Syncsort Ironstream provides unmatched mainframe data integration facilities enabling IT pros to get deep operational insights in next-generation analytics environments like Splunk – and now – the Elastic Stack.
View the Customer Education Webcast to learn what’s new in Syncsort Ironstream including:
• Support for Elastic Logstash: Delivering all Ironstream-supported data sources in real-time directly to Elastic Logstash to provide comprehensive mainframe information for decision support.
• Multiple Application Programming Interface (API): Support for multiple APIs for transporting large sets of records resulting in performance improvements of up to 10x.
• IMS Log Forwarding: Real-time and asynchronous forwarding is supported for multiple log record types, providing insight into IMS transaction performance and IMS system statistics.
• Enhanced SMF data collection: A new method of gathering SMF data minimizes the impact of high-volume SMF record processing on application performance by enabling asynchronous collection of SMF data through the SMF INMEM resources and API.
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...Precisely
View this webcast on-demand to learn how enhancements to Syncsort Ironstream® can make you more effective in meeting your most pressing security and IT operations challenges by monitoring your z/OS operating environment and the availability of critical business services.
In this webcast, you’ll review new data sources and features that are now available in Ironstream, including:
• SMF Versioning
• Enclave Support for RMF III Data
• A New Multi-Send API
• Support for Additional SMF Record Types
You’ll also learn how Ironstream Transaction Tracing gives organizations unprecedented visibility into their cross-platform transactions on the mainframe.
Red Hat Enterprise Linux: The web performance leaderJoanne El Chah
This reports illustrates how Red Hat Enterprise Linux beats Microsoft Windows as the best platform for enterprise web applications. Superior performance, coupled with significant cost savings derived from the ability to leverage the latest multicore x86 hardware as well as virtualization, adds up to competitive advantage.
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
This article introduces LAMP software stack on zLinux (Linux on IBM System z). Let’s call it zLAMP. We will delve into configuring and starting up individual components of zLAMP and then downloading, installing and testing few LAMP based off the shelf open source applications
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...Precisely
View this webcast on-demand to learn how enhancements to Syncsort Ironstream® can make you more effective in meeting your most pressing security and IT operations challenges by monitoring your z/OS operating environment and the availability of critical business services.
In this webcast, you’ll review new data sources and features that are now available in Ironstream, including:
• SMF Versioning
• Enclave Support for RMF III Data
• A New Multi-Send API
• Support for Additional SMF Record Types
You’ll also learn how Ironstream Transaction Tracing gives organizations unprecedented visibility into their cross-platform transactions on the mainframe.
Red Hat Enterprise Linux: The web performance leaderJoanne El Chah
This reports illustrates how Red Hat Enterprise Linux beats Microsoft Windows as the best platform for enterprise web applications. Superior performance, coupled with significant cost savings derived from the ability to leverage the latest multicore x86 hardware as well as virtualization, adds up to competitive advantage.
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
This article introduces LAMP software stack on zLinux (Linux on IBM System z). Let’s call it zLAMP. We will delve into configuring and starting up individual components of zLAMP and then downloading, installing and testing few LAMP based off the shelf open source applications
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN SatelliteShawn Wells
Presented at SHARE Denver 2009, Session ID 9204. Steps through what Red Hat Network Satellite is, what modules are included, various deployment architectures, and how to run RHN Satellite on System z. Finishes with Live Demo.
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...Precisely
Check out our latest Mainframe Customer Education Webcast, featuring new Ironstream facilities for enhanced z/OS Analytics. Product Management Directors Ed Wrazen and Ed Hallock spoke about what’s new in the Ironstream z/OS data forwarder, as well as new features and facilities including:
• Data Loss Protection
• Advanced Filtering for SMF data
• Splunk Applications for Ironstream
You'll also learn about integration with Splunk’s IT Service Intelligence for monitoring the availability of critical business services running on z/OS platforms.
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataPrecisely
Big Iron z/OS systems produce an enormous amount of operational data, but the challenge for the past few decades has been how to go beyond basic performance and availability management and extract the information that can provide IT operational intelligence? You need analytical insight into z/OS operations, security data, and service delivery in real-time for the success of your business.
Watch this webcast, to learn:
o Challenges that have inhibited z/OS analytics and how to overcome those challenges by forwarding critical IBM z/OS mainframe data to Splunk Enterprise for analysis.
o How gain better insights into security threats on z/OS and across your enterprise.
o How to leverage Splunk IT Service Intelligence to monitor critical business services reliant on z/OS critical components like CICS and DB2.
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Precisely
In today’s always-on IT world, a single security breach can bring your business to a standstill. You rely on Splunk’s powerful platform for monitoring, integrating, analyzing and visualizing security data from across your enterprise to protect your organization from security threats and incidents. However, Splunk doesn’t natively interact with mainframe and IBM i systems, leaving a glaring blind spot.
Join us to learn how to effectively integrate Mainframe and IBM i security data into Splunk- providing you with a comprehensive view of your security operations landscape.
