SlideShare a Scribd company logo
1 of 43
Download to read offline
World®
’16
CA	IDMS™	Version	19.0	
SQL	Enhancements	for	Modernization
Dave	Ross,	Senior	Principal	Product	Owner
CA	Technologies
MFX103S
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Customers	need	to	leverage	their	investment	in	CA	IDMS™	to	
create	new	applications	based	on	services	in	the	application	
economy,	and	they	need	to	do	this	with	current	technologies	
and	developer	skill	sets. This	session	shows	how	SQL	
enhancements	in	CA	IDMS	19.0	improve	standards	compliance,	
developer	productivity,	and	compatibility	with	third	party	tools	
and	applications. The	SQL	virtual	foreign	key	feature	enables	
developers	to	use	standard	SQL	to	access	and	update	network	
databases	without	the	need	to	use	network	DML	or	table	
procedures. Enhancements	to	SQL	DDL	enable	users	to	define	
databases	using	standard	DDL	compatible	with	other	databases.
David	Ross
CA	Technologies
Sr.	Principal	Product	
Owner,	CA	IDMS
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
SQL	VIRTUAL	FOREIGN	KEYS
ISO	STANDARD	SQL	CONSTRAINT	DDL
1
2
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	IDMS	SQL	Relational	to	Network	Mapping
••Identically	namedTable
••EquivalentRow
••Automatically	renamedColumn
••Partial	mapping
Referential	
constraint
••Via	SCHEMA
Record	
definition
••Equivalent
Record	
occurrence
••Except	ODO,	redefines,	…Element
••Lack	of	foreign	keysSet
SQL Network
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relational	to	Network	Mapping	Techniques
Syntax	extensions
Views
Procedures
••Table	procedures
••Called	procedures
Foreign	keys
••Referential	sets
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Comparison	of	Mapping	Techniques
SQL	Extensions No No No No Limited
Views Yes No No No Limited
Table	Procedures Yes Yes No No Encapsulate
Referential	Sets Yes No Yes Maybe Referential	constraints
Standard	SQL New	programs Exposes	SetsApplication
changes
Restructure
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Virtual	Foreign	Keys
Expose	Sets	as	Referential	Constraints
••Queries
••Updates
Based	on	ROWID
••Virtual	primary	key	=	ROWID
••Virtual	foreign	key	=	FKEY_<set_name>	
Define	on	SQL	Schema	definition
Visible	through	JDBC	and	ODBC	metadata
Enable	access	for	common	tools	and	application	frameworks
Use	SQL	to	access	and	maintain	network	databases	from	Java
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Virtual	Foreign	Key	Benefits
§ Use	standard	SQL	to	access	and	update	CA	IDMS
– Removes	INSERT	and	UPDATE	limitations
– Capabilities	like	network	DML
– Write	applications	using	Java,	.NET,	and	popular	frameworks
– No	special	CA	IDMS	SQL	syntax
§ Easy	to	implement
– No	database	changes
– No	changes	to	network	definitions
– No	need	for	table	procedures
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Virtual	Primary	Key
§ Pseudo	column	ROWID	
– Uniquely	identifies	a	row	
– Available	for	every	table
– Not	nullable
§ Datatype	ROWID
– Length	8	bytes
– Contains	DBKEY	and	Page	Info		
– Value	not	persistent	and	thus	not	a	true	primary	key
– Relational	operator	support	extended	(<,>,<=,>=)
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Virtual	Foreign	Key
§ Pseudo	column	FKEY_setname
– “setname”	is	the	SQL	transformed	name	of	set
– Value	is	ROWID	of	owner	of	set-name	or	NULL	if	no	membership
– Available	for	every	set	in	which	record	is	member
– Always	appears	nullable,	but	cannot	set	to	NULL	for	MA	sets
§ Datatype	ROWID
– Must	be	8	bytes
– contains	DBKEY	and	Page	Info	of	set	owner
