SlideShare a Scribd company logo
1 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Migrate from Terma Software Jaws to CA Workload
Automation iDash for Enhanced Workload Analytics
Jack McCarrick
DevOps: Continuous Delivery
eCLARO, Inc
Senior IT Consultant
DO4X178S
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Do you have the right tools to predict when SLAs might
be at risk? Join us and hear first-hand about how a
major technology company converted from JAWS to CA
Workload Automation iDash (CA iDash) to adopt a
powerful, real-time workload analytics and reporting
solution.
Jack McCarrick
Senior IT Consultant
eClaro, Inc.
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
MY BACKGROUND & OUR “WORKLOAD AUTOMATION” ENVIRONMENT
WHAT IS OUR “JAWS” ENVIRONMENT?
SUMMARY AND QUESTIONS
WHY DID WE CHOOSE IDASH?
MOVING FROM JAWS TO IDASH
IDASH ADVANTAGES: SOME NICE FEATURES
1
2
3
4
5
6
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
My Background
&
our “Workload Automation”
Environment
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
My Background….
 eClaro, Inc.
– ECLARO is a Business and Technology Consulting firm headquartered in
New York City with 14 offices across the United States, Canada and the
Philippines.
 Working through ECLARO since 1998 at a large technology
company (headquartered in Long Island, NY)
 I came out of the IBM Mainframe era! Started in 1974 with
OS/360 and progressed onwards! (Lots of Dinosaurs!)
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
My Background….
 IDMS Database
– DBA 1998 (1982) thru 2014 on the Mainframe
– System support (same period)
 ”CA Workload Automation AE (CA AutoSys®)” Admin
– Since 2004
– Release 3.4 to Release 4.5 conversion
– Release 4.5 to Release 11.0 conversion
– Undergoing upgrade from R 11.0 to R 11.3.6
 JAWS Admin and (now) CA iDash Admin
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Our CA AutoSys (“Workload Automation”) Environment
 Running Release 11.0 and Release 11.3.6, concurrently
 Workload Control Center (CA-WCC): running with all CA
AutoSys instances
– WCC Release 11.0 – we use ‘hard coded’ EEM Policies
– WCC Release 11.3.6 – we employ ‘behind the scenes’ EEM Policy code
– (this has impact on use of EEM with CA iDash – topic for another day!)
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Our CA AutoSys Instances:
“ACE”
Name
CA AutoSys
Environment
# Jobs # Runs/Day
“SVU” 11.0 TRN 27,600
“SVT” 11.0 DEV 36,200
“SVQ” 11.0 QA 28,400
“SVP” 11.0 PROD 26,000 500,000
“DV1” 11.3.6 Dev 8,600
“QA1” 11.3.6 QA 8,700
“PD1” 11.3.6 Prod 8,700 25,000
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
”What is our
JAWS
Environment?”
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Our JAWS Environment
 JAWS “Prod” and “Test” Instances
– Both 64 bit
– Prod is Release 3.5.6; Test is 4.3.4 (fairly ‘old’ releases)
 PROD JAWS: all production Job Streams
– Approximately 130 job streams
– 70 job streams are monitored by Users (we have had a ‘hard sell’)
 TEST JAWS: used for Admin ‘testing’
– Applying patches, upgrading the release, etc
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Focusing on our “Prod” JAWS Environment
 About 50 User tailored Reports
 Mainly used to issue SNMP output to generate emails
– “Job Stream Late” Alerts are 99% of those received
 “Real Time” monitoring not particularly used
 History: used, when needed, to ‘look back’ and investigate job
runs, etc
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
”Why did we choose
CA iDash ?”
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What made us choose CA iDash to replace JAWS?
 IT Management decided:
– To switch to a product that was more integrated with existing licensed
CA Software
– IT Management wants to maintain relationship with CA (stay in “CA
Family”)
– CA Tech Support was a major factor (same company)
 Cost was comparable: CA iDash was about 15% more to
license
– But……….
 “LICENSING”:
– This was a factor in our decision (see next slide)
Cost & Licensing
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
LICENSING: CA iDash vs JAWS
Licensed by “Number of CA AutoSys Jobs”
 Right now, our license is for 100,000 jobs
 JAWS Prod is set up for 60,000
 JAWS Test is set up for 40,000
 One JAWS instance can ‘see’ mutiple CA AutoSys instances
 (depending upon the license for that particular JAWS)
‘JAWS’
License NOT limited by “Number of CA AutoSys Jobs”
 No limit to number of CA iDash instances
 Currently, two (2): CA iDash ‘test’ and ‘prod’
 Will create a ‘sandbox’ CA iDash R12 Instance
 One CA iDash instance can ‘see’ mutiple CA AutoSys instances
 (no limit with regard to number of jobs)
