SlideShare a Scribd company logo
1 of 85
Download to read offline
CA	UIM	for	z	Systems	Technical		
Deep	Dive:	Get	the	Right	People	
Solving	Problems	Faster!
Lowell	H.	Higley
Mainframe
CA	Technologies
Sr Principal	Product	Manager
MFX22E
@LinuxLowell
#CAWorld
2 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
©	2015	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2015	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	
of	warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Abstract
Discover	how	CA	Unified	Infrastructure	
Management	(CA	UIM)	for	z	Systems	helps	you	
gain	a	holistic	view	of	your	business	services	
that	span	mobile-to-mainframe.	Learn	how	to	
use	the	new	CA	Unified	Infrastructure	
Management	for	z	Systems	probes	to	monitor	
your	mainframe	as	part	of	the	overall	IT	
infrastructure	from	a	single	pane	of	glass.
Lowell	Higley
CA	Technologies
Senior	Principal	
Product	Manager
4 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Agenda
CA	UIM	FOR	Z	SYSTEMS	ARCHITECTURAL	OVERVIEW
AVAILABLE	Z	SYSTEM	METRICS
BUILDING	TRUE	CROSS	ENTERPRISE	DASHBOARDS
USING	CA UIM FOR	Z	TO	LOWER	MTTR
1
2
3
4
5 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Skills	Assumptions
§ Familiar	with	CA	UIM	(but	not	experts)
– Can	navigate	around	and	use	CA	UIM	for	z
– Understands	probes,	metrics,	thresholds,	and	alarms
– Understands	the	concept	of	custom	dashboards
§ Understands	basic	z	Systems	functionality	and	terminology
CA	Unified	Infrastructure	Management	for	z	Systems
This	session	assumes	the	following	about	audience	knowledge
6 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Purpose
§ Not	an	instructional	“how	to”
§ Provide	building	blocks	to	create	single	pane	of	glass	
CA	Unified	Infrastructure	Management	for	z	Systems
This	session	assumes	the	following	about	audience	knowledge
CA	Unified	Infrastructure	Management
for	z	Systems	Overview
Agenda
CA UIM ARCHITECTURE
CA UIM FOR Z SYSTEMS PROBE PACKS
SYSTEM AND SKILLS REQUIREMENTS
Z SYSTEM DEVELOPMENT PHILOSOPHY
Z SYSTEM PROBE ARCHITECTURE
PREREQUISITES
1
2
3
4
5
6
CA	Unified	Infrastructure	Management	Architecture
Collect
Display
Correlate/	
Aggregate
§ Message	Bus	
§ Open	APIs
§ 3rd	party	integration
§ Agent	Optional
§ 180+	Probes
§ SDKs	available
§ Multi-Tenant
§ 3rd
Party	Integration
§ Easily	Skin-able
Hub
Data	
Repository
Agent	Based
(Probes	located	on	each	server)
P P P
CPU,	Disk,	Memory,	Logs,	Services,	Processes,	etc.
Agentless
(Probes	remotely	talk	to	devices)
P P P
Network,	Databases,	Cloud,	etc.
Server Server
UNIFIED	MONITORING	OF	PUBLIC	AND	PRIVATE	IT	ENVIRONMENTS
Application
Commercial	 &	Custom
Database
IT	&	Business
Cloud
Public	 &	Private
Network
LAN	&	WAN
Power
Efficiency
z SystemsServer
Physical	&	Virtual
11 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Unified	Infrastructure	Management	Architecture
Collect
Display
Correlate/	
Aggregate
§ Message	Bus	
§ Open	APIs
§ 3rd	party	integration
§ Agent	Optional
§ 180+	Probes
§ SDKs	available
§ Multi-Tenant
§ 3rd
Party	Integration
§ Easily	Skin-able
Hub
Data	
Repository
Agent	Based
(Probes	located	on	each	server)
P P P
CPU,	Disk,	Memory,	Logs,	Services,	Processes,	etc.
Agentless
(Probes	remotely	talk	to	devices)
P P P
Network,	Databases,	Cloud,	etc.
Server Server
UNIFIED	MONITORING	OF	PUBLIC	AND	PRIVATE	IT	ENVIRONMENTS
Application
Commercial	 &	Custom
Database
IT	&	Business
Cloud
Public	 &	Private
Network
LAN	&	WAN
Power
Efficiency
z Systems
Server
Physical	&	Virtual
12 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	UIM	for	z	Systems	– Probe	Pack	Summary
CA	UIM	Storage	for	z	Systems	
probe	pack	
CA	UIM	Operations	for	z	Systems	
probe	pack
CA	UIM	for	z	Systems
Built	on	the	CA	UIM	platform,	the	solution	provides	a	business	 service	view	across	
data	center	infrastructure,	including	the	industry’s	 most	complete	z	Systems	coverage:	
z/OS,	z/VM	and	Linux	on	z
Feeds	metrics	data	from	the	z/OS	
operating	system	into	CA	UIM	such	as:		
• Sysplex	images
• LPARs
• z/OS	instances
• Started	tasks
• System	tasks
• Channel	I/O
CA	UIM	for	z/VM	systems	
probe	pack
Feeds	metrics	data	from	the	
mainframe	storage	environment	into	
CA	UIM	such	as:
• DASD
• HFS	and	NFS	mount	points	
• Fibre	Channel	ports
Feeds	metrics	data	from	the	mainframe	
z/VM	hypervisor	and	data	related	to	
guests	running	on	z/VM	such	as:
• System/Guest	CPU
• Page	volume,	spool	volume,	wait	