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Virtual	Foreign	Keys
§ Virtual	foreign	keys	can	be	referenced	in	SQL	statements	like	
a	user-defined	column
§ Included	in	list	of	“all”	columns	(SELECT	*)	
§ Included	in	INSERT	and	UPDATE	default	column	list
– When	column	list	is	excluded
– Column	order:
§ User	defined	columns
§ ROWID
§ Virtual	foreign	keys	in	alphabetical	order
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Enabling	Virtual	Foreign	Keys	
§ “Create”	virtual	keys	with	SQL	schema	definition
create	schema	EMPSCHM
for	nonsql schema	EMPDICT.EMPSCHM	version	100
with	virtual	keys
§ ROWID	and	virtual	foreign	keys	become	visible
– SELECT	*
– INSERT	column	list	when	list	is	omitted
– UPDATE	column	list	when	list	is	omitted
§ “Remove”	virtual	keys
alter	schema	EMPSCHM	without	virtual	keys
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
EMPSCHM	With	Virtual	Foreign	Keys
DEPT-EMPLOYEE EMP-EXPERTISE
DEPT-ID-0410
DEPARTMENT
ORG-DEMO-REGION
410 F 120 CALC
FKEY_EMP_EXPERTISEFKEY_DEPT_EMPLOYEE
EMP-ID-0415
EMPLOYEE
EMP-DEMO-REGION
415 F 120 CALC
EMP-EXPERTISE
EXPERTISE
EMP-DEMO-REGION
400 F 16 VIA
ROWID ROWID ROWID
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SELECT	Examples
§ Obtain	DEPARTMENT	data	of	an	EMPLOYEE
select	*
from	DEPARTMENT	where	ROWID	=	
(select	FKEY_DEPT_EMPLOYEE	
from	EMPLOYEE	
where EMP_ID	=	1001)
§ Join	DEPARTMENT	and	EMPLOYEE
select	d.*,	e.*
from	DEPARTMENT	d,	EMPLOYEE	e
where	d.ROWID =	e.FKEY_DEPT_EMPLOYEE
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
More	SELECT	Examples
§ Select	all	EXPERTISE	records	for	an	EMPLOYEE
select	*	from	EXPERTISE
where	FKEY_EMP_EXPERTISE	=
(select	ROWID
from	EMPLOYEE
where	EMP_ID	=	1001)
§ Show	all	DEPARTMENTs	including	those	without	EMPLOYEEs
select	d.*,	e.*
from	DEPARTMENT	d	left	join	EMPLOYEE	e
on	d.ROWID =	e.FKEY_DEPT_EMPLOYEE
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
INSERT	Using	Virtual	Keys
§ Use	to	establish	set	membership
– Set	virtual	foreign	key	column	to	owner	ROWID	or	NULL
– Set	membership	options	define	integrity	constraints
– MA	set	disallows	NULL	valued	virtual	foreign	key
§ Use	ROWID	to	suggest	DBKEY	for	a	DIRECT	record
– Defaults	to	-1	on	STORE	(first	available	DBKEY	in	page	range	used)
– Ignored	if	record	location	mode	is	not	DIRECT
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
INSERT	Using	Virtual	Keys
§ Use	of	scalar-query-expression	in	VALUES	clause
– New	R19.0	feature	for	INSERT	statements	for	all	SQL	schemas
– With	virtual	keys,	allows	INSERT	to	contain	queries	that	retrieve	the	
virtual	foreign	key	values	to	be	set	in	the	inserted	row
§ Support	for	virtual	keys	in	query-specification
– Alternative	to	VALUES	clause	on	INSERT
– Query	result	must	have	same	number	of	columns	as	named	in	INSERT	
statement
– If	no	columns	named,	number	of	columns	must	match	the	total	
number	of	columns,	including	ROWID	and	all	VFKs
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
INSERT	Examples
VALUES	Clause	With	Column	List
insert	into	EMPLOYEE
(EMP_ID,
EMP_FNAME,	
EMP_LNAME,
FKEY_DEPT_EMPLOYEE,	
FKEY_OFFICE_EMPLOYEE)	
values
(976,	
’SEBASTIAN’,	
’VOLLMER’,
(select	ROWID	from	DEPARTMENT	where	DEPT_ID	=	9003),
(select	ROWID	from	OFFICE	where	OFFICE_CODE	=	'002'))
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
INSERT	Examples
VALUES	Clause	Without	Column	List
insert	into	EMPLOYEE
values
(976,
’SEBASTIAN’,	
’VOLLMER’,	
NULL,
(select	ROWID	from	DEPARTMENT	where	DEPT_ID	=	9003),
(select	ROWID	from	OFFICE	where	OFFICE_CODE	=	'002'))
§ EMPLOYEE	columns	are
