Responsible for reviewing the system requirements and performing the installation process.
Connect to IBM InfoSphere DataStage server
Control-M Administrator: Responsible for connecting Control-M to the IBM InfoSphere DataStage server.
Create Control-M for IBM InfoSphere DataStage accounts
Control-M Administrator: Responsible for creating accounts to access IBM InfoSphere DataStage jobs.
Define Control-M for IBM InfoSphere DataStage jobs
Control-M Production Controller: Responsible for defining IBM InfoSphere DataStage jobs in Control-M.
Monitor Control-M for IBM InfoSphere DataStage jobs
Control-M Production Controller: Responsible for monitoring the execution of IBM InfoSphere DataStage jobs
How to choose the right Integration Framework - Apache Camel (JBoss, Talend),...Kai Wähner
Data exchanges between companies increase a lot. The number of applications which must be integrated increases, too. The interfaces use different technologies, protocols and data formats. Nevertheless, the integration of these applications shall be modeled in a standardized way, realized efficiently and supported by automatic tests.
Three integration frameworks are available in the JVM environment, which fulfil these requirements: Apache Camel, Spring Integration and Mule. They implement the well-known Enteprise Integration Patterns (EIP) and therefore offers a standardized, domain-specific language to integrate applications.
These Integration Frameworks can be used in almost every integration project within the JVM environment - no matter which technologies, transport protocols or data formats are used. All integration projects can be realized in a consistent way without redundant boilerplate code.
This session shows and compares the three alternatives and discusses their pros and cons. Besides, a recommendation will be given when to use a more powerful Enterprise Service Bus (ESB) instead of one of these frameworks.
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현NAVER Engineering
네이버 오픈소스 세미나 - Performance does matter
2019.07.11
<세션 요약>
네이버 서비스에서 사내 서버리스 플랫폼까지 흘러가는 트랜잭션을 추적하고 분석하기 위해 개발한 Pinpoint의 Apache Openwhisk 플러그인과 그 개발 과정을 소개합니다.
Apache Openwhisk는 서버리스 플랫폼을 구축할 수 있는 오픈소스 프로젝트로 스칼라 언어와 Akka 라이브러리를 사용한 Actor 모델에 기반하고 있습니다. 스칼라 언어로 작성된 애플리케이션을 위한 Pinpoint 플러그인을 만들면서 겪었던 문제들과 해결했던 과정들을 위주로 설명드릴 예정입니다.
<연사 소개>
네이버에서 Serverless 플랫폼을 개발하고 있으며, 다양한 오픈소스 프로젝트에 관심이 많습니다.
Apache Openwhisk contributor로 활동하면서, Openwhisk 기반 서버리스 플랫폼의 트레이싱을 위한 Pinpoint 플러그인을 개발하고 컨트리뷰션을 진행하고 있습니다.
How to choose the right Integration Framework - Apache Camel (JBoss, Talend),...Kai Wähner
Data exchanges between companies increase a lot. The number of applications which must be integrated increases, too. The interfaces use different technologies, protocols and data formats. Nevertheless, the integration of these applications shall be modeled in a standardized way, realized efficiently and supported by automatic tests.
Three integration frameworks are available in the JVM environment, which fulfil these requirements: Apache Camel, Spring Integration and Mule. They implement the well-known Enteprise Integration Patterns (EIP) and therefore offers a standardized, domain-specific language to integrate applications.
These Integration Frameworks can be used in almost every integration project within the JVM environment - no matter which technologies, transport protocols or data formats are used. All integration projects can be realized in a consistent way without redundant boilerplate code.
This session shows and compares the three alternatives and discusses their pros and cons. Besides, a recommendation will be given when to use a more powerful Enterprise Service Bus (ESB) instead of one of these frameworks.
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현NAVER Engineering
네이버 오픈소스 세미나 - Performance does matter
2019.07.11
<세션 요약>
네이버 서비스에서 사내 서버리스 플랫폼까지 흘러가는 트랜잭션을 추적하고 분석하기 위해 개발한 Pinpoint의 Apache Openwhisk 플러그인과 그 개발 과정을 소개합니다.
Apache Openwhisk는 서버리스 플랫폼을 구축할 수 있는 오픈소스 프로젝트로 스칼라 언어와 Akka 라이브러리를 사용한 Actor 모델에 기반하고 있습니다. 스칼라 언어로 작성된 애플리케이션을 위한 Pinpoint 플러그인을 만들면서 겪었던 문제들과 해결했던 과정들을 위주로 설명드릴 예정입니다.
<연사 소개>
네이버에서 Serverless 플랫폼을 개발하고 있으며, 다양한 오픈소스 프로젝트에 관심이 많습니다.
Apache Openwhisk contributor로 활동하면서, Openwhisk 기반 서버리스 플랫폼의 트레이싱을 위한 Pinpoint 플러그인을 개발하고 컨트리뷰션을 진행하고 있습니다.
IBM WebSphere MQ V8 Security Features: Deep DiveMorag Hughson
This presentation takes a detailed look at three features in the newly announced IBM WebSphere MQ V8 product: Hostnames in CHLAUTH; Changes for Channels using SSL/TLS Certificates; and User ID & Password Connection Authentication. Full notes pages are provided.
This presentation took place at R ladies Taipei on July 31, 2023.
Hugging Face can be described as the GitHub for AI models. Initially, it was born to address the difficulty and incompatibility of natural language models. Now, besides open-source AI models for natural language, there are numerous other open-source AI models available on the platform. According to leaked documents from Google, open-source AI models are likely to dominate the development of the entire industry in the future. Therefore, the role of Hugging Face is becoming increasingly important.
This talk is designed for beginners in Hugging Face. It will guide you through using the natural language processing models from Hugging Face.
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
Interactive voice conversion for augmented speech productionNU_I_TODALAB
Invited Talk at SNL 2021
Title: "Interactive voice conversion for augmented speech production"
Speaker: Tomoki Toda
Toda Laboratory, Department of Intelligent Systems, Graduate School of Informatics, Nagoya University
CNA(Cloud Native Architecture)
MSA(Micro Service Architecture)
Service Mesh
MDA(Micro Data Architecture)
Data Mesh
MIA(Micro Inference Architecture)
Inference Mesh
Presentation done at Kamailio World 2014, Berlin, Germanu - several methods to do asynchronous SIP routing via Kamailio configuration file. Blend modules such as tm, tmx, mqueue, rtimer, async, evapi, etc. to suspend routing of current SIP request and resume that once processing of additional tasks has finished.
Distributed Solar Systems at EDF Renewables and AWS IoT: A Natural Fit (PUT30...Amazon Web Services
The AWS suite of managed services for IoT enables companies to quickly and easily deploy devices to the edge and synchronize their industrial time-series data from multiple sites to the AWS Cloud, where advanced analytics and machine learning can generate valuable insights about their business. In this session, learn how EDF Renewables used AWS Greengrass, AWS IoT Core, AWS IoT Analytics, and AWS Lambda to facilitate the collection, aggregation, and quality assurance of operational data from solar installations. Hear how working with AWS Professional Services transformed its approach to product development, and learn what challenges and solutions came with choosing leading-edge services form AWS.
