SlideShare uma empresa Scribd logo
1 de 69
Mainframe Technology Overview March 2008
Mainframe Technology Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
BluePhoenix Mainframe Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BluePhoenix Mainframe Architecture Inventory Reports Generation of Tools Conversion Unit Test System Test Implementation Repository Enhancement Repository Files Specific Cluster Metadata Libraries Generation Parameters Libraries Converted Libraries Implementation   Parameters
C-Scan ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Toolbox ,[object Object],[object Object],[object Object],[object Object]
Converting Programs, Files, Control Statements, and JCL ,[object Object],[object Object]
Global Assessment and Field Adjustment ,[object Object],[object Object],[object Object],[object Object],Tools and Products C-Scan
Toolbox Selection Screen (1 of 3)
Toolbox Selection Screen (2 of 3)
Toolbox Selection Screen (3 of 3)
Some Repository Files DBJCL DBDSN01 DBSOURCE DBDTSCAN DBPGROUT DBLOAD DBTRAN DBCALL INVLIST
Mainframe Technology Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Entry-points (Events) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power of C-Scan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power of C-Scan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power of C-Scan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power of C-Scan ,[object Object],[object Object],//SYSCIN DD * S010_RPT BUILD,DD1=IN010,DD2=OUT010,PARMDD=P010, D=|#+?|,SORTO='(1,8,CH,A,10,32,CH,A)' //P010  DD *  OUTREC (  IF (INDEX(6,72,' ?PIC ?X(50)'),EQ,0)  EXIT(LEAVEREC)  IF ($$IDXC(1,COB,32),EQ,'FILLER')  EXIT(LEAVEREC)  BUILD($$MEMBER,10:$$IDXC(1,COB,32),/)  )
C-Scan in Production  –  JCL
C-Scan in Production – Control Statements
C-Scan in Production – Control Statements
C-Scan in Production  –  XTBLDREC
Mainframe Technology Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Mainframe Tool Libraries ,[object Object],[object Object],[object Object],[object Object]
Controlling the Flow – Screens
Controlling The Flow – Batch: The Mini-Scheduler ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What We Need to Know About a Program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What We Need to Know
What We Need to Know: Collect JCL with PROCs Source JCL ITD External Reader OPJCL PROCLIB ITD DBJCL
Cross Referencing Components ,[object Object],[object Object],[object Object]
Multi-Language Interface Meta-COBOL #SRV22 JCL; PROCs; PARMs; CSD; DBMS; Load Repository Reports Date Fields xxxx sssss xxxx sssss xxxx sssss Records xxxx sssss xxxx sssss xxxx sssss PL/I Easytrieve Source and Copy COBOL Master Repository Inventory Assembler Other (4 th  GL)
Revise Commands, Conflicts, and Fixes Screen
IT Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
BluePhoenix IT Discovery Static Information Collection OLTP and Batch SOURCE and COPIES IT Discovery Repository Flat Files JCL; PROC; Control Statements LOAD Modules CICS Tables (CSD) IMS/DC Database Definitions DB2; IMS; IDMS Job Schedulers IT Discovery Repository DB2 Reports Queries Network Query Facility Web Queries
Process Stages Output Process Stage Input ,[object Object],Process Relational Database 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Analyze Source Entities 3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Analyze Inventory Components 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Build Environment 1 ,[object Object],[object Object]
Analyze Source Entities ,[object Object],[object Object],[object Object],[object Object]
Analyze Source Entities ,[object Object],[object Object],[object Object]
Query Facility Architecture IT Discovery Repository (DB2) QF Server QF Client QF Client QF Client QF Client
ITD – Incremental Running IT Discovery Collection Scripts Control Datasets Catalog IT Discovery Repository C-Scan Engine DB Definitions Changes, Additions and Deletions ONLY Libraries
Mainframe Technology Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
DBSOURCE Dataset (1 of 4) DBSOURCE
DBSOURCE Dataset (2 of 4) DBSOURCE
DBSOURCE Dataset (3 of 4) DBSOURCE
DBSOURCE Dataset (4 of 4) DBSOURCE
IT Discovery – DB2 Repository
IT Discovery – DB2 Repository
Tbinvlist Table (1 of 2)
Tbinvlist Table (2 of 2)
Mainframe Technology Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Query Facility Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Query Facility Users ,[object Object],[object Object],[object Object]
Query Facility Folders ,[object Object],[object Object],[object Object]
Query Facility – Categories and Queries ,[object Object],[object Object],[object Object],[object Object]
Query Facility – Categories and Queries
Query Facility – Queries
Query Facility – Running and Drilling ,[object Object],[object Object],[object Object],[object Object]
Query Facility – Running Queries
Query Facility – Drilling Down
Query Facility – Nested Query
Query Facility – Filters and Export ,[object Object],[object Object]
Query Facility – Filtering Results
Query Facility – Exporting Results
Query Facility – Exporting Results
Query Facility – Creating Queries ,[object Object],[object Object],[object Object],[object Object]
Query Facility – Query Creation
Query Facility – Drill-Down Linking
Query Facility – Online Documentation
Query Facility – Online Documentation
Thank You!

