Submit Search
Upload
CA IDMS™ 19.0 SQL Enhancements for Modernization
•
2 likes
•
536 views
CA Technologies
Follow
CA IDMS™ 19.0 SQL Enhancements for Modernization
Read less
Read more
Technology
Report
Share
Report
Share
1 of 43
Download now
Download to read offline
Recommended
CA IDMS™ 19.0 Web Services for Modernization
CA IDMS™ 19.0 Web Services for Modernization
CA Technologies
CA IDMS Performance and Tuning
CA IDMS Performance and Tuning
CA Technologies
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
CA Technologies
Pre-Con Ed: Using Java to Access Your CA IDMS Databases and Applications
Pre-Con Ed: Using Java to Access Your CA IDMS Databases and Applications
CA Technologies
CA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
CA Technologies
CA IDMS Database Navigation
CA IDMS Database Navigation
CA Technologies
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
CA Technologies
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
CA Technologies
Recommended
CA IDMS™ 19.0 Web Services for Modernization
CA IDMS™ 19.0 Web Services for Modernization
CA Technologies
CA IDMS Performance and Tuning
CA IDMS Performance and Tuning
CA Technologies
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
CA Technologies
Pre-Con Ed: Using Java to Access Your CA IDMS Databases and Applications
Pre-Con Ed: Using Java to Access Your CA IDMS Databases and Applications
CA Technologies
CA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
CA Technologies
CA IDMS Database Navigation
CA IDMS Database Navigation
CA Technologies
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
CA Technologies
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
Decrease Test Build Time, Not Test Quality with CA BlazeMeter
CA Technologies
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
CA Technologies
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
CA Technologies
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...
CA Technologies
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
CA Technologies
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
CA Technologies
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
CA Technologies
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
CA Technologies
TechTalk: All You Want to Know About Docker and CA Testing Tools.
TechTalk: All You Want to Know About Docker and CA Testing Tools.
CA Technologies
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
CA Technologies
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and Alert
CA Technologies
TechTalk: What Happened in the Backend? The Power of DB Compare
TechTalk: What Happened in the Backend? The Power of DB Compare
CA Technologies
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
CA Technologies
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
CA Technologies
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
CA Technologies
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
CA Technologies
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
CA Technologies
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
CA Technologies
Creating Web Applications with IDMS, COBOL and ADSO
Creating Web Applications with IDMS, COBOL and ADSO
Margaret Sliming
Advanced DBA – High Availability for Data
Advanced DBA – High Availability for Data
CA Technologies
More Related Content
What's hot
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
CA Technologies
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
CA Technologies
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...
CA Technologies
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
CA Technologies
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
CA Technologies
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
CA Technologies
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
CA Technologies
TechTalk: All You Want to Know About Docker and CA Testing Tools.
TechTalk: All You Want to Know About Docker and CA Testing Tools.
CA Technologies
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
CA Technologies
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and Alert
CA Technologies
TechTalk: What Happened in the Backend? The Power of DB Compare
TechTalk: What Happened in the Backend? The Power of DB Compare
CA Technologies
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
CA Technologies
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
CA Technologies
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
CA Technologies
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
CA Technologies
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
CA Technologies
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
CA Technologies
What's hot
(20)
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
TechTalk: All You Want to Know About Docker and CA Testing Tools.
TechTalk: All You Want to Know About Docker and CA Testing Tools.
