SlideShare a Scribd company logo
Turning Insight into Action with CICS Events Tom Grieve [email_address]
© IBM Corporation 2009. All Rights Reserved. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views.  They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant.  While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or   otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way.  Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.  Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment.  The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved.  Actual environmental costs and performance characteristics may vary by customer. The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM trademarks, see www.ibm.com/legal/copytrade.shtml AIX, CICS, CICSPlex, DB2, DB2 Universal Database, i5/OS, IBM, the IBM logo, IMS, iSeries, Lotus, OMEGAMON, OS/390, Parallel Sysplex, pureXML, Rational, RCAF, Redbooks, Sametime, Smart SOA, System i, System i5, System z , Tivoli, WebSphere, and z/OS. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
Business  Event Processing Bridges the Gap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT Developer Business User
IBM Event Processing products – some examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS and Event Processing An introduction to CICS as a source of events
Jun 9, 2009 "CICS is probably the most successful piece of software of all time . . . It is the mainstay of business computing throughout the world . . . Millions of users unknowingly activate CICS every day, and if it were to disappear the world economy would grind to a halt.“ Phil Manchester, Personal Computer Magazine ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CICS Although most people are blissfully unaware of CICS, they probably make use of it several times a week, for almost every commercial electronic transaction they make.  In the whole scheme of things, CICS is much more important than Microsoft Windows."   Martin Campbell-Kelly, From Airline Reservations to Sonic the Hedgehog (A History of the Software Industry)
CICS Events – a peek inside the box
CICS TS V4.1 is aimed at helping users to –  Business Flexibility and Innovation Compete   for new opportunity  by gaining insight into business processes and responding by modifying key business applications quickly and with confidence   Control costs   by simplifying IT infrastructure and improving development and operations productivity through easier-to-use interfaces and functions   –  IT  Simplification Comply  with corporate, industry and government policies to manage business risk of critical business applications –  Governance and Compliance Event Processing
CICS and Business Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Significance of Events from CICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS and event processing – overview Existing Business Logic Captured Events CICS Event Processing Event Capture Filtering Enrichment Formatting  Routing Extensible Secured Monitored etc. Development & Deployment Tools WebSphere  Business  Monitor WebSphere  Business  Events Code NOT changed CICS Transaction Server for z/OS Other  Event  Consumers Events
The event solution for CICS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A few example uses of CICS events
EP Scenario 1 – Observe business processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EP Scenario 2 – Non-invasive change to business processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EP Scenario 3 – Event Combination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example workflow for using Events in CICS
The Role-Based CICS Event Workflow Event Consumer Business Modeler Business Dashboard LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
LoB defines the business events Event Consumer Identify Business Events  Studies existing business processing and identifies business events that occur and information to be collected. May define patterns between events and specify delivery destinations or event display using other tooling. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
Application Analyst identifies events in application Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Inspects program(s) to determine how to capture the business events and collect the required data. Specifies where and how event is to be emitted. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
Systems Programmer configures the infrastructure CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Deploy Events Specifies format and destination for the captured events. Defines CICS resources to deploy the events LoB Manager Application Analyst Systems Programmer
LoB defines the business actions CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Deploy Events  Specify Business Actions Specifies the actions to take on consuming an event  LoB Manager Application Analyst Systems Programmer
LOB optionally configures a dashboard CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Deploy Events  Specify Business Actions Optionally Configure Dashboard Optionally configures a business dashboard to display metrics based on events from CICS and other components of the application system  LoB Manager Application Analyst Systems Programmer
CICS Event Specifications or… how CICS knows  where the events occur
CICS Event Specification Event policy ,[object Object],[object Object],[object Object],[object Object],Event Specification ,[object Object],[object Object],[object Object],[object Object],[object Object],Event Specification associated with  Event Capture Spec(s) ‏ ,[object Object],[object Object],[object Object],[object Object],ES ES ECS Event Binding EP Adapter Config   (Type. Q-name, tran, etc) ‏ CICS Bundle resource ES CS ES CS ES CS ES CS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CICS Event Specification Example
The event binding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS Bundle resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Deployment of Event Bindings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Names in event specifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBM Confidential
CICS Event Capture
CICS Event Capture options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Eventable CICS Commands – Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Eventable CICS Commands ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Filterable and Capturable Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction to  EP Adapters
CICS Event Processing Adapters ‘ WMQ’ EP Adapter Custom EP Adapter Transactions Security Dispatching Monitoring EVENT DISPATCHER Event Capture  Existing Business Logic WBM Internal Event CICS Event  CBE CBE XML CICS Event Tooling &  Schema EP Adapter Interface CICS  Tran ‘ TS queue’ EP Adapter CCE WBE ‘ Transaction  Start’ EP Adapter EXEC CICS  SIGNAL EVENT Sent to one of CFE WBE XML CICS TS Queue CFE Capture Point WBE Any format Anywhere CEI
CICS-provided EP Adapters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBM Confidential
Event Binding Editor The CICS event specification tooling
CICS EP Tooling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS Explorer Resource Perspective Showing a number of Bundle Projects in the Project Explorer, one expanded to show that it contains an event binding, and the bundle manifest
Event Binding Editor – Event Binding
Event Binding Editor  –   Event Specification
Event Binding Editor –  Event Specification (2) Another Event Specification with Name, Description and Emitted Business Information also shows where the Capture Specification is added
Event Binding Editor  –   Capture Specification
Event Binding Editor  –   Capture Specification (2)
Event Binding Editor  –   Capture Specification Filtering
Event Binding Editor  –   Filtering (2) Another Event Capture Specification showing Capture Predicates: File name specified as primary predicate
Event Binding Editor  –  Filtering (3) Example showing more predicates used to filter an event
Event Binding Editor  –   Information Sources
Event Binding Editor –   Information Sources (2) Capture Specification, showing the Information Sources panel defining how the event information is obtained from data available on the command (or from standard event context data)
Event Binding Editor  –   Information Sources Import Showing use of imported source code (copybook) to fill in the Information Sources
Event Binding Editor  –   Information Sources Import (2) Showing use of imported source code (copybook) to fill in the Information Sources
Event Binding Editor  –   Information Sources Import (3) Another example of using imported source code to fill in Information Sources
Event Binding Editor  –  EP Adapter  EP Adapter specification, showing the configuration details for WMQ Queue EP adapter, with Queue name and other WMQ parameters. The Advanced Dispatcher Options are shown, but nothing other than the defaults have been selected.
Deploying an Event Binding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary and Q&A Including a summarising scenario
Visibility, Compliance, and Business Flexibility with  CICS Events 06/09/09 CICS TS Stock Trading  Application WebSphere Business Events ,[object Object],[object Object],[object Object],WebSphere Business Monitor Stock Trade Events
CICS Event Processing Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You ! Any questions? ?