Mais conteúdo relacionado

Mais procurados

zIIP Capacity Planning
zIIP Capacity PlanningzIIP Capacity Planning
zIIP Capacity Planning
Martin Packer
 
Parallel Sysplex Performance Topics
Parallel Sysplex Performance TopicsParallel Sysplex Performance Topics
Parallel Sysplex Performance Topics
Martin Packer
 

Mais procurados (11)

Rational Development & Test for z Systems 9.5 Webinar with Rogers Communications
Rational Development & Test for z Systems 9.5 Webinar with Rogers CommunicationsRational Development & Test for z Systems 9.5 Webinar with Rogers Communications
Rational Development & Test for z Systems 9.5 Webinar with Rogers Communications
 
DB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in NutshellDB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in Nutshell
 
CV
CVCV
CV
 
How To Master PACBASE For Mainframe In Only Seven Days
How To Master PACBASE For Mainframe In Only Seven DaysHow To Master PACBASE For Mainframe In Only Seven Days
How To Master PACBASE For Mainframe In Only Seven Days
 
DB2 Data Sharing Performance
DB2 Data Sharing PerformanceDB2 Data Sharing Performance
DB2 Data Sharing Performance
 
zIIP Capacity Planning
zIIP Capacity PlanningzIIP Capacity Planning
zIIP Capacity Planning
 
zIIP Capacity Planning - May 2018
zIIP Capacity Planning - May 2018zIIP Capacity Planning - May 2018
zIIP Capacity Planning - May 2018
 
Munich 2016 - Z011598 Martin Packer - He Picks On CICS
Munich 2016 - Z011598 Martin Packer - He Picks On CICSMunich 2016 - Z011598 Martin Packer - He Picks On CICS
Munich 2016 - Z011598 Martin Packer - He Picks On CICS
 
Parallel Sysplex Performance Topics
Parallel Sysplex Performance TopicsParallel Sysplex Performance Topics
Parallel Sysplex Performance Topics
 
Parallel Batch Performance Considerations
Parallel Batch Performance ConsiderationsParallel Batch Performance Considerations
Parallel Batch Performance Considerations
 
zIIP Capacity Planning
zIIP Capacity PlanningzIIP Capacity Planning
zIIP Capacity Planning
 

Destaque

3 webeducation 24sep09-sol_tanguay
3 webeducation 24sep09-sol_tanguay3 webeducation 24sep09-sol_tanguay
3 webeducation 24sep09-sol_tanguay
melgolli
 
Why Enterprise Digital Strategies Must Drive IT Modernization
Why Enterprise Digital Strategies Must Drive IT ModernizationWhy Enterprise Digital Strategies Must Drive IT Modernization
Why Enterprise Digital Strategies Must Drive IT Modernization
Jason Bloomberg
 
