This document discusses IBM's z/OS Connect and Mobile Workload Pricing. z/OS Connect is a Liberty-based gateway that provides secure and simple RESTful access to z/OS applications from mobile, web and cloud applications. Mobile Workload Pricing is a sub-capacity pricing program that helps mitigate the impact of increased mobile transactions on z/OS workloads. Customers must track mobile transactions and report CPU usage to IBM using a new tool to qualify for adjusted pricing.
2824 IBM Mobile Workload Pricing: Five ways to tag and track your mobile work...nick_garrod
InterConnect 2015 session 2824 IBM Mobile Workload Pricing: Five ways to tag and track your mobile workloads. IBM Mobile Workload Pricing offers the very attractive benefit of being able to dramatically reduce the billable usage of mainframe applications that are dedicated to Mobile workloads. However, this benefit depends on the ability to prove that a particular workload is purely dedicated to Mobile workloads. In this session, you will discover five ways that you can demonstrably tag and track your mobile applications in order to qualify for these substantial IBM Mobile Workload Pricing benefits. So if your mainframe is serving mobile applications, this one session could justify your entire conference attendance. Don’t miss it.
This presentation is about -
Based on as a service model,
• SAAS (Software as a service),
• PAAS (Platform as a service),
• IAAS (Infrastructure as a service,
Based on deployment or access model,
• Public Cloud,
• Private Cloud,
• Hybrid Cloud,
For more details you can visit -
http://vibranttechnologies.co.in/salesforce-classes-in-mumbai.html
The Power of Two: Using IBM Standards Processing Engine for EDI Commerce or H...Brian Wilson
This is a presentation covering IBM's newest platform to handle standards processing, with current support for EDI X12 and EDIFACT, as well as HIPAA, within the IBM Integration Bus enterprise service bus offering.
Möt dagens utmaningar genom en robust integrationsplatform.
Läs mer om integration på länkarna: Informationsintegrering (http://www-03.ibm.com/software/products/sv/category/SWP00) respektive konnektivitet & integration (http://www-03.ibm.com/software/products/sv/category/SW666)
2824 IBM Mobile Workload Pricing: Five ways to tag and track your mobile work...nick_garrod
InterConnect 2015 session 2824 IBM Mobile Workload Pricing: Five ways to tag and track your mobile workloads. IBM Mobile Workload Pricing offers the very attractive benefit of being able to dramatically reduce the billable usage of mainframe applications that are dedicated to Mobile workloads. However, this benefit depends on the ability to prove that a particular workload is purely dedicated to Mobile workloads. In this session, you will discover five ways that you can demonstrably tag and track your mobile applications in order to qualify for these substantial IBM Mobile Workload Pricing benefits. So if your mainframe is serving mobile applications, this one session could justify your entire conference attendance. Don’t miss it.
This presentation is about -
Based on as a service model,
• SAAS (Software as a service),
• PAAS (Platform as a service),
• IAAS (Infrastructure as a service,
Based on deployment or access model,
• Public Cloud,
• Private Cloud,
• Hybrid Cloud,
For more details you can visit -
http://vibranttechnologies.co.in/salesforce-classes-in-mumbai.html
The Power of Two: Using IBM Standards Processing Engine for EDI Commerce or H...Brian Wilson
This is a presentation covering IBM's newest platform to handle standards processing, with current support for EDI X12 and EDIFACT, as well as HIPAA, within the IBM Integration Bus enterprise service bus offering.
Möt dagens utmaningar genom en robust integrationsplatform.
Läs mer om integration på länkarna: Informationsintegrering (http://www-03.ibm.com/software/products/sv/category/SWP00) respektive konnektivitet & integration (http://www-03.ibm.com/software/products/sv/category/SW666)
Achieving Scalability and speed with IBM Solutions - IaaS SoftlayerAna Alves Sequeira
En esta presentacion podreis ver varios ejemplo de empresas que se han movido al cloud con IBM Softlayer.
Los beneficios del mismo para mas escalabilidad y velocidad, con IBM IaaS - SoftLayer.
Presentation from IBM InterConnect 2015:
Mobile devices are increasingly ubiquitous and are the preferred, or in some cases the only, way we wish to interact as a consumer or employee. We now live in a world where we are often connected to the Internet in an "always-on" culture where receiving information or events is both valuable and acceptable. IBM MessageSight helps connect mobile platforms and devices to existing systems of record to enhance the way we involve our customers for improved experience and hence better outcomes. In this session, we explore how to use MessageSight to integrate with systems of record exposed using both IBM Integration Bus and WebSphere Application Server to allow bi-directional, event-driven communication to the mobile application.
IBM SmartCloud e SoftLayer: il Cloud senza compromessi
Una soluzione IaaS (Infrastructure as a Service) appropriata può fare la differenza per superare la concorrenza con idee innovative.
