SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
World®
’16
Modernizing	the	CA	Datacom®	
Data	– SQL	Access	Part	I
Kevin	Shuma,	VP	Product	Management
CA	Technologies
MFX95SA
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
This	is	a	two	part	session	that	provides	an	overview	of	steps	
necessary	to	take	make	CA	Datacom®	available	for	modern	
applications	via	SQL	and	server.
For	many	shops	their	CA	Datacom®/DB	environment	was	
created	before	the	implementation	of	SQL.	This	session	will	
walk	through	the	steps	necessary	to	make	all	the	their	data	SQL	
accessible	using	CA	Datacom®	SQL.		From	there	we	add	the	
ODBC	and	JDBC	support	provided	by	CA	Datacom®	server.	Once	
completed	you	will	have	data	that	is	fully	accessible	to	modern	
applications	development	environments.			
Kevin	Shuma
CA	Technologies
VP,	Product	
Management
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
WHY	SHOULD	WE	IMPLEMENT	SQL?
IMPLEMENTING	SQL	ACCESS
LEGACY	DATA	STRUCTURES
SQL	COLUMN	REPORT
SUMMARY	
1
2
3
4
5
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Why	should	we	implement	SQL?
§ SQL	provides	the	basic	access	point	for	modern	applications
– ODBC/JDBC	use	SQL	under	the	covers
§ Implementing	SQL	access	on	traditional	data
– Opens	up	critical	business	data	to	new	applications	and	business	
functions
– Does	not	interfere	with	existing	traditional	applications
§ Peaceful	coexistence	is	much	preferred	to	revolutionary	change	(rewrites)
§ Implementing	SQL	constraints	on	traditional	data
– Allows	business	rules	to	be	enforced	without	requiring	additional	coding		
Modernization	is	the	Key	to	Growth	in	Today’s	World
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Datacom®	SQL	and	CA	Datacom®	Server
CA	Datacom	data	
and	business	
logic
Web	and	
Application	Servers
Web	and	mobile	apps
Modernization	With	Coexistence
Batch
Traditional	apps
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Implementing	SQL	- AUTHIDs
§ AUTHIDs	must	be	adding	to	the	system	before	they	can	be	
used	in	table	references
§ Default	AUTHIDs	provided	with	Datacom
– SYSADM	(system	tables)
– SYSUSR	(default	for	user	tables)
§ We	recommend	that	the	user	define	meaningful	AUTHIDs	for	
their	environment		
– user_authid (18	character	user	specified	name)
Creating	the	System	Level	Schemas	- AUTHIDs
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Implementing	SQL	- AUTHIDs	(Cont’d)
Creating	the	System	Level	Schemas	- AUTHIDs
DBID AUTHID
0100 DB0100
0200 DB0200
1294 DB1294
• Using	an	AUTHID	that	ties	to	business	
function	may	make	it	easier	to	group	
the	tables
• All	SQL	table	name	must	be	unique	with	
AUTHID
• With	multiple	DBIDs	per	AUTHID	be	
careful	when	assigning	SQL	table	names	
AUTHID Business	Function DBID Table
PAYROLL Payroll 0100 All
VENDOR Accounts payable 0200 VND,	VNA,	VN3
INVENTORY Sales and	ordering 0300	
0400
INV,	ITM,	DTL
ORD,	ODL,	ITM
• CA	Datacom	already	requires	3	character	table	names	to	be	unique	within	DBID
• In	this	example	we	are	using	the	DBID	as	part	of	the	AUTHID	as	a	simple	default
• Makes	it	relatively	simple	for	existing	users	to	remember	the	AUTHID
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Implementing	SQL	- AUTHIDs	(Cont’d)
§ AUTHIDs	can	be	added	to	the	system	through	various	utilities
– They	only	need	to	be	defined	once	per	environment	(MUF)
Creating	the	System	Level	Schemas	- AUTHIDs
Datadictionary	batch Datadictionary	online SQL	statement
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Implementing	SQL	– Database	Model
Adding	SQL	Names	to	the	Database	Model	in	PROD	Status
DD	
Entity
Attribute Req. Values Default Status Comment
Schema AUTHID No 18	Character No ADD
CPY	PROD
Must	be	defined	in PROD	before	
using	for	tables
Database SQL-
Security
No Y	or	N N UPD	
PROD
Use default	or	set	to	N,	Use	
external	security		
SQL-NAME N/A 32	Character None UPD	
PROD
Used	for	documentation	only
Area SQL-Name No 32	Character None UPD	
PROD
Needed	if	adding	new	tables	via	
DDL	(CREATE TABLE	…		IN	…)
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Implementing	SQL	– Database	Model	(Cont’d)
Adding	SQL	Names	to	the	Database	Model	in	PROD	Status
DD	
Entity
Attribute Re
q.
Values Default Status Comment
Table SQL-Intent Yes	 N,	Y	or	R N UPD	
PROD
Use	Y	for	full	SQL	access						