Une selection de 200 comptes twitter en banque finance assurance par alban ...
Une selection de 200 comptes twitter en banque finance assurance   par alban ...Une selection de 200 comptes twitter en banque finance assurance   par alban ...
Une selection de 200 comptes twitter en banque finance assurance par alban ...
Alban Jarry
 

Destaque (20)

Move to Hadoop, Go Faster and Save Millions - Mainframe Legacy Modernization
Move to Hadoop, Go Faster and Save Millions - Mainframe Legacy ModernizationMove to Hadoop, Go Faster and Save Millions - Mainframe Legacy Modernization
Move to Hadoop, Go Faster and Save Millions - Mainframe Legacy Modernization
 
How to Leverage Mainframe Data with Hadoop: Bridging the Gap Between Big Iron...
How to Leverage Mainframe Data with Hadoop: Bridging the Gap Between Big Iron...How to Leverage Mainframe Data with Hadoop: Bridging the Gap Between Big Iron...
How to Leverage Mainframe Data with Hadoop: Bridging the Gap Between Big Iron...
 
3 webeducation 24sep09-sol_tanguay
3 webeducation 24sep09-sol_tanguay3 webeducation 24sep09-sol_tanguay
3 webeducation 24sep09-sol_tanguay
 
CIF: Etablir et entretenir des alliances en microassurance afin d’atteindre u...
CIF: Etablir et entretenir des alliances en microassurance afin d’atteindre u...CIF: Etablir et entretenir des alliances en microassurance afin d’atteindre u...
CIF: Etablir et entretenir des alliances en microassurance afin d’atteindre u...
 
Web 2.0 for Schools/ Education Institution
Web 2.0 for Schools/ Education InstitutionWeb 2.0 for Schools/ Education Institution
Web 2.0 for Schools/ Education Institution
 
Intelligent Mainframe Management: The Evolution of Expert Systems
Intelligent Mainframe Management: The Evolution of Expert Systems Intelligent Mainframe Management: The Evolution of Expert Systems
Intelligent Mainframe Management: The Evolution of Expert Systems
 
Queen
QueenQueen
Queen
 
Mainframe Overview V2
Mainframe Overview V2Mainframe Overview V2
Mainframe Overview V2
 
Why Enterprise Digital Strategies Must Drive IT Modernization
Why Enterprise Digital Strategies Must Drive IT ModernizationWhy Enterprise Digital Strategies Must Drive IT Modernization
Why Enterprise Digital Strategies Must Drive IT Modernization
 
Modernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENModernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GEN
 
Web 2.0 Overview
Web 2.0 OverviewWeb 2.0 Overview
Web 2.0 Overview
 
Présentation PowerPoint " Conception et développement d'un portail web pour l...
Présentation PowerPoint " Conception et développement d'un portail web pour l...Présentation PowerPoint " Conception et développement d'un portail web pour l...
Présentation PowerPoint " Conception et développement d'un portail web pour l...
 
Mission-Essential Mainframe as Part of Your Innovation Agenda: Strategy and D...
Mission-Essential Mainframe as Part of Your Innovation Agenda: Strategy and D...Mission-Essential Mainframe as Part of Your Innovation Agenda: Strategy and D...
Mission-Essential Mainframe as Part of Your Innovation Agenda: Strategy and D...
 
Cutting-edge Solutions with Mainframe Services
Cutting-edge Solutions with Mainframe ServicesCutting-edge Solutions with Mainframe Services
Cutting-edge Solutions with Mainframe Services
 
Conception d'un site web
Conception d'un site webConception d'un site web
Conception d'un site web
 
Une selection de 200 comptes twitter en banque finance assurance par alban ...
Une selection de 200 comptes twitter en banque finance assurance   par alban ...Une selection de 200 comptes twitter en banque finance assurance   par alban ...
Une selection de 200 comptes twitter en banque finance assurance par alban ...
 