Per massimizzare la velocità e l'agilità del cloud, IBM offre una vasta gamma di soluzioni Infrastructure-as-a-Service (IaaS) e oltre 100 applicazioni Software-as-a-Service (SaaS) e funzionalità Business process-as-a-Service (BPaaS) con la sicurezza, la disponibilità e la flessibilità necessarie per rispondere alle esigenze di innovazione delle aziende
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
GSE Nordic 2015 CICS Performance and Consolidation The CICS TS V5 releases introduce a number of runtime enhancements to reduce CPU usage, improve response times, reduce resource usage, while providing additional insight into transaction performance. Come along to this session as we explore some of the newer performance benefits found in CICS TS and how savings can translate to your environment. We will also look at a lab benchmark that consolidated CICS regions, maintaining throughput, saving significant MIPS, and reducing the management overhead.
Achieving Scalability and speed with IBM Solutions - IaaS SoftlayerAna Alves Sequeira
En esta presentacion podreis ver varios ejemplo de empresas que se han movido al cloud con IBM Softlayer.
Los beneficios del mismo para mas escalabilidad y velocidad, con IBM IaaS - SoftLayer.
Presentation from IBM InterConnect 2015:
Mobile devices are increasingly ubiquitous and are the preferred, or in some cases the only, way we wish to interact as a consumer or employee. We now live in a world where we are often connected to the Internet in an "always-on" culture where receiving information or events is both valuable and acceptable. IBM MessageSight helps connect mobile platforms and devices to existing systems of record to enhance the way we involve our customers for improved experience and hence better outcomes. In this session, we explore how to use MessageSight to integrate with systems of record exposed using both IBM Integration Bus and WebSphere Application Server to allow bi-directional, event-driven communication to the mobile application.
IBM SmartCloud e SoftLayer: il Cloud senza compromessi
Una soluzione IaaS (Infrastructure as a Service) appropriata può fare la differenza per superare la concorrenza con idee innovative.
Per massimizzare la velocità e l'agilità del cloud, IBM offre una vasta gamma di soluzioni Infrastructure-as-a-Service (IaaS) e oltre 100 applicazioni Software-as-a-Service (SaaS) e funzionalità Business process-as-a-Service (BPaaS) con la sicurezza, la disponibilità e la flessibilità necessarie per rispondere alle esigenze di innovazione delle aziende
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
GSE Nordic 2015 CICS Performance and Consolidation The CICS TS V5 releases introduce a number of runtime enhancements to reduce CPU usage, improve response times, reduce resource usage, while providing additional insight into transaction performance. Come along to this session as we explore some of the newer performance benefits found in CICS TS and how savings can translate to your environment. We will also look at a lab benchmark that consolidated CICS regions, maintaining throughput, saving significant MIPS, and reducing the management overhead.
GSE Nordic 2015 CICS Connectivity in DevOps The business driver behind adopting a DevOps approach to developing software, is the need to deliver applications to the market faster, with lower costs and higher quality. With CICS Transaction Server providing the core services on which many of these applications rely, the importance of being able to connect to CICS and reuse these core services continues to increase. When CICS introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the CICS connectivity story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. In this session, we will explore the different CICS connectivity options, suggest use-cases in which they can be of most value, and most importantly, learn which is the right tool for the job.
IBM Impact session Ed addison nuts and bolts wsnick_garrod
Are you interested in troubleshooting issues in your environment? This session will focus on problems seen coming into the CICS Level 2 Support Center. We will go over debugging techniques and solutions to the problems. We will also cover the tools you can utilize to make debugging easier. The focus for this session will be on CICS WebServices and how they could relate to the Mobile environment.
S102 cics the future is closer abridgednick_garrod
GSE Nordic 2015 - Future of CICS is closer than you think. There is a lot going on behind that mysterious curtain. Recently, the CICS development organization has adopted a new practice called ‘IBM Design Thinking’, which will forever change the way CICS products are developed. The core principle of this approach is to make sure we get as much feedback as possible on our future ideas. This is a quite unique opportunity to participate in a discussion regarding the future of IBM CICS technology. We will be sharing our views. And we will be hoping for lots for interactive feedback. Please don’t be shy!
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big TummySensual Occasions
A common goal for women is to have a flat stomach, so often we do things like diet and exercise. However, do you know what else can affect the how big or how small our stomachs can look?
The answer to that question is the clothes we wear, and that means all of the clothes. This means that even the choice of women’s knickers or lingerie can also be a big factor to slimming down our tummies.
Please visit http://www.sensualoccasions.co.uk/ for more information.