EMP_ID,	EMP_FNAME,	EMP_LNAME,	ROWID,
FKEY_DEPT_EMPLOYEE,	FKEY_OFFICE_EMPLOYEE
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
INSERT	Examples
Specifying	Virtual	Keys	Using	Query-specification
insert	into	EMPOSITION	
(START_YEAR,	
FKEY_EMP_EMPOSITION,	
FKEY_JOB_EMPOSITION)			
select	2015,	E.ROWID,	J.ROWID	from	EMPLOYEE	E,	JOB	J	
where	E.EMP_ID	=	23	and	J.JOB_ID	=	2025
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
UPDATE
§ Virtual	Foreign	Keys	can	be	specified	in	SET	clause
§ Equivalent	to	CONNECT/DISCONNECT	DML	verbs
§ Allowed	for	sets	with	membership	options	
– OPTIONAL	(OA/OM)
– MANDATORY	MANUAL	(MM)	when	record	not	yet	connected	to	set
§ SET	FKEY_setname	values	allowed
– NULL	
– ROWID	of	owner	occurrence	of	setname
– ROWID	of	member	occurrence	of	setname
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
UPDATE	Examples
§ Disconnecting	the	EMPLOYEE	from	the	DEPT-EMPL	set
update	EMPLOYEE	set	FKEY_DEPT_EMPL	=	NULL	
where	EMP_ID	=	23
§ EMPLOYEE	connected	to	DEPARTMENT	4000
update	EMPLOYEE	set	FKEY_DEPT_EMPL	=
(select	ROWID	from	DEPARTMENT	where	DEPT_ID=4000)
where	EMP_ID	=	23
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
DELETE	
§ Use	virtual	key	columns	the	same	as	user-defined	columns
delete	from	EMPLOYEE	
where	FKEY_DEPT_EMPL	=	
(select	ROWID	from	DEPARTMENT	
where	DEPT_NAME	=‘Sales’)
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Discovering	Virtual	Keys
§ JDBC	and	ODBC	metadata	APIs	expose	virtual	keys
§ java.sql.DatabaseMetaData interface	methods
– getPrimaryKeys
– getExportedKeys
– getImportedKeys
– getCrossReference
§ ODBC	API	functions
– SQLPrimaryKeys
– SQLForeignKeys
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Discovering	Network	Relationships
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Virtual	Keys	Compared	to	Other	Mapping	Techniques
SQL	Extensions No No No No Limited
Views Yes No No No Limited
Table	Procedures Yes Yes No No Encapsulate
Referential	Sets Yes No Yes Maybe Referential	constraints
Virtual	Keys Yes No No No Referential	constraints
Standard	SQL New	programs Exposes	SetsApplication
changes
Restructure
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SQL	DDL	Enhancements
§ ISO	Standard	Constraint	Definition	DDL
– CREATE	TABLE	
– ALTER	TABLE
– Unique	constraints
– Primary	Key	constraints
– Referential	constraints
§ Improves	integration	with	frameworks	and	tools
§ DISPLAY	TABLE
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Defining	UNIQUE	Constraints
§ A	unique	constraint	is	specified	by	coding
– UNIQUE	on	a	column	definition
– UNIQUE	(<column-names>)	in	the	column	list
§ A	constraint	may	be	named	
– CONSTRAINT	<name>
– Precedes	the	constraint	definition
– Name	is	generated	if	not	named
§ More	than	one	unique	constraint	may	be	defined
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
UNIQUE	Constraint	Example
create	table	ABC.TABLE1(
COL1	CHAR(8)	unique,
COL2	CHAR(8),
constraint	CON1	unique	(COL2,	COL1))
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Defining	Primary	Key	Constraints
§ A	Primary	Key	constraint	is	specified	by	coding
– PRIMARY	KEY	on	a	column	definition
– PRIMARY	KEY	(<column-names>)	in	the	column	list
§ A	constraint	may	be	named	
– CONSTRAINT	<name>
– Precedes	the	constraint	definition
– Name	is	generated	if	not	named
§ ONE	Primary	Key	constraint	per	table
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Primary	Key	Constraint	Examples
create	table	ABC.TABLEX	(
COL1	char(8)	not	null	primary	key,
COL2	char(8)	not	null,												
COL3	char(8)	not	null)	