Altinity Cluster Manager: ClickHouse Management for Kubernetes and CloudAltinity Ltd
Webinar. August 21, 2019
By Robert Hodges and Altinity Engineering Team
Simplified management is a prerequisite for running any data warehouse at scale. Altinity is developing a new web-based console for ClickHouse called the Altinity Cluster Manager. It's now in beta and offers simplified operation of ClickHouse installations for users. In this webinar we introduce the ACM and demonstrate use on Kubernetes as well as Amazon Web Services. Attendees are welcome to sign up as beta testers and provide feedback. Please join us to see the future of Clickhouse management!
Functional and non functional application loggingSander De Vos
This presentation will help you understand the importance of logging in applications. Every project is encountered with this aspect, functional or non-functional.This will become more and more important with current innovations: mobile (~offline) applications, SOA-architectures, Cloud integration.
An overview of the Java Logging-ecospace is discussed.
Eventually, the results are processed and analyzed with facilitating tools.
What is logging?
Why logging?
Who uses logs and what are they used for?
What needs to be logged?
How to log in Java
Log processing and analysis
Zabbix Inventory Indo alem do monitoramento.
Qual a definição de Inventário ?
De uma forma sucinta, um inventário (do latim inventariu) é uma relação dos bens pertencentes a uma empresa, se refere ao bens disponíveis em estoque para uso normal de um negócio e seus colaboradores, Costumam conter a descrição do produto,informações de hardware,software , entre outros, bem como a quantidade existente e o local onde se encontra.
inventário de ativos e o controle patrimonial!
Tendo em vista a definição pontuada do inventário de bens patrimonial de TI, sua ligação ao inventário de ativos é direta.
Os ativos são os bens das empresas, desta forma a associação pode ser feita de forma simples. Mas qual a relação do inventário de ativos e o controle patrimonial de um empreendimento? A resposta parece ser intuitiva, e é mesmo! De forma análoga, pense não somente em pequenas empresas, mas também em grandes empreendimentos que possuam grande quantidade de ativos. É necessário ter o controle de todos os bens da empresa, não somente para fins legais e contábeis, mas também por segurança.
O inventário de ativos tem como papel principal manter registros atualizados para os gestores, sobre todos os bens do empreendimento, além de garantir um controle sobre os mesmos, evitando furtos, depreciações e afins.
Zabbix do Monitoramento ao inventario.
A ideia de utilizar o zabbix para um inventario de rede foi centralizar e otimizar informações alem do monitoramento ao inventario em uma unica solução!
A iniciativa foi utilizar o WMI nativo da solução de monitoramento Zabbix transformando a mesma em uma solução de inventario de custo 0 para o empreendimento, então faça as contas!
whats? How is it ?
Não me pergunte como , veja os resultados.
Do the math!
Licenciamento zabbix: 0800.
Outras soluções ???
IBM WebSphere MQ V8 Security Features: Deep DiveMorag Hughson
This presentation takes a detailed look at three features in the newly announced IBM WebSphere MQ V8 product: Hostnames in CHLAUTH; Changes for Channels using SSL/TLS Certificates; and User ID & Password Connection Authentication. Full notes pages are provided.
This presentation took place at R ladies Taipei on July 31, 2023.
Hugging Face can be described as the GitHub for AI models. Initially, it was born to address the difficulty and incompatibility of natural language models. Now, besides open-source AI models for natural language, there are numerous other open-source AI models available on the platform. According to leaked documents from Google, open-source AI models are likely to dominate the development of the entire industry in the future. Therefore, the role of Hugging Face is becoming increasingly important.
This talk is designed for beginners in Hugging Face. It will guide you through using the natural language processing models from Hugging Face.
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
Interactive voice conversion for augmented speech productionNU_I_TODALAB
Invited Talk at SNL 2021
Title: "Interactive voice conversion for augmented speech production"
Speaker: Tomoki Toda
Toda Laboratory, Department of Intelligent Systems, Graduate School of Informatics, Nagoya University
CNA(Cloud Native Architecture)
MSA(Micro Service Architecture)
Service Mesh
MDA(Micro Data Architecture)
Data Mesh
MIA(Micro Inference Architecture)
Inference Mesh
Presentation done at Kamailio World 2014, Berlin, Germanu - several methods to do asynchronous SIP routing via Kamailio configuration file. Blend modules such as tm, tmx, mqueue, rtimer, async, evapi, etc. to suspend routing of current SIP request and resume that once processing of additional tasks has finished.
Distributed Solar Systems at EDF Renewables and AWS IoT: A Natural Fit (PUT30...Amazon Web Services
The AWS suite of managed services for IoT enables companies to quickly and easily deploy devices to the edge and synchronize their industrial time-series data from multiple sites to the AWS Cloud, where advanced analytics and machine learning can generate valuable insights about their business. In this session, learn how EDF Renewables used AWS Greengrass, AWS IoT Core, AWS IoT Analytics, and AWS Lambda to facilitate the collection, aggregation, and quality assurance of operational data from solar installations. Hear how working with AWS Professional Services transformed its approach to product development, and learn what challenges and solutions came with choosing leading-edge services form AWS.
Altinity Cluster Manager: ClickHouse Management for Kubernetes and CloudAltinity Ltd
Webinar. August 21, 2019
By Robert Hodges and Altinity Engineering Team
Simplified management is a prerequisite for running any data warehouse at scale. Altinity is developing a new web-based console for ClickHouse called the Altinity Cluster Manager. It's now in beta and offers simplified operation of ClickHouse installations for users. In this webinar we introduce the ACM and demonstrate use on Kubernetes as well as Amazon Web Services. Attendees are welcome to sign up as beta testers and provide feedback. Please join us to see the future of Clickhouse management!
Functional and non functional application loggingSander De Vos
This presentation will help you understand the importance of logging in applications. Every project is encountered with this aspect, functional or non-functional.This will become more and more important with current innovations: mobile (~offline) applications, SOA-architectures, Cloud integration.
An overview of the Java Logging-ecospace is discussed.
Eventually, the results are processed and analyzed with facilitating tools.
What is logging?
Why logging?
Who uses logs and what are they used for?
What needs to be logged?
How to log in Java
Log processing and analysis
Zabbix Inventory Indo alem do monitoramento.
Qual a definição de Inventário ?
De uma forma sucinta, um inventário (do latim inventariu) é uma relação dos bens pertencentes a uma empresa, se refere ao bens disponíveis em estoque para uso normal de um negócio e seus colaboradores, Costumam conter a descrição do produto,informações de hardware,software , entre outros, bem como a quantidade existente e o local onde se encontra.
inventário de ativos e o controle patrimonial!
Tendo em vista a definição pontuada do inventário de bens patrimonial de TI, sua ligação ao inventário de ativos é direta.