‘CA iDash’
“No Limit to CA iDash Instances gives GREAT VALUE to its cost, even if it is slightly more than JAWS”
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What made us choose CA iDash to replace JAWS?
 Ease of Installation & Use
 Configuration for use is simple
 User Interface very friendly
 Reporting features
Other factors…..
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash at my current Client:
 Currently, TWO CA iDash instances
– “Prod”: sees CA AutoSys SVP & PD1 (Prod Release 1.0 & 11.3.6)
– “Test”: sees CA AutoSys SVP, SVQ, QA1
– We could ‘mix and match’, pretty much at will
– We could easily install another CA iDash instance (no license limits)
– Installations are 64 bit
 We shall install CA iDash Release 12 to explore (as of 9/25/2015)
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Converting JAWS Job Streams to CA iDash “SLAs”
 “Aim for the Target (job)”
– Find name of TARGET JOB (eg: C_ZZBJ0140010)
 Supply the JOB NAME
– Use the “SLA Helper” ( a Wizard); follow screens
– CA iDash reads job information; takes just moments
– Give the new SLA a name (if you wish it to be different from Job name)
 You are Off and Running (“in a (i) Dash”) !
“I created 40 SLAs (former Job Streams) in about two (2) hours”…Jack
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Converting JAWS Job Streams to CA iDash “SLAs”
 “We have COMPLEX Job Streams”
– In JAWS, the LEARNING CURVE was ‘lengthy’
– All our night batch streams required heavy TRIMMING, just to make
the flow view ‘humanly understandable’
– Trimming took many hours, resulted in a “Critical Path” view
 CA iDash “SLA” generation:
– The WIZARD is a great “plus”
– Generation of SLA job flows takes moments (for complex flows)
– You get the Critical Path (“trimmed”) view AUTOMATICALLY!
– Thus, NO learning curve (or, not as much) !
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
SLA Created !
CA iDash
Created this
SLA
Definition in
about 3
seconds
“SLA
creation
seems
markedly
faster than
Job Stream
generation”
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Converse: SLA Deletion? – “Admin performance”
“Saves time for the CA iDash Admin”
“SLA DELETION is
quick! Even if the
full SLA structure is
complex”
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
You can get Run History right away !
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
“CA iDash Advantages”
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “SLAs” vs JAWS “Job Stream”
 The SLA is already TRIMMED! (default)
– JAWS job streams, especially if ‘complex’, require effort (man hours) to
edit down to a recognizable view
– CA iDash does this automatically
– Saves time in SLA preparation (“it can save hours of work”)
– Less of a ‘learning curve’ for the CA iDash Admin
 Now, CA iDash does maintain the complexity internally…..
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “SLA” - automatically TRIMMED:
The “trimmed”
SLA is called
the
CRITICAL
PATH
This is about one-third
of the graphical view of
the
Critical Path
(done for presentation
purposes)
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
..same CA iDash “SLA” - the full monty !....
This is about 1/10 of the full graphical view !!
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
We also like this….
 SEPARATION of Job Flow and GANTT displays
 JAWS:
– Combined into ONE display
 CA iDash:
– Job Flow display
– GANTT display
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
JAWS
This GANTT display also indicates a ‘semblance’ of the actual Job Flow
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash:
This Job Flow display shows the static dependencies
30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash:
”GANTT” display of same Job Flow
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Real Time” Monitoring
Similar
to
JAWS
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Btw…here is that same flow, FULL display
“Critical Path Distilled”
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”
 Similar to JAWS, CA iDash has ‘shells’ of report types:
– Job Status Reports - CA AutoSys Event Reports
– Job Run Reports - SLA Trend Reports
– All are TAILORABLE for your needs
 Have you ever had users ask for CA AutoSys information?
– “I find myself using CA iDash more than I did JAWS to satisfy requests”
– “When did job XYZ run last week?”
– “I need all job Failures from 6am to 8am last Thursday”
34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”…..continued
 “Server Statistic Report”
– Gives you Graphical and Detail views (not in JAWS)
– Reports upon LATENCY automatically!
 In JAWS reports, you must ‘deduce’ latency to some extent