create	table	ABC.TABLEY	(
COL1	char(8)	not	null,
COL2	char(8)	not	null,
COL3	char(8)	not	null,
primary	key	(COL2,	COL3))
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Generated	Enforcing	Index
§ Enforces	unique	and	primary	key	constraints
§ Created	by	CREATE	TABLE	and	ALTER	TABLE
– Suppresses	creation	of	default	index
– Uses	default	values	for	index	attributes
– Cannot	be	altered	to	be	NOT	UNIQUE
– Cannot	be	dropped	with	DROP	INDEX	unless	replacement	defined
§ Generated	Index	names
– IDX###############
– ###	is	a	15	digit	number	unique	in	the	schema
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Replacing	a	Generated	Enforcing	Index
§ Use	CREATE	UNIQUE	INDEX	
§ Columns	must	match	enforcing	index
§ Inherits	enforcing	index	attribute
§ When	primary	key	index	dropped
– A	replacement	inherits	the	primary	key	attribute
§ Generated	indexes	dropped	automatically
§ Non-generated	indexes	must	be	manually	dropped
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Defining	Referential	Constraints
§ A	referential	constraint	is	specified	by	coding
– REFERENCES	clause	on	a	column	definition
– FOREIGN	KEY	clause	in	the	column	list
§ A	constraint	may	be	named	
– CONSTRAINT	name
– Precedes	the	constraint	definition
– If	not	named,	a	name	is	generated
§ GEN###############
§ More	than	one	referential	constraint	may	be	defined
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Referential	Constraints	Example
create	table	ABC.TABLEX	(
COL1	char	(8),
COL2	char(8),
foreign	key	(COL1,COL2)	references	TABLEP,																		
COL3	char(8)	not	null
constraint	CON1		references	TABLEP	(COL5))
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Discovering	Constraints
§ java.sql.DatabaseMetaData interface	methods
– getIndexInfo
– getPrimaryKeys
– getExportedKeys
– getImportedKeys
– getCrossReference
§ ODBC	API	functions
– SQLStatistics
– SQLPrimaryKeys
– SQLForeignKeys
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Standard	SQL	DDL
SQL	DDL	enhancements	enable	
CA	IDMS	to	support	database	
definitions	provided	by	popular	
tools	and	frameworks
CA	IDMS	19.0
CA	IDMS	19.0	enables	Java	and	
Windows	developers	to	use	
industry	standard	technology	
to	create,	access,	and	maintain	
CA	IDMS	databases
SQL	Virtual	Keys
SQL	Virtual	Foreign	Keys	enable	
developers	to	use	standard	SQL	
to	access	and	update	network	
databases	
Summary
A	Few	Words	to	Review
39 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX100S Strategy	and	Vision	for	CA	IDMS 11/16/2016	at	12:45	pm
MFX101S Legacy	is	not	a	Dirty	Word 11/16/2016	at	1:45	pm
MFX102S CA	IDMS	19.0	Web	Services	for	Modernization 11/16/2016	at	3:00	pm
MFX103S CA	IDMS	19.0	SQL	Enhancements	for	Modernization	 11/16/2016	at	3:30	pm
MFX104S Java	Access	to	CA-IDMS	Data	at	BT	(British	Telecom) 11/16/2016	at	4:45	pm
MFX105S
Implementation	and	Use	of	Generic	VTAM	Resources	
with	Parallel	SYSPLEX	Features	(CA and	CAXIA)
11/17/2016	at	12:45	pm
MFX106S CA	IDMS	Buffer	Tuning	 11/17/2016	at	1:45	pm
MFX107S M3A	Services	Monitor,	Measure,	Manage	and	Alert	 11/17/2016	at	3:00	pm
MFX108S Birds	of	a	Feather/Stump	the	Techie!	 11/17/2016	at	3:45	pm
40 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Demo	Name
Product	X
Theater	#	location
Demo	Name
Services	Y
Theater	#	location
Demo	Name
Solution	Y
Theater	#	location
Demo	Name
Product	X
Theater	#	location
41 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
42 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.43 @CAWORLD					#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