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and Alert
TechTalk: What Happened in the Backend? The Power of DB Compare
TechTalk: What Happened in the Backend? The Power of DB Compare
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
Viewers also liked
Creating Web Applications with IDMS, COBOL and ADSO
Creating Web Applications with IDMS, COBOL and ADSO
Margaret Sliming
Advanced DBA – High Availability for Data
Advanced DBA – High Availability for Data
CA Technologies
Intro To IDMS
Intro To IDMS
Margaret Sliming
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
Spark Summit
Database Systems - Introduction (Chapter 1)
Database Systems - Introduction (Chapter 1)
Vidyasagar Mundroy
SparkR - Play Spark Using R (20160909 HadoopCon)
SparkR - Play Spark Using R (20160909 HadoopCon)
wqchen
Viewers also liked
(6)
Creating Web Applications with IDMS, COBOL and ADSO
Creating Web Applications with IDMS, COBOL and ADSO
Advanced DBA – High Availability for Data
Advanced DBA – High Availability for Data
Intro To IDMS
Intro To IDMS
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
Database Systems - Introduction (Chapter 1)
Database Systems - Introduction (Chapter 1)
SparkR - Play Spark Using R (20160909 HadoopCon)
SparkR - Play Spark Using R (20160909 HadoopCon)
Similar to CA IDMS™ 19.0 SQL Enhancements for Modernization
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
CA Technologies
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
CA Technologies
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
CA Technologies
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
What’s new in CA Datacom
What’s new in CA Datacom
CA Technologies
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
CA Technologies
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
CA Technologies
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
CA Technologies
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
CA Technologies
Mainframe as a Service: Cloud Capabilities for Your Core Business Applications
Mainframe as a Service: Cloud Capabilities for Your Core Business Applications
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
CA Technologies
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
CA Technologies
Microservice Lifecycle Demo Presentation
Microservice Lifecycle Demo Presentation
Matt McLarty
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
CA Technologies
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
CA Technologies
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
CA Technologies
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
CA Technologies
Similar to CA IDMS™ 19.0 SQL Enhancements for Modernization
(20)
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
What’s new in CA Datacom
What’s new in CA Datacom
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
Mainframe as a Service: Cloud Capabilities for Your Core Business Applications
Mainframe as a Service: Cloud Capabilities for Your Core Business Applications
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Microservice Lifecycle Demo Presentation
Microservice Lifecycle Demo Presentation
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
More from CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
How Components Increase Speed and Risk
How Components Increase Speed and Risk
CA Technologies
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
CA Technologies
More from CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
How Components Increase Speed and Risk
How Components Increase Speed and Risk
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Recently uploaded
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Enjoy Anytime
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Recently uploaded
(20)
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
The transition to renewables in India.pdf
The transition to renewables in India.pdf
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
CA IDMS™ 19.0 SQL Enhancements for Modernization
1.
World® ’16 CA IDMS™ Version 19.0 SQL Enhancements for Modernization Dave Ross, Senior Principal Product Owner CA Technologies MFX103S MAINFRAME AND WORKLOAD AUTOMATION
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Customers need to leverage their investment in CA IDMS™ to create new applications based on services in the application economy, and they need to do this with current technologies and developer skill sets. This session shows how SQL enhancements in CA IDMS 19.0 improve standards compliance, developer productivity, and compatibility with third party tools and applications.