According to IDC, in 2013 “the worldwide smartphone market reached yet another milestone, having shipped one billion units in a single year for the first time”. This was an increase of almost 40% over 2012. If much of your business runs on CICS, you have probably already exposed at least some your CICS applications to the mobile world. But are you exposing these services in the optimal way for your company? Come to this session to discover what the supported options are for mobile exploitation in CICS Transaction Server, CICS Transaction Gateway and z/OS Connect. This session will compare and contrast the options available, so you can understand what is right for you. It will also demonstrate how you can use IBM Worklight with CICS TS to optimize your mobile deployments. Make sure your phone is on silent – you won’t want to be disturbed in this session.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
2011.10.19 - Cloud Partner Day - Reseller BreakoutClub Alliances
Deck de présentation sur les annonces Cloud IBM du 12 octobre, préparé à l'occasion du "Cloud Partner Day" organisé par IBM à la Gaude. Présentation exploitée dans le cadre d'un atelier pour les Cloud Builders et Cloud Services Solution Providers.
Enable rapid service provisioning with cics, microservices and the z/OS Provi...Matthew Webster
Learn how to take advantage of microservices as an architectural pattern from an industry-wide point of view through to CICS. Understand how microservices can help your development team become leaner and more agile, and how they can you help adopt DevOps processes. You'll learn how they're different from other architectural patterns like Service Oriented Architectures (SOA), and why z Systems and CICS are a good fit for them. We'll cover container technologies and see demos of various scenarios using the IBM z/OS Provisioning Toolkit.
This presentation will give you some insight about Mobile Cloud Computing. This is an emerging technology and I provided basic details to explore this specific technology aligned with market leading products and their comparisons
Similar to SHARE 2014, Pittsburgh IBM Mobile Pricing (20)
“My systems work perfectly—it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be "an application issue" anymore. In CICS TS 5, new policy-based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rogue applications can be detected through various task threshold policies, such as excessive file or database access, repetitive program links, or abnormal storage requests. Once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely.
GSE Nordic 2015 Liberty, Egality, Fraternity “Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), is the slogan of France, coined around the time of the French Revolution. It also seems a pretty appropriate slogan for the mini revolution that is happening right now with CICS and WebSphere. The Liberty profile is a highly composable and dynamic application server runtime environment that is shipped as a part of both WebSphere and CICS. This session will introduce Liberty in CICS, compare the capability with WebSphere (note the ‘equality’ word) and discuss how these new Liberty applications can interact with and support the established fraternity of existing CICS applications that run your core business.
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
GSE Nordic 2015 1 Billion Smartphones a year and counting – How is your CICS connected? According to IDC, in 2013 “the worldwide smartphone market reached yet another milestone, having shipped one billion units in a single year for the first time”. This was an increase of almost 40% over 2012. If much of your business runs on CICS, you have probably already exposed at least some your CICS applications to the mobile world. But are you exposing these services in the optimal way for your company? Come to this session to discover what the supported options are for mobile exploitation in CICS Transaction Server, CICS Transaction Gateway and z/OS Connect. This session will compare and contrast the options available, so you can understand what is right for you. It will also discuss how you can use IBM MobileFirst with CICS TS to optimize your mobile deployments. Make sure your phone is on silent – you won’t want to be disturbed in this session.
S107 5 compelling reasons for using cics in the cloudnick_garrod
GSE Nordic 2015 5 Compelling reasons for using CICS in the cloud. So what does creating a CICS ‘Cloud’ really mean? And what exactly are these new CICS Cloud capabilities? How do these new Applications and Platforms artifacts relate to existing CICS technologies such as programs, transactions and regions? Where do these new Policies fit in? And most importantly, why would you do any of this? What value can you expect to derive from creating a CICS Cloud architecture? If you have ever asked yourself any of those questions, this session will give you five compelling answers. If you ever wondered what the CICS Cloud means in the real world, this session if for you.
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
GSE Nordic 2015 Using IBM UrbanCode Deploy to deliver your apps to CICS. Deploying applications to CICS can be tricky, and you may be struggling to figure out how to handle the many new zFS artifacts such as cloud, bundles, Java, and web services. This could even be slowing down the adoption of new technologies that could deliver the solutions your business needs. This session will introduce IBM UrbanCode Deploy as a tool to automate many types of application deployments through your environments. It can provide rapid feedback and continuous delivery in agile development while providing the audit trails, versioning and approvals needed in production. See the new z/OS and CICS TS plug-ins for UrbanCode Deploy in action to deploy COBOL, web services, and Java applications to CICS in a single action.
GSE Nordic 2015 Twist and cloud – How customers make CICS dance. Putting CICS into the cloud, is someone actually doing this? Since 2012 CICS TS Version 5 has been introducing and continuously enhancing its capabilities to support a Platform As A Service approach. Join speakers from CICS Technical Sales to hear about their experiences and how their customers gained value from cloud capabilities in CICS.
