SlideShare a Scribd company logo
1 of 59
Download to read offline
World®
’16
Application	Tuning	for	CA	
Datacom	environments	– Part	II
Kevin	Shuma,	VP	Product	Management
CA	Technologies
MFX67EB
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
This	is	a	two	part	session	that	describes	the	various	techniques	
used	to	tune	a	CA	Datacom	application	for	the	best	possible	
performance.	Included	will	be	discussions	on	available	
monitoring	tools.
This	session	is	primarily	focused	on	the	application	developer	
who	is	writing	applications	for	the	CA	Datacom®/DB	database.	
Kevin	Shuma
CA	Technologies
VP,	Product	
Management
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
APPLICATION	TUNING	WITHIN	THE	APPLICATION
WHAT	IS	THE	URT	AND	HOW	DOES	IT	AFFECT	THE	APPLICATION
GENERAL	PROGRAMMING	RECOMMENDATIONS
IDEAL	PROGRAMMING	RECOMMENDATIONS
AVAILABLE	TUNING	TOOLS	AND	RESOURCES
SUMMARY
1
2
3
4
5
6
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Application	Tuning	within	the	application
§ Some	application	issues	need	to	be	resolved	within	the	
application
§ In	other	cases,	new	or	different	programming	techniques	can	
be	used	to	improve	the	applications	performance	
§ This	session	will	address	ways	to	improve	application	
processing	within	the	application	program
Best	practices	that	can	be	applied
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	is	the	URT	and	how	does	it	
affect	the	application
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	is	a	URT?
§ Much	more	than	just	a	list	of	tables	accessed	by	the	program
– Interface	code	(batch	non-Ideal)
– Processing	options
– Tables	list	and	Sequential	Read	Ahead	options
– GBMAXR/GETBLK/SEQBUFS
– GSETL/GETIT	invoked	automatically	by	CA	Ideal	FOR	constructs	under	
the	right	circumstances
– Not	invoked	automatically	for	CA	MetaCOBOL+
Two-part	webcast	is	available	on	the	subject	of	URTs
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Sequential	Read	Ahead
Simplified	view
Half	of	SEQBUFS	
buffers	(1-16)	filled	
NOW
Second	half	of	SEQBUFS	
buffers	(17-32)	filled	
while	first	half	are	
being	processed
Application	Region MUF	Region
GSETL/GETIT
SEQBUFS=32
GETBLK=61440
GBMAXR=255
Block	of	rows	returned	
subject	to	GBMAXR	limit	
(255	is	“unlimited”)
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Sequential	Read	Ahead	(cont’d)
§ Pros
– Significantly	faster	batch	sequential	processing
– Reduced	elapsed	time	due	to	MUF	read-ahead
– Reduced	number	of	MUF	to	application	communications
§ Especially	important	when	using	XCF
– Possible	reduced	IOs	due	to	very	fast	buffer	re-use
Simplified	view
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Sequential	Read	Ahead	(cont’d)
§ Cons
– Significant	possibility	for	application	program	to	misuse	the	
functionality
§ Getting	lots	of	data	rows	that	are	never	actually	read	in	the	program	
§ Typical	when	not	reading	the	key	range	from	beginning	to	end
§ For	non-Ideal,	be	sure	to	specify	the	key	range	end	value
– Getting	lots	of	data	rows	and	holding	them	under	exclusive	control	
§ If	URT	has	UPDATE=YES	all	rows	passed	in	Block	GETxx	buffer	are	locked
§ Can	be	minimized	by	using	smaller	GBMAXR	and/or	GETBLK	(e.g.	
GBMAXR=10)
Simplified	view
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
URT	Priority
§ MUF	BREAK	parameter	will	influence	effectiveness
– BREAK	500	suitable	at	most	sites
§ What	to	specify	for	PRTY=	in	URTs:
– Hot	CICS	AORs	and	Hot	Trusted	Server:	12
– Normal	CICS	AORs	and	Trusted	Server:	10
– Hot	batch	(Time-sensitive	or	Critical	Path):	8	or	9
– Normal	batch:	7	(CA	Default)	
– Dataquery	CICS	AORs	and	Ad-hoc	Server:	5
– Dataquery	batch,	DBSQLPR	and	Data	Reporter:	3
Does	it	still	really	matter?	In	a	busy	MUF,	Yes!
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
General	programming	recommendations
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
General	Programming	Recommendations
§ Record-at-a-Time	(RAAT)
§ Set-at-a-Time	(SAAT	or	“CBS”)
§ SQL
§ Can	mix	and	match	all	three	access	methods	within	a	single	
program
One	DBMS,	three	APIs	available	to	3GLs	(COBOL,	PL/I,	etc.)