 (see examples on next slide)
Reporting features not available in JAWS.
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”…..LATENCY
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”…..EVENT
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”…..Detail (Latency & Events)
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”…..continued
 “CA AutoSys AUTOTRACK Reports”
– (one of my favorites!)
 When I am asked ‘who Force Started a job on Nov 1st ?”
 Go to CA AutoSys LOG, extract (grep) the log records for job and date/time
 Verify the event/run (force start)
 The LOG does NOT have the User ID who Force Started job
 But.. Autotrack does …..so, I run an Autotrack ‘scan’, create a file
 File has event (FORCE_START) and some user IDs
 I have to ‘match up’ the LOG and Autotrack date/time and ESTIMATE!
Reporting features not available in JAWS.
39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”…..continued
 “CA AutoSys AUTOTRACK Reports”
– (one of my favorites!)
 CA iDash does that work automatically
– Specify job(s), date range, etc., and…..
– Out comes your report!
– It’s as easy as that – and saves research time!
 (As with all reports, output can be HTML, XLS, PDF, CSV)
Reporting features not available in JAWS.
40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash “Reporting”…..my favorite (not in JAWS)
41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash - “Building Job History”:
“Here’s another feature we like a lot!”
 Both JAWS and CA iDash need CA AutoSys job history to
function
 CA AutoSys generates Job Run, Event, Audit history (once a
day)
 Both JAWS and CA iDash read this data (series of files)
 For JAWS, these files (“they can be quite large”) are COPIED
from the CA AutoSys server to the JAWS server to be read
42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash - “Building Job History”: (continued)
 For CA iDash, you have an option:
– Install an “CA iDash Agent” on your CA AutoSys server
– Then, from your CA AutoSys server, run the IDARCHIVE command
– IDARCHIVE will load the history data from where the files reside!
– You don’t need to COPY the history data
– (SAVES THE COPY EFFORT, AS WELL AS DISK SPACE)
– You can even run the IDARCHIVE command in an CA AutoSys job!
 “This is an CA iDash Admin feature we like a lot”
43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Example: CA iDash could do this, JAWS could not
 Request: if the Target Job runs over 60 minutes
– In this case, JAWS will **NOT** “TRIM out” the Parent jobs
– Job Stream monitoring MUST start at 12:00am, not 2:45am
– JAWS tends to monitor ‘job flows’
44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash: single job SLA was NOT an issue:
“Just select
the “SLA”
Job and let
CA iDash
monitor it!”
45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA iDash: single job SLA: (part of job flow dependencies)
“The SLA Job (in blue)
is tracked.
But, CA iDash still
knows about all the
previous
dependencies in the
entire job flow!”
CA iDash can track
Job Flows or SINGLE
jobs
46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
SUMMARY: (my own interpretation)
 Not trying to push CA iDash over JAWS – both are great
products!
 But, if you are curious, have an interest in CA iDash…. then…
– I definitely recommend to have a look at it!
– If you are a JAWS user: install CA iDash and test it out
– CA would gladly do a Proof Of Concept install for you
– You will definitely find things you like!
– Even if JAWS and CA iDash ‘come out even’, perhaps LICENSING could be
a deciding factor
– If you run CA AutoSys (WA) or CA 7®, CA iDash will complement them!
47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What would I like to see in CA iDash! (current: R 11.4)
 REPORTING: select criteria are Jobs, Machines, Statuses,
etc,..and DAYS! (eg: Nov 16th to Nov 20th)
– it would be nice if we could restrict to specific hours or ‘windows’ of
time in a day
– For example: “All Mornings last week”
 SNMP: include additional SLA fields that can be trapped by
network monitors such as NNMi and Open View (“give email
recipients additional info about their SLA”)
Thank You
49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow Conversations At…
CA Workload Automation
Mainframe Theatre
CA Workload Automation iDash
DevOps Continuous Delivery Theatre
Thursday 1:00PM
50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
CA Technologies
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization Adoption
CA Technologies
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
CA Technologies
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
CA Technologies
 
