify and automate complex scheduling requirements.
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...CA Technologies
This document provides an overview of using CA Workload Automation (AE) iDash to analyze critical paths in an AutoSys environment. It defines critical path and distinguishes it from critical job lists. It describes how iDash dynamically generates and monitors critical paths, and how Autosys events like job failures impact the critical path. The document also discusses using iDash reports and historical data to optimize job flows and troubleshoot why SLAs are missing.
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsCA Technologies
The document discusses best practices for configuring CA Workload Automation AE (CA WLA AE) to improve efficiency and reduce problems. It covers managing configuration parameters in the scheduling engine and user interface. Topics include database maintenance settings, IP caching, security modes, global variables, Workload Control Center views and performance tuning. The presentation provides guidance on defining user roles and environments to help users be more productive.
Pre-Con Ed: CA Workload Automation AE: Tips and TricksCA Technologies
This document provides a summary of tips and tricks for using CA Workload Automation AE. It discusses how to pass job attributes as environment variables, simplify failback, use job classes for load balancing, and create templates in the Workload Control Center. The presentation also recommends related sessions on topics like critical path analysis, leveraging the AE web services, and disaster recovery planning.
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...CA Technologies
This document discusses moving jobs from SAP, Oracle, and PeopleSoft adapters to the corresponding plug-ins in CA Workload Automation. It provides an overview of the differences between adapters and plug-ins, and describes conversion utilities that can help automate the process of moving jobs. The utilities convert command jobs to new job types, move parameters to attributes, and create properties files. Limitations of converting SAP jobs are also noted.
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
This presentation discusses how CA Workload Automation iDash can help optimize a company's workload automation environment. It notes that workload automation needs to understand business needs, monitor the entire environment, analyze key information, predict potential problems, and fix issues proactively. CA Workload Automation iDash simplifies complex workflows, predicts problems, and provides critical path forecasting. The presentation demonstrates iDash and concludes that it is a critical tool for helping workload automation evolve to meet changing business demands.
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesCA Technologies
The document discusses various job types available in CA Workload Automation Agent (CA WA AE). It provides examples of configuring different agent plugins like database, proxy, etc. and modifying the agentparm.txt file. It also demonstrates how to set up the owner attribute and job security for different job types like FTP, WBSVC, JMSPUB, HTTP etc. The document aims to provide a deep dive into the various agent job types in CA WA AE and how to install plugins, configure the agent and set up job security.
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentCA Technologies
The document discusses upgrading from the Universal Job Management Agent (CA UUJMA) to the CA Workload Automation System Agent. It provides an overview of how each agent works, including how they submit and track distributed workloads, their security features, and how they are configured in CA Workload Automation CA 7. The document also reviews the architectural differences between the two agents and how to migrate workload from the UUJMA to the System Agent.
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
This document discusses ways to improve performance and structure policies for Embedded Entitlements Manager (EEM) using CA Workload Automation. It recommends defining a security matrix, leveraging naming conventions, implementing group membership, using different policy methodologies, and testing the implementation. The presentation agenda includes defining infrastructure, group membership, policy methodology, and testing. It also recommends related sessions and demos.
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
The document discusses Wobtrigs and File Triggers in CA Workload Automation ESP Edition. It provides an overview of how Wobtrigs and File Triggers work at the event and application level. The key points covered include how to define and monitor Wobtrigs and File Triggers, best practices for using them, how to handle errors, and considerations for remote file systems and high availability scenarios. The document compares Wobtrigs and File Triggers, noting when each method is most appropriate.
Pre Con Ed: Optimize Cloud Services and Operations With CA Process AutomationCA Technologies
This document summarizes a presentation about how CA uses CA Process Automation to optimize cloud services and operations on AWS. The presentation discusses how CA Process Automation helps with cloud adoption, migration, and operations through automating tasks like compliance, governance, security, capacity management and cost optimization. Specific use cases demonstrated how CA implemented automated controls for compliance, cost optimization and operations management on AWS.