GSE Nordic 2015 CICS Cloud and DevOps agility2 Creating a CICS cloud can provide a step change in agility. Add DevOps to the equation and it’s more like a quantum leap. Imagine if the latest CICS DevOps technology could fully automate the reliable and repeatable deployment of CICS applications through the entire lifecycle. Imagine a fully automated build environment for any style of CICS application. With common scripting languages and tools to create a continuous deployment model. Or imagine using a tool like IBM UrbanCode Deploy to provision any type of CICS application, in coordination with other application and database components in a single action. Better still, don’t try and imagine it. Attend this session and see it for yourself.
GSE Nordic 2015 Conferece - CICS Opening. CICS TS V5.1 became available at the end of 2012, followed by CICS TS V5.2 in mid 2014. So what does that mean for you? Perhaps you can reduce operational complexity by hosting modern application interface logic inside the Liberty profile server within CICS? Perhaps you can use the new CICS Cloud capabilities to improve application reliability and accelerate deployments? Maybe you can improve your integration with Mobile devices? Or better control your costs though policies and consolidation? Nick and Ian open the CICS track to help you find out how CICS is reinventing mainframe application serving one again. Discover which sessions you should attend to get the most value from your attendance.
“Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), is the slogan of France, coined around the time of the French Revolution. It also seems a pretty appropriate slogan for the mini revolution that is happening right now with CICS and WebSphere. The Liberty profile is a highly composable and dynamic application server runtime environment that is shipped as a part of both WebSphere and CICS. This session will introduce Liberty in CICS, compare the capability with WebSphere (note the ‘equality’ word) and discuss how these new Liberty applications can interact with and support the established fraternity of existing CICS applications that run your core business.
When CICS Transaction Server introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the SOA story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. Additionally, there have been a great many enhancements to both these SOA styles in recent years. Come to this session to get up to speed on the evolution of these technologies. And most importantly, learn which is the right tool for the job.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
7. End-to-End Architecture for Mobile and Cloud Application
invoking z Services using APIs
Web Services
or REST based
services
On-Premise API
Enablement
Cloud APIs
Mobile
Applications
Cloud-based
Services
Enterprise
Transaction
Processing
CICS
IMS
WAS
DataPower
GW
appliance
DMZ
Access to systems of
records and enterprise
data via APIs
Enterprise
APIs
Management
Enterprise
API s
Cloud -
Integration
Services
Cloud –
Mobile App
Enablement
Service Enablement:
• Enables invocation of z
applications by remote
applications using standard
protocols (WSDL, REST)
API Enablement:
• Consumability by internal and
external developers (creation and
look up)
• Entitlement Management
(securing, workload
enforcement)
• Usage monitoring & Analytics
Cloud Integration
Enablement:
• Enabling integration with APIs
as well as technical services
Mobile Application
Development
• Invokes services and APIs
8. WebSphere Liberty Profile – What’s New ?
Extend existing enterprise data and business logic to Web, Mobile or Cloud apps
• Use WebSphere Liberty z/OS Connect for secure enterprise connectivity to easily extend
existing assets to Mobile and Cloud applications using RESTful services and JSON.
• Leverage Websphere Liberty Java Connector Architecture (JCA) feature to connect in
to and extend existing enterprise backend systems
• IBM WebSphere Liberty Optimized Adapters for z/OS (WOLA): a function of WAS
Liberty for z/OS that allows very fast, efficient, and low-latency memory to memory
exchanges between WAS z/OS and CICS, IMS & Batch.
Administer production apps with the WebSphere Liberty Administrative Center
• Flexible, extensible, mobile ready, next generation admin UI to manage Liberty Servers
WebSphere Liberty Repository to pick up new Liberty product features, samples,
and tutorials:
• Easily extend your development and production environments with new features
Different options for using WebSphere Liberty in the Cloud
• Build applications using the Liberty Buildpack and Caching services on IBM BlueMix
• Deploy WAS Liberty patterns using Pure Application Pattern service on SoftLayer
• Bring your own existing entitlement of WAS to SoftLayer or Amazon cloud environments
8
9. Problem Statement (s)
Customers on the z/OS platform today are increasingly expressing concerns about
their ability to handle large spikes of new requests originating from any number of
almost instantly available clients and systems that have a need for the business
assets available there.
The fast advancing worlds of mobile and cloud computing are putting more and
more pressure on applications and business logic located on z/OS in environments
like CICS, IMS, batch, and others.
Customers have expressed an interest in a common solution that can be used by
cloud, mobile, web and components like API management, that enables simple
discovery and secure access to z/OS business and infrastructure assets using
REST technology.
Infrastructure providers (cloud-based IaaS and SaaS providers) and mobile
services registries (ie: API Management) require a uniform way to interact with z-
based middleware for discovery, provisioning, data transformation, and service
invocation.
10. z/OS Connect
What is it and what are the benefits for customers?
z/OS Connect is a Liberty based gateway that provides a secure and simple way to
discover and call in to application assets/infrastructure on z/OS from Web/Cloud/Mobile
applications using RESTful services.