The SQL virtual foreign key feature enables developers to use standard SQL to access and update network databases without the need to use network DML or table procedures. Enhancements to SQL DDL enable users to define databases using standard DDL compatible with other databases. David Ross CA Technologies Sr. Principal Product Owner, CA IDMS
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda SQL VIRTUAL FOREIGN KEYS ISO STANDARD SQL CONSTRAINT DDL 1 2
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA IDMS SQL Relational to Network Mapping ••Identically namedTable ••EquivalentRow ••Automatically renamedColumn ••Partial mapping Referential constraint ••Via SCHEMA Record definition ••Equivalent Record occurrence ••Except ODO, redefines, …Element ••Lack of foreign keysSet SQL Network
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Relational to Network Mapping Techniques Syntax extensions Views Procedures ••Table procedures ••Called procedures Foreign keys ••Referential sets
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Comparison of Mapping Techniques SQL Extensions No
No No No Limited Views Yes No No No Limited Table Procedures Yes Yes No No Encapsulate Referential Sets Yes No Yes Maybe Referential constraints Standard SQL New programs Exposes SetsApplication changes Restructure
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Virtual Foreign Keys Expose Sets as Referential Constraints ••Queries ••Updates Based on ROWID ••Virtual primary key = ROWID ••Virtual foreign key = FKEY_<set_name> Define on SQL Schema definition Visible through JDBC and ODBC metadata Enable access for common tools and application frameworks Use SQL to access and maintain network databases from Java
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Virtual Foreign Key Benefits § Use standard SQL to access and update CA IDMS –
Removes INSERT and UPDATE limitations – Capabilities like network DML – Write applications using Java, .NET, and popular frameworks – No special CA IDMS SQL syntax § Easy to implement – No database changes – No changes to network definitions – No need for table procedures
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Virtual Primary Key § Pseudo column ROWID –
Uniquely identifies a row – Available for every table – Not nullable § Datatype ROWID – Length 8 bytes – Contains DBKEY and Page Info – Value not persistent and thus not a true primary key – Relational operator support extended (<,>,<=,>=)
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Virtual Foreign Key § Pseudo column FKEY_setname –
“setname” is the SQL transformed name of set – Value is ROWID of owner of set-name or NULL if no membership – Available for every set in which record is member – Always appears nullable, but cannot set to NULL for MA sets § Datatype ROWID – Must be 8 bytes – contains DBKEY and Page Info of set owner
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Virtual Foreign Keys § Virtual foreign keys can be referenced in SQL statements like a user-defined column §
Included in list of “all” columns (SELECT *) § Included in INSERT and UPDATE default column list – When column list is excluded – Column order: § User defined columns § ROWID § Virtual foreign keys in alphabetical order
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Enabling Virtual Foreign Keys § “Create” virtual keys with SQL schema definition create schema EMPSCHM for nonsql
schema EMPDICT.EMPSCHM version 100 with virtual keys § ROWID and virtual foreign keys become visible – SELECT * – INSERT column list when list is omitted – UPDATE column list when list is omitted § “Remove” virtual keys alter schema EMPSCHM without virtual keys
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD EMPSCHM With Virtual Foreign Keys DEPT-EMPLOYEE EMP-EXPERTISE DEPT-ID-0410 DEPARTMENT ORG-DEMO-REGION 410
F 120 CALC FKEY_EMP_EXPERTISEFKEY_DEPT_EMPLOYEE EMP-ID-0415 EMPLOYEE EMP-DEMO-REGION 415 F 120 CALC EMP-EXPERTISE EXPERTISE EMP-DEMO-REGION 400 F 16 VIA ROWID ROWID ROWID
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD SELECT Examples § Obtain DEPARTMENT data of an EMPLOYEE select * from DEPARTMENT where ROWID = (select FKEY_DEPT_EMPLOYEE from EMPLOYEE where
EMP_ID = 1001) § Join DEPARTMENT and EMPLOYEE select d.*, e.* from DEPARTMENT d, EMPLOYEE e where d.ROWID = e.FKEY_DEPT_EMPLOYEE
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD More SELECT Examples § Select all EXPERTISE records for an EMPLOYEE select * from EXPERTISE where FKEY_EMP_EXPERTISE = (select ROWID from EMPLOYEE where EMP_ID = 1001) §
Show all DEPARTMENTs including those without EMPLOYEEs select d.*, e.* from DEPARTMENT d left join EMPLOYEE e on d.ROWID = e.FKEY_DEPT_EMPLOYEE
