SlideShare a Scribd company logo
1 of 25
Download to read offline
End-to-end Transaction Visibility From
Mobile Devices To Your Mainframe
Ian Hartley, Principal Engineer
Ed Hallock, Director of Product Marketing & Management
2
Housekeeping
• Webcast Audio:
– Today’s webcast audio is streamed through your computer speakers.
– If you need technical assistance with the web interface or audio, please reach out to us using
the chat window.
• Questions Welcome:
– Submit your questions at any time during the presentation using the chat window.
– We will answer them during our Q&A session following the presentations.
• Recording and Slides:
– This webcast is being recorded. You will receive an email following the webcast with a link to
download both the recording and the slides.
Syncsort Confidential and Proprietary - do not copy or distribute
3
Today’s Presenters
Syncsort Confidential and Proprietary - do not copy or distribute
Ed Hallock is a highly experienced Information Technology Professional with a broad
experience base in software product development, support, product management, marketing,
and business development. In his diverse career Ed has benefited from working for some of the
largest independent software vendors, in a variety of roles, providing enterprise solutions to
Global 1000 corporations. Ed has extensive experience in performance and availability
management for systems and applications. He holds a bachelor’s degree in Computer Science
from Montclair State University in Upper Montclair, New Jersey and has presented at numerous
industry events as well as corporate related conferences and seminars.
Ian Hartley has worked in software development and system architecture roles where he
has gained a wide range of experience across many environments and platforms. He has a
passion for all things IT, and is always on the lookout for new technologies.
Starting with COBOL and CICS® on the mainframe, he migrated into several languages and
stacks ranging from C, Java, web services, mobile and JavaScript with the likes of Angular.
Ian has also produced many Splunk apps, add-ons and integrations for Enterprise Security® and
IT Service Intelligence®. He works closely with the Splunk teams in EMEA and the USA.
When Ian is not coding, you’ll find him off-road, running a trail somewhere.
4
Agenda
•The Transaction Tracing Challenge
•What is Transaction Tracing and How Does It Work
•A Quick Intro – Syncsort Ironstream
•Demo of the Ironstream Transaction Tracing Solution
•Summary
•Q&A
Syncsort Confidential and Proprietary - do not copy or distribute
5
The Transaction Tracing Challenge
• Growth of large-scale business services that incorporate web
and mobile applications has exploded across all industries.
• Many organization have a significant reliance on the
mainframe, including banking, insurance, financial services,
retail, and healthcare corporations.
• Transactions that originate on a tablet, phone, etc. and
connect to back-end applications hosted on the mainframe
tend to be very visible to customers, partners, and
executives.
• Unacceptable response times and unreliable performance
do not go unnoticed.
Syncsort Confidential and Proprietary - do not copy or distribute
6
The Transaction Tracing Challenge
• Organizations may monitor the overall end-user experience
to detect potential problems but have poor visibility into
what happens to them on the mainframe.
• Many know how long a transaction spends on the
mainframe but have no way to know what it is doing within
multiple systems and subsystems, including CICS and Db2.
• Lack of visibility creates significant challenges and can have
significant consequences on service levels.
Syncsort Confidential and Proprietary - do not copy or distribute
7
What is Transaction Tracing
• Enables organizations to get deep insight into web-based and mobile transactions’ impact on