Os ativos são os bens das empresas, desta forma a associação pode ser feita de forma simples. Mas qual a relação do inventário de ativos e o controle patrimonial de um empreendimento? A resposta parece ser intuitiva, e é mesmo! De forma análoga, pense não somente em pequenas empresas, mas também em grandes empreendimentos que possuam grande quantidade de ativos. É necessário ter o controle de todos os bens da empresa, não somente para fins legais e contábeis, mas também por segurança.
O inventário de ativos tem como papel principal manter registros atualizados para os gestores, sobre todos os bens do empreendimento, além de garantir um controle sobre os mesmos, evitando furtos, depreciações e afins.
Zabbix do Monitoramento ao inventario.
A ideia de utilizar o zabbix para um inventario de rede foi centralizar e otimizar informações alem do monitoramento ao inventario em uma unica solução!
A iniciativa foi utilizar o WMI nativo da solução de monitoramento Zabbix transformando a mesma em uma solução de inventario de custo 0 para o empreendimento, então faça as contas!
whats? How is it ?
Não me pergunte como , veja os resultados.
Do the math!
Licenciamento zabbix: 0800.
Outras soluções ???
Lots of ways to look at cloud computing. With System zEnterprise, you should be able to reduce your costs, reduce your risks, improve security and resilience and have investment protection for the future. See how.
Remote monitoring and management of switches from IBM BNT. Centralized point of administration to improve service delivery while reducing management costs.
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance. Demonstrating compliance for your industry can be complex and failure to comply can result in vulnerabilities, audit failures, loss of reputation, security breaches, and even system shut down. How can you simplify enforcement of security policy and best practices? How can you automate security monitoring, threat detection, remediation and compliance reporting? How can you demonstrate governance, risk and compliance on your mainframe? Learn how your modern mainframe can help you to comply with industry regulations, reduce costs and protect your enterprise while supporting cloud, mobile, social and big data environments.
View the full on-demand webcast: https://www2.gotomeeting.com/en_US/island/webinar/registration.tmpl?Action=rgoto&_sf=14
Similar to Control m ibm info shpere data stage control module (20)
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
3. 3
Customer support
You can obtain technical support by using the BMC Software Customer Support website or by contacting
Customer Support by telephone or e-mail. To expedite your inquiry, see “Before contacting BMC.”
Support website
You can obtain technical support from BMC 24 hours a day, 7 days a week at http://www.bmc.com/support.
From this website, you can:
read overviews about support services and programs that BMC offers
find the most current information about BMC products
search a database for issues similar to yours and possible solutions
order or download product documentation
download products and maintenance
report an issue or ask a question
subscribe to receive proactive e-mail alerts when new product notices are released
find worldwide BMC support center locations and contact information, including e-mail addresses, fax
numbers, and telephone numbers
Support by telephone or e-mail
In the United States and Canada, if you need technical support and do not have access to the web, call 800
537 1813 or send an e-mail message to customer_support@bmc.com. (In the subject line, enter
SupID:<yourSupportContractID>, such as SupID:12345). Outside the United States and Canada, contact
your local support center for assistance.
Before contacting BMC
Have the following information available so that Customer Support can begin working on your issue
immediately:
product information
• product name
• product version (release number)
• license number and password (trial or permanent)
operating system and environment information
• machine type
• operating system type, version, and service pack or other maintenance level such as PUT or PTF
• system hardware configuration
• serial numbers
• related software (database, application, and communication) including type, version, and service
pack or maintenance level
4. 4
sequence of events leading to the issue
commands and options that you used
messages received (and the time and date that you received them)
• product error messages
• messages from the operating system, such as file system full
• messages from related software
License key and password information
If you have questions about your license key or password, contact BMC as follows:
(USA or Canada) Contact the Order Services Password Team at 800 841 2031, or send an e-mail
message to ContractsPasswordAdministration@bmc.com.
(Europe, the Middle East, and Africa) Fax your questions to EMEA Contracts Administration at +31 20
354 8702, or send an e-mail message to password@bmc.com.
(Asia-Pacific) Contact your BMC sales representative or your local BMC office.
5. 5
Contents
Introduction to Control-M for IBM InfoSphere DataStage ...................................................6
Control-M for IBM InfoSphere DataStage overview...........................................................................6
Administrative roles........................................................................................................................6
Installation ....................................................................................................................8
Setting environment variables in UNIX.............................................................................................8
Installing Control-M for IBM InfoSphere DataStage on Control-M/Agent on UNIX ...............................9
Installing Control-M for IBM InfoSphere DataStage on Control-M/Agent on Windows........................10
Installation on Control-M/EM.........................................................................................................12
Control-M for IBM InfoSphere DataStage Uninstall..........................................................................14
Account management................................................................................................... 17
Creating an Account .....................................................................................................................17
Control-M for IBM InfoSphere DataStage account parameters.........................................................18
Editing an account........................................................................................................................19
Deleting an account......................................................................................................................19
Testing an account .......................................................................................................................20
Copying an account......................................................................................................................20
Exporting an account....................................................................................................................21
Job definition ............................................................................................................... 22
Accessing the IBM InfoSphere DataStage form...............................................................................22
Defining a Control-M for IBM InfoSphere DataStage job .................................................................23
Monitoring a job...........................................................................................................................24
Control-M for IBM InfoSphere DataStage parameters .....................................................................24
6. 6
1Chapter
1
Introduction to Control-M for IBM InfoSphere
DataStage
Control-M for IBM InfoSphere DataStage overview
Control-M for IBM InfoSphere DataStage is a control module that enables you to run and execute pre-defined
IBM InfoSphere DataStage jobs. Before you begin, do the following:
Install Control-M for IBM InfoSphere DataStage, as described in Installation.
Connect to an IBM InfoSphere DataStage server as described in CCM administration.
Control-M for IBM InfoSphere DataStage jobs are integrated with other Control-M jobs into a single
scheduling environment. This enables you to control and operate IBM InfoSphere DataStage jobs from within
Control-M. You can also do the following:
Define and monitor Control-M for IBM InfoSphere DataStage jobs, as described in Control-M for IBM
InfoSphere DataStage job definition.
Integrate IBM InfoSphere DataStage jobs with other Control-M jobs into a single scheduling
environment, as described in the Control-M User Guide.
Introduce all Control-M capabilities to IBM InfoSphere DataStage, including advanced scheduling
criteria, complex dependencies, quantitative and control resources, and AutoEdit variables, as described
in the Control-M User Guide.
Administrative roles
Certain Control-M for IBM InfoSphere DataStage tasks might need to be performed by different professionals
in your organization, as follows:
System Administrator: Responsible for reviewing the system requirements and performing the
installation process.
Control-M Administrator: Responsible for the administration of all Control-M processes.
Control-M Production Controller: Responsible for defining and/or monitoring Control-M jobs.
The following table lists the tasks performed when working with the Control-M for IBM InfoSphere DataStage
and the role of the professional who is responsible for its administration.
7. Control-M for IBM InfoSphere DataStage Administrator Guide
7
Tasks Roles
Install Control-M for IBM InfoSphere DataStage on a
Control-M/Agent on UNIX, as described in Installing
Control-M for IBM InfoSphere DataStage on Control-M/Agent
on UNIX (on page 9) and on Windows, as described in
Installing Control-M for IBM InfoSphere DataStage on
Control-M/Agent on Windows (on page 10).