states.
• Total	CPU
• Resident	Memory
• Working	Set
• Page	Read	and	Page	Writes
• Network	Metrics
13 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Development	Philosophy
CA	Unified	Infrastructure	Manager	(UIM)	for	z	Systems
Basic,	Light	Weight	Data	Sources
Provide	top	15	to	20	metrics	of	value	with	only	OS	dependencies
Advanced,	Heavier	Data	Sources
Provide	additional	metrics	with	some	heavier	dependencies
Application	Data	Sources
Provide	substantial	metrics/data	and	functionality	with	applications
Operations	
Analyst
Technical	
Specialist
Roadmap			Priority
14 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA
Common	
Services
CA	UIM	for	z	Product/Technology	Architecture
UIM	Server
UMP
System	z	Probe
z	Systems	
Data	Sources	
UIM	Infrastructure
System	z	Probe
CIM	
Server
(RMF)
CA	
Products
Connector
Layer
z/VM
(Monitor
Records)
REST	API	+	Resource	Model
CIM CCS Prod z/VM
Data	
Service
Distributed	
(CA	UIM	Hub)
z Systems	
Data	
Collector
Currently	GA
15 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
z	Systems	Data	Sources
CIM	
Server	1
IBM	Software	
Running	on	
z/OS
Data	
Collector	for	
z/VM	1
CIM	
Server	2
Data	
Collector	for	
z/VM	2
Depending	on	the	resource	requested,	the	request	from	the	
Data	Service	Probe	goes	either	to	CIM	Servers	(IBM	
Software)	or	Data	Collectors	for	z/VM	(CA	Software).	The	
CIM	Server	runs	on	z/OS,	and	the	Data	Collectors	run	on	
z/Linux	under	z/VM.
CA	Software	
Running	on	
Linux	under	
z/VM
RMF	DDS	 RMF	DDS
IBM	Software	
Running	on	
z/OS
The	requests	to	CIM	pull	their	metrics	by	going	to	the	RMF	DDS	
Server,	GPMSERVE.	The	RMF	DDS	server	is	an	http-enabled	
server	that	serves	requests	for	RMF	data.
The	requests	to	the	Data	Collectors	pull	their	
metrics	by	using	IBMs	MonReader.	
Network	Request	From	Data	
Service	Probe	on	Windows/Linux
16 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Data	Collector	for	z/VM	in	Some	More	Detail
Connector
Layer
REST	API	+	Resource	Model
MonReader Connector
Data	Collector	for	z/VM
Data	Collector	for	z/VM	is	a	specialized	instance	of	the	Data	
Service	Probe	codebase,	so	you	will	see	similarities	going	
forward	through	the	different	presentations.
Network	Request	From	Data	
Service	Probe
17 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	UIM	High	Level	Architecture
The	UIM	infrastructure	showed	here	is	
installed	on	a	Windows	or	Linux	
machine.	The	UIM/UMP	install	is	
covered	as	part	of	another	training.	
UMP	is	the	user	interface	for	the	UIM	
server.
• The	z	Systems	Probe	set	is	installed	through	CA	UIM.	
• CA	UIM	will	configure	a	machine	as	a	robot.	
• Then,	the	robot	can	have	probes	installed	underneath	it.	
• Valid	machines	are	Windows	and	Linux.
UIM	Server
UMP
UIM	Infrastructure
CA	UIM	Probes	running	
on	Windows/Linux
18 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	UIM	for	z	System	Probes
CA	UIM	
Storage	for	
z	Systems	Probe
Data	Service	
Probe	
“Connector”
Layer
REST	API	+	Resource	Model
CIM	Connector z/VM	Connector
Data	Service	Probe
CA	UIM	
Operations	for	
z	Systems	Probe
CA	UIM	for	
z/VM	systems	
Probe
Request	to	z	Systems	Software
• These	probes	run	on	
Windows	or	Linux,	and	
they	are	installed	
through	CA	UIM.	
• The	z	Systems	Probes	all	
request	data	from	the	
Data	Service	probe	
below.	
The	Data	Service	Probe	takes	
requests	from	z	Systems	
Probes,	and	returns	data	by	
connecting	to	software	running	
on	z	Systems,	described	on	the	
next	slide.	The	connections	are	
brokered	by	“connectors”	
within	the	Data	Service	Probe.
19 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	UIM	for	z	Systems	High	Level	Security	Diagram
CIM	Data	
Source	1
Data	Collector	
for	ZVM	1
CIM	Data	
Source(s)	2+
Data	Collector	
for	ZVM		2+
SSL
SSL
LDAP	Server
Data	Source	Credentials
Mainframe	
Security	(SAF)
Mainframe	
Security	(SAF)
Data	Service	
Probe
zStorage, zOps,	
z/VM	Probe(s)
SSL
SSL
All	SSL	Connections	can	be	
optionally	disabled	for	setup	
and	testing	purposes.Prereq:	Keyring	
Setup	for	TLS
Prereq:	RMF	
and	GPMSERVE
20 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Prerequisites	– Operations	and	Storage
§ CA	UIM	8.2+
§ IBM	z/OS	1.13	or	2.1
§ CIM	Server	for	z/OS
§ Resource	Management	Facility	for	z/OS
– Configured	as	a	data	provider	to	CIM
CA	Unified	Infrastructure	Management	for	z	Systems
21 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Prerequisites	– z/VM