Use	R	for	SQL	read	access	only
AUTHID Yes Existing	
AUTHID	
None UPD	
PROD
Must	be	already defined
SQL-Name YES 32	Character None UPD	
PROD
Must	be	defined	to access	table	
with	SQL
Key AUTHID N/A Assigned to	
table	value
auto UPD	
PROD
Automatically	assigned
SQL-Name NO 32	Character None UPD	
PROD
Must	be	defined	to access	index	
with	SQL	(ALTER	or	DROP)
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Implementing	SQL	– Database	Model	(Cont’d)
Adding	SQL	Names	to	the	Database	Model	in	PROD	Status
DD	
Entity
Attribute Req. Values Default Status Comment
Column AUTHID N/A Assigned to	
table	value
auto UPD	
PROD
Automatically	assigned
SQL-Name NO 32	Character Generated UPD	
PROD
Generated	using	existing
column	name
Column AUTHID N/A Assigned to	
table	value
auto UPD	
PROD
Automatically	assigned
SQL-Name NO 32	Character User	
specified
UPD	Test
CPY PROD
User	wants	specific	SQL	name
User	specified	name	for	column
requires	extra	steps
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Sample	DDUPDATE	Job	to	Add	SQL	Attributes
Update	SQL	
attributes	in	
PROD	status	
Catalog	PROD	to	
CXX	and	DDD
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Making	the	SQL	Attributes	“Live”
§ SQL	attributes	are	set	through	Datadictionary	processes
– SQL	attributes	made	usable	during	the	CXX	CATALOG
§ SQL	definitions	are	stored	in	the	DDD
§ Only	“active/production”	definitions	are	in	DDD
Update	TABLE
Copy	to	PROD
DDUPDATE
MUF
DD	
0002
Catalog DDUPDATE
MUF
DD	
0002
CXX
DDD	
0015
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Legacy	Data	Structures
§ Legacy	data	structures	may	have	some	“SQL”	access	limits
– All	tables	are	accessible,	but	the	content	access	may	be	limited
§ SQL	accessibility	to	legacy	table	definitions
– Group	fields	are	ignored	by	SQL
§ Only	elementary	fields	are	viewable
– 2nd redefinition	columns	are	not	accessible		
§ Only	the	first	set	of	column	definitions	are	viewable;	anything	after	the	
REDEFINE	is	ignored
– Elements	of	repeating	groups	are	not	distinguishable
§ Repeating	group	(array)	is	represented	as	a	single	character	column
May	Have	Been	Built	Using	Older	Data	Structures	(VSAM,	COBOL	Copybooks)
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL	Column	Report
§ Can	be	executed	against	any	existing	table
– Regardless	of	SQL-INTENT	setting
– Can	be	used	to	preview	SQL	accessibility
Quick	Way	to	Determine	How	SQL	Accessible	Legacy	Table	Definitions	Are
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL	Column	Report	(Cont’d)
Quick	Way	to	Determine	How	SQL	Accessible	Legacy	Table	Definitions	Are
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL	Column	Report	(Cont’d)
SQL	ACCESS	STD.	- Shows	Current	SQL	Accessibility
STD	– indicates	if	column	is	
accessible	by	standard	SQL
NO	- will	include	reason	data	is	
not	accessible
• CMP	– column	is	a	compound	
(group)	field
• RPT	– Column	is	a	repeating	
field
• RDF	– Colum	is	a	redefinition	
(2nd definition)
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Experiences
SQL	Column	report	provides	a	
detailed	report	showing	SQL	
column	accessibility	for	any	
table.
Key	Topics
Adding	SQL	accessibility	to	
existing	tables	will	allow	new	
modern	applications	to	be	
created	that	peacefully	coexist	
with	existing	legacy	
applications.
Findings
It	is	a	simple	process	to	make	
an	existing	table	SQL	
accessible.
Summary
Part	I
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX92S Strategy	and	Vision	for	CA	Datacom	and	CA	Ideal™ 11/16/2016	at	12:45	pm
MFX93S What’s	new	in	CA	Datacom	 11/16/2016	at	1:45	pm
MFX94S Reducing	TCO	with	Datacom	Compression	(Presspack) 11/16/2016	at	3:00	pm
MFX95SA Modernizing	the	CA	Datacom	data – SQL	Access	Part	I 11/16/2016	at	3:45	pm
MFX95SB Modernizing	the	CA	Datacom	data – SQL	Access	Part	II 11/16/2016	at	4:30	pm
MFX96S CA	Datacom/AD	Installation/Upgrade	and	Maintenance 11/17/2016	at	12:45	pm
MFX97S
CA	Datacom/AD	Report	Utilization,	and
information	gather	for	Support
11/17/2016	at	1:45	pm
MFX98S
Using	CA	SYSVIEW®	to	monitor	and	measure	your	CA	
Datacom	environment	– AD	and	DB
11/17/2016	at	3:00	pm
MFX99S Birds	of	a	Feather/Stump	the	Techie!	 11/17/2016	at	3:45	pm
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.23 @CAWORLD					#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