The benefits include :
• Fast on-ramp for z/OS customers to discover and reach z/OS applications securely/simply using
RESTful services. Service references can be copied from z/OS Connect and stored in any repository –
cloud based (such as IBM Cloud OE) or mobile based (such as IBM Worklight, API Management) or any
other web technology
• Light-weight and modular providing flexibility to run multiple copies on the same or different z/OS
systems and assign higher/lower priority to specific Liberty servers
• Integrated with z/OS management makes the operations of the environment automated and consistent
with the environments it is exposing
• Provides ability to standardize on security access for calling in to z/OS applications in all major
environments - CICS, IMS, batch, Unix System Services, and ISV software. Supports SAF-based
security integration allowing for individual z/OS Connect services to have unique sets of authorized
users.
• Provides ability to track and prioritize requests from cloud, mobile, web based external requestors
using standard z/OS mechanisms like SMF and WLMA. Fulfills audit/chargeback needs for access to
z/OS applications
11. WOLA
WOLA
IBM z/OS Connect
WOLA Link Server
Task CICS
Programs
IMS dependent
regions
BlueMix
IMS
VSAM
DB2
DLI
zosConnect
JSON to/from
byte[] (Cobol
copybook)
CICS
WOLA over
OTMA
WOLA direct
Batch
zosConnect
JSON to/from
byte[] (C
structure)
zosConnect
JSON to/from
byte[] (PL/I
structure)
WOLA
WAS Liberty z/OS
RESTful
RESTful
RESTful
z/OS Connect
A service that encapsulate calling z/OS target applications using REST
calls. z/OS Connect will support JSON payloads for calls from external
cloud or mobile-based clients and will enable the conversion of the
payload to the target program's expected format. It will also provide the
response payload conversion from a byte array into JSON format before
returning the response to the caller.
Data binding
conversion/routing
Mobile/
APIM
Mobile/
APIM
Security / Auditing /
Metering
CloudOE
Javascript
CloudOE
Javascript
CloudOE
Java
12. z/OS Connect Liberty under CICS
CICS
Programs
CloudOE
Javascript
CloudOE
Javascript
CloudOE
Java
BlueMix
VSAM
DB2
zosConnect
JSON to/from
byte[] (Cobol
copybook)
CICS
zosConnect
JSON to/from
byte[] (C
structure)
zosConnect
JSON to/from
byte[] (PL/I
structure)
CICS Liberty/JVMServer
RESTful
RESTful
RESTful
z/OS Connect under CICS Liberty
Same z/OS Connect implementation – the CICS JCICS service provider handles requests targeted to
existing CICS programs. CICS provides interceptors to integrate z/OS Connect with CICS security
Data binding
conversion/routing
Security / Auditing /
Metering
JCICS
Mobile/
APIM
Mobile/
APIM
13. Dependent Region
Message
Processing
Program (MPP)
WOLA
IMS
Connect
z/OS Connect Liberty for IMS
IMS dependent
regions
BlueMix
IMS
DB2
zosConnect
JSON to/from
byte[] (Cobol
copybook)
zosConnect
JSON to/from
byte[] (C
structure)
zosConnect
JSON to/from
byte[] (PL/I
structure)
z/OS Connect Liberty for IMS
RESTful
RESTful
RESTful
Data binding
conversion/routing
Security / Auditing /
Metering
z/OS Connect Liberty for IMS
Same z/OS Connect implementation – WOLA or the IMS Connect service provider handles
requests targeted to existing IMS transactions and data.
TCP/IP
OTMA
OTMA
CloudOE
Javascript
CloudOE
Javascript
CloudOE
Java
Mobile/
APIM
Mobile/
APIM
DLI
IMS
DB
ODBM
Dependent Region
Batch Message
Processing
Program (BMP)
Dependent Region
IMS Fast Path
(IFP)
Dependent Region
Java Message
Proc (JMP)
Dependent Region
Java Batch Proc
(JBP)
DLI
14. GUIDE SHARE EUROPE
Agenda:
z/OS Connect... Mainframe Makes Mobile Magic
Mobile Workload Pricing
What's going on in CICS TS with IBM Design Thinking?