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD INSERT Using Virtual Keys § Use to establish set membership –
Set virtual foreign key column to owner ROWID or NULL – Set membership options define integrity constraints – MA set disallows NULL valued virtual foreign key § Use ROWID to suggest DBKEY for a DIRECT record – Defaults to -1 on STORE (first available DBKEY in page range used) – Ignored if record location mode is not DIRECT
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD INSERT Using Virtual Keys § Use of scalar-query-expression in VALUES clause –
New R19.0 feature for INSERT statements for all SQL schemas – With virtual keys, allows INSERT to contain queries that retrieve the virtual foreign key values to be set in the inserted row § Support for virtual keys in query-specification – Alternative to VALUES clause on INSERT – Query result must have same number of columns as named in INSERT statement – If no columns named, number of columns must match the total number of columns, including ROWID and all VFKs
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD INSERT Examples VALUES Clause With Column List insert into EMPLOYEE (EMP_ID, EMP_FNAME, EMP_LNAME, FKEY_DEPT_EMPLOYEE, FKEY_OFFICE_EMPLOYEE) values (976, ’SEBASTIAN’, ’VOLLMER’, (select ROWID from DEPARTMENT where DEPT_ID = 9003), (select ROWID from OFFICE where OFFICE_CODE = '002'))
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD INSERT Examples VALUES Clause Without Column List insert into EMPLOYEE values (976, ’SEBASTIAN’, ’VOLLMER’, NULL, (select ROWID from DEPARTMENT where DEPT_ID = 9003), (select ROWID from OFFICE where OFFICE_CODE = '002')) § EMPLOYEE columns are EMP_ID, EMP_FNAME, EMP_LNAME, ROWID, FKEY_DEPT_EMPLOYEE, FKEY_OFFICE_EMPLOYEE
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD INSERT Examples Specifying Virtual Keys Using Query-specification insert into EMPOSITION (START_YEAR, FKEY_EMP_EMPOSITION, FKEY_JOB_EMPOSITION) select 2015, E.ROWID, J.ROWID from EMPLOYEE E, JOB J where E.EMP_ID = 23 and J.JOB_ID = 2025
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD UPDATE § Virtual Foreign Keys can be specified in SET clause §
Equivalent to CONNECT/DISCONNECT DML verbs § Allowed for sets with membership options – OPTIONAL (OA/OM) – MANDATORY MANUAL (MM) when record not yet connected to set § SET FKEY_setname values allowed – NULL – ROWID of owner occurrence of setname – ROWID of member occurrence of setname
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD UPDATE Examples § Disconnecting the EMPLOYEE from the DEPT-EMPL set update EMPLOYEE set FKEY_DEPT_EMPL = NULL where EMP_ID = 23 §
EMPLOYEE connected to DEPARTMENT 4000 update EMPLOYEE set FKEY_DEPT_EMPL = (select ROWID from DEPARTMENT where DEPT_ID=4000) where EMP_ID = 23
24.
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DELETE § Use virtual key columns the same as user-defined columns delete from EMPLOYEE where FKEY_DEPT_EMPL = (select ROWID from DEPARTMENT where DEPT_NAME =‘Sales’)
25.
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Discovering Virtual Keys § JDBC and ODBC metadata APIs expose virtual keys §
java.sql.DatabaseMetaData interface methods – getPrimaryKeys – getExportedKeys – getImportedKeys – getCrossReference § ODBC API functions – SQLPrimaryKeys – SQLForeignKeys
26.
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Discovering Network Relationships
27.
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Virtual Keys Compared to Other Mapping Techniques SQL Extensions No
No No No Limited Views Yes No No No Limited Table Procedures Yes Yes No No Encapsulate Referential Sets Yes No Yes Maybe Referential constraints Virtual Keys Yes No No No Referential constraints Standard SQL New programs Exposes SetsApplication changes Restructure
28.
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD SQL DDL Enhancements § ISO Standard Constraint Definition DDL –
CREATE TABLE – ALTER TABLE – Unique constraints – Primary Key constraints – Referential constraints § Improves integration with frameworks and tools § DISPLAY TABLE
29.
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Defining UNIQUE Constraints § A unique constraint is specified by coding –
UNIQUE on a column definition – UNIQUE (<column-names>) in the column list § A constraint may be named – CONSTRAINT <name> – Precedes the constraint definition – Name is generated if not named § More than one unique constraint may be defined
30.
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD UNIQUE Constraint Example create table ABC.TABLE1( COL1 CHAR(8) unique, COL2 CHAR(8), constraint CON1 unique (COL2, COL1))
31.