Pre-Con Ed: What’s New With Workload Automation DE R12?CA Technologies
The document summarizes the new features and enhancements in CA Workload Automation DE r12 and r12.1. Major changes include improved internationalization with Unicode support, a new web-based self-service client, enhanced database and installation functionality, additional job types for Hadoop integration, and various operational improvements.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE Edition. It discusses customizing the desktop client by setting defaults, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips to help attendees more effectively use scheduling, reporting, and other features of CA Workload Automation DE.
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AECA Technologies
This document summarizes a presentation about planning for disaster recovery of CA Workload Automation environments. It discusses defining disasters, where to locate disaster recovery sites, the differences between high availability and disaster recovery configurations, and considerations for implementing disaster recovery. The presentation also recommends related sessions and must-see demos at the CAWorld conference.
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...CA Technologies
The document discusses using the ESPmgr utility to send messages from an agent to a CA Workload Automation system. It provides examples of using ESPmgr to control workload objects by changing their state or performing actions like inserting jobs. It also describes how ESPmgr can be used to create custom third-party integrations by setting state values and user status fields on workload objects.
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...CA Technologies
The document discusses how to use CA Workload Automation Service Governor ESP Edition and CA Workload Automation High Availability ESP Edition to improve workload management and business continuity. It describes how critical path analysis can identify jobs most critical to meeting SLAs, and how Service Governor can prioritize these jobs to shorten completion times. It also explains how High Availability uses IBM Sysplex clustering to provide automatic failover and ensure uninterrupted job streaming if the primary ESP system fails.
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...CA Technologies
The document discusses new features in CA NetMaster 12.2 for managing mainframe and network performance. It describes a new mainframe team center user interface that provides a modernized view of monitoring tools and collaborative activities. It also discusses new predictive analytics capabilities to detect abnormal patterns earlier in order to avoid issues and fix problems faster using machine learning algorithms. Additional updates include support for shared memory communications and an improved network management user interface.
Pre-Con Ed: Upgrading CA Workload Automation DE to R12CA Technologies
The document discusses the two methods for upgrading CA Workload Automation DE (CA WA DE) from version 11.3 to release 12 (R12): the in-place upgrade method and the traditional migration method. The in-place upgrade upgrades the server in the same directory, requiring minimal downtime. The migration method installs a new server instance and migrates artifacts, variables, and history to the new server, preserving the previous version for fallback. The document provides details on the processes and advantages of each method.
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
This document provides an overview of new features and enhancements in CA Workload Automation ESP Edition 11.4. Key updates include improved zIIP processor support, performance metrics, Mainframe 2.0 compliance, and integration with CA OPS/MVS Event Management. Continuous delivery is used to deliver ongoing enhancements through incremental updates. Over 35 enhancements have already been delivered via PTF to the 11.4 base release.
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksCA Technologies
The document discusses various ways to optimize CA Workload Automation ESP Edition procedures and applications to reduce manual intervention and streamline batch workflows. It covers topics like using schedule criteria in natural language, dueout processing techniques, templates, configuration options like concurrent event processing and procedure caching. The presentation provides examples and explanations for each topic to demonstrate how to simplify and automate complex scheduling requirements.
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...CA Technologies
This document discusses best practices for setting up CA Workload Automation ESP Edition (CA WLA ESP) applications across multiple environments. It recommends using naming standards and symbolic libraries to automate the migration of CA WLA ESP procedures from development to production. This helps minimize manual work and ensures procedures remain in sync across environments. It also suggests leveraging software change management tools like global variable tables and triggers to further automate the process.
Common Challenges in DevOps Change ManagementMatt Ray
This document discusses common challenges in DevOps change management. It emphasizes that infrastructure should be defined as code and version controlled. The Chef repository contains cookbooks and other components that define infrastructure as code. Tools like Spiceweasel can generate commands to build infrastructure from files. Nodes should be treated as ephemeral and provisioned from a base configuration using roles rather than being manually configured. Environments help manage versioned infrastructures defined in the Chef repository for different stages. The Chef community is available for help on IRC, mailing lists and GitHub.