L'e-assurance en France - Etude des sites
L'e-assurance en France - Etude des sites L'e-assurance en France - Etude des sites
L'e-assurance en France - Etude des sites
 
Application Migration - What, When, Why, How?
Application Migration - What, When, Why, How?Application Migration - What, When, Why, How?
Application Migration - What, When, Why, How?
 
[Direct Assurance] 6 principes de Neuromarketing utilisés par Direct Assuranc...
[Direct Assurance] 6 principes de Neuromarketing utilisés par Direct Assuranc...[Direct Assurance] 6 principes de Neuromarketing utilisés par Direct Assuranc...
[Direct Assurance] 6 principes de Neuromarketing utilisés par Direct Assuranc...
 
Comment transformer WordPress en portail de formation
Comment transformer WordPress en portail de formationComment transformer WordPress en portail de formation
Comment transformer WordPress en portail de formation
 

Semelhante a Mainframe Technology Overview

OWB11gR2 - Extending ETL
OWB11gR2 - Extending ETL OWB11gR2 - Extending ETL
OWB11gR2 - Extending ETL
Suraj Bang
 
Perfsystems- Consulting Services
Perfsystems- Consulting ServicesPerfsystems- Consulting Services
Perfsystems- Consulting Services
Perfsys Tems
 
Logic synthesis with synopsys design compiler
Logic synthesis with synopsys design compilerLogic synthesis with synopsys design compiler
Logic synthesis with synopsys design compiler
naeemtayyab
 
Structuring Spark: DataFrames, Datasets, and Streaming by Michael Armbrust
Structuring Spark: DataFrames, Datasets, and Streaming by Michael ArmbrustStructuring Spark: DataFrames, Datasets, and Streaming by Michael Armbrust
Structuring Spark: DataFrames, Datasets, and Streaming by Michael Armbrust
Spark Summit
 
Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02
Wei Sun
 
Synchronize AD and OpenLDAP with LSC
Synchronize AD and OpenLDAP with LSCSynchronize AD and OpenLDAP with LSC
Synchronize AD and OpenLDAP with LSC
LDAPCon
 

Semelhante a Mainframe Technology Overview (20)

Informatica slides
Informatica slidesInformatica slides
Informatica slides
 
Oracle RI ETL process overview.
Oracle RI ETL process overview.Oracle RI ETL process overview.
Oracle RI ETL process overview.
 
OWB11gR2 - Extending ETL
OWB11gR2 - Extending ETL OWB11gR2 - Extending ETL
OWB11gR2 - Extending ETL
 
SQL Performance Tuning and New Features in Oracle 19c
SQL Performance Tuning and New Features in Oracle 19cSQL Performance Tuning and New Features in Oracle 19c
SQL Performance Tuning and New Features in Oracle 19c
 
User Group3009
User Group3009User Group3009
User Group3009
 
Perfsystems- Consulting Services
Perfsystems- Consulting ServicesPerfsystems- Consulting Services
Perfsystems- Consulting Services
 
Advanced SQL - Database Access from Programming Languages
Advanced SQL - Database Access  from Programming LanguagesAdvanced SQL - Database Access  from Programming Languages
Advanced SQL - Database Access from Programming Languages
 
Google cloud Dataflow & Apache Flink
Google cloud Dataflow & Apache FlinkGoogle cloud Dataflow & Apache Flink
Google cloud Dataflow & Apache Flink
 
U-SQL Killer Scenarios: Custom Processing, Big Cognition, Image and JSON Proc...
U-SQL Killer Scenarios: Custom Processing, Big Cognition, Image and JSON Proc...U-SQL Killer Scenarios: Custom Processing, Big Cognition, Image and JSON Proc...
U-SQL Killer Scenarios: Custom Processing, Big Cognition, Image and JSON Proc...
 