the mainframe.
• Unprecedented granularity that enables you to monitor and improve and application
performance.
• Lightweight solution with a minimal footprint
Syncsort Confidential and Proprietary - do not copy or distribute
• Leverages Syncsort Ironstream® to
deliver IBM z/OS machine data in
real-time to leading platforms for
operational analytics, like Splunk®
8
How Does It Work?
• Uses a transaction identifier to
correlate transaction workloads
through CICS and Db2 on z/OS.
• Ties the transaction identifier to
SMF 110 and 101 records
generated by CICS and Db2.
• Provides the correlated SMF
data to Splunk for a visualization
of various performance
attributes of the units of work.
• Time spent in the CICS and Db2
sub-systems along with
resources consumed to support
the transactions is clearly
reported.
Syncsort Confidential and Proprietary - do not copy or distribute
9
Polling Question #1
•What technologies are you currently using, if any, to monitor and
correlate mainframe components for transactions initiated outside of the
mainframe environment?
– Dynatrace
– AppDynamics
– Home grown solution
– None
Syncsort Confidential and Proprietary - do not copy or distribute
10
Critical Mainframe Data  Normalized and Streamed to Splunk with Ironstream®
Syncsort Confidential and Proprietary - do not copy or distribute
11
Ironstream® Overview
Syncsort Confidential and Proprietary - do not copy or distribute
12
Demo Overview
Syncsort Confidential and Proprietary - do not copy or distribute
13
HTTP – CICS Web Services, RESTful API
Syncsort Confidential and Proprietary - do not copy or distribute
14
HTTP – CICS Web Services, RESTful API
+ Unique UI token
http://webservice/abc
UXTime
Stop
UI Time
UI Log
CICS Time
SMF 110
+ UI
token
DB2
token
DB2 Time
SMF 101
token
Splunk
Start
Syncsort Confidential and Proprietary - do not copy or distribute
15
16
17
18
19
Polling Question #2 (Multiple Choice)
•What technologies are involved in your cross-platform transactions
initiated outside of the mainframe environment?
– Java
– C+
– CICS Transaction Gateway (CTG)
– CICS Web Services/RESTful API
– IBM MQ
– IMS Connect
Syncsort Confidential and Proprietary - do not copy or distribute
– Db2 Connect
– DataPower Gateway
– WebSphere Application
Server (WAS)
20
Let's Go To Demo
Syncsort Confidential and Proprietary - do not copy or distribute
21
Summary
• Tracks transactions initiated on and off the mainframe –
including mobile and web platforms -- and feeds data in real-
time to Splunk Enterprise to take advantage of its advanced
analytics and visualization.
• Provides critical information on overall transaction response
time, with the ability to drill-down into transaction details
including time spent, and resources consumed, on CICS and
Db2 on z/OS.
• Enables transaction problem isolation and resolution for long-
running transactions, to meet SLAs, improving application
performance and end-user experience.
Syncsort Confidential and Proprietary - do not copy or distribute
22
More Information on Transaction Tracing
http://www.syncsort.com/en/Transaction-Tracing
http://www.syncsort.com/en/Resource-
Center/Mainframe/SolutionSheets/Syncsort-Ironstream-Transaction-Tracing
Syncsort Confidential and Proprietary - do not copy or distribute
23
Get Ironstream® for SYSLOG for free
Syncsort Confidential and Proprietary - do not copy or distribute
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
Make more sense of the massive machine data piled up in your mainframe.
Get started with Ironstream today!
Mainframes power mission-critical applications around the world. But many organizations are still flying blind,
with no easy way to derive operational intelligence from the vast amounts of
machine data generated by these critical systems.
Industry Leader in Mainframe
Software Products
THANK YOU – Questions?