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...CA Technologies
The document discusses best practices for using JavaScripts in CA Workload Automation. JavaScripts can be invoked at the Event, Application, and Job level to automate tasks and set properties. Key points include:
- JavaScripts are commonly used as pre-processors at Event trigger time or post-processors at job run time.
- JavaScripts can be defined in the Event, Application, or Job definitions and invoked from the JavaScript Repository or embedded.
- Properties like job names and frequencies must be set at Event trigger time while arguments can be set at run time.
- Prefixes like ESP, APPL, and WOB determine the scope of symbolic variables set by JavaScripts.
This document is a curriculum vitae for Anuj Gupta that outlines his professional experience and technical skills. It summarizes that he has over 7 years of experience as an IT consultant providing strategic guidance to clients. He has worked as a team leader and senior engineer on various projects for companies like Newgen Software, Infosys, RBS Services, and Airtel. His technical skills include languages like Java, XML, and SQL as well as frameworks like Hibernate, RESTful web services, and Hadoop. He also has experience in data analytics using tools like R, machine learning algorithms, and natural language processing.
This joint webinar with Neebula Systems CTO Ariel Gordon and DBmaestro CTO Yaniv Yehuda highlights the critical features in best practices and tools that are required to address the new challenges to your organization.
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016Manideep Konakandla
The document provides an agenda for a presentation on breaking and securing Docker container environments. The presentation covers introducing containers and Docker, risks areas for containers like images and runtimes, how to break and secure images, runtimes, daemons, and hosts. It also discusses securing the entire container pipeline including communication and registries. The presentation concludes with discussing the future of container security and references.
DevOps and the Importance of Single Source Code Repos Perforce
Companies are increasingly moving to DevOps practices to streamline product development and delivery. In this presentation DevOps author and evangelist Gene Kim will discuss how version control has moved from a development concern to a fundamental practice for everyone in the value stream, especially Operations. He will discuss the importance of the single, shared source code repository in high performing technology organizations.
He will discuss the research he has done over the last 16 years about the top predictors of DevOps performance, and how best to overcome the cultural and workflow friction that can exist between Development teams and Operations.
He will discuss the research he has done over the last 16 years about the top predictors of DevOps performance, and how best to overcome the cultural and workflow friction that can exist between Development teams and Operations."
Snapchat is a popular social media app among millennials and college students. The document proposes using Snapchat stories and in-story advertisements on college campuses to promote Verizon's "Life of Verizon" Snapchat account and recruit students. It outlines the basics of Snapchat, why it's an effective platform, example solutions, a budget of $44,000 with most spending on a week-long in-story ad campaign at the University of Arizona, and metrics to measure the success of increased interest in jobs.
Case Study: Verizon Wireless: Chasing the Yellow Before They Turn RedCA Technologies
In the age of the application economy, Verizon shows one way they strive to earn user loyalty. By correlating network and application metrics and gaining network and application performance insights, Verizon is able to homogenize behaviors across organizations and focus on fault prevention rather than decreasing time to fix after the fault has already occurred.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
This hands-on lab will provide experience with CA Workload Automation advanced integration agents for Hadoop, Informatica, and MSSQL Server. Attendees will learn about the capabilities of these agents and use them to create automated business processes. The lab overview outlines creating a business process using agent job types, initiating the process, and troubleshooting any failures.
The document discusses Verizon's history of partnership with government agencies dating back to the 1980s, providing services such as connecting agencies to the internet, voice communications, and mobile services. It highlights Verizon's expanding services including IoT, cloud, cybersecurity, and 5G networks. Customer testimonials praise Verizon's understanding of agencies' needs and ability to provide realistic solutions. The document proposes that Verizon and government agencies can work together to create digitally advanced agencies that gain new insights through partnerships and agility.
Verizon Communications is an American broadband and telecommunications company that started in 1983. It provides fixed-line data, voice, and television services as well as wireless voice and data. Verizon launched its FiOS fiber optic internet, television, and telephone services beginning in 2005 and acquired several companies to expand its business services offerings.