System Administrator
Control-M Administrator
Install Control-M for IBM InfoSphere DataStage on a
Control-M/Enterprise Manager (Control-M/EM) client, as
described in Installation on Control-M/EM (on page 12).
System Administrator
Control-M Administrator
Manage Control-M for IBM InfoSphere DataStage accounts,
as described in CCM administration.
Control-M Administrator
Define Control-M for IBM InfoSphere DataStage jobs, as
described in Control-M for IBM InfoSphere DataStage job
definition.
Control-M Administrator
8. 8
2Chapter
2
Installation
Control-M for IBM InfoSphere DataStage can be installed on Windows and UNIX on a Control-M/Agent. The
Control-M/Agent on which you install Control-M for IBM InfoSphere DataStage must also have the IBM
InfoSphere DataStage client or IBM InfoSphere DataStage engine installed on it.
The IBM InfoSphere DataStage form and the CCM client plug-in must be installed on a Control-M/EM client.
The following procedures describe how to install Control-M for IBM InfoSphere DataStage.
Setting environment variables in UNIX (on page 8): describes how to set environment variables in UNIX
Installing Control-M for IBM InfoSphere DataStage on Control-M/Agent on UNIX (on page 9): describes how
to install Control-M for IBM InfoSphere DataStage on Control-M/Agent on UNIX via regular and automatic
installation
Installing Control-M for IBM InfoSphere DataStage on Control-M/Agent on Windows (on page 10): describes
how to install Control-M for IBM InfoSphere DataStage on Control-M/Agent on Windows via regular and
automatic installation
Installation on Control-M/EM (on page 12): describes how to install Control-M for IBM InfoSphere DataStage
on a Control-M/EM client
Setting environment variables in UNIX
This procedure describes how to set environment variables in UNIX, which enables you to see messages from
the console.
1. Do one of the following:
• If you use csh or tcsh, use the following syntax:
setenv <envVar> <value>
Example: setenv DISPLAY myhost:0.0
• If you use sh or ksh, use the following syntax:
<envVar>=<value>
export <envVar>
Example: DISPLAY=myhost:0.0
export DISPLAY
<envVar> is the name of the environment variable.
<value> is the value assigned to the environment variable.
9. Control-M for IBM InfoSphere DataStage Administrator Guide
9
Installing Control-M for IBM InfoSphere DataStage on
Control-M/Agent on UNIX
This procedure describes how to install Control-M for IBM InfoSphere DataStage on Control-M/Agent on
UNIX interactively or automatically.
If you want to install multiple instances of Control-M for IBM InfoSphere DataStage on several computers
using the same configuration, use the automatic installation, as described in this procedure.
NOTE: The default installation is interactive and uses a GUI display. XServer must be running and configured
using the DISPLAY environment variable. If you do not have XServer available, BMC recommends that you
continue with the console installation or perform an automatic installation.
Before You Begin
Make sure that the IBM InfoSphere DataStage client or IBM InfoSphere DataStage engine is installed on the
Control-M/Agent machine, and the Control-M/Agent has access and permission to run the IBM InfoSphere
DataStage DSJOB command line utility.
NOTE: The Control-M/Agent account must have all paths defined in order to run the DSJOB command line
utility.
Make sure that all jobs running on Control-M/Agent have ended.
To install on UNIX:
1. Log in as the Control-M/Agent user, and stop the Control-M/Agent by typing the following command:
$CONTROLM/scripts/shut-ag -u <agentUser> -p all
NOTE: If the Control-M/Agent was installed with user root, then log in as user root every time you start
up or shut down the Control-M/Agent throughout this procedure.
If you are using an AIX operating system, you must remove unused libraries from memory, by typing the
following command as a root user:
/usr/sbin/slibclean
2. Do one of the following:
• Mount the installation DVD.
• Extract the files from the temporary directory that you created when obtaining the installation files
via EPD (see Control-M for IBM InfoSphere DataStage Release Notes).
3. Use one of the following modes:
• Display: if you install using GUI (or XServer), set your DISPLAY environment variable, as described
in Setting environment variables in UNIX (on page 8).
• Console: it is not necessary to set DISPLAY.
4. From the installation DVD or from the installation files via EPD, activate the installation script with the
following command:
<source_path>/setup.sh
10. Control-M for IBM InfoSphere DataStage Administrator Guide
10
5. Do one of the following:
• Interactive install: continue with the on-screen instructions until the installation is complete.
• Automatic install: do the following:
a. Continue with the on-screen instructions until the Summary window.
b. Click Generate and select the location to create the XML parameter file.
c. Click Yes.
d. Copy the automatic installation parameters file to a network location that is accessible to all
computers where you want to perform an automatic installation.
e. To run the installation script, type the following command:
<source_path>/setup.sh -silent <filename.xml>
The installation logs can be found at the following location:
$HOME/BMCINSTALL/log/cmdatastage/BMC_Control-M_For_IBM_InfoSphere_DataStag
e_Install_<date-time>.log
6. Start the Control-M/Agent by running the following command:
$CONTROLM/scripts/start-ag -u <agentUser> -p all
7. Log out of the Control-M/Agent account.
8. Set up the location of the IBM InfoSphere DataStage engine for Control-M for IBM InfoSphere DataStage.
a. Navigate to:
<Agent dir>/cm/DATASTAGE/exe
b. Run the following command:
./ctmdatastage_container setds <ds engine path>
EXAMPLE: ./ctmdatastage_container setds /opt/IBM/InformationServer/Server/DSEngine
9. To use the Control-M for IBM InfoSphere DataStage utilities in the CCM, run the ctmgetcm utility in the
Control-M/Server. For more information, see the Control-M Administrator Guide.
10. Continue with Installation on Control-M/EM (on page 12).
Installing Control-M for IBM InfoSphere DataStage on
Control-M/Agent on Windows
This procedure describes how to install Control-M for IBM InfoSphere DataStage on Control-M/Agent on
Windows.
If you want to install multiple instances of Control-M for IBM InfoSphere DataStage on several computers
using the same configuration, use the automatic installation, as described in this procedure.
Before You Begin
Make sure that the IBM InfoSphere DataStage client or IBM InfoSphere DataStage engine is installed on the
Control-M/Agent machine, and the Control-M/Agent has access and permission to run the IBM InfoSphere
DataStage DSJOB command line utility.
11. Control-M for IBM InfoSphere DataStage Administrator Guide
11
NOTE: The Control-M/Agent account must have all paths defined in order to run the DSJOB command line
utility.
Make sure that all jobs running on Control-M/Agent have ended.
To install on Windows:
1. Log in to the computer as a user who has Administrator authorization.
2. Do one of the following:
• From the installation DVD, double-click the Setup.exe file.
• From a command prompt window, type <source_path>Setup.exe.
3. Do one of the following:
• Interactive install: Continue with the on-screen instructions until the installation is complete.