CA PPM 14.x Agile Integrations
CA PPM14.x Agile IntegrationsCA PPM14.x Agile Integrations
CA PPM 14.x Agile Integrations
CA Technologies
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
CA Technologies
 
Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...
CA Technologies
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
CA Technologies
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
CA Technologies
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
CA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
CA Technologies
 
Continuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value ChainContinuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value Chain
CA Technologies
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
CA Technologies
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
CA Technologies
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
CA Technologies
 
Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in? Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in?
CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
CA Technologies
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Technologies
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
CA Technologies
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication Solution
CA Technologies
 

What's hot (20)

Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization Adoption
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
CA PPM 14.x Agile Integrations
CA PPM14.x Agile IntegrationsCA PPM14.x Agile Integrations
CA PPM 14.x Agile Integrations
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Continuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value ChainContinuous Delivery: the Strongest Link in Your Value Chain
Continuous Delivery: the Strongest Link in Your Value Chain
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in? Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in?
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent Bystander
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication Solution
 

Viewers also liked

Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
CA Technologies
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
CA Technologies
 
How CSBP Turbocharged Its Enterprise Job Scheduling Capability
How CSBP Turbocharged Its Enterprise Job Scheduling CapabilityHow CSBP Turbocharged Its Enterprise Job Scheduling Capability
How CSBP Turbocharged Its Enterprise Job Scheduling Capability
InSync Conference
 
Challenges in Optimizing Job Scheduling on Mesos
Challenges in Optimizing Job Scheduling on MesosChallenges in Optimizing Job Scheduling on Mesos
Challenges in Optimizing Job Scheduling on Mesos
Alex D. Gaudio
 
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
CA Technologies
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
CA Technologies
 
Continuous integrations - Basics
Continuous integrations - BasicsContinuous integrations - Basics
Continuous integrations - Basics
Barış İNANÇ
 
Forrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationForrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automation
Sathish Nagarajan
 
Business Intelligence Release Management Best Practices
Business Intelligence Release Management Best PracticesBusiness Intelligence Release Management Best Practices
Business Intelligence Release Management Best Practices
John Heaton
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
CA Technologies
 
Leading DevOps Application Release and Deployment - Best Practices for Organi...
Leading DevOps Application Release and Deployment - Best Practices for Organi...Leading DevOps Application Release and Deployment - Best Practices for Organi...
Leading DevOps Application Release and Deployment - Best Practices for Organi...
IBM UrbanCode Products
 
R12 subledgeraccountingandgl
R12 subledgeraccountingandglR12 subledgeraccountingandgl
R12 subledgeraccountingandglRam Niket Kumar
 
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
CA Technologies
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration Topics
CA Technologies
 
Best practices in release management
Best  practices in release managementBest  practices in release management
Best practices in release management
Abhinav Sabharwal- Business Analyst Mumbai
 
Application release-automation-with-zero-touch-deployment
Application release-automation-with-zero-touch-deploymentApplication release-automation-with-zero-touch-deployment
Application release-automation-with-zero-touch-deploymentPraveen John kumar
 
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
CA Technologies
 
How Application Release Automation Powers DevOps
How Application Release Automation Powers DevOpsHow Application Release Automation Powers DevOps
How Application Release Automation Powers DevOps
XebiaLabs
 
Continuous Delivery in the Enterprise - with IBM UrbanCode
Continuous Delivery in the Enterprise - with IBM UrbanCodeContinuous Delivery in the Enterprise - with IBM UrbanCode
Continuous Delivery in the Enterprise - with IBM UrbanCode
IBM UrbanCode Products
 
The Evolution of Application Release Automation
The Evolution of Application Release AutomationThe Evolution of Application Release Automation
The Evolution of Application Release Automation
XebiaLabs
 