Best Practices with CA Workload Automation AutoSys (AE)CA Technologies
In this session we will cover the CA Technologies recommended configuration and architectures for CA Workload Automation AusoSys (AE) , including the scheduling engine, agents, security and graphical user interface (GUI). These best practices are designed to help maximize performance and minimize maintenance and issues.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...CA Technologies
The document discusses CA Workload Automation AE Web Services, which provide a RESTful interface for integrating with and controlling CA Workload Automation. It covers the architecture of the web services, including security implementation using CA EEM. It also demonstrates how to call the web services using the CA WA REST Client and provides examples of retrieving job statuses and performing job actions through the web services.
Enterprise Developers, Linux and z Systems - What you Need to KnowCA Technologies
This document discusses Linux on IBM zSystems mainframes. It begins with an overview of Linux, describing its composition of a kernel, operating system, and distribution. It then discusses how Linux can run on zSystems mainframes, providing virtualization benefits like workload isolation and high resource sharing. Some key advantages of running Linux on zSystems include near continuous high utilization, reduced complexity, and reliability with 99.999% availability. The document provides examples of customer use cases and discusses how Docker can also run on these mainframes.
Modernizing the CA Datacom Data – SQL Access Part ICA Technologies
This document provides an overview of steps to modernize access to CA Datacom data by implementing SQL access. It discusses adding SQL attributes to the database model, defining AUTHIDs for SQL schemas, and using a SQL column report to determine legacy tables' SQL accessibility. The summary describes how implementing SQL allows critical business data to be accessed by new applications while existing applications continue functioning.
Modernizing the CA Datacom Data – SQL Access Part IICA Technologies
The document discusses modernizing access to CA Datacom data by implementing Datacom views to make legacy data structures accessible via SQL. It provides steps for generating Datacom view syntax using dictionary utilities, examples of Datacom views for different data structures like repeating groups and redefinitions, and best practices for working with Datacom views. It also introduces the DBSQLPR utility for executing SQL statements against Datacom data.
This presentation frames a Microservices Lifecycle Demo given by Jay Thorne at CA World 2016. The presentation discusses Fred Brook's concepts of essential and accidental complexity and how they fit with microservice architecture.
Tech Talk: Demystifying Mobile to Mainframe DevOps CA Technologies
This document discusses how to monitor mobile to mainframe applications using CA tools. It begins with an overview of end-to-end application monitoring using CA Application Performance Management (CA APM). When issues are detected, CA APM alerts can be used to identify problems on the mainframe. Historical data in CA SYSVIEW allows isolating transactions for further analysis. Thresholds in CA SYSVIEW can automatically invoke the CA Mainframe Application Tuner (CA MAT) to monitor transactions. CA MAT provides code-level diagnostics to help developers identify and fix performance issues.
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)CA Technologies
This document provides an introduction to software-defined networking (SDN) and network functions virtualization (NFV). It discusses how traditional infrastructure management solutions are not well-suited for the dynamic nature of SDN/NFV environments. It then summarizes CA's solution, CA Virtual Network Assurance, which provides visibility, correlation, planning and proactive safeguarding for SDN/NFV networks through multi-vendor monitoring, performance management, and other capabilities. The solution helps customers gain operational confidence and deliver next-generation services on their SDN/NFV networks.
This document provides an agenda and overview of new functionality in recent releases of CA Datacom products, including the database engine, metadata dictionary, CICS services, SQL, and server. Key enhancements discussed include online table alterations, performance improvements for zIIP offloading and multi-TCB environments, active-active replication, and upcoming SQL table expressions.
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesCA Technologies
The document discusses how to implement Generic VTAM Resources and Parallel Sysplex Features in CA IDMS systems. Generic VTAM Resources allow multiple IDMS systems to share a common connection resource, improving availability. Parallel Sysplex Features enable data sharing across multiple update systems using a shared cache in a coupling facility, improving performance and high availability. Key steps include defining Generic VTAM resources, XCF groups, and shared cache structures, and configuring the IDMS systems to use these resources and participate in the data sharing group.