Obevo Javasig.pptx
Obevo Javasig.pptxObevo Javasig.pptx
Obevo Javasig.pptx
 
Project seminar
Project seminarProject seminar
Project seminar
 
Logic synthesis with synopsys design compiler
Logic synthesis with synopsys design compilerLogic synthesis with synopsys design compiler
Logic synthesis with synopsys design compiler
 
Large scale, interactive ad-hoc queries over different datastores with Apache...
Large scale, interactive ad-hoc queries over different datastores with Apache...Large scale, interactive ad-hoc queries over different datastores with Apache...
Large scale, interactive ad-hoc queries over different datastores with Apache...
 
Structuring Spark: DataFrames, Datasets, and Streaming by Michael Armbrust
Structuring Spark: DataFrames, Datasets, and Streaming by Michael ArmbrustStructuring Spark: DataFrames, Datasets, and Streaming by Michael Armbrust
Structuring Spark: DataFrames, Datasets, and Streaming by Michael Armbrust
 
Productionalizing ML : Real Experience
Productionalizing ML : Real ExperienceProductionalizing ML : Real Experience
Productionalizing ML : Real Experience
 
Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02
 
ora_sothea
ora_sotheaora_sothea
ora_sothea
 
Synchronize AD and OpenLDAP with LSC
Synchronize AD and OpenLDAP with LSCSynchronize AD and OpenLDAP with LSC
Synchronize AD and OpenLDAP with LSC
 
Leveraging Open Source to Manage SAN Performance
Leveraging Open Source to Manage SAN PerformanceLeveraging Open Source to Manage SAN Performance
Leveraging Open Source to Manage SAN Performance
 
Cics application programming - session 2
Cics   application programming - session 2Cics   application programming - session 2
Cics application programming - session 2
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Mainframe Technology Overview