Viewers also liked (20)

Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
 
How CSBP Turbocharged Its Enterprise Job Scheduling Capability
How CSBP Turbocharged Its Enterprise Job Scheduling CapabilityHow CSBP Turbocharged Its Enterprise Job Scheduling Capability
How CSBP Turbocharged Its Enterprise Job Scheduling Capability
 
Challenges in Optimizing Job Scheduling on Mesos
Challenges in Optimizing Job Scheduling on MesosChallenges in Optimizing Job Scheduling on Mesos
Challenges in Optimizing Job Scheduling on Mesos
 
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
 
Continuous integrations - Basics
Continuous integrations - BasicsContinuous integrations - Basics
Continuous integrations - Basics
 
Forrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationForrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automation
 
Business Intelligence Release Management Best Practices
Business Intelligence Release Management Best PracticesBusiness Intelligence Release Management Best Practices
Business Intelligence Release Management Best Practices
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
 
Leading DevOps Application Release and Deployment - Best Practices for Organi...
Leading DevOps Application Release and Deployment - Best Practices for Organi...Leading DevOps Application Release and Deployment - Best Practices for Organi...
Leading DevOps Application Release and Deployment - Best Practices for Organi...
 
R12 subledgeraccountingandgl
R12 subledgeraccountingandglR12 subledgeraccountingandgl
R12 subledgeraccountingandgl
 
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration Topics
 
Best practices in release management
Best  practices in release managementBest  practices in release management
Best practices in release management
 
Application release-automation-with-zero-touch-deployment
Application release-automation-with-zero-touch-deploymentApplication release-automation-with-zero-touch-deployment
Application release-automation-with-zero-touch-deployment
 
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
 
How Application Release Automation Powers DevOps
How Application Release Automation Powers DevOpsHow Application Release Automation Powers DevOps
How Application Release Automation Powers DevOps
 
Continuous Delivery in the Enterprise - with IBM UrbanCode
Continuous Delivery in the Enterprise - with IBM UrbanCodeContinuous Delivery in the Enterprise - with IBM UrbanCode
Continuous Delivery in the Enterprise - with IBM UrbanCode
 
The Evolution of Application Release Automation
The Evolution of Application Release AutomationThe Evolution of Application Release Automation
The Evolution of Application Release Automation
 

Similar to Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced Workload Analytics

CA Workload Automation iDash: Real World Use
CA Workload Automation iDash: Real World UseCA Workload Automation iDash: Real World Use
CA Workload Automation iDash: Real World Use
CA Technologies
 
Case Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCase Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 Days
CA Technologies
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
CA Technologies
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Technologies
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
CA Technologies
 
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
CA Technologies
 
Blazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsBlazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast Apps
CA Technologies
 
iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015
iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015
iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015
Extra Technology
 
Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...
Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...
Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...
CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
CA Technologies
 
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
CA Technologies
 
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
CA Technologies
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
CA Technologies
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
CA Technologies
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
CA Technologies
 
See Inside the Middleware Black Box
See Inside the Middleware Black Box See Inside the Middleware Black Box
See Inside the Middleware Black Box
CA Technologies
 
Why and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in AzureWhy and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in Azure
Riverbed Technology
 
Why and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureWhy and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in Azure
Ian Downard
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
CA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
CA Technologies
 

Similar to Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced Workload Analytics (20)

CA Workload Automation iDash: Real World Use
CA Workload Automation iDash: Real World UseCA Workload Automation iDash: Real World Use
CA Workload Automation iDash: Real World Use
 
Case Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCase Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 Days
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
 
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
 
Blazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsBlazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast Apps
 
iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015
iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015
iDash for CA7 and AutoSys - CA Workload Automation Technology Summit (WATS) 2015
 
Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...
Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...
Case Study: VF Corporation Takes a Practical Approach to Improving its MOJO w...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
 
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
See Inside the Middleware Black Box
See Inside the Middleware Black Box See Inside the Middleware Black Box
See Inside the Middleware Black Box
 
Why and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in AzureWhy and How to Monitor Application Performance in Azure
Why and How to Monitor Application Performance in Azure
 