• Automatic install: Do the following:
a. Continue with the on-screen instructions until the Summary window.
b. Click Generate and select the location to create the XML parameter file.
c. Click Yes.
d. The automatic installation XML parameters file that is created (<filename>.xml) is relevant only
for computers with the same agent instance name. Otherwise, a separate <filename>.xml file
must be created for each computer, or modified manually for each computer.
e. Copy the automatic installation parameters file to a network location that is accessible to all
computers where you want to perform an automatic installation.
f. Run the installation script, as follows:
<installation_path>Setup.exe -silent <silent.xml>
The installation log can be found at the following location:
BMCINSTALLlogcmdatastageBMC_Control-M_For_IBM_InfoSphere_DataStage_Instal
l_<timestamp>.log
4. Set up the location of the IBM InfoSphere DataStage DSJOB for Control-M for IBM InfoSphere DataStage.
a. Navigate to:
<Agent dir>cmDATASTAGEexe
b. Run the following command:
ctmdatastage_container setds <dsjob path>
EXAMPLE: ctmdatastage_container setds c:IBMInformationServerClientsClassic
NOTE: Make sure that you provide only the path to the dsjob.exe file (without the file name).
5. To use the Control-M for IBM InfoSphere DataStage utilities in the CCM, you must run the ctmgetcm
utility in the Control-M/Server. For more information, see the Control-M Administrator Guide.
6. Continue with Installation on Control-M/EM (on page 12).
12. Control-M for IBM InfoSphere DataStage Administrator Guide
12
Installation on Control-M/EM
After you have installed Control-M for IBM InfoSphere DataStage on the Control-M/Agent, you must install
Control-M for IBM InfoSphere DataStage on the Control-M/EM client computer.
This procedure must be performed on every computer that has Control-M/EM client components installed.
The following procedures describe how to install the Control-M for IBM InfoSphere DataStage client and
server plug-in on Control-M/EM:
Installing the Control-M for IBM InfoSphere DataStage client plug-in (on page 12)
Enabling Find and Update support on Control-M/EM server (on page 13)
Installing the Control-M Self Service plug-in (on page 14)
Installing the Control-M for IBM InfoSphere DataStage client plug-in
This procedure describes how to install Control-M for IBM InfoSphere DataStage on the Control-M/EM client,
which installs the CCM plug-in, imports the IBM InfoSphere DataStage form, and enables Find and Update
support.
Before you begin
Make sure that you have met the following requirements:
Successful completion of one of the following:
• Installing Control-M for IBM InfoSphere DataStage on Control-M/Agent on UNIX (on page 9)
• Installing Control-M for IBM InfoSphere DataStage on Control-M/Agent on Windows (on page 10)
Control-M for IBM InfoSphere DataStage DRDSG.8.0.00 DVD is mounted or accessible through your
network.
Control-M/EM GUI server is shut down.
Control-M/EM client applications are closed.
To install on Control-M/EM client:
1. Do one of the following:
• If you download the Control-M for IBM InfoSphere DataStage 8.0.00 zip file from the BMC EPD site
for a Windows installation, you need to create the EM directory content that is required to install the
Control-M for IBM InfoSphere DataStage on the Control-M/EM client computer. Do the following:
a. Extract the files from the downloaded zip file.
b. Double-click the EM.exe self-extractor.
• If you download the Control-M for IBM InfoSphere DataStage 8.0.00 from the DVD, continue with
the next step.
2. Log in with a user ID with administrator privileges on the specific computer.
3. If you are not using Windows Vista, Windows 7, or Windows 2008, navigate to
<dvd_path>EMClient and continue with step 7.
13. Control-M for IBM InfoSphere DataStage Administrator Guide
13
4. Navigate to the following directory:
<dvd_path>EM
5. Copy or map the EM directory to your local disk.
6. Navigate to the mapped or copied directory:
<mapped/copied_location>EMClient
7. Run the Install_EM_Client_DataStage.cmd file, and follow the installation instructions provided.
You have installed the Control-M for IBM InfoSphere DataStage client on the Control-M Configuration
Manager. In addition, the IBM InfoSphere DataStage form is imported on the Control-M/EM client.
To use the Control-M for IBM InfoSphere DataStage utilities in the Control-M Configuration Manager,
make sure that the ctmgetcm utility has run in Control-M/Server. For more information, see the
Control-M Administrator Guide.
8. From the Control-M Configuration Manager, restart the Control-M/EM GUI server.
Enabling Find and Update support on Control-M/EM server
The following procedure describes how to enable Control-M for IBM InfoSphere DataStage Find and Update
support.
Before You Begin
Make sure that you have met the following requirements:
You have successfully completed Installing the Control-M for IBM InfoSphere DataStage client plug-in
(on page 12).
The Control-M for IBM InfoSphere DataStage DRDSG.8.0.00 DVD is mounted or accessible through your
network.
The Control-M/EM GUI server is shut down.
The Control-M/EM client applications are closed.
To enable Find and Update support:
1. Do one of the following:
• If you download the Control-M for IBM InfoSphere DataStage 8.0.00 zip file from the BMC EPD site
for a Windows installation, you need to create the EM directory content that is required to enable find
and update support on the Control-M/EM server, do the following:
a. Extract the files from the downloaded zip file.
b. Double-click the EM.exe self-extractor.
• If you download the Control-M for IBM InfoSphere DataStage 8.0.00 from the DVD, continue with
the next step.
2. From the installation DVD, copy the DATASTAGE_appl.xml file located in the
<DVD>EMApplFields directory to one of the following Control-M/EM directories:
• Windows: <Control-M/EM home directory>etcapplfields
• UNIX: <Control-M/EM home directory>/etc/applfields/
14. Control-M for IBM InfoSphere DataStage Administrator Guide
14
3. From the Control-M Configuration Manager, restart the Control-M/EM GUI server.
After you have finished installing Control-M for IBM InfoSphere DataStage, you need to create an
account in the Control-M Configuration Manager, as described in CCM administration.
After you have created an account you can define a Control-M for IBM InfoSphere DataStage job, as
described in Control-M for IBM InfoSphere DataStage job definition.
Installing the Control-M Self Service plug-in
This procedure describes how to install the Control-M for IBM InfoSphere DataStage plug-in on Control-M
Self Service server.
To install the Control-M Self Service plug-in:
1. Do one of the following:
• If you download the Control-M for IBM InfoSphere DataStage 8.0.00 zip file from the BMC EPD site
for a Windows installation, you need to create the EM directory content that is required to enable find
and update support on the Control-M/EM server, do the following:
a. Extract the files from the downloaded zip file.
b. Double-click the EM.exe self-extractor.
• If you download the Control-M for IBM InfoSphere DataStage 8.0.00 from the DVD, continue with
the next step.
2. From the installation DVD, copy the the content of the <DVD>EMSelfService directory to one of the
following directories:
• Windows: <Control-M/EM home directory>etc
• UNIX: <Control-M/EM home directory>/etc/
Control-M for IBM InfoSphere DataStage Uninstall
The following procedures describe how to uninstall Control-M for IBM InfoSphere DataStage from UNIX and
Microsoft Windows:
Uninstalling Control-M for IBM InfoSphere DataStage from UNIX (on page 15)
Uninstalling Control-M for IBM InfoSphere DataStage from Windows (on page 15)
Performing an automatic uninstall from Windows (on page 16)
15. Control-M for IBM InfoSphere DataStage Administrator Guide
15
Uninstalling Control-M for IBM InfoSphere DataStage from UNIX
This procedure describes how to uninstall Control-M for IBM InfoSphere DataStage from UNIX.