Topics will include:
- An overview of different types of security data and how to tap into mainframe & IBM i data in your Splunk Security Operations Center
- Unique and comparative differentiators across security data integration tools to be used within the Splunk Security Operations center
- Customer use cases and examples
IBM Spectrum Scale ECM - Winning CombinationSasikanth Eda
This presentation describes various deployment options to configure IBM enterprise content management (ECM) FileNet® Content Manager components to use IBM Spectrum Scale™ (formerly known as IBM GPFS™) as back-end storage. It also describes various IBM Spectrum Scale value-added features with FileNet Content Manager
to facilitate an efficient and effective data-management solution.
Building a Business Objects Shared-Services Environment.pdfKhairulAmri730768
Would you like to learn how a global financial services company plans to deploy Business Objects XI Release 2 to support a federated BI shared service? Find out how the new platform will replace a Business Objects 6.5 system currently supporting over 70 reporting
applications and 5,500 users deployed across all regions. Walk through our technical design plans and discover first-hand how we plan to meet some critical technical requirements such as the following: high availability and disaster recovery, security for virtual application silos on single-server instances, a global "My BusinessObjects" portal, and integration with an enterprise-level job control system.
z/OS V2R3 Communications Server Content PreviewzOSCommserver
This presentation provides an overview of the new features and changes planned for z/OS V2R3 Communications Server. Features discussed include: z/OS encryption readiness technology, changes to the Communications Server-provided mail programs in z/OS V2R3, AT-TLS currency, and more.
S ss0885 spectrum-scale-elastic-edge2015-v5Tony Pearson
IBM Spectrum Scale offerings include the Spectrum Scale software that you can deploy on your own choice of hardware, Elastic Storage Server and Storwize V7000 Unified pre-built systems.
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
If you’re like most z/OS mainframe professionals, you’ve been using monitoring tools from industry leaders like BMC, Compuware, etc. for years now. These valuable, reliable point solution tools get the job done, but can they do more?
View this webinar on-demand to show how machine data from z/OS is changing everything for Mainframe IT and enabling new solutions around IT Operations Analytics, Security Information and Event Management, and IT Service Intelligence. We will review the state of the mainframe and look at some interesting use cases for new solutions including:
• Being able to quickly discover and act upon correlations between mainframe issues and their broader impact to application service delivery
• To know or even project forward your MLC costs such that you can really understand what is impacting the 4-hour rolling average window
• A performance monitor for your mainframe sort which will clearly show how the sort is performing and what can be done to help those that are not performing optimally
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...MongoDB
Implementation and Operationalization of MongoDB Sharding in a Highly Complex and Secured Platform - Order Processing System at Cisco Systems Inc.
The order processing system at Cisco, with a large volume of order transactions, requires high performance, scalable, highly available, and secured environment. This was achieved by implementing a MongoDB sharded cluster on private cloud infrastructure with high security and automation tools.
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN SatelliteShawn Wells
Presented at SHARE Denver 2009, Session ID 9204. Steps through what Red Hat Network Satellite is, what modules are included, various deployment architectures, and how to run RHN Satellite on System z. Finishes with Live Demo.
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...Precisely
Check out our latest Mainframe Customer Education Webcast, featuring new Ironstream facilities for enhanced z/OS Analytics. Product Management Directors Ed Wrazen and Ed Hallock spoke about what’s new in the Ironstream z/OS data forwarder, as well as new features and facilities including:
• Data Loss Protection
• Advanced Filtering for SMF data
• Splunk Applications for Ironstream
You'll also learn about integration with Splunk’s IT Service Intelligence for monitoring the availability of critical business services running on z/OS platforms.
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataPrecisely
Big Iron z/OS systems produce an enormous amount of operational data, but the challenge for the past few decades has been how to go beyond basic performance and availability management and extract the information that can provide IT operational intelligence? You need analytical insight into z/OS operations, security data, and service delivery in real-time for the success of your business.
Watch this webcast, to learn:
o Challenges that have inhibited z/OS analytics and how to overcome those challenges by forwarding critical IBM z/OS mainframe data to Splunk Enterprise for analysis.
o How gain better insights into security threats on z/OS and across your enterprise.
o How to leverage Splunk IT Service Intelligence to monitor critical business services reliant on z/OS critical components like CICS and DB2.
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Precisely
In today’s always-on IT world, a single security breach can bring your business to a standstill. You rely on Splunk’s powerful platform for monitoring, integrating, analyzing and visualizing security data from across your enterprise to protect your organization from security threats and incidents. However, Splunk doesn’t natively interact with mainframe and IBM i systems, leaving a glaring blind spot.
Join us to learn how to effectively integrate Mainframe and IBM i security data into Splunk- providing you with a comprehensive view of your security operations landscape.