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...CA Technologies
Williams established a DevOps model based on Gartner's layered testing strategy using CA Technologies tools. Gartner recommends shifting testing left by focusing on business logic testing using mocking, service virtualization, and reusable scripts. This reduces GUI testing and allows teams to get quality products to market more quickly. Williams implemented Agile Requirements Designer to design test cases, Test Data Manager for data virtualization, and AppTest for test automation to achieve continuous integration based on Gartner's strategy.
VMware Product Applicability Guide for NERC CIP v5 Final Version 1.0Anthony Dukes
This document summarizes VMware's software-defined data center (SDDC) products and their applicability to the North American Electric Reliability Corporation's Critical Infrastructure Protection Version 5 (NERC CIP v5) cybersecurity standards. It was produced by Coalfire, an independent cybersecurity audit firm, in conjunction with VMware. The document maps the NERC CIP v5 requirements to VMware's SDDC products such as VMware ESXi, VMware vCenter, VMware NSX, and VMware management and automation products. It finds that while the SDDC alone does not provide all required technologies for full compliance, it can be used along with third-party products and entity policies and
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2CA Technologies
This document discusses CA Test Data Manager and its capabilities for high performance masking and test data generation for mainframe applications like IMS and DB2. It summarizes how CA Test Data Manager can centrally manage test data across different sources, securely subset and mask data on the mainframe without moving it, and generate synthetic test data scenarios. It also highlights how CA Test Data Manager maintains data integrity and allows test data assets to be controlled and reused across different projects and versions.
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
The document discusses how establishing digital trust can help companies become digital enterprises. It outlines barriers that companies face in areas like ensuring resources, assuring systems, delivering digital experiences, verifying people, and protecting data. The document provides best practices and CA technologies that can help companies optimize their platforms, assure systems through tools like AI and automation, deliver digital experiences through DevSecOps, verify people with identity management, and protect data with discovery tools. Following these practices can help companies transform to digital enterprises by establishing digital trust.
Domino IQ – What to Expect, First Steps and Use Casespanagenda
Webinar Recording: https://www.panagenda.com/webinars/domino-iq-what-to-expect-first-steps-and-use-cases/
HCL Domino iQ Server – From Ideas Portal to implemented Feature. Discover what it is, what it isn’t, and explore the opportunities and challenges it presents.
Key Takeaways
- What are Large Language Models (LLMs) and how do they relate to Domino iQ
- Essential prerequisites for deploying Domino iQ Server
- Step-by-step instructions on setting up your Domino iQ Server
- Share and discuss thoughts and ideas to maximize the potential of Domino iQ
Down the Rabbit Hole – Solving 5 Training RoadblocksRustici Software
Feeling stuck in the Matrix of your training technologies? You’re not alone. Managing your training catalog, wrangling LMSs and delivering content across different tools and audiences can feel like dodging digital bullets. At some point, you hit a fork in the road: Keep patching things up as issues pop up… or follow the rabbit hole to the root of the problems.
Good news, we’ve already been down that rabbit hole. Peter Overton and Cameron Gray of Rustici Software are here to share what we found. In this webinar, we’ll break down 5 training roadblocks in delivery and management and show you how they’re easier to fix than you might think.
Soulmaite review - Find Real AI soulmate reviewSoulmaite
Looking for an honest take on Soulmaite? This Soulmaite review covers everything you need to know—from features and pricing to how well it performs as a real AI soulmate. We share how users interact with adult chat features, AI girlfriend 18+ options, and nude AI chat experiences. Whether you're curious about AI roleplay porn or free AI NSFW chat with no sign-up, this review breaks it down clearly and informatively.
Discover 7 best practices for Salesforce Data Cloud to clean, integrate, secure, and scale data for smarter decisions and improved customer experiences.