Before You Begin
Make sure that all jobs have ended.
To uninstall from UNIX:
1. From a Control-M/Agent computer, log in as a Control-M/Agent user, and type the following command to
shut down Control-M/Agent:
$CONTROLM/scripts/shut-ag -u <agentUser> -p all
NOTE: If the Control-M/Agent was installed with user root, then log in as user root every time you start
up or shut down the Control-M/Agent throughout this procedure.
2. If you are using an AIX operating system, you must remove unused libraries from memory by typing the
following command:
/usr/sbin/slibclean
3. Set your DISPLAY environment variable according to the computer name, as described in Setting
environment variables in UNIX (on page 8).
4. Type one of the following commands:
• Interactive: $HOME/BMCINSTALL/uninstall/DRDSG.8.0.00/uninstall.sh
• Automatic: $HOME/BMCINSTALL/uninstall/DRDSG.8.0.00/uninstall.sh -silent
Control-M for IBM InfoSphere DataStage has been successfully removed from your computer.
5. To restart Control-M/Agent, type the following command:
$CONTROLM/scripts/start-ag -u <agentUser> -p all
Uninstalling Control-M for IBM InfoSphere DataStage from Windows
This procedure describes how to uninstall Control-M for IBM InfoSphere DataStage from Windows.
Before You Begin
Make sure that all jobs have ended.
To uninstall from Windows:
1. From the Start menu, select Settings > Control Panel.
2. Double-click Add/Remove Programs.
3. Select Control-M for IBM InfoSphere DataStage <Agent Name>, and click Add/Remove.
4. Click OK to continue.
Control-M for IBM InfoSphere DataStage is successfully removed from your computer.
16. Control-M for IBM InfoSphere DataStage Administrator Guide
16
Performing an automatic uninstall from Windows
This procedure describes how to perform an automatic uninstall from Windows.
Before You Begin
Make sure that all jobs have ended.
To perform an automatic uninstall from Windows:
1. Log in to the computer using a user ID that has Administrator privileges.
2. Type the following command:
<Agent Install Path>BMCINSTALLuninstallDRDSG.8.0.00Uninstall.exe -silent
Control-M for IBM InfoSphere DataStage has been successfully removed from your computer.
17. 17
3Chapter
3
Account management
Before you can define a Control-M for IBM InfoSphere DataStage job in the Control-M/Desktop, you need to
create an account in the Control-M Configuration Manager, which enables you to connect to the required IBM
InfoSphere DataStage server.
An account contains the connection parameters to a specified IBM InfoSphere DataStage server, such as
host name, user name, and password. By adding an account to the Control-M Configuration Manager, you
enable Control-M for IBM InfoSphere DataStage users to connect to the required IBM InfoSphere DataStage
server with only the account name. As a result, users can run a job without having to provide authentication
details every time they connect to the IBM InfoSphere DataStage server.
The following procedures describe how to create, edit, delete, test, copy, and export an account in the
Control-M Configuration Manager.
Creating an Account (on page 17)
Editing an account (on page 19)
Deleting an account (on page 19)
Testing an account (on page 20)
Copying an account (on page 20)
Exporting an account (on page 21)
Creating an Account
This procedure describes how to create an IBM InfoSphere DataStage account in the Control-M
Configuration Manager, which enables you to define an IBM InfoSphere DataStage job in the
Control-M/Desktop.
Before you begin
Make sure that you have set up the location of the IBM InfoSphere DataStage engine for Control-M for IBM
InfoSphere DataStage. For more information, see Installing Control-M for IBM InfoSphere DataStage on
Control-M/Agent on UNIX (on page 9) or Installing Control-M for IBM InfoSphere DataStage on
Control-M/Agent on Windows (on page 10).
To create an account:
1. From Control-M Configuration Manager, right-click the CM (DATASTAGE) on the host that you want to
manage.
2. Select Account Management.
The Control-M for IBM InfoSphere DataStage Account Management dialog box appears.
18. Control-M for IBM InfoSphere DataStage Administrator Guide
18
3. Click the Add icon.
The Add Account dialog box appears.
4. In the Account Name field, enter the name of the account that you want to add. (The account name
must begin with a letter and without any blank spaces or special characters).
5. Select one of the following options:
• Local User: use only when Control-M for IBM InfoSphere DataStage is installed on an IBM
InfoSphere DataStage engine.
o Unix: IBM InfoSphere DataStage jobs run using the Control-M agent user account.
o Windows: IBM InfoSphere DataStage jobs run under the user specified in the Log On tab of the
Control-M/Agent Service Properties.
• Server Login (non-secured): use to connect to any remote IBM InfoSphere DataStage engine.
• Authentication File: use to connect to any remote IBM InfoSphere DataStage engine, using a local
credentials file. For more information about the credentials file, see your IBM InfoSphere DataStage
documentation.
NOTE: The available fields are determined by the option that you select.
6. For each field, enter the required value, as described in Control-M for IBM InfoSphere DataStage account
parameters (on page 18).
7. Click Next.
The Add Account - Summary dialog box appears.
8. (Optional) Review the account details, and click Test.
If the test was completed successfully, the account is validated and you can now define an IBM
InfoSphere DataStage job, as described in the Control-M for IBM InfoSphere DataStage Job Editing Form
Help in Defining a Control-M for IBM InfoSphere DataStage job (on page 23). If the test failed, review the
error message(s), fix any problems as necessary, and test the account again.
9. Click Finish.
The account is added to the Control-M for IBM InfoSphere DataStage Account Management
dialog box.
Control-M for IBM InfoSphere DataStage account
parameters
The following table lists the Set Connection Detail parameters to add an account.
Field Description
Server Name Defines the host name of the IBM InfoSphere DataStage engine
Domain Name (optional) Defines the domain of the IBM InfoSphere DataStage engine
User Name Defines the user name for the IBM InfoSphere DataStage engine
19. Control-M for IBM InfoSphere DataStage Administrator Guide
19
Field Description
Password Defines the password for the IBM InfoSphere DataStage engine
Confirm Password Confirms the password for the IBM InfoSphere DataStage engine
Authentication File Defines the full path, including the authentication file name of the local
credentials file for the IBM InfoSphere DataStage engine
Editing an account
This procedure describes how to edit an account in the Control-M Configuration Manager.
1. From Control-M Configuration Manager, right-click the CM (DATASTAGE) on the host that you want to
manage.
2. Select Account Management.
The Control-M for IBM InfoSphere DataStage Account Management dialog box appears.
3. Select the account that you want to edit, and click the Edit icon.
The Update <account> Account dialog box appears.
4. For each field, type the required value, as described in Control-M for IBM InfoSphere DataStage account
parameters (on page 18).