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Record-at-a-Time	(RAAT)
§ Most	commonly	used	API	for	legacy	applications
– Not	available	directly	to	programmers	in	CA	Ideal
– Used	by	CA	MetaCOBOL+	LOCATE/READ	statements
– Similar	to	VSAM	programming	API	
§ All	processing	selections	predetermined	(table,	keys,	
elements)	
– Changes		to	keys	or	elements	require	program	changes
§ Very	fast	for	direct	random	keyed	access	(LOCxx/REDxx)
– But	each	row	is	returned	individually	– communications	overhead
One	DBMS,	three	APIs	available	to	3GLs	(COBOL,	PL/I,	etc.)
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Record-at-a-Time	(RAAT)	(cont’d)
§ Sequential	read	ahead	(GSETx/GETxx)
– Batch	only
– Very	fast	if	trawling	through	large	key	ranges
– Tune	GBMAXR/GETBLK/SEQBUFS	in	URT
– “New”	feature	(r12)	to	specify	end-of-key-range	on	GSETL
§ Often	rows	are	returned	that	are	later	rejected	by	the	
application	in	non-zIIP	processing
One	DBMS,	three	APIs	available	to	3GLs	(COBOL,	PL/I,	etc.)
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Set-at-a-Time	(SAAT	or	“CBS”)
§ API	built	for	use	with	4GL	applications
– Similar	to	SQL	programming	API	(without	joins)
– CA	Ideal	and	CA	MetaCOBOL+	“FOR”	constructs
§ Call	DBNTRY….SELFR/SELNR/SELSM/SELPR
§ Dataviews	can	only	reference	a	vertical	subset	of	a	single	table
§ Can	select	on	non-key	columns,	and	order	rows
– Reducing	communications	overhead	and	performing	the	“sorting”	on	zIIP
– Review	old	programs	with	IF	tests	and	internal	sorts
One	DBMS,	three	APIs	available	to	3GLs	(COBOL,	PL/I,	etc.)
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Set-at-a-Time	(SAAT	or	“CBS”)	(cont’d)
§ CA	MetaCOBOL+	does	NOT	convert	SRA	candidates	
to	GSETL/GETIT
§ CA	MetaCOBOL+	(or	CALL)	does	allow	SKIP	processing	
within	the	set
– Change	direction	or	jump	to	top/bottom	of	set,	or	relative	position
– Great	for	simple	(single-table)	scrolling	applications
One	DBMS,	three	APIs	available	to	3GLs	(COBOL,	PL/I,	etc.)
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Set-at-a-Time	(SAAT	or	“CBS”)	(cont’d)
§ Tune	using	CBS	trace	– “$$$”	in	chars	1-3	of	UIB
§ Manual	joins	(nested	FOR)	often	means	rows	are	returned	
that	are	later	rejected	by	the	application	in	non-zIIP	
processing
One	DBMS,	three	APIs	available	to	3GLs	(COBOL,	PL/I,	etc.)
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Set-at-a-Time	(SAAT	or	“CBS”)	(cont’d)
§ The	temporary	index
– CBS	examines	the	request	made	and	determines	how	to	access	the	data	
– A	temporary	index	is	built	if
§ Mixed	ascending/descending	ORDER	BY
§ ORDER/GROUP	BY	a	non-key	field
§ Signed	non-positive	numeric	fields	possible	in	key
§ CBS	chose	a	better	key	to	satisfy	the	WHERE	clause	
– Sometimes	a	temporary	index	is	NOT	a	bad	thing.
§ Unnecessary	ones	should	be	eliminated
One	DBMS,	three	APIs	available	to	3GLs	(COBOL,	PL/I,	etc.)
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CBS	- Building	a	temporary	index
Mixed	ORDER	BY	with	both	ascending	and	descending
FOR FIRST PRICE-LIST-R001
WHERE EFCTV-DATE = W.EFCTV-DATE
AND FGI-ID = W.FGI-ID
AND PRICE-CLS-ID = W.PRICE-CLS-ID
AND ALWN-BRCKT-CDE GT $SPACES
ORDERED BY EFCTV-DATE FGI-ID PRICE-CLS-ID
DESCENDING ALWN-BRCKT-CDE
FOR FIRST PRICE-LIST-R001
WHERE EFCTV-DATE = W.EFCTV-DATE
AND FGI-ID = W.FGI-ID
AND PRICE-CLS-ID = W.PRICE-CLS-ID
AND ALWN-BRCKT-CDE GT $SPACES
ORDERED BY DESCENDING EFCTV-DATE
FGI-ID
PRICE-CLS-ID
ALWN-BRCKT-CDE
Before After
All	the	“ascending”	columns	in	the	ORDER	BY	are	specified	as	
equalities	in	the	WHERE	clause,	so	the	ORDER	BY	can	be	changed	
without	impacting	the	program
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CBS	- Building	a	temporary	index	(cont’d)
§ SQL	CREATE	TABLE	statements	always	define	numeric	columns	
as	signed
– DBA	can	change	to	unsigned	afterwards
§ If	the	column	only	ever	contains	positive	values
– DBA	should	set	TYPE-NUMERIC=P	attribute
§ If	the	column	does	contain	negative	values
– DBA	should	set	DATA-SENSITIVE	attribute	
Signed	numeric	columns	in	key
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CBS	- Determining	the	best	key	to	use	for	CBS