§ CA	UIM	8.2+
§ IBM	z/VM	6.2	or	6.3
§ Available	Linux	guest	
– SUSE	SLES	11	SP3	(min	1gb	RAM)
– Red	Hat		RHEL	6.5	or	6.6	(min	512mb	RAM)
– 70	mb disk	space
– IBM	JRE	7	or	8
CA	Unified	Infrastructure	Management	for	z	Systems
22 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Skills	Required
§ z/OS	SysProg
– Install/configure	RMF*
– Install/configure	CIM**
*	Already	installed	by	majority	of	customers
**	Not	installed	that	often
CA	Unified	Infrastructure	Management	for	z	Systems
§ z/VM	SysProg
– Insert	statements	in	user	dir
– Define	memory
– Activate	system	services
– Provision	Linux	Guest
§ Linux	Admin
– Configure	install	OS	&	
prerequisites§ UIM	Probe	Installation
Q	&	A
Unified	Monitoring	Best	Practices
Agenda
CONSIDERATIONS
METRICS, THRESHOLDS AND ALARMS
1
2
26 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Considerations
§ Normalization
– Disk	is	disk..	Or	is	it	DASD?
§ Mainframe-isms
– What	level	of	CPU	utilization	
is	good	(vs.	distributed)?
CA	Unified	Infrastructure	Management	for	z	Systems
Things	to	consider	when	extending	CA	UIM	to	z	Systems
27 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Metrics
§ CPU	(CP,	zIIP,	zAAP)
CA	Unified	Infrastructure	Management	for	z	Systems
28 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Thresholds
CA	Unified	Infrastructure	Management	for	z	Systems
SEVERITY OPERATOR VALUE
Critical > 85%
Major > 75 to	85%
Minor >= 65	to	75%
29 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Alarms
CA	Unified	Infrastructure	Management	for	z	Systems
SEVERITY	BASED	ON	THRESHOLD
30 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	UIM	
Operations	
for	z	Systems
Probe	Pack
31 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Hierarchy
CA	Unified	Infrastructure	Management	for	z	Systems
CEC
LPAR
z/OS
Started	Task
System Task
Channels
Sysplex Coupling Facilities
32 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
Name QOS Description
CEC	CP	Usage	% QOS_CEC_CP_USAGE_PCT Percentage	of	CP	used	by	CEC
CEC	zAAP Usage	% QOS_CEC_ZAAP_USAGE_PCT Percentage	of	zAAP used	by	CEC
CEC	zIIPUsage	% QOS_CEC_ZIIP_USAGE_PCT Percentage	of	zIIPused	by	CEC
CEC
33 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
Name QOS Description
LPAR	CPU	Usage	% QOS_LPAR_TOTAL_CPU_USAGE_PCT Percentage	of	defined	CPU	used	by	this	
LPAR
LPAR	zAAP Usage	% QOS_LPAR_ZAAP_USAGE_PCT Percentage	of	total	zAAP usage	in	an	
LPAR
LPAR	zAAP CP	Usage	% QOS_LPAR_ZAAP_ON_CP_USAGE_PCT Percentage	of	zAAP CP	usage	in	an	
LPAR
LPAR	CP	Usage	% QOS_LPAR_CP_USAGE_PCT Percentage	of	total	CP	usage	in	an	LPAR
LPAR	zIIPCP	Usage	% QOS_LPAR_ZIIP_ON_CP_USAGE_PCT Percentage	of	zIIPCP	usage	in	an	LPAR
LPAR	zIIPUsage	% QOS_LPAR_ZIIP_USAGE_PCT Percentage	of	total	zIIPusage	in	an	
LPAR
LPAR
34 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
z/OS
Name QOS Description
z/OS	State QOS_ZOS_STATE Indicates	the	overall	state	of	the	z/OS	system
z/OS	User	Count QOS_ZOS_USER_COUNT Total	number	of	users	logged	on	to	the	z/OS	system
z/OS	Processes	Count QOS_ZOS_TOTAL_PROCESSES_COUNT Total	number	of	UNIX®	processes	and	active	address	
spaces	on	the	z/OS	system
z/OS	Active	Address	
Space	Count
QOS_ZOS_ADDRESS_SPACE_COUNT Number	of	active	address	spaces	on	the	z/OS	system
z/OS	Virtual	Memory	
Pages/second
QOS_ZOS_PAGE_RATE_PAGES_PER_SEC Number	of	virtual	memory	page	ins	per	second
z/OS	zAAPUsage	% QOS_ZOS_ZAAP_USAGE_PCT Percentage	of	zAAP used	by	the	z/OS	system
z/OS	zIIP Usage	% QOS_ZOS_ZIIP_USAGE_PCT Percentage	of	zIIP used	by	the	z/OS	system
z/OS	CP	Usage	% QOS_ZOS_CP_USAGE_PCT Percentage	of	CP	used	by	the	z/OS	system
z/OS	zAAPCP	Usage	% QOS_ZOS_ZAAP_ON_CP_USAGE_PCT Percentage	of	zAAP CP	usage	in	a	z/OS	system
z/OS	zIIP CP	Usage	% QOS_ZOS_ZIIP_ON_CP_USAGE_PCT Percentage	of	zIIP CP	usage	in	a	z/OS	system
35 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
STC
Name QOS Description
Started	Task	CPU	Usage	
Milliseconds
QOS_ZOS_STARTED_TASK_CPU_USAGE_
MS
Total	amount	of	CPU	used	by	the	Started	
Task	in	milliseconds
Started	Task	Working	
Set	Size	MB
QOS_ZOS_STARTED_TASK_WORKING_SE
T_SIZE_MB
Physical	Memory	allocated	by	the	Started	
Task	in	megabytes
36 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
System	
Tasks
Name QOS Description
System	Task	CPU	Usage	
Milliseconds
QOS_ZOS_SYSTEM_TASK_CPU_USAGE_
MS
Total	amount	of	CPU	used	by	the	System	
Task	in	milliseconds