5. (Optional) Review the account details, and click Test.
If the test completed successfully, the account is validated and you can now define an IBM InfoSphere
DataStage job, as described in the Control-M for IBM InfoSphere DataStage Job Editing Form Help,
Defining a Control-M for IBM InfoSphere DataStage job (on page 23). If the test failed, review the error
message(s), fix any problems as necessary, and test the account again.
6. Click OK.
The account is updated in the Control-M for IBM InfoSphere DataStage Account Management
dialog box.
Deleting an account
This procedure describes how to delete an account from the Control-M Configuration Manager.
1. From Control-M Configuration Manager, right-click the CM (DATASTAGE) on the host that you want to
manage.
2. Select Account Management.
The Control-M for IBM InfoSphere DataStage Account Management dialog box appears.
3. Select the account that you want to delete, and click the Delete icon.
A confirmation message appears.
20. Control-M for IBM InfoSphere DataStage Administrator Guide
20
4. Click Yes.
The account is deleted.
Testing an account
This procedure describes how to test an account in the Control-M Configuration Manager, which enables you
to validate the connection parameters.
1. From Control-M Configuration Manager, right-click the CM (DATASTAGE) on the host that you want to
manage.
2. Select Account Management.
The Control-M for IBM InfoSphere DataStage Account Management dialog box appears.
3. Select the account that you want to test, and click .
If the test completed successfully, the account is validated and you can now define a IBM InfoSphere
DataStage job, as described in Defining a Control-M for IBM InfoSphere DataStage job (on page 23). If
the test failed, review the error message and test it again.
Copying an account
This procedure describes how to copy an account in the Control-M Configuration Manager, which enables
you to create an additional account using the parameters of an existing account.
To copy an account:
1. From Control-M Configuration Manager, right-click the CM (DATASTAGE) on the host that you want to
manage.
2. Select Account Management.
The Control-M for IBM InfoSphere DataStage Account Management dialog box appears.
3. Select an account that you want to copy, and click .
The Copy <account> Account dialog box appears.
4. In the Account Name field, type a name for the new account, change any required parameters, and
then click OK.
5. (Optional) Click Test.
If the test completed successfully, the account is validated and you can now define a IBM InfoSphere
DataStage job, as described Defining a Control-M for IBM InfoSphere DataStage job (on page 23). If the
test failed, review the error message and test it again.
6. Click OK.
21. Control-M for IBM InfoSphere DataStage Administrator Guide
21
Exporting an account
This procedure describes how to export an account from one Control-M/Agent to another Control-M/Agent,
where Control-M for IBM InfoSphere DataStage is installed.
To export an account:
1. From Control-M Configuration Manager, right-click the CM (DATASTAGE) on the host that you want to
manage.
2. Select Account Management.
The Control-M for IBM InfoSphere DataStage Account Management dialog box appears.
3. Select an account that you want to export and click .
The Account Management - Export Account Destination dialog box appears.
4. From the Control-M/Server name drop-down list, select the Control-M/Server that contains the
Control-M/Agent, where you want to export the account.
5. From the Control-M/CM Host Name drop-down list, select the Control-M/Agent that contains the
account on the CM you want to export.
6. Click OK.
The Export Account Destination dialog box appears.
7. In the Account Name field, type a name for the exported account and change any required parameters,
and then click OK.
8. (Optional) Click Test.
If the test completed successfully, the account is validated and you can now define a IBM InfoSphere
DataStage job, as described in the Control-M for IBM InfoSphere DataStage Job Editing Form Help
Defining a Control-M for IBM InfoSphere DataStage job (on page 23). If the test failed, review the error
message and test it again.
9. Click OK.
22. 22
4Chapter
4
Job definition
Control-M for IBM InfoSphere DataStage is a control module that connects to an IBM InfoSphere DataStage
server and enables you to run IBM InfoSphere DataStage jobs, as described in Defining a Control-M for IBM
InfoSphere DataStage job (on page 23).
Control-M for IBM InfoSphere DataStage jobs are integrated with other Control-M jobs into a single
scheduling environment. Control-M capabilities are available for Control-M for IBM InfoSphere DataStage,
including advanced scheduling criteria, complex dependencies, quantitative and control resources, and
AutoEdit variables.
To access the IBM InfoSphere DataStage form, see Accessing the IBM InfoSphere DataStage form (on page
22).
Job definition parameters in Control-M for IBM InfoSphere DataStage enable you to apply values for the
AutoEdit variables, as described in the Control-M User Guide. For a list of Control-M for IBM InfoSphere
DataStage parameters, see Control-M for IBM InfoSphere DataStage parameters (on page 24).
Accessing the IBM InfoSphere DataStage form
This procedure describes how to access the IBM InfoSphere DataStage form, which enables you to define a
IBM InfoSphere DataStage job.
To access the IBM InfoSphere DataStage form:
1. Log in to Control-M/Desktop, as described in the Control-M User Guide.
2. From the Edit menu, select New > Job.
3. From the Job Type dropdown list, select IBM InfoSphere DataStage.
4. Click the IBM InfoSphere DataStage tab.
The IBM InfoSphere DataStage form appears.
23. Control-M for IBM InfoSphere DataStage Administrator Guide
23
Defining a Control-M for IBM InfoSphere DataStage job
This procedure describes how to define a Control-M for IBM InfoSphere DataStage job, which enables you to
run IBM InfoSphere DataStage jobs on an IBM InfoSphere DataStage server.
Before You Begin
Make sure that you have met the following requirements:
A configured IBM InfoSphere DataStage account, as described in Account management (on page 17).
Successful completion of Accessing the IBM InfoSphere DataStage form (on page 22).
To define an IBM InfoSphere DataStage job:
1. (Mandatory) In the Account field, do one of the following actions:
• Enter the account name.
• Click Load, select the account that you want, and click OK.
2. (Mandatory) In the Project field, do one of the following actions:
• Enter the project name.
• Click Load, select the project that you want, and click OK.
3. (Mandatory) In the Job Name field, do one of the following actions:
• Enter the job name.
• Click Load, select the job that you want, and click OK.
4. (Optional) In the Job Invocation ID field, enter the invocation ID for a multiple-instance job.
5. Do one of the following options:
• In the Parameter File field, enter the name of the parameter file that you want to use, or click
Load, and select a file from the list.
When clicking Load, a list of files in the <Agent dir>cmDATASTAGEparameters directory
appears. Make sure you have copied the parameters file to this location, and that the Agent user has
permissions to use this file.
• Click Load Parameters, and then click in the Value column to edit the value of a parameter.
6. In the Run options area, select any of the following options:
• Reset job before run: resets a job before it runs.
• Run in restart mode: runs a sequential job in restart mode.
7. Click Job Output to set the IBM InfoSphere DataStage log entry types that are written to the job Sysout.
8. Click Set limits to limit the number of rows and warnings. If you enter "0", the number of rows and
warnings is unlimited.
For more information about defining a job in the job editing form, see the Control-M User Guide.