Topics will include:
- An overview of different types of security data and how to tap into mainframe & IBM i data in your Splunk Security Operations Center
- Unique and comparative differentiators across security data integration tools to be used within the Splunk Security Operations center
- Customer use cases and examples
IBM Spectrum Scale ECM - Winning CombinationSasikanth Eda
This presentation describes various deployment options to configure IBM enterprise content management (ECM) FileNet® Content Manager components to use IBM Spectrum Scale™ (formerly known as IBM GPFS™) as back-end storage. It also describes various IBM Spectrum Scale value-added features with FileNet Content Manager
to facilitate an efficient and effective data-management solution.
Building a Business Objects Shared-Services Environment.pdfKhairulAmri730768
Would you like to learn how a global financial services company plans to deploy Business Objects XI Release 2 to support a federated BI shared service? Find out how the new platform will replace a Business Objects 6.5 system currently supporting over 70 reporting
applications and 5,500 users deployed across all regions. Walk through our technical design plans and discover first-hand how we plan to meet some critical technical requirements such as the following: high availability and disaster recovery, security for virtual application silos on single-server instances, a global "My BusinessObjects" portal, and integration with an enterprise-level job control system.
z/OS V2R3 Communications Server Content PreviewzOSCommserver
This presentation provides an overview of the new features and changes planned for z/OS V2R3 Communications Server. Features discussed include: z/OS encryption readiness technology, changes to the Communications Server-provided mail programs in z/OS V2R3, AT-TLS currency, and more.
S ss0885 spectrum-scale-elastic-edge2015-v5Tony Pearson
IBM Spectrum Scale offerings include the Spectrum Scale software that you can deploy on your own choice of hardware, Elastic Storage Server and Storwize V7000 Unified pre-built systems.
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
If you’re like most z/OS mainframe professionals, you’ve been using monitoring tools from industry leaders like BMC, Compuware, etc. for years now. These valuable, reliable point solution tools get the job done, but can they do more?
View this webinar on-demand to show how machine data from z/OS is changing everything for Mainframe IT and enabling new solutions around IT Operations Analytics, Security Information and Event Management, and IT Service Intelligence. We will review the state of the mainframe and look at some interesting use cases for new solutions including:
• Being able to quickly discover and act upon correlations between mainframe issues and their broader impact to application service delivery
• To know or even project forward your MLC costs such that you can really understand what is impacting the 4-hour rolling average window
• A performance monitor for your mainframe sort which will clearly show how the sort is performing and what can be done to help those that are not performing optimally
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...MongoDB
Implementation and Operationalization of MongoDB Sharding in a Highly Complex and Secured Platform - Order Processing System at Cisco Systems Inc.
The order processing system at Cisco, with a large volume of order transactions, requires high performance, scalable, highly available, and secured environment. This was achieved by implementing a MongoDB sharded cluster on private cloud infrastructure with high security and automation tools.
Solaris operating systems are the building blocks of computer systems, and provide the interface between user applications and computer hardware. Solaris 10 is a multiuser, multitasking, multithreading operating environment, developed and sold by Sun Microsystems. Solaris is one implementation of the UNIX operating system that draws on both the System V (AT&T) and Berkeley (BSD) traditions. It has risen from little more than a research project to become the dominant UNIX operating system in the international marketplace today. Solaris 10 is the latest in a long line of operating environment releases based around the SunOS. Operating system, this is currently in version 5.10. Solaris is commonly found in large corporations and educational institutions that require concurrent, multiuser access on individual hosts and between hosts connected via the Internet. However, it is also rapidly being adopted by small businesses and individual developers.
Similar to What’s New in Syncsort Ironstream 2.1 (20)
AI-Ready Data - The Key to Transforming Projects into Production.pptxPrecisely
Moving AI projects from the laboratory to production requires careful consideration of data preparation. Join us for a fireside chat where industry experts, including Antonio Cotroneo (Director, Product Marketing, Precisely) and Sanjeev Mohan (Principal, SanjMo), will discuss the crucial role of AI-ready data in achieving success in AI projects. Gain essential insights and considerations to ensure your AI solutions are built on a solid foundation of accurate, consistent, and context-rich data. Explore practical insights and learn how data integrity drives innovation and competitive advantage. Transform your approach to AI with a focus on data readiness.
Building a Multi-Layered Defense for Your IBM i SecurityPrecisely
In today's challenging security environment, new vulnerabilities emerge daily, leaving even patched systems exposed. While IBM works tirelessly to release fixes as they discover vulnerabilities, bad actors are constantly innovating. Don't settle for reactive defense – secure your IT with a layered approach!
This holistic strategy builds multiple security walls, making it far harder for attackers to breach your defenses. Even if a certain vulnerability is exploited, one of the controls could stop the attack or at least delay it until you can take action.