System	Task	Working	Set	
Size	MB
QOS_ZOS_SYSTEM_TASK_WORKING_SET
_SIZE_MB
Physical	Memory	allocated	by	the	System	
Task	in	megabytes
37 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
Channels
Name QOS Description
Channel	Received	
Bytes/second
QOS_ZOS_CHANNEL_RECEIVED_BYTES_PE
R_SEC
Total	number	of	bytes	received	in	bytes	per	
second,	including	framing	characters
Channel	Transmitted	
Bytes/second
QOS_ZOS_CHANNEL_TRANSMITTED_BYTE
S_PER_SEC
Total	number	of	bytes	transmitted	in	bytes	
per	second,	including	framing	characters
Channel	
Errors/second
QOS_ZOS_CHANNEL_ERRORS_PER_SEC Number	of	network	errors	per	second
Channel	Network	Port	
Usage	%
QOS_ZOS_CHANNEL_NETWORK_PORT_US
AGE_PCT
Percentage	of	channel	capacity	used	by	the	
z/OS	system
38 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
SysPlex
Name QOS Description
Sysplex State QOS_SYSPLEX_STATE Indicates	the	current	state	of	the	Sysplex
39 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
Coupling	
Facilities
Name QOS Description
Coupling	Facility	State QOS_SYSPLEX_COUPLING_FACILITY_STA
TE
Indicates	the	current	state	of	the	
Coupling	Facility
Coupling	Facility	
Processor	Usage	%
QOS_SYSPLEX_COUPLING_FACILITY_PR
OCESSOR_USAGE_PCT
Percentage	of	processor	used	by	the	
Coupling	Facility
40 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Operations	Probe	Best	Practices
The	Coupling	Facilities	should	always	be	in	a	running	state.	Set	
alarm	for	the	Coupling	Facilities	state	based	on	the	threshold	
values	suggested	below.
CA	Unified	Infrastructure	Management	for	z	Systems
QOS_SYSPLEX_COUPLING_FACILITY_STATE
Severity Operator Value
Critical == 6 or	9
41 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	UIM	
Storage
for	z	Systems
Probe	Pack
42 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Storage	Probe	Hierarchy
CA	Unified	Infrastructure	Management	for	z	Systems
CEC
LPAR z/OS
DASDs
HFS
NFS
FC	Ports
43 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Active	Time	% QOS_ZOS_DASD_ACTIVE_TIME_PCT Percentage	of	time	the	disk	unit	was	
actively	processing	requests.
Average	Usage	% QOS_ZOS_DASD_USAGE_PCT Percentage	of	average	device	in	use.
DASD	Available	
Space	MB
QOS_ZOS_DASD_AVAILABLE_SPACE_
MB
Available	space	on	DASD	device	in	MB.
IO	Intensity	
Milliseconds
QOS_ZOS_DASD_IO_INTENSITY_MS Wait-time	for	device	in	milliseconds,	
where	the	value	can	be	greater	than	1000.
IO	Queue	Depth	
Count
QOS_ZOS_DASD_IO_QUEUE_DEPTH_
COUNT
Average	number	of	I/O	requests	currently	
in	queue.
Operational	State QOS_ZOS_DASD_STATE Returns	2	- OK,	9	- Stopping,	10	Stopped
Response	Time	
Milliseconds
QOS_ZOS_DASD_RESPONSE_TIME_
MS
Average	time	required	to	complete	an	I/O	
request	in	milliseconds.
DASD
Storage	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
44 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
FCPort	 Received	Bytes/second QOS_ZOS_FCPORT_RECEIVED_BYTES_PER_SEC Total	number	of	bytes	received	per	second.
FCPort	 Received	
Packets/second
QOS_ZOS_FCPORT_RECEIVED_PACKETS_PER_SEC Total	number	of	packets	received	per	second.
FCPort	 Transmitted	
Bytes/second
QOS_ZOS_FCPORT_TRANSMITTED_BYTES_PER_SEC Total	number	of	bytes	transmitted	 per	second.
FCPort	 Transmitted	
Packets/second
QOS_ZOS_FCPORT_TRANSMITTED_PACKETS_PER_SEC Total	number	of	packets	transmitted	 per	second.
Storage	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
45 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
HFS	Metrics
Name QOS Description
Hierarchical	 Filesystem	
Available	Space	MB
QOS_ZOS_HFS_AVAILABLE_SPACE_MB Space	available	on	the	Hierarchical	 Filesystem	in	MB.
Hierarchical	 Filesystem	Usage	
%
QOS_ZOS_HFS_USAGE_PCT Percentage	of	amount	of	Hierarchical	 Filesystem	in	use.
Read-write	 status	of	the	
Hierarchical	 Filesystem
QOS_ZOS_HFS_READ_WRITE_STATE Read-write	 status	of	the	Hierarchical Filesystem
46 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
NFS	Metrics
Name QOS Description
Network	 Filesystem	Available	
Space	MB
QOS_ZOS_NFS_AVAILABLE_SPACE_MB Space	available	on	the	Network	Filesystem	in	MB.
Network	 Filesystem	Usage	% QOS_ZOS_NFS_USAGE_PCT Percentage	of	amount	of	Network	 Filesystem	in	use.
Read-write	 status	of	the	
Network	 Filesystem
QOS_ZOS_NFS_READ_WRITE_STATE Read-write	 status	of	the	Network
47 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	UIM	for	
z/VM
systems
Probe	Pack