§ CBS	dynamically	chooses	the	best	key	to	use	based	on	
information	in	the	where	and	order	by	clauses
§ Be	careful	when	trying	to	second-guess	CBS
– Run	a	CBS	trace	to	check	that	your	assumption	was	correct
– With	two	similar	candidate	keys,	Statistical	Population	Counting	can	
change	the	key	selection	at	runtime
§ In	the	following	example
– The	ORDER	BY	matches	the	native	key
– But	a	better	key	matches	the	WHERE	clause
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CBS	- Determining	the	best	key	to	use	for	CBS	(cont’d)
Order	by	determines	the	key	– but	is	not	the	best	choice
FOR FIRST SALES-EST-PD
WHERE MARKET-CODE EQ W.MARKET-CODE
AND SOURCE-CODE EQ $SPACES
AND CURRENT-WEEK EQ W-WEEK
AND CPCK-ITEM-CODE EQ $SPACES
AND SETUP-WEEK-10 GE SETUP-DATE
ORDERED BY MARKET-CODE
SOURCE-CODE
CURRENT-WEEK
SETUP-WEEK-10
FOR FIRST SALES-EST-PD
WHERE MARKET-CODE EQ W.MARKET-CODE
AND SOURCE-CODE EQ $SPACES
AND CURRENT-WEEK EQ W-WEEK
AND CPCK-ITEM-CODE EQ $SPACES
AND SETUP-WEEK-10 GE SETUP-DATE
ORDERED BY MARKET-CODE
CURRENT-WEEK
SOURCE-CODE :Moved
CPCK-ITEM-CODE :Inserted
SETUP-WEEK-10
Before After
Statistical	Population	Counting	and	a	Temporary	Index Now	a	direct	selection
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CBS	- More	WHERE	clause	tips
§ Avoid	NOT	operator,	if	feasible
– WHERE	ACTIVE	=	“Y”…	rather	than…
– WHERE	ACTIVE	<>	“N”
§ Specify	an	alternative	to	“OR”-ing	values	for	a	field	- use	a	
range,	if	feasible
– WHERE	QTY	=	3	OR	4	OR	5	…becomes…
– WHERE	QTY	>=	3	AND	QTY	<=	5
– Convert	to	IF	statement	ONLY	in	special	circumstances
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL
§ Agile/DevOps	- Quick	to	develop/maintain
§ All	joins/aggregation/formatting	done	in	MUF	
– Available	for	zIIP	processing
– Keeps	the	application	small/simple/efficient
§ Minimizes	communications	overhead
– SQL	pre-fetch	works	for	CICS	requests	too
§ If	there	is	syntax/functionality	you	need…
– Submit	your	enhancement	“Ideas”
Industry	standard	syntax
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL	(cont’d)
§ SQL	Constraints	can	be	used	to	implement	business	rules	
– Runs	in	MUF	(on	zIIP)
– Reduces	need	for	program		“checks”
§ Don’t	allow	a	delete	of	a	customer	that	still	has	an	order
§ Only	allow	type	“A,B,C”
§ Utilize	CASCADE	to	trigger	full	deletes
§ SQL	CACHE	can	be	implemented	to	improve	repeated	
dynamic	queries	
Industry	standard	syntax
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL	tuning	tips
§ IN	vs.	OR
– WHERE	CAT_TYPE	IN(’05’,’07’)	
– WHERE	CAT_TYPE	=	’05’	OR	CAT_TYPE	=	’07’
– Usually	OR	is	better
§ OR	vs.	BETWEEN	
– WHERE	CAT_TYPE	IN(’05’,’06’,’07’)	
– WHERE	CAT_TYPE	=	’05’	OR	CAT_TYPE	=	’06’	OR	CAT_TYPE	=	’07’
– WHERE	CAT_TYPE	BETWEEN	’05’	AND	‘07’
– Usually	BETWEEN	is	better
Simple	where	clause	predicate	tips
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL	tuning	tips	(cont’d)
§ Index	cardinality	stats	and	Row	Counts
– RETIX	DBID=100,KEYNAME=*SETR
– REPORT	AREA=IXX,DBID=100,TYPE=G,UPDATE=YES	
– Don't	forget	UAT	environments
– Especially	if	refreshed	using	DASD	utilities
§ SYSMSG	enhancements
– Much	easier	to	understand
– Predicate	messages	no	longer	“lost”	in	PXX
– SELECT	*	FROM	SYSADM.SYSMSG	WHERE	PLANNAME	=	'KEVIN';
SQL	query	optimization	housekeeping
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
COBOL	tuning	tips
§ COBOL	STRING/UNSTRING	with	pointer	is	very	efficient
§ Caching	using	internal	arrays
– Good	or	bad?
– Direct	access	can	be	good
– Searching	is	CPU-intensive
§ Order	the	EVALUATE	predicates	by	most-used	->	Least-used
SQL	query	optimization	housekeeping
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
COBOL	tuning	tips	(cont’d)
§ CBL	OPTIMIZE	– Dual	compile?
§ Enterprise	COBOL	5.x	and	beyond	- the	biggest	step	change	
since	COBOL	II
– Architecture	exploitation	(ARCH)
– Choose	the	highest	level	supported	by	your	hardware	
– Including	your	DR	site
SQL	query	optimization	housekeeping
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	
recommendations
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $SUBSTR