Join us for this webcast to hear about:
• How security risks continue to evolve and change
• The importance of keeping all your systems patched an up-to-date
• A multi-layered approach to network, system object and data security
Navigating the Cloud: Best Practices for Successful MigrationPrecisely
In today's digital landscape, migrating workloads and applications to the cloud has become imperative for businesses seeking scalability, flexibility, and efficiency. However, executing a seamless transition requires strategic planning and careful execution. Join us as we delve into the insightful insights around cloud migration, where we will explore three key topics:
i. Considerations to take when planning for cloud migration
ii. Best practices for successfully migrating to the cloud
iii. Real-world customer stories
Unlocking the Power of Your IBM i and Z Security Data with Google ChroniclePrecisely
In today's ever-evolving threat landscape, any siloed systems, or data leave organizations vulnerable. This is especially true when mission-critical systems like IBM i and IBM Z mainframes are not included in your security planning. Valuable security data from these systems often remains isolated, hindering your ability to detect and respond to threats effectively.
Ironstream and bridge this gap for IBM systems by integrating the important security data from these mission-critical systems into Google Chronicle where it can be seen, analyzed and correlated with the data from other enterprise systems Here's what you'll learn:
• The unique challenges of securing IBM i and Z mainframes
• Why traditional security tools fall short for mainframe data
• The power of Google Chronicle for unified security intelligence
• How to gain comprehensive visibility into your entire IT ecosystem
• Real-world use cases for integrating IBM i and Z security data with Google Chronicle
Join us for this webcast to hear about:
• The unique challenges of securing IBM i and IBM Z systems
• Real-world use cases for integrating IBM i and IBM Z security data with Google Chronicle
• Combining Ironstream and Google Chronicle to deliver faster threat detection, investigation, and response times
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
Are you considering leveraging the cloud alongside your existing IBM AIX and IBM I systems infrastructure? There are likely benefits to be realized in scalability, flexibility and even cost.
However, to realize these benefits, you need to be aware of the challenges and opportunities that come with integrating your IBM Power Systems in the cloud. These challenges range from data synchronization to testing to planning for fallback in the event of problems.
Join us for this webcast to hear about:
• Seamless migration strategies
• Best practices for operating in the cloud
• Benefits of cloud-based HA/DR for IBM AIX and IBM i
It can be challenging display and share capacity data that is meaningful to end users. There is an overabundance of data points related to capacity, and the summarization of this data is difficult to construct and display.
You are already spending time and money to handle the critical need to manage systems capacity, performance and estimate future needs. Are you it spending wisely? Are you getting the level of results from your investment that you really need? Can you prove it?
The good news is that the return on investment of implementing capacity management and capacity planning is most definitely positive and provable, both in terms of tangible monetary value and in some less tangible but no-less-valuable benefits.
Join us for this webinar and learn:
• Top Trends in Capacity Management
• Common customer pain points
• Ways to demonstrate these benefits to your company
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
Ready to improve efficiency, provide easy to use data automations and take materials master (MM) data maintenance to the next level?
Find out how during our Automate Studio training on March 28 – led by Sigrid Kok, Principal Sales Engineer, and Isra Azam, Sales Engineer, at Precisely.
This session’s for you if you want to discover the best approaches for creating, extending or maintaining different types of materials, as well as automating the tricky parts of these processes that slow you down.
Greater control over your Automate Studio business processes means bigger, better results. We’ll show you how to enable your business users to interact with SAP from Microsoft Office and other familiar platforms – resulting in more efficient SAP data management, along with improved data integrity and accuracy.
This 90-minute session will be filled with a variety of topics, including:
real world approaches for creating multiple types of materials, balancing flexibility and power with simplicity and ease of use
tips on material creation, including
downloading the generated material number
using formulas to format prior to upload, such as capitalization or zero padding to make it easy to get the data right the first time
conditionally require fields based on other field entries
using LOV for fields that are free form entry for standard values
tips on modifying alternate units of measure, building from scratch using GUI scripting
modify multiple language descriptions, build from scratch using a standard BAPI
make end-to-end MM process flows more of a reality with features including APIs and predictive AI
Through these topics, you’ll gain plenty of actionable takeaways that you can start implementing right away – including how to:
improve your data integrity and accuracy
make scripts flexible and usable for automation users
seamlessly handle both simple and complex parts of material master
interact with SAP from both business user and script developers’ perspectives
easily upload and download data between SAP and Excel – and how to format the data before upload using simple formulas
You’ll leave this session feeling ready and empowered to save time, boost efficiency, and change the way you work.
Automate Studio reduces your dependency on technical resources to help you create automation scenarios – and our team of experts is here to make sure you get the most out of our solution throughout the journey.
Questions? Sigrid & Isra will be ready to answer them during a live Q&A at the end of the session.
Who should attend:
Attendees who will get the most out of this session are Automate Studio developers and runners familiar with SAP MM. Knowledge of Automate Studio script creation is nice to have, but not required.
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
Join us for an insightful roundtable discussion featuring experts from AWS, Confluent, and Precisely as they delve into the complexities and opportunities of migrating mainframe data to the cloud.
In this engaging webinar, participants will learn about the various considerations, strategies, and customer challenges associated with replicating mainframe data to cloud environments.
Our panelists will share practical insights, real-world experiences, and best practices to help organizations successfully navigate this transformative journey.