Developing Schemas with FME and Excel - Peak of Data & AI 2025Safe Software
When working with other team members who may not know the Esri GIS platform or may not be database professionals; discussing schema development or changes can be difficult. I have been using Excel to help illustrate and discuss schema design/changes during meetings and it has proven a useful tool to help illustrate how a schema will be built. With just a few extra columns, that Excel file can be sent to FME to create new feature classes/tables. This presentation will go thru the steps needed to accomplish this task and provide some lessons learned and tips/tricks that I use to speed the process.
Your startup on AWS - How to architect and maintain a Lean and Mean accountangelo60207
Prevent infrastructure costs from becoming a significant line item on your startup’s budget! Serial entrepreneur and software architect Angelo Mandato will share his experience with AWS Activate (startup credits from AWS) and knowledge on how to architect a lean and mean AWS account ideal for budget minded and bootstrapped startups. In this session you will learn how to manage a production ready AWS account capable of scaling as your startup grows for less than $100/month before credits. We will discuss AWS Budgets, Cost Explorer, architect priorities, and the importance of having flexible, optimized Infrastructure as Code. We will wrap everything up discussing opportunities where to save with AWS services such as S3, EC2, Load Balancers, Lambda Functions, RDS, and many others.
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfRejig Digital
Unlock the future of oil & gas safety with advanced environmental detection technologies that transform hazard monitoring and risk management. This presentation explores cutting-edge innovations that enhance workplace safety, protect critical assets, and ensure regulatory compliance in high-risk environments.
🔍 What You’ll Learn:
✅ How advanced sensors detect environmental threats in real-time for proactive hazard prevention
🔧 Integration of IoT and AI to enable rapid response and minimize incident impact
📡 Enhancing workforce protection through continuous monitoring and data-driven safety protocols
💡 Case studies highlighting successful deployment of environmental detection systems in oil & gas operations
Ideal for safety managers, operations leaders, and technology innovators in the oil & gas industry, this presentation offers practical insights and strategies to revolutionize safety standards and boost operational resilience.
👉 Learn more: https://www.rejigdigital.com/blog/continuous-monitoring-prevent-blowouts-well-control-issues/
Jeremy Millul - A Talented Software DeveloperJeremy Millul
Jeremy Millul is a talented software developer based in NYC, known for leading impactful projects such as a Community Engagement Platform and a Hiking Trail Finder. Using React, MongoDB, and geolocation tools, Jeremy delivers intuitive applications that foster engagement and usability. A graduate of NYU’s Computer Science program, he brings creativity and technical expertise to every project, ensuring seamless user experiences and meaningful results in software development.
Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...Anish Kumar
Presented by: Anish Kumar
LinkedIn: https://www.linkedin.com/in/anishkumar/
This lightning talk dives into real-world GenAI projects that scaled from prototype to production using Databricks’ fully managed tools. Facing cost and time constraints, we leveraged four key Databricks features—Workflows, Model Serving, Serverless Compute, and Notebooks—to build an AI inference pipeline processing millions of documents (text and audiobooks).
This approach enables rapid experimentation, easy tuning of GenAI prompts and compute settings, seamless data iteration and efficient quality testing—allowing Data Scientists and Engineers to collaborate effectively. Learn how to design modular, parameterized notebooks that run concurrently, manage dependencies and accelerate AI-driven insights.
Whether you're optimizing AI inference, automating complex data workflows or architecting next-gen serverless AI systems, this session delivers actionable strategies to maximize performance while keeping costs low.
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....Jasper Oosterveld
Sensitivity labels, powered by Microsoft Purview Information Protection, serve as the foundation for classifying and protecting your sensitive data within Microsoft 365. Their importance extends beyond classification and play a crucial role in enforcing governance policies across your Microsoft 365 environment. Join me, a Data Security Consultant and Microsoft MVP, as I share practical tips and tricks to get the full potential of sensitivity labels. I discuss sensitive information types, automatic labeling, and seamless integration with Data Loss Prevention, Teams Premium, and Microsoft 365 Copilot.
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...Impelsys Inc.