More Related Content

What's hot

Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
Nitai Partners Inc
 
WSO2ConAsia2016-Prabath
WSO2ConAsia2016-PrabathWSO2ConAsia2016-Prabath
WSO2ConAsia2016-Prabath
Prabath Abeysekara
 
Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...
BMC Software
 
SmartCloud Control Desk Roadmap
SmartCloud Control Desk RoadmapSmartCloud Control Desk Roadmap
SmartCloud Control Desk Roadmap
IBM Danmark
 
Uc4 wp one_automation_us
Uc4 wp one_automation_usUc4 wp one_automation_us
Uc4 wp one_automation_us
Lockheed Martin
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
Malin De Silva
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategy
RMayo22
 
Esm 5 08 V3
Esm 5 08  V3Esm 5 08  V3
Esm 5 08 V3
Pini Cohen
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
Ashita Mehra
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
Kimber Spradlin
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Precisely
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federal
John McDonald
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
IBM Sverige
 
ca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebookca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebook
Tiffany Hamilton
 
HRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCSHRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCS
IBM India Smarter Computing
 
Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"
National Information Standards Organization (NISO)
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Citrix
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
TripleValue
 

What's hot (18)

Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
WSO2ConAsia2016-Prabath
WSO2ConAsia2016-PrabathWSO2ConAsia2016-Prabath
WSO2ConAsia2016-Prabath
 
Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...
 
SmartCloud Control Desk Roadmap
SmartCloud Control Desk RoadmapSmartCloud Control Desk Roadmap
SmartCloud Control Desk Roadmap
 
Uc4 wp one_automation_us
Uc4 wp one_automation_usUc4 wp one_automation_us
Uc4 wp one_automation_us
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategy
 
Esm 5 08 V3
Esm 5 08  V3Esm 5 08  V3
Esm 5 08 V3
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federal
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
ca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebookca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebook
 
HRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCSHRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCS
 
Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
 

Similar to Turning Insight Into Action With Cics Events

AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
WASdev Community
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4
Susan Yoskin
 
OpenWhisk Introduction
OpenWhisk IntroductionOpenWhisk Introduction
OpenWhisk Introduction
Ioana Baldini
 
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
nick_garrod
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
eileendohertysmith
 
Z cloud with technical details
 Z cloud with technical details Z cloud with technical details
Z cloud with technical details
Jim Porell
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and Growth
IBM Danmark
 