Whether you're considering migrating and modernizing your mainframe applications to cloud, or augmenting mainframe-based applications with data replication to cloud, this roundtable will provide valuable perspectives and insights to maximize the benefits of migrating mainframe data to the cloud.
Join us on March 27 to gain a deeper understanding of the opportunities and challenges in this evolving landscape.
Data Innovation Summit: Data Integrity TrendsPrecisely
Data integrity remains an evolving process of discovery, identification, and resolution. With an all-time low in public confidence on data being used for decision-making, attention has gradually shifted to data quality and data integration across multiple systems and frameworks. Data integrity becomes a focal point again for companies to make strategic moves in a world facing an evolving economy.
Key takeaways:
· How to build a data-driven culture within your organization
· Tips to engage with key stakeholders in your business and examples from other businesses around the world
· How to establish and maintain a business-first approach to data governance
· A summary of the findings from a recent survey of global data executives by Drexel University's LeBow College of Business
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
Artificial Intelligence (AI) has become a strategic imperative in a rapidly evolving business landscape. However, the rush to embrace AI comes with risks, as illustrated by instances of AI-generated content with fake citations and potentially dangerous recommendations. The critical factor underpinning trustworthy AI is data integrity, ensuring data is accurate, consistent, and full of rich context.
Attend our upcoming webinar, "AI You Can Trust: Ensuring Success with Data Integrity," as we explore organizational challenges in maintaining data integrity for AI applications and real-world use cases showcasing the transformative impact of high-integrity data on AI success.
During this panel discussion, we'll highlight everything from personalized recommendations and AI-powered workflows to machine learning applications and innovative AI assistants.
Key Topics:
AI Use Cases with Data Integrity: Discover how data integrity shapes the success of AI applications through six compelling use cases.
Solving AI Challenges: Uncover practical solutions to common AI challenges such as bias, unreliable results, lack of contextual relevance, and inadequate data security.
Three Considerations of Data Integrity for AI: Learn the essential pillars—complete, trusted, and contextual—that underpin data integrity for AI success.
Precisely and AWS Partnership: Explore how the collaboration between Precisely and Amazon Web Services (AWS) addresses these challenges and empowers organizations to achieve AI-ready data.
Join our panelists to unlock the full potential of AI by starting your data integrity journey today. Trust in AI begins with trusted data – let's future-proof your AI together.
Less Bias. More Accurate. Relevant Outcomes.
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
La fonction finance est au cœur du succès de l’entreprise, et doit aussi évoluer pour faire face aux enjeux d’aujourd’hui : aller plus vite, traiter plus d’informations et assurer une qualité des données sans faille.
Nous vous proposons de découvrir ensemble comment répondre à ces défis, notamment les points suivants :
Gérer les référentiels comptables et financiers, comptes comptables, clients, fournisseurs, centres de couts, centres de profits…Accélérer les clôtures et permettre de passer les écritures comptables nécessaires, de lancer les rapports adéquats et d’extraire les informations en temps réelOrganiser les taches en les affectant de manière ordonnancée à leurs responsables ou en les lançant automatiquement et les suivre de manière granulaire
Notre webinaire sera l’occasion d’évoquer et d’illustrer cette palette de capacités disponibles pour des utilisateurs métier sans code ou avec peu de code et nous vous espérons nombreux.
In dieser Präsentation diskutieren wir, welche Tools aus unserer Sicht dabei helfen, die Transformation zu SAP S/4HANA optimal zu gestalten. Aber wir blicken auch nach vorne!
In unserem Beitrag fokussieren wir uns nicht nur auf kurzfristige Lösungen, sondern es geht auch um das Thema „Nachhaltigkeit“. Um Investitionen für die Zukunft.
Dazu gehören Entwicklungen, die die SAP Welt nachhaltig verändern werden.
Wir betrachten zukünftige Technologien, wie KI oder Machine Learning, die dazu beitragen, datenintensive SAP Prozesse zu optimieren, die Datenqualität zu verbessern, manuelle Prozesse zu reduzieren und Mitarbeiter zu entlasten.
Werfen Sie mit uns einen Blick in die Zukunft und gestalten Sie die digitale Transformation in Ihrem Unternehmen mit.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
2. Today’s Presenters
Ed Wrazen Director, Mainframe Product Management
is responsible for the product strategy & roadmap for
Syncsort’s Mainframe products and solutions. With a career
in Enterprise IT spanning 35 years, Ed has held roles in
software development, database administration, product
management, consulting and marketing in global businesses
and enterprise technology companies. Ed has experience in
Enterprise systems architectures, performance management,
database and data management technologies and is a regular
speaker at industry events worldwide.
2Syncsort Confidential and Proprietary - do not copy or distribute
Ian Hartley, Principal Engineer, develops solutions for both
Splunk and Elastic. He has a close working relationship with
both organizations and uses his IT knowledge to build great
results. Ian has worked in the software industry since the late
80’s and has held several development and architecture roles.