§ $SUBSTR	is	one	of	the	most	CPU-intensive	functions	of	CA	
Ideal
– Never	code	a	$SUBSTR	with	fixed	values	for	both	START=	and	LEN=
– Break	the	target	field	into	a	group	field	and	reference	the	data	directly	
as	a	simple	field
§ Don’t	repeat	the	same	$SUBSTR	function	unnecessarily
– SET	the	result	into	a	simple	field	and	then	reference	that	field	in	
subsequent	statements
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $SUBSTR	(cont’d)
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
Level Field Name T I Ch/Dg
----- ------------------- - - -----
1 SRA-DATA X 80
SELECT FIRST ACTION
WHEN $SUBSTR(SRA-DATA,START=70,LENGTH=3) = 'ELM'
SET ELM = TRUE
WHEN $SUBSTR(SRA-DATA,START=70,LENGTH=3) = 'DVW'
SET DVW = TRUE
WHEN $SUBSTR(SRA-DATA,START=70,LENGTH=3) = 'PGM'
SET PGM = TRUE
ENDSEL
Level Field Name T I Ch/Dg
----- ------------------- - - -----
1 SRA-DATA
2 FILLER-1 X 69
2 SRA-ENT-TYP X 3
2 FILLER-2 X 8
SELECT FIRST ACTION
WHEN SRA-ENT-TYP = 'ELM'
SET ELM = TRUE
WHEN SRA-ENT-TYP = 'DVW'
SET DVW = TRUE
WHEN SRA-ENT-TYP = 'PGM'
SET PGM = TRUE
ENDSEL
Before After
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $STRING
§ $STRING	is	one	of	the	most	CPU-intensive	functions	of	CA	
Ideal
– Data	is	copied	to	a	temporary	work	area,	appended	and	then	copied	to	
the	target	area
– Where	appropriate,	use	the	new	Ideal	15.0	DOCUMENT	feature	with	
variable-length	fields	to	accomplish	the	task
§ Don’t	repeat	the	same	$STRING	function	unnecessarily
– Set	the	result	into	a	simple	field	and	then	reference	that	field	in	
subsequent	statements
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $STRING	(cont’d)
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
SET W.DUPLICATE = FALSE
LOOP
VARYING W.SUB2 FROM 1 BY 1
UNTIL W.DUPLICATE
OR W.SUB2 = 640
IF DUP-PGM-DVW(W.SUB2) =
$STRING(RPT.PROGRAM,
RPT.STATUS,
RPT.DATAVIEW)
SET W.DUPLICATE = TRUE
ENDIF
ENDLOOP
Before
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $STRING
§ While	we	are	here	what	else	can	we	improve?
– Avoid	looping	through	the	whole	array
§ In	this	case,	all	640	entries	are	searched	if	the	incoming	item	is	NOT	
a	duplicate
§ Store	the	“maximum	entry#”	value	when	the	array	is	built	and	use	
that	value	to	terminate	the	loop
– Avoid	re-testing	the	“terminator”	value	on	each	iteration	of	the	loop
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $STRING	(cont’d)
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
SET W.DUPLICATE = FALSE
LOOP
VARYING W.SUB2 FROM 1 BY 1
UNTIL W.DUPLICATE
OR W.SUB2 = 640
IF DUP-PGM-DVW(W.SUB2) =
$STRING(RPT.PROGRAM,
RPT.STATUS,
RPT.DATAVIEW)
SET W.DUPLICATE = TRUE
ENDIF
ENDLOOP
Before
SET W.DUPLICATE = FALSE
SET NEW-PGM-DVW = $STRING(RPT.PROGRAM,
RPT.STATUS,RPT.DATAVIEW)
<<SEARCH-PGM-DVW>>
LOOP
VARYING W.SUB2 FROM 1 BY 1 UP THRU W.DVW-MAX
IF DUP-PGM-DVW(W.SUB2) = NEW-PGM-DVW
SET W.DUPLICATE = TRUE
QUIT SEARCH-PGM-DVW
ENDIF
ENDLOOP
After
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $STRING	(cont’d)
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
SET W.DUPLICATE = FALSE
LOOP
VARYING W.SUB2 FROM 1 BY 1
UNTIL W.DUPLICATE
OR W.SUB2 = 640
IF DUP-PGM-DVW(W.SUB2) =
$STRING(RPT.PROGRAM,
RPT.STATUS,
RPT.DATAVIEW)
SET W.DUPLICATE = TRUE
ENDIF
ENDLOOP
Before
SET W.DUPLICATE = FALSE
SET NEW-PGM-DVW = $STRING(RPT.PROGRAM,
RPT.STATUS,RPT.DATAVIEW)
<<SEARCH-PGM-DVW>>
LOOP
VARYING W.SUB2 FROM 1 BY 1 UP THRU W.DVW-MAX
IF DUP-PGM-DVW(W.SUB2) = NEW-PGM-DVW
SET W.DUPLICATE = TRUE
QUIT SEARCH-PGM-DVW
ENDIF
ENDLOOP
After
SET NEW-PGM-DVW = $STRING(RPT.PROGRAM,
RPT.STATUS,RPT.DATAVIEW)
LOOP
VARYING W.SUB2 FROM 1 BY 1 UP THRU W.DVW-MAX
UNTIL DUP-PGM-DVW(W.SUB2) = NEW-PGM-DVW
ENDLOOP
IF W.SUB2 > W.SUB
SET W.DUPLICATE = FALSE
ELSE
SET W.DUPLICATE = TRUE
ENDIF
After
If	you	really	hate	QUIT
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	– Internal	sorting
§ AVOID	unnecessary	internal	sorts
– Use	SQL	to	join/aggregate/sort	data	into	required	sequence	
§ Move	work	to	MUF	where	zIIP	CPU	can	be	used
– Use	the	sorted	report	facility	of	CA	Ideal	instead,	if	appropriate
– If	internal	sort	is	the	only	option,	avoid	repeatedly	calculating	the	index	