48 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
z/VM	Probe	Hierarchy
CA	Unified	Infrastructure	Management	for	z	Systems
49 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Monitored
Member Count
QOS_CLUSTER_MONITORED_ME
MBER_COUNT
Number	of	members	in	the	SSI	
cluster	currently	being	monitored.
Cluster
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
50 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Running	State	of	
Guest
QOS_GUEST_RUN_STATE Running	state	of	guest.
0	=	stopped
1	=	running
Note: At	this	time	we	do	not	monitor	
inactive	guests.
Guest	Count
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
51 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Active	Guest	Count QOS_HYPERVISOR_GUEST_RUNNI
NG_COUNT
Number	of	virtual	guest	machines	
running	on	the	hypervisor.
Guest	Count
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
52 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Aggregate	System	CPU	
Usage
QOS_HYPERVISOR_CPU_AGGREGATE_SYSTEM
_CPU_USAGE_PCT
Percentage	of	CPU	used	by	system	(aggregate	of	all	
CPUs).
Aggregate	Guest	CPU	
Usage
QOS_HYPERVISOR_CPU_AGGREGATE_GUEST_
CPU_USAGE_PCT
Percentage	of	CPU	used	by	guests	(aggregate	of	all	
CPUs).
Aggregate	Total	CPU	Usage
QOS_HYPERVISOR_CPU_AGGREGATE_TOTAL_
CPU_USAGE_PCT
Percentage	of	total	CPU	used	by	system	and	guests	
(aggregate	of	all	CPUs).
Guest	CPU	Usage/percent
QOS_HYPERVISOR_CPU_GUEST_CPU_USAGE_
PCT Percentage	of	this	CPU	used	by	guests.
System	CPU	
Usage/percent
QOS_HYPERVISOR_CPU_SYSTEM_CPU_USAGE
_PCT Percentage	of	this	CPU	used	by	system.
Total	CPU	Usage/percent
QOS_HYPERVISOR_CPU_TOTAL_CPU_USAGE_
PCT Percentage	of	this	CPU	used	by	system	and	guests.
Aggregate	Virtual	CPU	
Usage
QOS_GUEST_CPU_AGGREGATE_VIRTUAL_USA
GE_PCT
Percentage	of	CPU	used	by	guest	(aggregate	of	all	
virtual	CPUs).
CPU
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
53 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Test	Idle	Wait	State
QOS_HYPERVISOR_WAIT_STATE_TEST_IDLE_PC
T Percentage	of	guests	in	test	idle	wait	state.
Test	Idle	SVM	Wait	
State
QOS_HYPERVISOR_WAIT_STATE_TEST_IDLE_SV
M_PCT Percentage	of	guests in	test	idle	SVM	state.
Page	Wait	State QOS_HYPERVISOR_WAIT_STATE_PAGE_PCT Percentage	of	guests in	page	wait	state.
CPU	Wait	State QOS_HYPERVISOR_WAIT_STATE_CPU_PCT Percentage	of	guests in	CPU	wait	state.
I/O	Wait	State QOS_HYPERVISOR_WAIT_STATE_IO_PCT Percentage	of	guests in	I/O	wait	state.
Simulation	Wait	State
QOS_HYPERVISOR_WAIT_STATE_SIMULATION_
PCT
Percentage	of	guests in	simulation	wait	
state.
Console	 Wait	State QOS_HYPERVISOR_WAIT_STATE_CONSOLE_PCTPercentage	of	guests in	console	wait	state.
Other	Wait	State QOS_HYPERVISOR_WAIT_STATE_OTHER_PCT Percentage	of	guests in	other	wait	state.
Wait	State
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
54 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Aggregate	Page	
Volume	Usage
QOS_HYPERVISOR_PAGE_VOL_AGGREG
ATE_USAGE_PCT
Used	space	on	page	volume	as	percentage	of	
total	(aggregate	of	all	page	volumes).
Aggregate	Page	
Volume	Reads/sec
QOS_HYPERVISOR_PAGE_VOL_AGGREG
ATE_READS_PER_SEC
Number	of	page	volume	reads	per	second	
(aggregate	of	all	page	volumes).
Aggregate	Page	
Volume	Writes/sec
QOS_HYPERVISOR_PAGE_VOL_AGGREG
ATE_WRITES_PER_SEC
Number	of	page	volume	writes	per	second	
(aggregate	of	all	page	volumes).
Page	Volume	Usage
QOS_HYPERVISOR_PAGE_VOL_USAGE_
PCT
Used	space	on	page	volume	as	percentage	of	
total.
Page	Volume	
Reads/sec
QOS_HYPERVISOR_PAGE_VOL_READS_
PER_SEC Number	of	page	volume	reads	per	second.
Page	Volume	
Writes/sec
QOS_HYPERVISOR_PAGE_VOL_WRITES
_PER_SEC Number	of	page	volume	writes	per	second
Page	Volume
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
55 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Aggregate	Spool	
Volume	Usage
QOS_HYPERVISOR_SPOOL_VOL_AGGRE
GATE_USAGE_PCT
Used	space	on	spool	volume	as	percentage	
of	total	(aggregate	of	all	spool	volumes).
Aggregate	Spool	
Volume	Reads/sec
QOS_HYPERVISOR_SPOOL_VOL_AGGRE
GATE_READS_PER_SEC
Number	of	spool	volume	reads	per	second	
(aggregate	of	all	spool	volumes).
Aggregate	Spool	
Volume	Writes/sec
QOS_HYPERVISOR_SPOOL_VOL_AGGRE
GATE_WRITES_PER_SEC
Number	of	spool	volume	writes	per	second	
(aggregate	of	all	spool	volumes).
Spool	Volume	Usage
QOS_HYPERVISOR_SPOOL_VOL_USAGE
_PCT
Used	space	on	spool	volume	as	percentage	