He has worked with many different technology stacks and
environments for software companies. Ian also speaks at
events and writes articles.
3. Agenda
Introduction to Syncsort Ironstream®
Recent New Features
– SMF Versioning
– Enclave support for RMF III data
– Multiple Application Programming Interface
What’s new in Ironstream 2.1
– Support for Elastic Logstash
– IMS Log Forwarding
– Enhanced SMF data collection
Demo
Q&A
Syncsort Confidential and Proprietary - do not copy or distribute 3
4. Utilizing Machine Data for Log Analytics
Syncsort Confidential and Proprietary - do not copy or distribute
Log Analytics Platform
Cloud or On-Premise
Machine Data: Any Location, Type, Volume
Online
Services
Web
Services
Servers
Security GPS
Location
Storage
Desktops
Networks
Packaged
Applications
Custom
Apps
Messaging
Telecoms
Online
Shopping
Cart
Web
Clickstreams
Databases
Energy
Meters
Call Detail
Records
Smartphones
and Devices
RFID
On-
Premises
Private
Cloud
Public
Cloud
Platform Support (Apps / API / SDKs)
Enterprise Scalability
Universal Indexing
Answer Any Question
Developer
Platform
Report &
analyze
Custom
dashboards
Monitor
& alert
Ad hoc
search
Mainframe
4
5. Critical Mainframe Data
Normalized and Streamed with Ironstream®
Syncsort Confidential and Proprietary - do not copy or distribute 5
6. Critical Mainframe Data
Normalized and Streamed with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67+
types
RMF
Up to 50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Syncsort Confidential and Proprietary - do not copy or distribute 6
7. Critical Mainframe Data
Normalized and Streamed with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67+
types
RMF
Up to 50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Syncsort Confidential and Proprietary - do not copy or distribute 7
8. Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Syncsort Confidential and Proprietary - do not copy or distribute 8
9. Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Security and Compliance/SIEM
- Ensure Audits Passed
Syncsort Confidential and Proprietary - do not copy or distribute 9
10. Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Security and Compliance/SIEM
- Ensure Audits Passed
IT Operational Analytics/ITOA
-Ensure Ops SLAs Met
Syncsort Confidential and Proprietary - do not copy or distribute 10
11. Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Security and Compliance/SIEM
- Ensure Audits Passed
IT Operational Analytics/ITOA
-Ensure Ops SLAs Met
IT Service Intelligence/ITSI
-Ensure Services Health
Syncsort Confidential and Proprietary - do not copy or distribute 11
14. z/OS SMF Changes
SMF record structures can and do change from one release of z/OS to
another
Significant No. of SMF changes with z/OS 2.3 (avail Sep 29, 2017)
– Up to 2048 record types supported
– Up to 65k subtypes per record type
– DSECT changes - Fields Added or Moved
– Extended Headers now available
Changes with subsystems
– Different versions of CICS or Db2
– Different versions running on same LPAR
14Syncsort Confidential and Proprietary - do not copy or distribute
15. SMF Processing requirement for different z/OS levels
Technologies that process SMF data from z/OS need to be mindful
of changes between releases
An SMF Processing Solution compiled on one z/OS may need to
process SMF data from another z/OS
Ability to process SMF data on a z/OS level that did not
generate the original data
Ability to detect subsystem version that generated SMF
– CICS 4.2, CICS 5.1, CICS 5.2 CICS 5.3, CICS 5.4
– Db2 v10, Db2 v11, Db2 v12
15Syncsort Confidential and Proprietary - do not copy or distribute
16. New Ironstream Support for SMF Versioning
Dynamically detects the z/OS level
Determines the structure of z/OS SMF records
Determines the subsystem SMF record structure
Supports multiple versions of z/OS SMF data in a single instance
Ironstream now includes a framework for supporting
multiple versions of z/OS SMF data
• Positioned for future z/OS releases
• Correctly formats the SMF record for Log analytics
• Multiple versions/formats supported
16Syncsort Confidential and Proprietary - do not copy or distribute
18. What are Enclave Attributes?
An enclave is a transaction that can span multiple dispatchable units
(SRBs and tasks) in one or more address spaces and is reported on and
managed as a unit.
The enclave is managed separately from the address spaces it runs in.
A program can create an enclave, schedule SRBs into it, or join tasks to it.
A multisystem work manager can process a transaction on multiple
systems by using a multisystem enclave.