Why and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureWhy and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in Azure
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced Workload Analytics

  • 1. 1 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced Workload Analytics Jack McCarrick DevOps: Continuous Delivery eCLARO, Inc Senior IT Consultant DO4X178S
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Do you have the right tools to predict when SLAs might be at risk? Join us and hear first-hand about how a major technology company converted from JAWS to CA Workload Automation iDash (CA iDash) to adopt a powerful, real-time workload analytics and reporting solution. Jack McCarrick Senior IT Consultant eClaro, Inc.
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda MY BACKGROUND & OUR “WORKLOAD AUTOMATION” ENVIRONMENT WHAT IS OUR “JAWS” ENVIRONMENT? SUMMARY AND QUESTIONS WHY DID WE CHOOSE IDASH? MOVING FROM JAWS TO IDASH IDASH ADVANTAGES: SOME NICE FEATURES 1 2 3 4 5 6
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD My Background & our “Workload Automation” Environment
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD My Background….  eClaro, Inc. – ECLARO is a Business and Technology Consulting firm headquartered in New York City with 14 offices across the United States, Canada and the Philippines.  Working through ECLARO since 1998 at a large technology company (headquartered in Long Island, NY)  I came out of the IBM Mainframe era! Started in 1974 with OS/360 and progressed onwards! (Lots of Dinosaurs!)
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD My Background….  IDMS Database – DBA 1998 (1982) thru 2014 on the Mainframe – System support (same period)  ”CA Workload Automation AE (CA AutoSys®)” Admin – Since 2004 – Release 3.4 to Release 4.5 conversion – Release 4.5 to Release 11.0 conversion – Undergoing upgrade from R 11.0 to R 11.3.6  JAWS Admin and (now) CA iDash Admin
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Our CA AutoSys (“Workload Automation”) Environment  Running Release 11.0 and Release 11.3.6, concurrently  Workload Control Center (CA-WCC): running with all CA AutoSys instances – WCC Release 11.0 – we use ‘hard coded’ EEM Policies – WCC Release 11.3.6 – we employ ‘behind the scenes’ EEM Policy code – (this has impact on use of EEM with CA iDash – topic for another day!)
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Our CA AutoSys Instances: “ACE” Name CA AutoSys Environment # Jobs # Runs/Day “SVU” 11.0 TRN 27,600 “SVT” 11.0 DEV 36,200 “SVQ” 11.0 QA 28,400 “SVP” 11.0 PROD 26,000 500,000 “DV1” 11.3.6 Dev 8,600 “QA1” 11.3.6 QA 8,700 “PD1” 11.3.6 Prod 8,700 25,000
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ”What is our JAWS Environment?”
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Our JAWS Environment  JAWS “Prod” and “Test” Instances – Both 64 bit – Prod is Release 3.5.6; Test is 4.3.4 (fairly ‘old’ releases)  PROD JAWS: all production Job Streams – Approximately 130 job streams – 70 job streams are monitored by Users (we have had a ‘hard sell’)  TEST JAWS: used for Admin ‘testing’ – Applying patches, upgrading the release, etc
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Focusing on our “Prod” JAWS Environment  About 50 User tailored Reports  Mainly used to issue SNMP output to generate emails – “Job Stream Late” Alerts are 99% of those received  “Real Time” monitoring not particularly used  History: used, when needed, to ‘look back’ and investigate job runs, etc
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ”Why did we choose CA iDash ?”
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What made us choose CA iDash to replace JAWS?  IT Management decided: – To switch to a product that was more integrated with existing licensed CA Software – IT Management wants to maintain relationship with CA (stay in “CA Family”) – CA Tech Support was a major factor (same company)  Cost was comparable: CA iDash was about 15% more to license – But……….  “LICENSING”: – This was a factor in our decision (see next slide) Cost & Licensing
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD LICENSING: CA iDash vs JAWS Licensed by “Number of CA AutoSys Jobs”  Right now, our license is for 100,000 jobs  JAWS Prod is set up for 60,000  JAWS Test is set up for 40,000  One JAWS instance can ‘see’ mutiple CA AutoSys instances  (depending upon the license for that particular JAWS) ‘JAWS’ License NOT limited by “Number of CA AutoSys Jobs”  No limit to number of CA iDash instances  Currently, two (2): CA iDash ‘test’ and ‘prod’  Will create a ‘sandbox’ CA iDash R12 Instance  One CA iDash instance can ‘see’ mutiple CA AutoSys instances  (no limit with regard to number of jobs) ‘CA iDash’ “No Limit to CA iDash Instances gives GREAT VALUE to its cost, even if it is slightly more than JAWS”