More Related Content

What's hot

Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowCA Technologies
 
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...CA Technologies
 
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...CA Technologies
 
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring CoveragePre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring CoverageCA Technologies
 
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...CA Technologies
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentCA Technologies
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
 
TechTalk: All You Want to Know About Docker and CA Testing Tools.
TechTalk: All You Want to Know About Docker and CA Testing Tools.TechTalk: All You Want to Know About Docker and CA Testing Tools.
TechTalk: All You Want to Know About Docker and CA Testing Tools.CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
 
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationPre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationCA Technologies
 
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertM3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertCA Technologies
 
TechTalk: What Happened in the Backend? The Power of DB Compare
TechTalk: What Happened in the Backend? The Power of DB CompareTechTalk: What Happened in the Backend? The Power of DB Compare
TechTalk: What Happened in the Backend? The Power of DB CompareCA Technologies
 
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...CA Technologies
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...CA Technologies
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumCA Technologies
 
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions CA Technologies
 
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementPre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementCA Technologies
 
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
Tech Talk: Keeping Applications Compliant and Secure Using Release AutomationTech Talk: Keeping Applications Compliant and Secure Using Release Automation
Tech Talk: Keeping Applications Compliant and Secure Using Release AutomationCA Technologies
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?CA Technologies
 

What's hot (20)

Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
 
Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...Case Study: Jack Henry & Associates Automates Application Deployments Through...
Case Study: Jack Henry & Associates Automates Application Deployments Through...
 
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring CoveragePre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
Pre-Con Ed: Triage and Diagnose Apps through Improved Monitoring Coverage
 
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
 
TechTalk: All You Want to Know About Docker and CA Testing Tools.
TechTalk: All You Want to Know About Docker and CA Testing Tools.TechTalk: All You Want to Know About Docker and CA Testing Tools.
TechTalk: All You Want to Know About Docker and CA Testing Tools.
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationPre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
 
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertM3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and Alert
 
TechTalk: What Happened in the Backend? The Power of DB Compare
TechTalk: What Happened in the Backend? The Power of DB CompareTechTalk: What Happened in the Backend? The Power of DB Compare
TechTalk: What Happened in the Backend? The Power of DB Compare
 
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
 
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
 
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementPre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
 
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
Tech Talk: Keeping Applications Compliant and Secure Using Release AutomationTech Talk: Keeping Applications Compliant and Secure Using Release Automation
Tech Talk: Keeping Applications Compliant and Secure Using Release Automation
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
 