NZS-2990 Made with IBM - Mobile-ready Systems of Record
NZS-2990 Made with IBM - Mobile-ready Systems of RecordNZS-2990 Made with IBM - Mobile-ready Systems of Record
NZS-2990 Made with IBM - Mobile-ready Systems of Record
IBM z Systems Software - IT Service Management
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
Vincent Burckhardt
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
Suzanne Livingston
 
Making People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and AnalyzableMaking People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and Analyzable
Weiwei Yang
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Derek Baron
 
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
Daniel Berg
 
Portal on the Cloud
Portal on the CloudPortal on the Cloud
Portal on the Cloud
Steven Gerhardt
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
Michael Elder
 
Future Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaSFuture Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaS
Peter Coffee
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data Sheet
Éric Guay
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
Antonio Rolle
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 

Similar to Turning Insight Into Action With Cics Events (20)

AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4
 
OpenWhisk Introduction
OpenWhisk IntroductionOpenWhisk Introduction
OpenWhisk Introduction
 
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
 
Z cloud with technical details
 Z cloud with technical details Z cloud with technical details
Z cloud with technical details
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and Growth
 
NZS-2990 Made with IBM - Mobile-ready Systems of Record
NZS-2990 Made with IBM - Mobile-ready Systems of RecordNZS-2990 Made with IBM - Mobile-ready Systems of Record
NZS-2990 Made with IBM - Mobile-ready Systems of Record
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
Making People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and AnalyzableMaking People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and Analyzable
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
 
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
 
Portal on the Cloud
Portal on the CloudPortal on the Cloud
Portal on the Cloud
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
 
Future Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaSFuture Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaS
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data Sheet
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 

More from CICS ROADSHOW

Business Analytics Em Plataforma Hibrida Alexos
Business Analytics Em Plataforma Hibrida   AlexosBusiness Analytics Em Plataforma Hibrida   Alexos
Business Analytics Em Plataforma Hibrida Alexos
CICS ROADSHOW
 
SystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - AlexosSystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - Alexos
CICS ROADSHOW
 
Problem Determination Tools
Problem Determination ToolsProblem Determination Tools
Problem Determination Tools
CICS ROADSHOW
 
R Dz7.5 Overview
R Dz7.5 OverviewR Dz7.5 Overview
R Dz7.5 Overview
CICS ROADSHOW
 
La Cics Tools Overview April 2009
La   Cics Tools Overview   April 2009La   Cics Tools Overview   April 2009
La Cics Tools Overview April 2009
CICS ROADSHOW
 
Cics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And PhpCics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And Php
CICS ROADSHOW
 
Cics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical OverviewCics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical Overview
CICS ROADSHOW
 
Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009
CICS ROADSHOW
 
Cics Explorer April 2009
Cics Explorer April 2009Cics Explorer April 2009
Cics Explorer April 2009
CICS ROADSHOW
 
Cics Connectivity
Cics ConnectivityCics Connectivity
Cics Connectivity
CICS ROADSHOW
 

More from CICS ROADSHOW (10)

Business Analytics Em Plataforma Hibrida Alexos
Business Analytics Em Plataforma Hibrida   AlexosBusiness Analytics Em Plataforma Hibrida   Alexos
Business Analytics Em Plataforma Hibrida Alexos
 
SystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - AlexosSystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - Alexos
 
Problem Determination Tools
Problem Determination ToolsProblem Determination Tools
Problem Determination Tools
 
R Dz7.5 Overview
R Dz7.5 OverviewR Dz7.5 Overview
R Dz7.5 Overview
 
La Cics Tools Overview April 2009
La   Cics Tools Overview   April 2009La   Cics Tools Overview   April 2009
La Cics Tools Overview April 2009
 
Cics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And PhpCics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And Php
 
Cics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical OverviewCics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical Overview
 
Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009
 
Cics Explorer April 2009
Cics Explorer April 2009Cics Explorer April 2009
Cics Explorer April 2009
 
Cics Connectivity
Cics ConnectivityCics Connectivity
Cics Connectivity
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Turning Insight Into Action With Cics Events