More Related Content

What's hot

Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
olivier lussac
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
Jonah Kowall
 
Timothy Knell_CV_Oct2015
Timothy Knell_CV_Oct2015Timothy Knell_CV_Oct2015
Timothy Knell_CV_Oct2015
Timothy Knell
 

What's hot (7)

RESUME_JAIDEEP_MOHITE
RESUME_JAIDEEP_MOHITERESUME_JAIDEEP_MOHITE
RESUME_JAIDEEP_MOHITE
 
Arturo Lugo
Arturo LugoArturo Lugo
Arturo Lugo
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Intermedia Unite – Brochure
Intermedia Unite – BrochureIntermedia Unite – Brochure
Intermedia Unite – Brochure
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
 
Huntech
HuntechHuntech
Huntech
 
Timothy Knell_CV_Oct2015
Timothy Knell_CV_Oct2015Timothy Knell_CV_Oct2015
Timothy Knell_CV_Oct2015
 

Similar to End-to-End Transaction Visibility from Mobile Devices to Your Mainframe

Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
Andrew White
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
Sarah Thomas
 
Ketan999new999
Ketan999new999Ketan999new999
Ketan999new999
ketan shah
 
CommTEL Call Centre platform & software suite (PDF)
CommTEL Call Centre platform & software suite (PDF)CommTEL Call Centre platform & software suite (PDF)
CommTEL Call Centre platform & software suite (PDF)
acuser30
 

Similar to End-to-End Transaction Visibility from Mobile Devices to Your Mainframe (20)

z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Enabling z Agility with DevOps and Enterprise Transformation
Enabling z Agility with DevOps and Enterprise TransformationEnabling z Agility with DevOps and Enterprise Transformation
Enabling z Agility with DevOps and Enterprise Transformation
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!
 
Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing
 
How to Balance System Speed and Risk for Multi-Platform Innovation
How to Balance System Speed and Risk for Multi-Platform InnovationHow to Balance System Speed and Risk for Multi-Platform Innovation
How to Balance System Speed and Risk for Multi-Platform Innovation
 
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataBig Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
 
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Airtel-BML
Airtel-BMLAirtel-BML
Airtel-BML
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
 
Ketan999new999
Ketan999new999Ketan999new999
Ketan999new999
 
CommTEL Call Centre platform & software suite (PDF)
CommTEL Call Centre platform & software suite (PDF)CommTEL Call Centre platform & software suite (PDF)
CommTEL Call Centre platform & software suite (PDF)
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 

More from Precisely

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
Precisely
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Precisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
Precisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
Precisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
Precisely
 

More from Precisely (20)