subscript
§ Calculate	the	“subscript	– 1”	once	and	use	that	in	all	subsequent	statements
§ Use	group	field	to	move	whole	array	“row”	at	once
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
39 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
If	internal	sort	is	the	only	option,	avoid	repeatedly	
calculating	the	index	subscript
LOOP VARYING W.SUB FROM W.ENTRIES BY -1 DOWN THRU 1
IF W.CURR-KEY < W.PREV-KEY
SET WT.PROD-CD = W.PROD-CD(W.SUB)
SET WT.CUST-CD = W.CUST-CD(W.SUB)
SET WT.EFCT-DT = W.EFCT-DT(W.SUB)
SET WT.TERM-DT = W.TERM-DT(W.SUB)
SET W.PROD-CD(W.SUB) = W.PROD-CD(W.SUB - 1)
SET W.CUST-CD(W.SUB) = W.CUST-CD(W.SUB - 1)
SET W.EFCT-DT(W.SUB) = W.EFCT-DT(W.SUB - 1)
SET W.TERM-DT(W.SUB) = W.TERM-DT(W.SUB - 1)
SET W.PROD-CD(W.SUB - 1) = WT.PROD-CD
SET W.CUST-CD(W.SUB - 1) = WT.CUST-CD
SET W.EFCT-DT(W.SUB - 1) = WT.EFCT-DT
SET W.TERM-DT(W.SUB - 1) = WT.EFCT-DT
ENDIF
ENDLOOP
Before
LOOP VARYING W.SUB
FROM W.ENTRIES BY -1 DOWN THRU 1
IF W.CURR-KEY < W.PREV-KEY
SET W.SUB2 = W.SUB - 1
SET WT.ARRAY-ROW =
W.ARRAY-ROW(W.SUB) BY POSITION
SET W.ARRAY-ROW(W.SUB) =
W.ARRAY-ROW(W.SUB2) BY POSITION
SET W.ARRAY-ROW(W.SUB2) =
WT.ARRAY-ROW BY POSITION
ENDIF
ENDLOOP
After
40 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $TRIM
§ $TRIM	is	one	of	the	most	CPU-intensive	functions	of	CA	Ideal
– When	building	output	text	strings
§ Avoid	repeatedly	trimming	trailing	blanks	and	so	on	from	the	same	input	
strings
– If	repeatedly	referencing	fixed-length	input
§ Convert	to	variable-length	working	data	field	with	$TRIM	just	once	and	
reference	that
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
41 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Ideal	programming	gotchas	- $TRIM	(cont’d)
§ Appending	data	to	an	output	“message”	string
– Define	output	message	string	as	variable-length	working	data	field;	no	
need	for	$TRIM
– Use	the	CA	Ideal	15.0	DOCUMENT	feature
§ Particularly	relevant	to	these	types	of	applications
– Interfacing	with	IBM	MQ-Series
– Ideal/web	interface	output	documents
Ideal	is	a	powerful	language	but	some	processes	can	be	expensive	to	use
42 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Re-Initializing	Arrays
§ In	batch,	storage	is	cheap,	CPU	is	expensive
– If	an	array	has	to	be	cleared	many	times	during	execution	of	a	program
§ Keep	an	empty	copy	of	the	array	in	working	data	
§ Use	SET	real-array	=	empty-array	BY	POSITION
§ In	CICS,	storage	is	not	so	cheap,	so	this	method	may	not	be	
appropriate	for	large	arrays
43 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Calling	Non-Ideal	Subprograms
§ If	using	any	Language	Environment	(LE)-enabled	language
– Make	sure	you	are	using	the	CEEUOPT	RTEREUS=ON	option
§ Ensures	that	LE	runtime	environment	is	only	established	once
§ Working	data	and	so	on	is	preserved	between	calls	of	the	subprogram
§ Significant	performance	improvements	where	subprogram	is	called	
repeatedly
44 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Insert	or	update	existing	row
Determine	which	to	use	based	on	likelihood	that	row	already	exists
FOR FIRST dataviewname
WHERE...
update values
WHEN NONE
FOR NEW dataviewname
insert values
WHEN DUPLICATE
handle “unique” failures
ENDFOR
ENDFOR
FOR NEW dataviewname
insert values
WHEN DUPLICATE
FOR FIRST dataviewname
WHERE...
update values
ENDFOR
ENDFOR
Row	is	usually	present Row	is	usually	NOT	present
45 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Dataviews	and	elements
§ Dataviews	are	a	collection	of	elements
– Elements	are	the	unit	of	transfer
§ Defined	as	a	single	field
– costs	vs	benefits	– now	on	zIIP
– Isolation	from	other	table	changes	– Agile/DevOps
– SQL	effectively	does	this
§ Defined	as	the	whole	row
– Use	where	the	whole	row	is/will	be	ALWAYS	required
§ Defined	as	all	the	columns	in	a	key
– Index-only	processing.
Elements	are	a	Datacom-only	concept
46 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Available	Tuning	tools	and	resources
47 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Built-in	tuning	tools
§ PXX	Job	statistics