15. Mobile Workload Pricing for z/OS
●
Benefits
− Improves the cost of growth for mobile transactions processed in
System z environments such as CICS, IMS, DB2, and WAS
− Mobile Workload Pricing (MWP) for z/OS enhances Sub-Capacity pricing
•Mitigates the impact of Mobile on MLC charges where higher transaction volumes cause a spike in
machine utilization
•Normalizes the rate of transaction growth
− No infrastructure changes required, no separate LPARs needed
•It is an enhanced way of reporting sub-capacity MSUs
•System runs as it always has, workload execution is not altered
●
Hardware requirements
− Available to all enterprises running a zEC12 or zBC12 server (actual mobile work may run on
any zEnterprise machine including z196 and z114)
●
MWP Announcement Letters – 2014-05-06
• AP14-0219 Asia Pacific
• A14-0429 Canada
• ZP14-0280 Europe, Middle East, Africa
• JP14-0279 Japan
• LP14-0279 Latin America
• 214-223 United States
16. Mobile Workload Pricing Reporting Process
●
New Mobile Workload Reporting Tool (MWRT) – available 30 June 2014
− A new Windows-based Java tool to report sub-capacity MSUs and make adjustments
to reported LPAR MSUs based on Mobile transaction data
• Standard SCRT methodology plus new feature to adjust for Mobile workload impact
• New tool will replace SCRT for customers who take advantage of Mobile Workload Pricing
●
Customers must track mobile transactions and produce a file showing mobile
CPU consumption each month
• Record mobile program transaction data, including CPU seconds, on an hourly basis per LPAR
• Load the resulting data file into MWRT each month (IBM-specified CSV format)
• Run MWRT and submit the results to IBM each month (Replaces SCRT process)
●
MSU adjustments and monthly peak calculation for billing
− MWRT will subtract 60% of the reported Mobile MSUs from a given LPAR in each hour,
adjusting the total LPAR MSU value for that hour
• This will function like a partial “off-load” from a software pricing perspective
• When an LPAR value is adjusted, all software running in the LPAR will benefit from lower MSUs
• Tool will calculate the monthly MSU peak for a given machine using the adjusted MSU values
17. Example: reducing Mobile impact to LPAR peak
z/OS
&
Other
CICS
Measure LPAR MSUs:
Standard SCRT
methodology, SMF 70
records1,500
Usag
e
Tag Mobile transactions:
e.g. Capture CICS
transaction details (SMF
110 records) and filter by
transaction type
Other
Mobile
Other
1,380 MSUs
Subtract 60% of mobile MSUs:
-60% * 200 = -120
Measure CICS
usage:
Capture SMF 89
record in new IBM
reporting tool
(replaces SCRT);
SMF 89 is IBM usage
standard
CICS,
z/OS
&
Other
200
100
100
80
Adjusted LPAR MSUs:
Per new MWRT reporting tool
Transaction
definitions
Adjusted LPAR
MSUs used to
determine peak
for month;
Pricing & billing
BAU based on
peak
MSUs
1
2
3
4
5
6
300
Mobile
LPAR MSUs
for billing (Standard)
z/OS/Other 1,500
CICS 1,500
LPAR MSUs
for billing (Adjusted)
z/OS/Other 1,380
CICS 1,380Figures are for illustrative purposes only.
18. Example: Sample LPAR MSU values by hour
●
SCRT calculates the Rolling 4-Hour Average (R4HA) MSU
peak
− All workloads are included
Peak R4HA value = 1404 MSUs
19. LPAR MSU values adjusted for mobile contribution
●
MWRT removes 60% of the Mobile workload, interval-by-interval
− Non-mobile workload is unchanged
− Billing for the month is based upon the newly calculated R4HA curve after the
mobile workload has been reduced
New Peak R4HA Value = 1231 MSUs
MWRT savings = 173 MSUs
Provides benefit when Mobile workloads contribute to monthly peak MSUs;
Off-peak MSU adjustments will not affect MSUs used for billing.
Original Peak R4HA value = 1404 MSUs
20. Identifying Mobile Transaction Workload
●
Customers are responsible for processing their mobile transaction data into
a predefined format to be loaded into MWRT for each sub-capacity reporting
period.
− IBM must approve the data gathering methodology.
●
The data must consist of general purpose processor CPU seconds for
each mobile transaction program summarized by hour by LPAR for all
machines processing mobile transactions.
− Detailed instructions, including CSV file format, available in the MWRT user's guide.
●
Mobile Workload Pricing Defining Programs:
5655-S97 CICS TS for z/OS V4 5635-A04 IMS V13
5655-Y04 CICS TS for z/OS V5 5655-DSQ IMS DB VUE V12
5722-DFJ CICS VUE V5 5655-DSM IMS DB VUE V13
5635-DB2 DB2 V9 for z/OS 5655-L82 WS MQ for z/OS V6
5605-DB2 DB2 10 for z/OS 5655-R36 WS MQ for z/OS V7
5615-DB2 DB2 11 for z/OS 5655-W97 WS MQ for z/OS V8
5697-P12 DB2 VUE V9 5655-VUE WS MQ VUE V7
5697-P31 DB2 10 VUE 5655-VU8 WS MQ VUE V8
5697-P43 DB2 11 VUE 5655-N02 WebSphere App Server for z/OS V7
5635-A02 IMS V11 5655-W65 WebSphere App Server for z/OS V8
5635-A03 IMS V12
21. New MWP Contract Addendum
●
Mobile Workload Pricing is available for Mobile workloads running on a
zEC12 or zBC12 server with AWLC or AEWLC sub-capacity pricing
− Alternatively, if you install and operate a zEC12 or zBC12 in your enterprise you
will be eligible for MWP when running a Mobile Workload Pricing Defining
Program on a z196 or z114 server with sub-capacity pricing
●
There is a new contract addendum:
− The System z AWLC and AEWLC Addendum for Mobile Workload Pricing
− Contract number Z126-6300
●
Agreement to and compliance with the terms and conditions specified in
the MWP contract Addendum is required
− If the MWP Addendum is not implemented, MWRT Reports will be rejected!