Mais conteúdo relacionado

Mais procurados

Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5CA Technologies
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IICA Technologies
 
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeterDecrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeterCA Technologies
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...CA Technologies
 
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...CA Technologies
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service VirtualizationCA Technologies
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Technologies
 
CA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product OverviewCA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product OverviewCA Technologies
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...CA Technologies
 
CA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Technologies
 
Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...CA Technologies
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0CA Technologies
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Technologies
 
Pre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service ManagementPre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service ManagementCA Technologies
 
Understanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashUnderstanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashCA Technologies
 
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...CA Technologies
 
Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...CA Technologies
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)CA Technologies
 
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...CA Technologies
 

Mais procurados (20)

Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
 
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeterDecrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
 
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service Virtualization
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
 
CA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product OverviewCA View® and CA Deliver™ – Product Overview
CA View® and CA Deliver™ – Product Overview
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
 
CA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app control
 
Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application Development
 
Pre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service ManagementPre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service Management
 
Understanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashUnderstanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDash
 
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
 
Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
 
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
 

Destaque

Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part ICA Technologies
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part ICA Technologies
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemCA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA Technologies
 
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IIAdvanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IICA Technologies
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)CA Technologies
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA DatacomCA Technologies
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and TuningCA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldCA Technologies
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationCA Technologies
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database NavigationCA Technologies
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesCA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...CA Technologies
 
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBUsing Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBCA Technologies
 
Advanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFAdvanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFCA Technologies
 
Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...
Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...
Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...CA Technologies
 
DevOps: From Industry Buzzword to Real Implementation / Real Benefits
DevOps: From Industry Buzzword to Real Implementation / Real BenefitsDevOps: From Industry Buzzword to Real Implementation / Real Benefits
DevOps: From Industry Buzzword to Real Implementation / Real BenefitsCA Technologies
 

Destaque (19)

Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
 
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IIAdvanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and Tuning
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database Navigation
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBUsing Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
 
Advanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFAdvanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUF
 
Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...
Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...
Moving from Load Runner to Open Source: Increase Performance Test Coverage 10...
 
DevOps: From Industry Buzzword to Real Implementation / Real Benefits
DevOps: From Industry Buzzword to Real Implementation / Real BenefitsDevOps: From Industry Buzzword to Real Implementation / Real Benefits
DevOps: From Industry Buzzword to Real Implementation / Real Benefits
 

Semelhante a Modernizing the CA Datacom Data – SQL Access Part I

Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...CA Technologies
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Technologies
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...CA Technologies
 
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...CA Technologies
 
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for ModernizationCA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for ModernizationCA Technologies
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentCA Technologies
 
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)CA Technologies
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolCA Technologies
 
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12CA Technologies
 
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12CA Technologies
 
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...CA Technologies
 
Case Study: EchoStar Transforms Complex Software Releases to Customer Network...
Case Study: EchoStar Transforms Complex Software Releases to Customer Network...Case Study: EchoStar Transforms Complex Software Releases to Customer Network...
Case Study: EchoStar Transforms Complex Software Releases to Customer Network...CA Technologies
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...CA Technologies
 
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsPre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsCA Technologies
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...CA Technologies
 
Pre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service ManagementPre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service ManagementCA Technologies
 
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...CA Technologies
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®CA Technologies
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresCA Technologies
 

Semelhante a Modernizing the CA Datacom Data – SQL Access Part I (20)

Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and Maintenance
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
 
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
 
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for ModernizationCA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for Modernization
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
 
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 1)
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
 
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
 
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
 
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...
 
Case Study: EchoStar Transforms Complex Software Releases to Customer Network...
Case Study: EchoStar Transforms Complex Software Releases to Customer Network...Case Study: EchoStar Transforms Complex Software Releases to Customer Network...
Case Study: EchoStar Transforms Complex Software Releases to Customer Network...
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
 
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsPre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
 
Pre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service ManagementPre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service Management
 
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mais de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 

Último (20)

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 

Modernizing the CA Datacom Data – SQL Access Part I