of	total.
Spool	Volume	
Reads/sec
QOS_HYPERVISOR_SPOOL_VOL_READS
_PER_SEC Number	of	spool	volume	reads	per	second.
Spool	Volume	
Writes/sec
QOS_HYPERVISOR_SPOOL_VOL_WRITE
S_PER_SEC Number	of	spool	volume	writes	per	second.
Spool	Volume
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
56 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Active	Trace	ID	Count
QOS_HYPERVISOR_VSWITCH_ACTIVE_TRACEID_C
OUNT Count	of	active	trace	IDs	on	this	virtual	switch.
Linux	Guest	in	Sniffer	Mode	
Count
QOS_HYPERVISOR_VSWITCH_LINUX_SNIFFER_MO
DE_GUESTS_COUNT
Count	of	linux	guests	in	sniffer	mode	on	this	virtual	
switch.
Received	Bytes/sec
QOS_HYPERVISOR_VSWITCH_RECEIVE_RATE_BYT
ES_PER_SEC
Rate	in	bytes	per	second	of	data	received	on	this	virtual	
switch.
Received	Discarded	
Packets/sec
QOS_HYPERVISOR_VSWITCH_RECEIVE_DISCARDE
D_RATE_PACKETS_PER_SEC
Rate	in	packets	per	second	of	discarded	inbound	packets	
on	this	virtual	switch.
Received	Error	Packets/sec
QOS_HYPERVISOR_VSWITCH_RECEIVE_ERROR_RA
TE_PACKETS_PER_SEC
Rate	in	packets	per	second	of	inbound	errors	on	this	
virtual	switch.
Received	Packets/sec
QOS_HYPERVISOR_VSWITCH_RECEIVE_RATE_PAC
KETS_PER_SEC
Rate	in	packets	per	second	of	data	received	on	this	
virtual	switch.
Transmitted	Bytes/sec
QOS_HYPERVISOR_VSWITCH_TRANSMIT_RATE_B
YTES_PER_SEC
Rate	in	bytes	per	second	of	data	transmitted	on	this	
virtual	switch.
Transmitted	Discarded	
Packets/sec
QOS_HYPERVISOR_VSWITCH_TRANSMIT_DISCARD
ED_RATE_PACKETS_PER_SEC
Rate	in	packets	per	second	of	discarded	outbound	
packets	on	this	virtual	switch.
Transmitted	Error	
Packets/sec
QOS_HYPERVISOR_VSWITCH_TRANSMIT_ERROR_
RATE_PACKETS_PER_SEC
Rate	in	packets	per	second	of	outbound	errors	on	this	
virtual	switch.
Transmitted	Packets/sec
QOS_HYPERVISOR_VSWITCH_TRANSMIT_RATE_P
ACKETS_PER_SEC
Rate	in	packets	per	second	of	data	transmitted	on	this	
virtual	switch.
VSwitch
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
57 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Name QOS Description
Memory	Page	Reads/Sec
QOS_GUEST_MEMORY_PAGE_READS_PER_SE
C
The	rate	in	pages	per	second	of	pages	read	from	a	
page	disk	for	this	guest.
Memory	Page	Writes/Sec
QOS_GUEST_MEMORY_PAGE_WRITES_PER_S
EC
The	rate	in	pages	per	second	of	pages	written	to	a	
page	disk	for	this	guest.
Resident	Memory QOS_GUEST_MEMORY_RESIDENT_MB
Guest's	resident	memory	in	megabytes.	This	is	the	
memory	that	is	not	paged	out	to	disk.
Working	Set	Memory QOS_GUEST_MEMORY_WORKING_SET_MB
Guest's	working	set	memory	in	megabytes.	This	is	
the	memory	needed	for	the	guest	to	be	dispatched	
on	a	real	CPU.
Memory
z/VM	Probe	Available	Metrics
CA	Unified	Infrastructure	Management	for	z	Systems
Q	&	A
Building	True	Cross	Enterprise	Dashboards
60 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Dashboard	Users
§ Executive	Management
§ Operations	Management
§ Generalists
– Help	Desk	Analysts
– IT	Operations	Analysts
§ Mainframe	Team
– Management
– Specialists	/	Experts
61 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Single	Pane	of	Glass	Business	Service	Visibility
FRONT	END
CA	Unified	Infrastructure	Manager	(UIM)	for	z	Systems
Backend
NETWORKUSER
End
User
Router Firewall Switch
Load
Balancer
Web
Services Portal
A	Business	Service
Applications
CICS
IMS
IDMS
Databases
Mainframe	
Databases	
z/VM	– Linux
Storage
App	Server
3rd
party	Apps
Databases
Web	Services
SaaS
MQ
62 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
63 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Purpose	of	Dashboards
Determine:
§ Who	will	be	consuming	the	dashboard	data?
§ What	is	the	business	purpose	of	the	dashboard?
CA	Unified	Infrastructure	Management	for	z	Systems
64 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Dashboard	Approaches
§ Out	of	the	Box
§ Executive	Overview
§ Geographic
§ Generalist
§ By	Application
§ By	Subsystem
§ Drill	Down
65 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Dashboard	Users
§ Executive	Management
§ Operations	Management
§ Generalists
– Help	Desk	Analysts
– IT	Operations	Analysts
§ Mainframe	Team
– Management
– Specialists	/	Experts
66 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Building	the	Right	Dashboards
With	user	and	purpose	in	mind:
§ Define	components	of	the	dashboard
§ Determine	metrics	required	to	provide	intended	purpose
§ Define/determine	thresholds	for	each	metric
§ Create	alarm	groups