An enclave represents a “business unit of work”
– Used by a variety of workloads – Db2, Db2 DDF, Websphere, MQ, LDAP, TCP/IP
– Enclave created and used for work across multiple address spaces and systems
18Syncsort Confidential and Proprietary - do not copy or distribute
19. Enclave support for RMF III data
Enclave is used to keep track of
address space independent
transactions
– Can consist of multiple TCBs
or SRBs executing across
multiple address spaces
Enclave used by Db2
– Distributed Data Facility (DDF)
– Db2 Stored Procedures
– Db2 Sysplex query parallelism
– Db2 sequential prefetch
Other users
– MQSeries
– Websphere
– TCP/IP
– LDAP
19Syncsort Confidential and Proprietary - do not copy or distribute
Displaying Enclave activity using RMF
20. Configuring Ironstream to collect Enclave Attributes
1. Activate Ironstream Desktop
Browser
2. On Admin menu, select
Ironstream instance
3. Select RMF Filters
– Automatically built using RMF
DDS
4. Select Enclave attributes from
MVS Image Attributes
Syncsort Confidential and Proprietary - do not copy or distribute 20
22. Ironstream API Enhancements
The Ironstream API enables Ironstream instances to programmatically
collect user-defined EBCDIC or ASCII data and forward it.
The API includes a configurable IRONSTREAM_API data source and a
SSDFAPI routine, which is a standalone load module that can be called
or link edited statically into the calling program
New capability allows an API instance to be INITiated and TERMinated
– Enables multiple records to be sent while the connection is active
22Syncsort Confidential and Proprietary - do not copy or distribute
23. Using the Multi-Send API
23Syncsort Confidential and Proprietary - do not copy or distribute
CALL SSDFPAPI,(NUMPARM,REQUEST,
CLASS,TYPE,SUBTYPE,TOKEN,
RETCODE, RSNCODE)
|
|
|
PROCESS DATA 1-N
CALL SSDFPAPI,(NUMPARM,
REQUEST, TOKEN, DATA,
LENGTH, RETCODE, RSNCODE)
|
END DATA |
|
|
CALL SSDFPAPI,(NUMPARM,REQUEST,
TOKEN,RETCODE, RSNCODE)
Requesting Program Ironstream
INIT Request
SEND Request…1
SEND Request…N
TERM Request
▪ Validate Request
▪ Perform RACF Check
▪ Build Control Block Chain
▪ Send a valid Token to Requestor
▪ Validate request
▪ Process record for each SEND
request
▪ Validate request
▪ Release Storage
1. Request: Request type can be
“INIT”, “SEND” or “TERM”
2. Class: Identifies the
Ironstream instance running
with the same class
3. Type: Identifies the Ironstream
instance running with same
class and type combination.
4. Subtype: Identifies the
Ironstream instance running
with Same class, type and
subtype combination
5. Token: Used by API
6. Data: Data Address
7. Length: Data Length
API Parameter Options
24. Advantages of the Multi-Send API
Good for multiple, sequential send requests
– E.g. Processing file input
Connection persists over multiple send requests
– RACF check performed only on the initiation of the connection
Eliminates the need for the API to allocate and release storage for
each operation
Up to 10x Performance Improvement over Single-Send API when
sending multiple records
For single or few requests, Single-Send is appropriate
24Syncsort Confidential and Proprietary - do not copy or distribute
25. Extending Ironstream Data Sources, Connectivity & Integration
SMF Versioning
– Ensuring All Software Levels are
Supported by Ironstream
– Enable Ironstream to work seamlessly
with z/OS software upgrades
RMF Enclave Attributes
– Extend coverage of key z/OS metrics
– Deliver insight into operational services
– Monitor and identify problems faster
API Enhancements
– Enhance performance for application
data solutions to Ironstream
– Provide flexibility in connectivity options
– Minimize resource consumption &
utilization
25Syncsort Confidential and Proprietary - do not copy or distribute
26. What’s New in Ironstream 2.1
26Syncsort Confidential and Proprietary - do not copy or distribute
27. Ironstream 2.1 Overview
27Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
28. Ironstream 2.1 Overview
28Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
29. Ironstream 2.1 Overview
29Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
30. Ironstream 2.1 Overview
30Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
31. Log Forwarding to Elastic Logstash
Ironstream now offers the capability
to forward z/OS Mainframe log and
application data directly to Logstash
– Connection via TCPIP, HTTP
– All data sources supported by
Ironstream can be forwarded
to Elastic
– Sample Ironstream Kibana
dashboards available
31Syncsort Confidential and Proprietary - do not copy or distribute
42. IMS Log Forwarding
For organization who are running IMS systems, Ironstream now offers IMS log
forwarding to Splunk and ELK
– Ironstream supports both Synchronous (real-time) and Asynchronous log collection
– Data is sent in JSON for ingestion into Splunk or Elastic Logstash
– Ironstream exploits zIIP for reduced Mainframe MSU and associated savings
42Syncsort Confidential and Proprietary - do not copy or distribute
43. IMS Log Forwarding
For organization who are running IMS systems, Ironstream now offers IMS log
forwarding to Splunk and ELK