Viewers also liked

Creating Web Applications with IDMS, COBOL and ADSO
Creating Web Applications with IDMS, COBOL and ADSOCreating Web Applications with IDMS, COBOL and ADSO
Creating Web Applications with IDMS, COBOL and ADSOMargaret Sliming
 
Advanced DBA – High Availability for Data
Advanced DBA – High Availability for DataAdvanced DBA – High Availability for Data
Advanced DBA – High Availability for DataCA Technologies
 
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...Spark Summit
 
Database Systems - Introduction (Chapter 1)
Database Systems - Introduction (Chapter 1)Database Systems - Introduction (Chapter 1)
Database Systems - Introduction (Chapter 1)Vidyasagar Mundroy
 
SparkR - Play Spark Using R (20160909 HadoopCon)
SparkR - Play Spark Using R (20160909 HadoopCon)SparkR - Play Spark Using R (20160909 HadoopCon)
SparkR - Play Spark Using R (20160909 HadoopCon)wqchen
 

Viewers also liked (6)

Creating Web Applications with IDMS, COBOL and ADSO
Creating Web Applications with IDMS, COBOL and ADSOCreating Web Applications with IDMS, COBOL and ADSO
Creating Web Applications with IDMS, COBOL and ADSO
 
Advanced DBA – High Availability for Data
Advanced DBA – High Availability for DataAdvanced DBA – High Availability for Data
Advanced DBA – High Availability for Data
 
Intro To IDMS
Intro To IDMSIntro To IDMS
Intro To IDMS
 
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
SparkR: The Past, the Present and the Future-(Shivaram Venkataraman and Rui S...
 
Database Systems - Introduction (Chapter 1)
Database Systems - Introduction (Chapter 1)Database Systems - Introduction (Chapter 1)
Database Systems - Introduction (Chapter 1)
 
SparkR - Play Spark Using R (20160909 HadoopCon)
SparkR - Play Spark Using R (20160909 HadoopCon)SparkR - Play Spark Using R (20160909 HadoopCon)
SparkR - Play Spark Using R (20160909 HadoopCon)
 

Similar to CA IDMS™ 19.0 SQL Enhancements for Modernization

Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...CA Technologies
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...CA Technologies
 
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...CA Technologies
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IICA Technologies
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldCA Technologies
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA DatacomCA Technologies
 
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part IModernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part ICA Technologies
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps CA Technologies
 
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowSlaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowCA Technologies
 
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...CA Technologies
 
Mainframe as a Service: Cloud Capabilities for Your Core Business Applications
Mainframe as a Service: Cloud Capabilities for Your Core Business ApplicationsMainframe as a Service: Cloud Capabilities for Your Core Business Applications
Mainframe as a Service: Cloud Capabilities for Your Core Business ApplicationsCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)CA Technologies
 
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementPre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementCA Technologies
 
Microservice Lifecycle Demo Presentation
Microservice Lifecycle Demo PresentationMicroservice Lifecycle Demo Presentation
Microservice Lifecycle Demo PresentationMatt McLarty
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...CA Technologies
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyCA Technologies
 
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...CA Technologies
 
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...CA Technologies
 

Similar to CA IDMS™ 19.0 SQL Enhancements for Modernization (20)

Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part IModernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowSlaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
 
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
 
Mainframe as a Service: Cloud Capabilities for Your Core Business Applications
Mainframe as a Service: Cloud Capabilities for Your Core Business ApplicationsMainframe as a Service: Cloud Capabilities for Your Core Business Applications
Mainframe as a Service: Cloud Capabilities for Your Core Business Applications
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
 
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementPre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
 
Microservice Lifecycle Demo Presentation
Microservice Lifecycle Demo PresentationMicroservice Lifecycle Demo Presentation
Microservice Lifecycle Demo Presentation
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
 
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
Hands-On Lab: Speed Configuration and Deployment With CA Unified Infrastructu...
 
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

CA IDMS™ 19.0 SQL Enhancements for Modernization