22. Measuring GP CPU for Mobile Workload Pricing (MWP)
From Announcement ZP14-0280 (EMEA) - https://ibm.biz/MWPAnnouncementLetter
.... Mobile workloads are defined as the transactions processed by a named mobile
application, or transactions that can be identified as originating from a mobile
device.
You must be able to track and report the general purpose processor time (CPU Time)
for mobile transactions and report those values in a pre-defined format to IBM
each month ....
It is necessary to provide evidence a transaction is eligible for MWP and quantify the
GP CPU consumed.
Evidence must originate outside of the system and be associated with the CPU
measured for the request.
Some measuring techniques use an address space as the measurement 'container' and
others require the finer granularity of a transaction.
The quantified amount of GP CPU consumed must be captured to provide input to the
MWP reporting tool (MWRT).
23. Providing evidence of eligibility
We have identified two classes of evidence – implicit and explicit:
Implicit evidence:
Something about where the work is routed to – eg if all mobile work is routed to
particular servers, then all their consumption is eligible (transaction-level
measurement is not required).
This is the most invasive option for system programmers as it requires new servers or
changes to routing to existing servers.
Something about where the work arrives from – eg if particular routes are reserved for
mobile requests, then their identity can serve as evidence (transaction-level
measurement is required).
This evidence might only be known in the receiving system, and might not flow to other
systems deeper in the infrastructure.
Explicit evidence:
Something in the request itself. Requires transaction-level measurement.
• Its target transaction id, its security context, an element of its payload (an explicit
parameter asserting evidence), ...
This is also quite invasive, especially for the application developers.
You might already be operating your systems with the necessary evidence – it
won't always require large changes to provide it.
24. Quantifying GP CPU eligible for MWP
No new CPU measurement techniques have been created for MWP. It is
intended that the mobile defining products' existing capabilities can be
used to satisfy the requirements for quantifying GP CPU eligible for MWP.
It is expected that SMF records and other log data containing GP CPU
consumption measurements will be used to contain the evidence that the
transaction(s) consuming the CPU are eligible.
Using the evidence associated with the measurement 'container' (address
space or transaction), you can calculate the total GP CPU eligible for
MWP and provide it as input to MWRT.
The diagram on the following page illustrates these concepts.
25. Mobile Workload Pricing: Technology Requirements
CICS
IMS
DB2
MQ
WAS
SMF MWRT
Mobile
CPU
Measurement
MWP peak
CSV file
Mobile
Trans
Non-
Mobile
Trans
Mobile CPU Measurement:
Varies by product, application
and installation.
Types
70 & 89
27. Example 1:: Measuring by defining product instance
If you are not currently measuring CPU at the individual transaction or request level, and do not wish to move to
a finer grained level of measurement, then you have the option to use existing mechanisms to route eligible
mobile workload to dedicated instances and use the SMF 89 records that are recorded with the CPU
consumption for each of the instances processing that workload. The address spaces dedicated to eligible
workload could be existing ones which you now use exclusively for such transactions, new ones that are
required to support growth in such workload, or a mixture of new and existing.
If, for example, work arrives via TCPIP, then the mobile requester will use an IP address which resolves to one or
more listening ports associated with specific address spaces running one of the mobile defining products. It is
important that only eligible workload is routed to these regions, as you will be recording the entire CPU
measurement as eligible workload for those address spaces in MWRT.
Similarly, it would be possible to dedicate intermediate resources (such as CICS Transaction Gateway) to mobile
workloads and route from them to the defining product - however only CPU measured from the defining
product's address space will be valid input to MWRT. You will need to add up the total CPU measurements for
the address spaces you are dedicating to eligible workload and use these in the CSV file input to MWRT.
28. Example 1:: Measuring by defining product instance (continued)
Some instances of defining products MUST serve both eligible and non-
eligible workloads - for example, a CICS File Owning Region cannot
be cloned into one that is used for eligible work and one for ineligible
work. In these cases you will NOT be able to attribute the CPU
consumed in such an address space to mobile workload.
Pros: does not require introduction of transaction-level measurement.
Cons: requires existing or newly created middleware instances to be
dedicated exclusively to eligible workload, with a 'fence' between the
execution resources.