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

End-to-End Transaction Visibility from Mobile Devices to Your Mainframe

  • 1. End-to-end Transaction Visibility From Mobile Devices To Your Mainframe Ian Hartley, Principal Engineer Ed Hallock, Director of Product Marketing & Management
  • 2. 2 Housekeeping • Webcast Audio: – Today’s webcast audio is streamed through your computer speakers. – If you need technical assistance with the web interface or audio, please reach out to us using the chat window. • Questions Welcome: – Submit your questions at any time during the presentation using the chat window. – We will answer them during our Q&A session following the presentations. • Recording and Slides: – This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. Syncsort Confidential and Proprietary - do not copy or distribute
  • 3. 3 Today’s Presenters Syncsort Confidential and Proprietary - do not copy or distribute Ed Hallock is a highly experienced Information Technology Professional with a broad experience base in software product development, support, product management, marketing, and business development. In his diverse career Ed has benefited from working for some of the largest independent software vendors, in a variety of roles, providing enterprise solutions to Global 1000 corporations. Ed has extensive experience in performance and availability management for systems and applications. He holds a bachelor’s degree in Computer Science from Montclair State University in Upper Montclair, New Jersey and has presented at numerous industry events as well as corporate related conferences and seminars. Ian Hartley has worked in software development and system architecture roles where he has gained a wide range of experience across many environments and platforms. He has a passion for all things IT, and is always on the lookout for new technologies. Starting with COBOL and CICS® on the mainframe, he migrated into several languages and stacks ranging from C, Java, web services, mobile and JavaScript with the likes of Angular. Ian has also produced many Splunk apps, add-ons and integrations for Enterprise Security® and IT Service Intelligence®. He works closely with the Splunk teams in EMEA and the USA. When Ian is not coding, you’ll find him off-road, running a trail somewhere.
  • 4. 4 Agenda •The Transaction Tracing Challenge •What is Transaction Tracing and How Does It Work •A Quick Intro – Syncsort Ironstream •Demo of the Ironstream Transaction Tracing Solution •Summary •Q&A Syncsort Confidential and Proprietary - do not copy or distribute
  • 5. 5 The Transaction Tracing Challenge • Growth of large-scale business services that incorporate web and mobile applications has exploded across all industries. • Many organization have a significant reliance on the mainframe, including banking, insurance, financial services, retail, and healthcare corporations. • Transactions that originate on a tablet, phone, etc. and connect to back-end applications hosted on the mainframe tend to be very visible to customers, partners, and executives. • Unacceptable response times and unreliable performance do not go unnoticed. Syncsort Confidential and Proprietary - do not copy or distribute
  • 6. 6 The Transaction Tracing Challenge • Organizations may monitor the overall end-user experience to detect potential problems but have poor visibility into what happens to them on the mainframe. • Many know how long a transaction spends on the mainframe but have no way to know what it is doing within multiple systems and subsystems, including CICS and Db2. • Lack of visibility creates significant challenges and can have significant consequences on service levels. Syncsort Confidential and Proprietary - do not copy or distribute
  • 7. 7 What is Transaction Tracing • Enables organizations to get deep insight into web-based and mobile transactions’ impact on the mainframe. • Unprecedented granularity that enables you to monitor and improve and application performance. • Lightweight solution with a minimal footprint Syncsort Confidential and Proprietary - do not copy or distribute • Leverages Syncsort Ironstream® to deliver IBM z/OS machine data in real-time to leading platforms for operational analytics, like Splunk®
  • 8. 8 How Does It Work? • Uses a transaction identifier to correlate transaction workloads through CICS and Db2 on z/OS. • Ties the transaction identifier to SMF 110 and 101 records generated by CICS and Db2. • Provides the correlated SMF data to Splunk for a visualization of various performance attributes of the units of work. • Time spent in the CICS and Db2 sub-systems along with resources consumed to support the transactions is clearly reported. Syncsort Confidential and Proprietary - do not copy or distribute
  • 9. 9 Polling Question #1 •What technologies are you currently using, if any, to monitor and correlate mainframe components for transactions initiated outside of the mainframe environment? – Dynatrace – AppDynamics – Home grown solution – None Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. 10 Critical Mainframe Data  Normalized and Streamed to Splunk with Ironstream® Syncsort Confidential and Proprietary - do not copy or distribute
  • 11. 11 Ironstream® Overview Syncsort Confidential and Proprietary - do not copy or distribute
  • 12. 12 Demo Overview Syncsort Confidential and Proprietary - do not copy or distribute
  • 13. 13 HTTP – CICS Web Services, RESTful API Syncsort Confidential and Proprietary - do not copy or distribute
  • 14. 14 HTTP – CICS Web Services, RESTful API + Unique UI token http://webservice/abc UXTime Stop UI Time UI Log CICS Time SMF 110 + UI token DB2 token DB2 Time SMF 101 token Splunk Start Syncsort Confidential and Proprietary - do not copy or distribute
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19 Polling Question #2 (Multiple Choice) •What technologies are involved in your cross-platform transactions initiated outside of the mainframe environment? – Java – C+ – CICS Transaction Gateway (CTG) – CICS Web Services/RESTful API – IBM MQ – IMS Connect Syncsort Confidential and Proprietary - do not copy or distribute – Db2 Connect – DataPower Gateway – WebSphere Application Server (WAS)
  • 20. 20 Let's Go To Demo Syncsort Confidential and Proprietary - do not copy or distribute
  • 21. 21 Summary • Tracks transactions initiated on and off the mainframe – including mobile and web platforms -- and feeds data in real- time to Splunk Enterprise to take advantage of its advanced analytics and visualization. • Provides critical information on overall transaction response time, with the ability to drill-down into transaction details including time spent, and resources consumed, on CICS and Db2 on z/OS. • Enables transaction problem isolation and resolution for long- running transactions, to meet SLAs, improving application performance and end-user experience. Syncsort Confidential and Proprietary - do not copy or distribute
  • 22. 22 More Information on Transaction Tracing http://www.syncsort.com/en/Transaction-Tracing http://www.syncsort.com/en/Resource- Center/Mainframe/SolutionSheets/Syncsort-Ironstream-Transaction-Tracing Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. 23 Get Ironstream® for SYSLOG for free Syncsort Confidential and Proprietary - do not copy or distribute http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition Make more sense of the massive machine data piled up in your mainframe. Get started with Ironstream today! Mainframes power mission-critical applications around the world. But many organizations are still flying blind, with no easy way to derive operational intelligence from the vast amounts of machine data generated by these critical systems.
  • 24. Industry Leader in Mainframe Software Products
  • 25. THANK YOU – Questions?