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Defining Primary Key Constraints § A Primary Key constraint is specified by coding –
PRIMARY KEY on a column definition – PRIMARY KEY (<column-names>) in the column list § A constraint may be named – CONSTRAINT <name> – Precedes the constraint definition – Name is generated if not named § ONE Primary Key constraint per table
32.
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Primary Key Constraint Examples create table ABC.TABLEX ( COL1 char(8) not null primary key, COL2 char(8) not null, COL3 char(8) not null) create table ABC.TABLEY ( COL1 char(8) not null, COL2 char(8) not null, COL3 char(8) not null, primary key (COL2, COL3))
33.
33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Generated Enforcing Index § Enforces unique and primary key constraints §
Created by CREATE TABLE and ALTER TABLE – Suppresses creation of default index – Uses default values for index attributes – Cannot be altered to be NOT UNIQUE – Cannot be dropped with DROP INDEX unless replacement defined § Generated Index names – IDX############### – ### is a 15 digit number unique in the schema
34.
34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Replacing a Generated Enforcing Index § Use CREATE UNIQUE INDEX §
Columns must match enforcing index § Inherits enforcing index attribute § When primary key index dropped – A replacement inherits the primary key attribute § Generated indexes dropped automatically § Non-generated indexes must be manually dropped
35.
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Defining Referential Constraints § A referential constraint is specified by coding –
REFERENCES clause on a column definition – FOREIGN KEY clause in the column list § A constraint may be named – CONSTRAINT name – Precedes the constraint definition – If not named, a name is generated § GEN############### § More than one referential constraint may be defined
36.
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Referential Constraints Example create table ABC.TABLEX ( COL1 char (8), COL2 char(8), foreign key (COL1,COL2) references TABLEP, COL3 char(8) not null constraint CON1 references TABLEP (COL5))
37.
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Discovering Constraints § java.sql.DatabaseMetaData
interface methods – getIndexInfo – getPrimaryKeys – getExportedKeys – getImportedKeys – getCrossReference § ODBC API functions – SQLStatistics – SQLPrimaryKeys – SQLForeignKeys
38.
38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Standard SQL DDL SQL DDL enhancements enable CA IDMS to support database definitions provided by popular tools and frameworks CA IDMS 19.0 CA IDMS 19.0 enables Java and Windows developers to use industry standard technology to create, access, and maintain CA IDMS databases SQL Virtual Keys SQL Virtual Foreign Keys enable developers to use standard SQL to access and update network databases Summary A Few Words to Review
39.
39 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME MFX100S Strategy and Vision for CA IDMS 11/16/2016 at 12:45 pm MFX101S Legacy is not a Dirty Word 11/16/2016 at 1:45 pm MFX102S CA IDMS 19.0 Web Services for Modernization 11/16/2016 at 3:00 pm MFX103S CA IDMS 19.0 SQL Enhancements for Modernization 11/16/2016 at 3:30 pm MFX104S Java Access to CA-IDMS Data at BT (British Telecom) 11/16/2016 at 4:45 pm MFX105S Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features (CA and CAXIA) 11/17/2016 at 12:45 pm MFX106S CA IDMS Buffer Tuning 11/17/2016 at 1:45 pm MFX107S M3A Services Monitor, Measure, Manage and Alert 11/17/2016 at 3:00 pm MFX108S Birds of a Feather/Stump the Techie! 11/17/2016 at 3:45 pm
40.
40 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Demo Name Product X Theater # location Demo Name Services Y Theater # location Demo Name Solution Y Theater # location Demo Name Product X Theater # location
41.
41 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
42.
42 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.
43.
@CAWORLD #CAWORLD © 2016 CA. All RIGHTS RESERVED.43 @CAWORLD #CAWORLD Mainframe and Workload Automation For more information on Mainframe and Workload Automation, please visit: http://cainc.to/9GQ2JI
Download now