Web accessibility is a fundamental principle that strives to make the internet inclusive for all. According to the World Health Organization, over a billion people worldwide live with some form of disability. These individuals face significant challenges when navigating the digital landscape, making the quest for accessible web content more critical than ever.
Enter Artificial Intelligence (AI), a technological marvel with the potential to reshape the way we approach web accessibility. AI offers innovative solutions that can automate processes, enhance user experiences, and ultimately revolutionize web accessibility. In this blog post, we’ll explore how AI is making waves in the world of web accessibility.
Your startup on AWS - How to architect and maintain a Lean and Mean account J...angelo60207
Prevent infrastructure costs from becoming a significant line item on your startup’s budget! Serial entrepreneur and software architect Angelo Mandato will share his experience with AWS Activate (startup credits from AWS) and knowledge on how to architect a lean and mean AWS account ideal for budget minded and bootstrapped startups. In this session you will learn how to manage a production ready AWS account capable of scaling as your startup grows for less than $100/month before credits. We will discuss AWS Budgets, Cost Explorer, architect priorities, and the importance of having flexible, optimized Infrastructure as Code. We will wrap everything up discussing opportunities where to save with AWS services such as S3, EC2, Load Balancers, Lambda Functions, RDS, and many others.
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfAlkin Tezuysal
As the demand for vector databases and Generative AI continues to rise, integrating vector storage and search capabilities into traditional databases has become increasingly important. This session introduces the *MyVector Plugin*, a project that brings native vector storage and similarity search to MySQL. Unlike PostgreSQL, which offers interfaces for adding new data types and index methods, MySQL lacks such extensibility. However, by utilizing MySQL's server component plugin and UDF, the *MyVector Plugin* successfully adds a fully functional vector search feature within the existing MySQL + InnoDB infrastructure, eliminating the need for a separate vector database. The session explains the technical aspects of integrating vector support into MySQL, the challenges posed by its architecture, and real-world use cases that showcase the advantages of combining vector search with MySQL's robust features. Attendees will leave with practical insights on how to add vector search capabilities to their MySQL systems.
TrustArc Webinar - 2025 Global Privacy SurveyTrustArc
How does your privacy program compare to your peers? What challenges are privacy teams tackling and prioritizing in 2025?
In the sixth annual Global Privacy Benchmarks Survey, we asked global privacy professionals and business executives to share their perspectives on privacy inside and outside their organizations. The annual report provides a 360-degree view of various industries' priorities, attitudes, and trends. See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar features an expert panel discussion and data-driven insights to help you navigate the shifting privacy landscape. Whether you are a privacy officer, legal professional, compliance specialist, or security expert, this session will provide actionable takeaways to strengthen your privacy strategy.
This webinar will review:
- The emerging trends in data protection, compliance, and risk
- The top challenges for privacy leaders, practitioners, and organizations in 2025
- The impact of evolving regulations and the crossroads with new technology, like AI
Predictions for the future of privacy in 2025 and beyond
If You Use Databricks, You Definitely Need FMESafe Software
DataBricks makes it easy to use Apache Spark. It provides a platform with the potential to analyze and process huge volumes of data. Sounds awesome. The sales brochure reads as if it is a can-do-all data integration platform. Does it replace our beloved FME platform or does it provide opportunities for FME to shine? Challenge accepted
Improving Developer Productivity With DORA, SPACE, and DevExJustin Reock
Ready to measure and improve developer productivity in your organization?
Join Justin Reock, Deputy CTO at DX, for an interactive session where you'll learn actionable strategies to measure and increase engineering performance.
Leave this session equipped with a comprehensive understanding of developer productivity and a roadmap to create a high-performing engineering team in your company.
DevOps in the Modern Era - Thoughtfully Critical PodcastChris Wahl
https://youtu.be/735hP_01WV0
My journey through the world of DevOps! From the early days of breaking down silos between developers and operations to the current complexities of cloud-native environments. I'll talk about my personal experiences, the challenges we faced, and how the role of a DevOps engineer has evolved.