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What made us choose CA iDash to replace JAWS?  Ease of Installation & Use  Configuration for use is simple  User Interface very friendly  Reporting features Other factors…..
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash at my current Client:  Currently, TWO CA iDash instances – “Prod”: sees CA AutoSys SVP & PD1 (Prod Release 1.0 & 11.3.6) – “Test”: sees CA AutoSys SVP, SVQ, QA1 – We could ‘mix and match’, pretty much at will – We could easily install another CA iDash instance (no license limits) – Installations are 64 bit  We shall install CA iDash Release 12 to explore (as of 9/25/2015)
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Converting JAWS Job Streams to CA iDash “SLAs”  “Aim for the Target (job)” – Find name of TARGET JOB (eg: C_ZZBJ0140010)  Supply the JOB NAME – Use the “SLA Helper” ( a Wizard); follow screens – CA iDash reads job information; takes just moments – Give the new SLA a name (if you wish it to be different from Job name)  You are Off and Running (“in a (i) Dash”) ! “I created 40 SLAs (former Job Streams) in about two (2) hours”…Jack
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Converting JAWS Job Streams to CA iDash “SLAs”  “We have COMPLEX Job Streams” – In JAWS, the LEARNING CURVE was ‘lengthy’ – All our night batch streams required heavy TRIMMING, just to make the flow view ‘humanly understandable’ – Trimming took many hours, resulted in a “Critical Path” view  CA iDash “SLA” generation: – The WIZARD is a great “plus” – Generation of SLA job flows takes moments (for complex flows) – You get the Critical Path (“trimmed”) view AUTOMATICALLY! – Thus, NO learning curve (or, not as much) !
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD SLA Created ! CA iDash Created this SLA Definition in about 3 seconds “SLA creation seems markedly faster than Job Stream generation”
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Converse: SLA Deletion? – “Admin performance” “Saves time for the CA iDash Admin” “SLA DELETION is quick! Even if the full SLA structure is complex”
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD You can get Run History right away !
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD “CA iDash Advantages”
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “SLAs” vs JAWS “Job Stream”  The SLA is already TRIMMED! (default) – JAWS job streams, especially if ‘complex’, require effort (man hours) to edit down to a recognizable view – CA iDash does this automatically – Saves time in SLA preparation (“it can save hours of work”) – Less of a ‘learning curve’ for the CA iDash Admin  Now, CA iDash does maintain the complexity internally…..
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “SLA” - automatically TRIMMED: The “trimmed” SLA is called the CRITICAL PATH This is about one-third of the graphical view of the Critical Path (done for presentation purposes)
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ..same CA iDash “SLA” - the full monty !.... This is about 1/10 of the full graphical view !!
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We also like this….  SEPARATION of Job Flow and GANTT displays  JAWS: – Combined into ONE display  CA iDash: – Job Flow display – GANTT display
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD JAWS This GANTT display also indicates a ‘semblance’ of the actual Job Flow
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash: This Job Flow display shows the static dependencies
  • 30. 30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash: ”GANTT” display of same Job Flow
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Real Time” Monitoring Similar to JAWS
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Btw…here is that same flow, FULL display “Critical Path Distilled”
  • 33. 33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”  Similar to JAWS, CA iDash has ‘shells’ of report types: – Job Status Reports - CA AutoSys Event Reports – Job Run Reports - SLA Trend Reports – All are TAILORABLE for your needs  Have you ever had users ask for CA AutoSys information? – “I find myself using CA iDash more than I did JAWS to satisfy requests” – “When did job XYZ run last week?” – “I need all job Failures from 6am to 8am last Thursday”