– Ironstream supports both Synchronous (real-time) and Asynchronous log collection
– Data is sent in JSON for ingestion into Splunk or Elastic Logstash
– Ironstream exploits zIIP for reduced Mainframe MSU and associated savings
43Syncsort Confidential and Proprietary - do not copy or distribute
IMS Log Records Supported
Master Terminal x’01’, X’03’
System x’45’
Transaction x’01’, x’03’, x’06’, x’07’, x’08’,
x’0A’, x’31’, x’32’, x’33’, x’34’,
x’35’, x’38’, x’56’
BMC Mainview x’FA’ (coming soon)
Summary level information also available for
Transaction statistics
44. IMS Log Forwarding
For organization who are running IMS systems, Ironstream now offers IMS log
forwarding to Splunk and ELK
– Ironstream supports both Synchronous (real-time) and Asynchronous log collection
– Data is sent in JSON for ingestion into Splunk or Elastic Logstash
– Ironstream exploits zIIP for reduced Mainframe MSU and associated savings
Insight into IMS System & Transaction Statistics & performance for ITOA
– Monitor IMS resource utilization
– Report transaction response times & isolate issues
– Problem identification
– Monitor Critical Service Levels
44Syncsort Confidential and Proprietary - do not copy or distribute
IMS Log Records Supported
Master Terminal x’01’, X’03’
System x’45’
Transaction x’01’, x’03’, x’06’, x’07’, x’08’,
x’0A’, x’31’, x’32’, x’33’, x’34’,
x’35’, x’38’, x’56’
BMC Mainview x’FA’ (coming soon)
Summary level information also available for
Transaction statistics
45. Ironstream IMS Log Collection - Synchronous
45Syncsort Confidential and Proprietary - do not copy or distribute
TCPIP
HTTP/HTTPS
Synchronous Collection for online regions using the “log write” exit point
▪ IMS calls the “log write” exit after a block of data has been written to the IMS online log dataset.
▪ The exit gathers the entire block of data.
▪ Required log records are extracted from within the block and formatted into JSON for forwarding at no impact to the online service
IMS Control
Region
IMS Log
Exit
SSDFILSG
Data
Space
Record
Extract
&
Format
Ironstream
Forwarder
Cloud or
On-premise
z/OS
46. SLDS
Ironstream IMS Log Collection - Asynchronous
46Syncsort Confidential and Proprietary - do not copy or distribute
IMS
Control
Region TCPIP
HTTP/HTTPS
Asynchronous Collection for online regions using a Log Archive process step
SLDS
IMS
Archive Log
Ironstream
IMS Job
Log
Gatherer
▪ The Asynchronous log gatherer processes the IMS Archive file produced by a previous job step. In this case, the entire
Ironstream process runs as a step within the IMS archive job
▪ Required log records are extracted from within the block and formatted into JSON for forwarding.
Data
Space
Record
Extract
&
Format
Ironstream
Forwarder
IMS Archive Job
z/OS
Cloud or
On-premise
47. SMF INMEM Resources
47Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
48. SMF INMEM Resources
IRONSTREAM PROCESSING
Enables collection of SMF data through the SMF
INMEM resources and API
– Low-latency
– Can run on a zIIP Engine
– Requires LOGSTREAM to be defined in
SMFPRMxx definitions
48Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
49. SMF INMEM Resources
IRONSTREAM PROCESSING
Enables collection of SMF data through the SMF
INMEM resources and API
– Low-latency
– Can run on a zIIP Engine
– Requires LOGSTREAM to be defined in
SMFPRMxx definitions
Defining SMF INMEM to Ironstream
– Add “SMF_SOURCE”:”INMEM”
– Add “INMEM_RESOURCE~.”<logstream>” as required
49Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
50. SMF INMEM Resources
IRONSTREAM PROCESSING
Enables collection of SMF data through the SMF
INMEM resources and API
– Low-latency
– Can run on a zIIP Engine
– Requires LOGSTREAM to be defined in
SMFPRMxx definitions
Defining SMF INMEM to Ironstream
– Add “SMF_SOURCE”:”INMEM”
– Add “INMEM_RESOURCE~.”<logstream>” as required
Logstream connections can be controlled by the
Operator Modify Command
50Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
51. Summary: Value Today for Enterprises with a z/OS Mainframe
Syncsort Confidential and Proprietary - do not copy or distribute
Less Complexity
Collect mainframe data; correlate
with data from other platforms; no
mainframe expertise required
Clearer Security Information
Identify unauthorized mainframe
access, other security risks; prepares
and visualizes key data for
compliance audits
Healthier IT Operations
Real-time alerts identify problems in
all key environments View latency,
transactions per second, exceptions,
etc.
Effective Problem-Resolution
Management
Real-time views to identify real or
potential failures earlier; view related
'surrounding' information to support
triage repair or prevention
Higher Operational Efficiency
Enhanced event correlation across
systems; Staff resolves problems faster;
“do more with less”
Eliminate Your Mainframe
“Blind-Spot”
Splunk/Elastic + Ironstream = Your
360ᵒ Enterprise View
51
52. What Now?
Syncsort Confidential and Proprietary - do not copy or distribute 52
VISIT:
HTTP://WWW.SYNCSORT.COM/EN/PRODUCTS/MAINFRAME/IRONSTREAM
CONTACT:
INFO@SYNCSORT.COM
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
Get Ironstream® for SYSLOG for free