– Shows	number	of	Database	requests	and	I/O’s
§ RXX	reports	(and	READRXX)
– Useful	to	track	maintenance	activity	and	times
§ Datacom	Accounting
– Can	be	very	low	overhead	if	defined	correctly
– Can	be	extremely	detailed	for	use	when	required
§ Dynamic	System	Tables
Included	with	the	Datacom	environment
48 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Built-in	tuning	tools	(cont’d)
§ AUTOINFO/AUTOSTATUS/AUTOCOLLECT
– Useful	in	spotting	trends	and	contentions
§ MUF	
– EOJ	SYSPRINT
– JES	LOG
§ CBS	Diagnostic	trace
§ SQL	plan	message	options	(or	traces)
Included	with	the	Datacom	environment
49 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Built-in	tuning	tools	(cont’d)
§ CICS	DEBUG	Facility
§ CA	Ideal	DEBUG	facility
– Yes	it	runs	in	batch,	and	in	runtime-only	environments
§ IBM	Debug	Tool
– Basic	but	can	be	very	useful
Included	with	the	Datacom	environment
50 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Application	Tuning	tools
§ CA	Intertest	
– Functionally	rich
– Code	Counting	feature	to	identify	heavily	used	statements
§ CA	Sysview
– Excellent	for	analysis	of	current	activity
– CICS	Transaction	Log	provides	historical	analysis
§ Make	sure	Sysview’s	DCCTXPR	has	been	implemented
Available	for	use	with	the	Datacom	environment
51 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Application	Tuning	tools	(cont’d)
§ CA	Mainframe	Application	Tuner	(MAT)
– Major	new	tool	for	CA	Ideal	and	COBOL	and	others
– Virtually	no	overhead	and	no	recompiles	required
§ I	recommend	you	attend	the	various	sessions	on	these	
products	while	you	are	at	CA	World
§ Come	see	us	at	the	Datacom	demo	station
Available	for	use	with	the	Datacom	environment
52 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
External	resources
§ CADRE	on	CA	Communities	
communities.ca.com/community/ca-datacom-cadre
– There	is	no	such	thing	as	a	“stupid	question”
– Ask	questions	and	share	your	experiences	with	developers	across	the	
globe
– Submit	your	“Ideas”	for	product	enhancements
– Specific	enhancement	requests	are	welcome
– Non-specific	“I	wish	somehow..”	requests	are	just	as	welcome
Available	to	CA	Datacom	users
53 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
External	resources	(cont’d)
§ CA	Support
– support.ca.com/irj/portal/anonymous/newhome
– The	friendly	CA	support	staff	have	decades	of	experience	and	are	
always	happy	to	help
Available	to	CA	Datacom	users
54 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Our	results	when	applying	application	tuning
We	have	more	Datacom	tables	than	ever	before.
We	have	more	rows	in	those	tables	than	ever	before.
We	have	more	applications	processing	the	data	than	ever	before.
We	have	faster	response	times	(batch,	Server	and	CICS)	than	ever	before.
We	have	30%	less	CPU	(MSUs)	than	at	the	start	of	the	tuning	exercise.
The	mainframe	is	no	longer	the	highest	TCO	server.
Summary
Comments	from	the	managing	DBA	for	the	two	sites	profiled	in	Part	I
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.55 @CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.55
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI
56 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX92S Strategy	and	Vision	for	CA	Datacom	and	CA	Ideal 11/16/2016	at	12:45	pm
MFX93S What’s	new	in	CA	Datacom	 11/16/2016	at	1:45	pm
MFX94S Reducing	TCO	with	Datacom	Compression	(Presspack) 11/16/2016	at	3:00	pm
MFX95SA Modernizing	the	CA	Datacom	data – SQL	Access	Part	I 11/16/2016	at	3:45	pm
MFX95SB Modernizing	the	CA	Datacom	data – SQL	Access	Part	II 11/16/2016	at	4:30	pm
MFX96S CA	Datacom/AD	Installation/Upgrade	and	Maintenance 11/17/2016	at	12:45	pm
MFX97S
CA	Datacom/AD	Report	Utilization,	and
information	gather	for	Support
11/17/2016	at	1:45	pm
MFX98S
Using	Sysview to	monitor	and	measure	your	CA	Datacom	
environment	– AD	and	DB
11/17/2016	at	3:00	pm
MFX99S Birds	of	a	Feather/Stump	the	Techie!	 11/17/2016	at	3:45	pm
57 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
58 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
59 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation

More Related Content

What's hot

Advanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFAdvanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFCA Technologies
 
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeterDecrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeterCA Technologies
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Technologies
 
Continuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value ChainContinuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value ChainCA Technologies
 
Mobile to Mainframe: Leveraging Application Services for Rapid Application De...
Mobile to Mainframe: Leveraging Application Services for Rapid Application De...Mobile to Mainframe: Leveraging Application Services for Rapid Application De...
Mobile to Mainframe: Leveraging Application Services for Rapid Application De...CA Technologies
 
Modernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENModernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENCA Technologies
 
Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service VirtualizationCA Technologies
 
CA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product OverviewCA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product OverviewCA Technologies
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...CA Technologies
 
See Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ PlusSee Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ PlusCA Technologies
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...CA Technologies
 
Case Study: University of California Shares Tips and Tricks for Leveraging CA...
Case Study: University of California Shares Tips and Tricks for Leveraging CA...Case Study: University of California Shares Tips and Tricks for Leveraging CA...
Case Study: University of California Shares Tips and Tricks for Leveraging CA...CA Technologies
 
Getting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 InvestmentGetting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 InvestmentCA Technologies
 
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...CA Technologies
 
What’s New With DB2 Solutions; Administration, Utilities, Performance & Reco...
What’s New With DB2 Solutions;  Administration, Utilities, Performance & Reco...What’s New With DB2 Solutions;  Administration, Utilities, Performance & Reco...
What’s New With DB2 Solutions; Administration, Utilities, Performance & Reco...CA Technologies
 
CA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Technologies
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresCA Technologies
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...CA Technologies
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service VirtualizationCA Technologies
 

What's hot (20)

Advanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFAdvanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUF
 
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeterDecrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application Development
 
Continuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value ChainContinuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value Chain
 
Mobile to Mainframe: Leveraging Application Services for Rapid Application De...
Mobile to Mainframe: Leveraging Application Services for Rapid Application De...Mobile to Mainframe: Leveraging Application Services for Rapid Application De...
Mobile to Mainframe: Leveraging Application Services for Rapid Application De...
 
Modernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENModernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GEN
 
Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service Virtualization
 
CA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product OverviewCA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product Overview
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
 
See Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ PlusSee Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ Plus
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
Case Study: University of California Shares Tips and Tricks for Leveraging CA...
Case Study: University of California Shares Tips and Tricks for Leveraging CA...Case Study: University of California Shares Tips and Tricks for Leveraging CA...
Case Study: University of California Shares Tips and Tricks for Leveraging CA...
 
Getting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 InvestmentGetting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 Investment
 
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
 
What’s New With DB2 Solutions; Administration, Utilities, Performance & Reco...
What’s New With DB2 Solutions;  Administration, Utilities, Performance & Reco...What’s New With DB2 Solutions;  Administration, Utilities, Performance & Reco...
What’s New With DB2 Solutions; Administration, Utilities, Performance & Reco...
 
CA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app control
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service Virtualization
 

Viewers also liked

Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBUsing Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBCA Technologies
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)CA Technologies
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA DatacomCA Technologies
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part ICA Technologies
 
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part ICA Technologies
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemCA Technologies
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part ICA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA Technologies
 
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference SessionWhat's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference SessionStefana Muller
 
CA Agile Requirements Designer 101 - an introduction to the general premise o...
CA Agile Requirements Designer 101 - an introduction to the general premise o...CA Agile Requirements Designer 101 - an introduction to the general premise o...
CA Agile Requirements Designer 101 - an introduction to the general premise o...CA Technologies
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and TuningCA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldCA Technologies
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationCA Technologies
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database NavigationCA Technologies
 
CA Agile Requirements Designer and Coverage 101 - Hands on Lab
CA Agile Requirements Designer and Coverage 101 - Hands on LabCA Agile Requirements Designer and Coverage 101 - Hands on Lab
CA Agile Requirements Designer and Coverage 101 - Hands on LabCA Technologies
 
TDM: Masking, Subsetting and generating Synthetic Data
TDM: Masking, Subsetting and generating Synthetic Data TDM: Masking, Subsetting and generating Synthetic Data
TDM: Masking, Subsetting and generating Synthetic Data CA Technologies
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesCA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Get Started with JMeter in 60 Minutes
Get Started with JMeter in 60 MinutesGet Started with JMeter in 60 Minutes
Get Started with JMeter in 60 MinutesCA Technologies
 

Viewers also liked (20)

Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBUsing Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
 
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
 
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference SessionWhat's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
 
CA Agile Requirements Designer 101 - an introduction to the general premise o...
CA Agile Requirements Designer 101 - an introduction to the general premise o...CA Agile Requirements Designer 101 - an introduction to the general premise o...
CA Agile Requirements Designer 101 - an introduction to the general premise o...
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and Tuning
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database Navigation
 
CA Agile Requirements Designer and Coverage 101 - Hands on Lab
CA Agile Requirements Designer and Coverage 101 - Hands on LabCA Agile Requirements Designer and Coverage 101 - Hands on Lab
CA Agile Requirements Designer and Coverage 101 - Hands on Lab
 
TDM: Masking, Subsetting and generating Synthetic Data
TDM: Masking, Subsetting and generating Synthetic Data TDM: Masking, Subsetting and generating Synthetic Data
TDM: Masking, Subsetting and generating Synthetic Data
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Get Started with JMeter in 60 Minutes
Get Started with JMeter in 60 MinutesGet Started with JMeter in 60 Minutes
Get Started with JMeter in 60 Minutes
 

Similar to Application Tuning for CA Datacom Environments Part II

Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IIPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IICA Technologies
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Technologies
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps CA Technologies
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolCA Technologies
 
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...CA Technologies
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...CA Technologies
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...CA Technologies
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...CA Technologies
 
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...CA Technologies
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)CA Technologies
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring CA Technologies
 
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...CA Technologies
 
Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx
Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptxApplication-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx
Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptxDerrickDay2
 
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...CA Technologies
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Managing multi-version applications in cics
Managing multi-version applications in cicsManaging multi-version applications in cics
Managing multi-version applications in cicsMatthew Webster
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...CA Technologies
 

Similar to Application Tuning for CA Datacom Environments Part II (20)

Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IIPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and Maintenance
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
 
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
 
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
 
Incognito factors in web applications
Incognito factors in web applicationsIncognito factors in web applications
Incognito factors in web applications
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
 
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
 
Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx
Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptxApplication-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx
Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx
 
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
Managing multi-version applications in cics
Managing multi-version applications in cicsManaging multi-version applications in cics
Managing multi-version applications in cics
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Recently uploaded (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Application Tuning for CA Datacom Environments Part II