29. Example 1:: Measuring by defining product instance (continued)
CICS regions
1-10
CICS regions
11-15
SMF MWRT
Mobile
CPU
Measurement
MWP peak
CSV file
Mobile
Trans
Non-
Mobile
Trans
Mobile CPU Measurement:
Calculate the total GP CPU
consumed by regions 11-15.
Types
70 & 89
31. Example 2:: Measuring by transaction name
Transaction names (or tranids) are a very familiar mechanism used to distinguish workloads
of different types. Although most commonly used as a functional distinction, it is common
to use them for accounting and charge-back purposes. Also tranids are already commonly
used to informing routing and workload management decisions, and many performance
analysis tools have excellent support to split out work by tranid, so extending their use to
distinguish workload for mobile CPU measurement might be appropriate.
However, this will mean defining new tranids in order to ensure that eligible and non-eligible
workload is robustly distinguished. Also, you might have application or system code which
is sensitive to tranid values already, so overloading their use for MWP might not be
appropriate, and you would want to consider one of the options below.
In CICS TS, tranids dedicated to mobile workload can be associated with the same
application programs and run alongside tasks using the existing tranids.
32. Example 2:: Measuring by transaction name
CICS regions
1-10
SMF MWRT
Mobile
CPU
Measurement
MWP peak
CSV file
Mobile
Trans
Non-
Mobile
Trans
Mobile CPU Measurement:
Calculate the total GP CPU
consumed by MOB1
transactions
Types
70 & 89
MOB1
MOB1
MOB1
TRN4
TRN4
TRN4
Type 110
33. In Summary
●
Mobile Workload Pricing (MWP) Benefits
− Improves the cost of growth for mobile transactions processed in
System z environments such as CICS, IMS, DB2, and WAS
− MWP for z/OS enhances Sub-Capacity pricing
•Mitigates the impact of Mobile on MLC charges where higher transaction volumes
cause a spike in machine utilization
•Normalizes the rate of transaction growth
− No infrastructure changes required, no separate LPARs needed
•It is an enhanced way of reporting sub-capacity MSUs
•System runs as it always has, workload execution is not altered
●
Key requirements
•Available to all enterprises running a zEC12 or zBC12 server (actual mobile work
may run on any zEnterprise machine including z196 and z114)
•Use a Mobile Workload Pricing Defining Program to process mobile transactions
•Implement sub-capacity using AWLC or AEWLC under standard pricing terms
•Meet the mobile workload tracking and reporting requirements
Editor's Notes
The "API economy” has changed how developers think about building apps, and how organizations deploy software in the cloud.
Everywhere you look on the Web these days, it seems as if somebody’s launching new APIs.
There are over 10,000 API documented on programmable web today… and is significantly increasing as we speak.
<number>
Let’s look at the Cars.com mobile app as an example.
Cars.com is a consumer of APIs, and has assembled several 3rd party apis together to form the base function of their cars app.
For example, they use a Map Provider API to provide a “store locator function”
APIs from a car dealer data aggregator for availability of certain makes and models.
They use APIs from a Bank to offer Loan calculators and origination
Auto insurance from an Insurance companies APIs
And can imagine them using the new Xtify API from IBM to provide notifications, that a car they were looking for was now found.
<number>
By consuming APIs to assemble their App, Cars.com… Can focus on their core competence and value add, rather then reinventing common capabilties
Sees Quicker time to market, decreases cost and speeds up their cars.com app development and delivery
Drives innovation, from others, into their app (like, perhaps the notifications from Xtify)
Perhaps the insurance company offers value to their affiliates (which cars.com is now part of) by marketing the cars.com app to their insurance customers
<number>
Now, let’s look at the API Economy from the Providers perspective
The Bank can extend it’s reach beyond customers doing on-line banking.
By offering an API, that includes Mortgage Calculators, Lon Origination, On-line Payment, and Account Query
the bank can reach new mobile app providers link Cars.com (automotive sales), Zillow (on line real-estate), and Mint (financial data aggregator)
Which…
<number>
Expands into new customer bases and niches that the bank would normally not reach on their own
Expands their brand and brand loyalty – you think about google when you see their maps appear in apps, perhaps you will think of “the bank” when you see their signature mortgage calculator
And now you have third parties innovating with your content in ways you haven’t imagined and you are now monetizing those sources – across a wide array of app, running on a wide array of platforms
<number>
Different options for using WAS in the Cloud
Deploy Pure patterns that use WebSphere Application Server to SoftLayer and on premise
Compose and test applications using the Liberty buildpack and caching services on IBM BlueMix
Bring your existing entitlement of WebSphere Application Server to the cloud of your choice (SoftLayer, …)
Pick up new Liberty product features, samples, and how to’s from the Liberty Repository
Update your server with new Liberty features (ie. Programming models) will be delivered via Liberty Repository
Download new samples, and information on how to integrate 3rd party features from partners and open source
<number>