13. 13 @CAWORLD #CAWORLD
Best Practices
Mainframe Proclib Naming Standard
Mainframe Proclibs contain Application names are limited to 8 characters and are defined with the following format:
IPSNESP.AAA.PROCLIB.VISL
Where:
IPSNESP – Does not change
AAA - Characters are defined as the 3 alpha character code
PROCLIB – Does not change
VIS – Does not change
L – Mainframe Location Code
Example:
IPSNESP.CMD.PROCLIB.VISN
| |
Application North
Application/Event/Proclib Standardized Names Example
16. 16 @CAWORLD #CAWORLD
Dev-Ops
Step 2: Create Stop File Trigger Application
APPL OTAECFT
/* This appl contains all OTA EAST CFT jobs*/
FILE_TRIGGER OTAE_STOP_FT
/* Triggers OTA EAST Stop Event $VZWXOTA.OTAESTOP
RUN DAILY
AGENT OTAEAST
FILENAME '/ota/data/adm_ota/otaStopEastESP' CREATE NOCHANGE(1) CONTINUOUS($VZWXOTA.OTAESTOP)
DUEOUT EXEC 23:59 EASTERN
NOTIFY OVERDUE ALERT(GLB5)
Stop and Start Setup
17. 17 @CAWORLD #CAWORLD
Dev-Ops
Step 3: Create Stop Application
APPL OTAESTOP
/* This appl will set OTA_EASTBATCH to 0*/
JOB STOP.EASTOTA_BATCH TASK SELFCOMPLETING
/* This link job will stop the OTA East batch jobs.*/
RUN DAILY
RELEASE ADD(Cleanup_Stop_Start_Files.OTAEAST_STOP)
ESP RESDEF OTA_PRD_DATA_OTA_EASTBATCH SET AVAIL(0)
NOTIFY PNODE(COMPLETE) ALERT(SHTR)
ENDJOB
UNIX_JOB Cleanup_Stop_Start_Files.OTAEAST_STOP
/* This script will cleanup the ESP Stop/Start dummy files created to stop/start OTA batch
RUN DAILY
AGENT OTAEAST
USER adm_ota
SCRIPTNAME /ota/data/adm_ota/cleanupESP.sh
ENDJOB
Stop and Start Setup
18. 18 @CAWORLD #CAWORLD
Dev-Ops
Step 4: Create Start Continuous File Trigger Application
APPL OTAECFT
/* This appl contains all OTA EAST CFT jobs*/
FILE_TRIGGER OTAE_STRT_FT
/* Triggers OTA EAST Start Event $VZWXOTA.OTAESTRT
RUN DAILY
AGENT OTAEAST
FILENAME '/ota/data/adm_ota/otaStartEastESP' CREATE NOCHANGE(1) CONTINUOUS($VZWXOTA.OTAESTRT)
DUEOUT EXEC 23:59 EASTERN
NOTIFY OVERDUE ALERT(GLB5)
ENDJOB
Stop and Start Setup
21. 21 @CAWORLD #CAWORLD
CA WA ESP Edition and CA Endevor®
Step 1: Creation of the CA Endevor® Environment
The CA Endevor® Administrator in coordination with our Scheduling team defined the CA Endevor® environment. The CA Endevor® environment
contains the following: 1 Environment, 1 System, 27 Subsystems, 2 stages and 2 types (APL) for application and (SYM) for Global Variables/Symlib
members.
CA Endevor® Setup
Environment
EPSWLS
System
EPS
Subsystem
AAA00 (AAA = 3 Character
Application code)
Stage
Stage 1: PSTG
Stage 2: PROD
Type
Type 1: APL
Type 2: SYM
Step 2: Creation of the Package Shipment Rules
Since the CA Endevor® software is required to be installed on our development mainframe, we needed a process to send the updated applications to
the production mainframe proclibs. The CA Endevor® Administrator created Package Shipment rules to allow this to occur. Once the CA Endevor®
package is executed, the CA Endevor® with CA WA ESP elements are then ‘shipped’ to our production proclibs.