  • 1. Turning Insight into Action with CICS Events Tom Grieve [email_address]
  • 2. © IBM Corporation 2009. All Rights Reserved. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM trademarks, see www.ibm.com/legal/copytrade.shtml AIX, CICS, CICSPlex, DB2, DB2 Universal Database, i5/OS, IBM, the IBM logo, IMS, iSeries, Lotus, OMEGAMON, OS/390, Parallel Sysplex, pureXML, Rational, RCAF, Redbooks, Sametime, Smart SOA, System i, System i5, System z , Tivoli, WebSphere, and z/OS. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. CICS and Event Processing An introduction to CICS as a source of events
  • 11.
  • 12. CICS Events – a peek inside the box
  • 13. CICS TS V4.1 is aimed at helping users to – Business Flexibility and Innovation Compete for new opportunity by gaining insight into business processes and responding by modifying key business applications quickly and with confidence Control costs by simplifying IT infrastructure and improving development and operations productivity through easier-to-use interfaces and functions – IT Simplification Comply with corporate, industry and government policies to manage business risk of critical business applications – Governance and Compliance Event Processing
  • 14.
  • 15.
  • 16. CICS and event processing – overview Existing Business Logic Captured Events CICS Event Processing Event Capture Filtering Enrichment Formatting Routing Extensible Secured Monitored etc. Development & Deployment Tools WebSphere Business Monitor WebSphere Business Events Code NOT changed CICS Transaction Server for z/OS Other Event Consumers Events
  • 17.
  • 18. A few example uses of CICS events
  • 19.
  • 20.
  • 21.
  • 22. Example workflow for using Events in CICS
  • 23. The Role-Based CICS Event Workflow Event Consumer Business Modeler Business Dashboard LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
  • 24. LoB defines the business events Event Consumer Identify Business Events Studies existing business processing and identifies business events that occur and information to be collected. May define patterns between events and specify delivery destinations or event display using other tooling. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
  • 25. Application Analyst identifies events in application Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Inspects program(s) to determine how to capture the business events and collect the required data. Specifies where and how event is to be emitted. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
  • 26. Systems Programmer configures the infrastructure CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Deploy Events Specifies format and destination for the captured events. Defines CICS resources to deploy the events LoB Manager Application Analyst Systems Programmer
  • 27. LoB defines the business actions CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Deploy Events Specify Business Actions Specifies the actions to take on consuming an event LoB Manager Application Analyst Systems Programmer
  • 28. LOB optionally configures a dashboard CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Deploy Events Specify Business Actions Optionally Configure Dashboard Optionally configures a business dashboard to display metrics based on events from CICS and other components of the application system LoB Manager Application Analyst Systems Programmer
  • 29. CICS Event Specifications or… how CICS knows where the events occur
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Introduction to EP Adapters
  • 42. CICS Event Processing Adapters ‘ WMQ’ EP Adapter Custom EP Adapter Transactions Security Dispatching Monitoring EVENT DISPATCHER Event Capture Existing Business Logic WBM Internal Event CICS Event CBE CBE XML CICS Event Tooling & Schema EP Adapter Interface CICS Tran ‘ TS queue’ EP Adapter CCE WBE ‘ Transaction Start’ EP Adapter EXEC CICS SIGNAL EVENT Sent to one of CFE WBE XML CICS TS Queue CFE Capture Point WBE Any format Anywhere CEI
  • 43.
  • 44. Event Binding Editor The CICS event specification tooling
  • 45.
  • 46. CICS Explorer Resource Perspective Showing a number of Bundle Projects in the Project Explorer, one expanded to show that it contains an event binding, and the bundle manifest
  • 47. Event Binding Editor – Event Binding
  • 48. Event Binding Editor – Event Specification
  • 49. Event Binding Editor – Event Specification (2) Another Event Specification with Name, Description and Emitted Business Information also shows where the Capture Specification is added
  • 50. Event Binding Editor – Capture Specification
  • 51. Event Binding Editor – Capture Specification (2)
  • 52. Event Binding Editor – Capture Specification Filtering
  • 53. Event Binding Editor – Filtering (2) Another Event Capture Specification showing Capture Predicates: File name specified as primary predicate
  • 54. Event Binding Editor – Filtering (3) Example showing more predicates used to filter an event
  • 55. Event Binding Editor – Information Sources
  • 56. Event Binding Editor – Information Sources (2) Capture Specification, showing the Information Sources panel defining how the event information is obtained from data available on the command (or from standard event context data)
  • 57. Event Binding Editor – Information Sources Import Showing use of imported source code (copybook) to fill in the Information Sources
  • 58. Event Binding Editor – Information Sources Import (2) Showing use of imported source code (copybook) to fill in the Information Sources
  • 59. Event Binding Editor – Information Sources Import (3) Another example of using imported source code to fill in Information Sources
  • 60. Event Binding Editor – EP Adapter EP Adapter specification, showing the configuration details for WMQ Queue EP adapter, with Queue name and other WMQ parameters. The Advanced Dispatcher Options are shown, but nothing other than the defaults have been selected.
  • 61.
  • 62. Summary and Q&A Including a summarising scenario
  • 63.
  • 64.
  • 65. Thank You ! Any questions? ?