§ Create	dashboards
67 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Groups
68 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Metrics	to	Include
§ Which	metrics	will	tell	me	something	is	wrong	with	the	target	
group,	subsystem,	etc.?
– Specific	application…	z/OS	address	space?
– Storage	availability…	DASD	response	time?
– General	system	health…	CPU	metrics?	State?
69 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
USM	– Viewing	Metrics
70 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
USM	– Viewing	Alarms
71 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Performance	Reports
72 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
List	Reports
73 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Dashboards
74 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Sample	Dashboard
Q	&	A
Using	CA	UIM	for	z	Systems	to	Lower	MTTR
77 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
MTTR…	What	is	it?
Mean	Time	to	Resolution
§ Measure	of	how	much	
time	is	required	to	
resolve	an	issue
78 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
MTTR…	Why	is	important?
§ System/application	down
§ Lost	customer	transactions
§ Lost	Revenue
79 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Single	Pane	of	Glass	Monitoring
Different	tools	give	
different	views.
Same	tool	provides	the	
same	view.
Visibility	across	a	
complete	business	
service	or	application.
80 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Alerting
81 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Predictive	Analytics
§ Health	index	
– CA	UIM	features	a	health	index	capability	that	enables	the	tracking	of	
infrastructure	performance	using	a	simplified	scale.	With	this	
capability,	it	is	easy	to	quickly	identify	underperforming	assets	and	
track	health	trends	over	time.
§ Business	metric	monitoring
– CA	UIM	can	aggregate	monitoring	data	from	disparate	sources	and	
correlate	business-centric	data	to	provide	current,	holistic	views	of	
critical	business	services.
82 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Challenge
§ Lack	of	experienced	mainframe		
specialists required	simplification	
of	mainframe	operations
§ Required	monitoring	of	business	
service	that	span	across	
distributed	and	mainframe	
environments	to	improve	service	
levels
Solution
CA	Unified	Infrastructure	
Management	for	z	Systems
§ Monitor	entire	IT	infrastructure,	
inclusive	of	mainframe
§ Aggregate	metrics	data	on	key	
elements	of	z	Systems	
§ Leverage	pre-packaged,	
customizable	dashboards
§ Automated	alerts,	trending	reports,	
predictive	analytics	and	real-time	
intelligence		
“CA	UIM	for	z	Systems	allows	us	to	easily	
and	quickly	identify	and	diagnose	
infrastructure	performance	problems	across	
the	mainframe	and	distributed	
environments	with	a	single	view.	This	helps	
save	the	organization	money	as	we	are	able	
to	free	up	our	mainframe	specialists	to	focus	
on	more	business	 critical	efforts	and	
ultimately	support	business	 growth.”
Scott	Brod,	Assistant	VP	IT	Infrastructure,	BHI	USA
BHI	USA	is	a	full-service	commercial	bank	
serving	the	financial	needs	of	businesses,	
their	owners,	and	private	banking	customers	
looking	for	expert	financial	solutions.	
Bank	Hapoalim	Uses	CA	UIM	for	z	Systems
To	Reduce	Costs	and	Grow	the	Business
83 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME/LOCATION
MFT02S	
UCOP	Transforms	Education	Services	with	Single	Pane	of	
Glass	Visibility	of	Their	Entire	IT	Infrastructure
11/19/2015	at	1:00	PM	in	
Mainframe	Theater
MFT18S
Stop	the	Blame	Game	with	Increased	Visibility	of	your	
Mobile-to-Mainframe	IT	Infrastructure	(with	Bank	
Hapoalim)
11/19/2015	at	2:00	PM	in	
Mainframe	Theater
MFX24S	
CA	Unified	Infrastructure	Management	for	z	Systems:	
Get	a	Holistic	View	of	Your	Mobile-to-Mainframe	
Infrastructure	
11/19/2015	at	3:45	PM	in	
Breakers	I
84 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Follow	On	Conversations	At…
Demo	Station:	MNFSE011	
Unified	Infrastructure	
Management	for	z	Systems
DEMO	STATION TECH	TALKS
Tech	Talk	MFT16T:	See	It	Live:	Single	
Pane	of	Glass	Enterprise	Monitoring	with	
CA	Unified	Infrastructure	Management	for	z	
Systems™	- 11/19	at	11:30 am
Tech	Talk	MFT17T:	Identify,	Triage	and	
Fix	Performance	Problems	Faster:	See	How	
the	University	of	California	Office	of	the	
President	Does	It		- 11/19	at	2:00 pm
Q	&	A