24. Control-M for IBM InfoSphere DataStage Administrator Guide
24
Monitoring a job
While a Control-M for IBM InfoSphere DataStage job is running, you can monitor the progress of the job.
1. In the Control-M/EM GUI, locate the Control-M for IBM InfoSphere DataStage job that you want to
monitor.
2. Right-click the job, and select Sysout.
3. If more than one occurrence of the job appears in the list, select the sysout that you want to view.
The Sysout window appears.
If the job is still running on the IBM InfoSphere DataStage engine, an intermediate summary of the job
appears.
Control-M for IBM InfoSphere DataStage parameters
Job definition parameters in Control-M for IBM InfoSphere DataStage enable you to apply values for the
AutoEdit variables, as described in the Control-M User Guide.
The following table describes the parameters for Control-M for IBM InfoSphere DataStage.
Parameter Description
Account (on page 26) Defines the Control-M for IBM InfoSphere DataStage account.
Project (on page 29) Defines the Control-M for IBM InfoSphere DataStage project name.
Job Name (on page 27) Defines the Control-M for IBM InfoSphere DataStage job name.
Job Invocation ID (on page
27)
Defines the Control-M for IBM InfoSphere DataStage job invocation ID.
Parameter File (on page 28) Defines the Control-M for IBM InfoSphere DataStage parameter file.
Parameter Name (on page 28) Defines the name of a specific parameter.
Parameter Value (on page 28) Defines the value of a specific parameter.
Run in Restart Mode (on page
30)
Runs the Control-M for IBM InfoSphere DataStage job in Restart mode.
Reset Job Before Run (on page
30)
Resets the Control-M for IBM InfoSphere DataStage job before the job
runs.
Abort Job After <value>
Warnings (on page 25)
Sets the maximum number of warnings.
25. Control-M for IBM InfoSphere DataStage Administrator Guide
25
Parameter Description
Stop Stages After <value>
Rows (on page 31)
Sets the maximum number of rows.
Info (on page 27) Writes Info log entries to Control-M for IBM InfoSphere DataStage job
Sysout.
Warning (on page 31) Writes Warning log entries to Control-M for IBM InfoSphere
DataStage job Sysout.
Fatal (on page 26) Writes Fatal log entries to Control-M for IBM InfoSphere DataStage
job Sysout.
Reject (on page 29) Writes Reject log entries to Control-M for IBM InfoSphere DataStage
job Sysout.
Started (on page 30) Writes Started log entries to Control-M for IBM InfoSphere DataStage
job Sysout.
Reset (on page 29) Writes Reset log entries to Control-M for IBM InfoSphere DataStage
job Sysout.
Batch (on page 26) Writes Batch log entries to Control-M for IBM InfoSphere DataStage
job Sysout.
Abort Job After <value> Warnings
Sets the maximum number of warnings.
Usage Optional
Valid Values 0-9999999
Default Value 0
Case Sensitive No
Variable Name %%DataStage-MAX_WARNINGS
26. Control-M for IBM InfoSphere DataStage Administrator Guide
26
Account
Defines the Control-M for IBM InfoSphere DataStage account.
Usage Mandatory
Length 1 - 30 characters
Case Sensitive Yes - only capital letters
Variable Name %%DataStage-ACCOUNT
Batch
Writes Batch log entries to Control-M for IBM InfoSphere DataStage job Sysout.
Usage Optional
Valid Values Yes, No
Default Value No
Case Sensitive Yes
Variable Name %%DataStage-OUTPUT_BATCH
Fatal
Writes Fatal log entries to Control-M for IBM InfoSphere DataStage job Sysout.
Usage Optional
Valid Values Yes, No
Default Value Yes
Case Sensitive Yes
Variable Name %%DataStage-OUTPUT_FATAL
27. Control-M for IBM InfoSphere DataStage Administrator Guide
27
Info
Writes Info log entries to Control-M for IBM InfoSphere DataStage job Sysout.
Usage Optional
Valid Values Yes, No
Default Value No
Case Sensitive Yes
Variable Name %%DataStage-OUTPUT_INFO
Job Invocation ID
Defines the Control-M for IBM InfoSphere DataStage job invocation ID.
Usage Optional
Case Sensitive Yes
Variable Name %%DataStage-JOB_INVOCATION_ID
Job Name
Defines the Control-M for IBM InfoSphere DataStage job name.
Usage Mandatory
Case Sensitive Yes
Variable Name %%DataStage-JOB_NAME
28. Control-M for IBM InfoSphere DataStage Administrator Guide
28
Parameter File
Defines the Control-M for IBM InfoSphere DataStage parameter file.
Usage Optional
Case Sensitive Yes
Variable Name %%DataStage-PARAMS_FILE
Parameter Name
Defines the name of a specific parameter.
Usage Optional
Case Sensitive Yes
Variable Name %%DataStage-PARAMS-Pxxx-PRM_NAME
xxx determines the parameter number between 001-999
Parameter Value
Defines the value of a specific parameter.
Usage Optional
Case Sensitive Yes
Variable Name %%DataStage-PARAMS-Pxxx-PRM_VALUE
xxx determines the parameter number between 001-999
29. Control-M for IBM InfoSphere DataStage Administrator Guide
29
Project
Defines the Control-M for IBM InfoSphere DataStage project name.
Usage Mandatory
Case Sensitive Yes
Variable Name %%DataStage-PROJECT
Reject
Writes Reject log entries to Control-M for IBM InfoSphere DataStage job Sysout.
Usage Optional
Valid Values Yes, No
Default Value No
Case Sensitive Yes
Variable Name %%DataStage-OUTPUT_REJECT
Reset
Writes Reset log entries to Control-M for IBM InfoSphere DataStage job Sysout.
Usage Optional
Valid Values Yes, No
Default Value No
Case Sensitive Yes
Variable Name %%DataStage-OUTPUT_RESET
30. Control-M for IBM InfoSphere DataStage Administrator Guide
30
Reset Job Before Run
Resets the Control-M for IBM InfoSphere DataStage job before the job runs.
Usage Optional
Valid Values Yes, No
Default Value Yes
Case Sensitive Yes
Variable Name %%DataStage-RESET_JOB
Run in Restart Mode
Runs the Control-M for IBM InfoSphere DataStage job in Restart mode.
Usage Optional
Valid Values Yes, No
Default Value No
Case Sensitive Yes
Variable Name %%DataStage-RESTART_SEQUENCE
Started
Writes Started log entries to Control-M for IBM InfoSphere DataStage job Sysout.
Usage Optional
Valid Values Yes, No
Default Value No
Case Sensitive Yes
Variable Name %%DataStage-OUTPUT_STARTED
31. Control-M for IBM InfoSphere DataStage Administrator Guide
31
Stop Stages After <value> Rows
Sets the maximum number of rows.
Usage Optional
Valid Values 0-9999999
Variable Name %%DataStage-MAX_ROWS
Warning
Writes Warning log entries to Control-M for IBM InfoSphere DataStage job Sysout.
Usage Optional
Valid Values Yes, No
Default Value No
Case Sensitive Yes
Variable Name %%DataStage-OUTPUT_WARNING