  • 34. 34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”…..continued  “Server Statistic Report” – Gives you Graphical and Detail views (not in JAWS) – Reports upon LATENCY automatically!  In JAWS reports, you must ‘deduce’ latency to some extent  (see examples on next slide) Reporting features not available in JAWS.
  • 35. 35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”…..LATENCY
  • 36. 36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”…..EVENT
  • 37. 37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”…..Detail (Latency & Events)
  • 38. 38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”…..continued  “CA AutoSys AUTOTRACK Reports” – (one of my favorites!)  When I am asked ‘who Force Started a job on Nov 1st ?”  Go to CA AutoSys LOG, extract (grep) the log records for job and date/time  Verify the event/run (force start)  The LOG does NOT have the User ID who Force Started job  But.. Autotrack does …..so, I run an Autotrack ‘scan’, create a file  File has event (FORCE_START) and some user IDs  I have to ‘match up’ the LOG and Autotrack date/time and ESTIMATE! Reporting features not available in JAWS.
  • 39. 39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”…..continued  “CA AutoSys AUTOTRACK Reports” – (one of my favorites!)  CA iDash does that work automatically – Specify job(s), date range, etc., and….. – Out comes your report! – It’s as easy as that – and saves research time!  (As with all reports, output can be HTML, XLS, PDF, CSV) Reporting features not available in JAWS.
  • 40. 40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash “Reporting”…..my favorite (not in JAWS)
  • 41. 41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash - “Building Job History”: “Here’s another feature we like a lot!”  Both JAWS and CA iDash need CA AutoSys job history to function  CA AutoSys generates Job Run, Event, Audit history (once a day)  Both JAWS and CA iDash read this data (series of files)  For JAWS, these files (“they can be quite large”) are COPIED from the CA AutoSys server to the JAWS server to be read
  • 42. 42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash - “Building Job History”: (continued)  For CA iDash, you have an option: – Install an “CA iDash Agent” on your CA AutoSys server – Then, from your CA AutoSys server, run the IDARCHIVE command – IDARCHIVE will load the history data from where the files reside! – You don’t need to COPY the history data – (SAVES THE COPY EFFORT, AS WELL AS DISK SPACE) – You can even run the IDARCHIVE command in an CA AutoSys job!  “This is an CA iDash Admin feature we like a lot”
  • 43. 43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: CA iDash could do this, JAWS could not  Request: if the Target Job runs over 60 minutes – In this case, JAWS will **NOT** “TRIM out” the Parent jobs – Job Stream monitoring MUST start at 12:00am, not 2:45am – JAWS tends to monitor ‘job flows’
  • 44. 44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash: single job SLA was NOT an issue: “Just select the “SLA” Job and let CA iDash monitor it!”
  • 45. 45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA iDash: single job SLA: (part of job flow dependencies) “The SLA Job (in blue) is tracked. But, CA iDash still knows about all the previous dependencies in the entire job flow!” CA iDash can track Job Flows or SINGLE jobs
  • 46. 46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD SUMMARY: (my own interpretation)  Not trying to push CA iDash over JAWS – both are great products!  But, if you are curious, have an interest in CA iDash…. then… – I definitely recommend to have a look at it! – If you are a JAWS user: install CA iDash and test it out – CA would gladly do a Proof Of Concept install for you – You will definitely find things you like! – Even if JAWS and CA iDash ‘come out even’, perhaps LICENSING could be a deciding factor – If you run CA AutoSys (WA) or CA 7®, CA iDash will complement them!
  • 47. 47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What would I like to see in CA iDash! (current: R 11.4)  REPORTING: select criteria are Jobs, Machines, Statuses, etc,..and DAYS! (eg: Nov 16th to Nov 20th) – it would be nice if we could restrict to specific hours or ‘windows’ of time in a day – For example: “All Mornings last week”  SNMP: include additional SLA fields that can be trapped by network monitors such as NNMi and Open View (“give email recipients additional info about their SLA”)
  • 49. 49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow Conversations At… CA Workload Automation Mainframe Theatre CA Workload Automation iDash DevOps Continuous Delivery Theatre Thursday 1:00PM
  • 50. 50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15