More Related Content

What's hot

Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkCA Technologies
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...CA Technologies
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...CA Technologies
 
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...CA Technologies
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....CA Technologies
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionCA Technologies
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...CA Technologies
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent BystanderCA Technologies
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsCA Technologies
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...CA Technologies
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementCA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...CA Technologies
 

What's hot (20)

Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication Solution
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent Bystander
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
 

Viewers also liked

Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...CA Technologies
 
Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)
Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)
Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)Rego Consulting
 
CA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHACA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHAATUL JHA
 
Ca uim overview
Ca uim overviewCa uim overview
Ca uim overviewBevis Chen
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)옥시즌
 
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure ManagementHands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure ManagementCA Technologies
 

Viewers also liked (7)

Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
 
Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)
Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)
Rego University: Hidden Automation & Gel Scripting, CA PPM (CA Clarity PPM)
 
CA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHACA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHA
 
Ca uim overview
Ca uim overviewCa uim overview
Ca uim overview
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
 
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure ManagementHands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
 

Similar to CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Problems Faster!

The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
See Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ PlusSee Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ PlusCA Technologies
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made EasierCA Technologies
 
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI CA Technologies
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...CA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
CA PPM 14.x Agile Integrations
CA PPM14.x Agile IntegrationsCA PPM14.x Agile Integrations
CA PPM 14.x Agile IntegrationsCA Technologies
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...CA Technologies
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelCA Technologies
 
How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...
How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...
How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...CA Technologies
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...CA Technologies
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...CA Technologies
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
 
Maximize the Value of CA Workload Automation AE (AutoSys®)
Maximize the Value of CA Workload Automation AE (AutoSys®)Maximize the Value of CA Workload Automation AE (AutoSys®)
Maximize the Value of CA Workload Automation AE (AutoSys®)CA Technologies
 
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...CA Technologies
 

Similar to CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Problems Faster! (20)

The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
See Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ PlusSee Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ Plus
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
 
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
CA PPM 14.x Agile Integrations
CA PPM14.x Agile IntegrationsCA PPM14.x Agile Integrations
CA PPM 14.x Agile Integrations
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 
How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...
How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...
How T-Mobile Leveraged Service Virtualization as a Foundation to Digital Tra...
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
 
Maximize the Value of CA Workload Automation AE (AutoSys®)
Maximize the Value of CA Workload Automation AE (AutoSys®)Maximize the Value of CA Workload Automation AE (AutoSys®)
Maximize the Value of CA Workload Automation AE (AutoSys®)
 
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Problems Faster!