Notas do Editor

  1. Notes:
  2. Methodology is SUN AM C-Scan language bits and bytes is SUN PM The major special purpose “exit” is MON AM; this includes exercise time The special purpose files that we use to analyze and convert systems, with their corresponding reports is MON PM Other special purpose “exits” is TUES AM; this includes exercise time, which will extend into the afternoon A walk through the conversion process including a case study you will do on your own is WED and THURS AM The Summary is THURS PM No homework, but you’ll find that reading through the reference material and reviewing your class notes will be helpful.
  3. We sell service, not technology It is the combination of our people, our methodology and our tools that we provide that delivers our service
  4. Describe the flow process of all 6 phases A questionnaire covers the management, development and maintenance processes, the existing systems and applications, the hardware, data and system software, the current practices, and IS principles. A survey and assessment is completed to identify the Year 2000 date affected components (software, hardware, procedures, databases, etc.). Clusters, data bridges and interfaces are also identified for conversion. The conversion process includes multiple phases in an iterative process, fine-tuning the conversion controls until compilable code is achieved. Intra-cluster tests (unit and regression) are performed. Intra-cluster tests are completed on all components within the cluster. Acceptance testing is a client-driven testing process that demonstrates the application’s ability to meet the acceptance criteria previously defined with the client.
  5. Benefits: Maximize automation of the conversion process. Minimize interference with Production Systems Maintenance. Minimize code freezing period. Progressive conversion of logically linked subsystems (clusters). Conversion process transparent to end user. Capabilities: Produces a database of the organization’s software inventory. Produces a database of all date fields and their cross references. Provides a large range of software inventory cross reference reports. Provides computerized templates that control the conversion process. Provides automated update capabilities that support db and application logic changes. Toolbox automated analysis, conversion, management, and control services simplifies the conversion process, significantly minimizing risks usually involved with such a large project. Consistently automates conversions minimizing human mistakes that are difficult to detect. Enables the correction of errors by applying changes across multiple applications. Develops control parameters to use as input to perform the actual conversion. Changes to program do not affect the performance of conversion. Customer retains control over source code, thereby minimizing freeze time.
  6. Benefits: Maximize automation of the conversion process. Minimize interference with Production Systems Maintenance. Minimize code freezing period. Progressive conversion of logically linked subsystems (clusters). Conversion process transparent to end user. Capabilities: Produces a database of the organization’s software inventory. Produces a database of all date fields and their cross references. Provides a large range of software inventory cross reference reports. Provides computerized templates that control the conversion process. Provides automated update capabilities that support db and application logic changes. Toolbox automated analysis, conversion, management, and control services simplifies the conversion process, significantly minimizing risks usually involved with such a large project. Consistently automates conversions minimizing human mistakes that are difficult to detect. Enables the correction of errors by applying changes across multiple applications. Develops control parameters to use as input to perform the actual conversion. Changes to program do not affect the performance of conversion. Customer retains control over source code, thereby minimizing freeze time.
  7. The first step of scanning the environment is to create a dataset of recent log activities. Depending on the client’s archiving procedures, up to 15 months of the system log files may be processed. The purpose is to identify the active jobs, programs and on-line transactions in order to reduce the conversion repository to only active components.. In this step the DBLOG dataset is created out of SMF and other monitor log files, such as Tmon, Omegamon, etc. The results are a list of jobs, programs and transactions including statistics of how often each has been used. The jobs should be tailored according to the site’s archiving procedure and system monitor type. In the case of a third party’s log manager such as MXG, a job should be tailored according to their reports. The based assumption is that these reports were verified by the client and found to be accurate.
  8. Methodology is SUN AM C-Scan language bits and bytes is SUN PM The major special purpose “exit” is MON AM; this includes exercise time The special purpose files that we use to analyze and convert systems, with their corresponding reports is MON PM Other special purpose “exits” is TUES AM; this includes exercise time, which will extend into the afternoon A Walk Through the conversion process including a case study you will do on your own is WED and THURS AM The Summary is THURS PM No homework, but you’ll find that reading through the reference material and reviewing your class notes will be helpful.
  9. INIT - Example: INIT (BUILDW(10000' ')) to initialize work area with blanks. TERM - to calculate and write summary values of fields. INITMEM - example: INITMEM(BUILD(1:$$MEMBER)) to save member name. TERMMEM - Same as TERM but the summaries are per member. PROCESS - OUTREC - process a record from input. Give example on the board!!! APPEND - write example of a report!!! HEADER - create information for page header lines. TRAILER - Same as above for trailer lines. KEYS - example: KEYS(1,8,HEADER('DETAILS FOR':1,8,/))
  10. Examples should be prepared for those variables that need them.
  11. Methodology is SUN AM C-Scan language bits and bytes is SUN PM The major special purpose “exit” is MON AM; this includes exercise time The special purpose files that we use to analyze and convert systems, with their corresponding reports is MON PM Other special purpose “exits” is TUES AM; this includes exercise time, which will extend into the afternoon A Walk Through the conversion process including a case study you will do on your own is WED and THURS AM The summary is THURS PM No homework, but you’ll find that reading through the reference material and reviewing your class notes will be helpful.
  12. Survey questionnaires are distributed to the client: Site Preliminary Questionnaire One of the first contacts with the client will be to initiate a request for general information about the client’s environment. This will be done through a site Preliminary Questionnaire. The purpose of the questionnaire is to understand the complexity and quantities of the most important components of the client’s environment. The questionnaire also identifies the main programming languages, the main DBMSs, system monitors, and naming conventions. Use the document to identify components not yet supported by the Toolbox. System Questionnaires Each site will have many applications, projects or systems being processed. A System Questionnaire should be distributed to each client resource responsible for an application, project or system. The purpose of the questionnaire is to collect information about every active application system or project that exists on site and is valid for the conversion process. This will be done by obtaining the naming conventions per system and a list of libraries, files, databases and I/O modules. It is needed for setting up the tools for performing the survey and for clustering the systems. The information from the system questionnaires will also be used for learning the client’s environment. The information will be compared with the actual components found through scanning the environment using IT Discovery. Reports are included with IT Discovery for reporting discrepancies in the client information.
  13. This illustrates the process flow during Survey and Assessment using IT Discovery.
  14. Properties of Objects Each object in AppBuilder has a set of properties or attributes that describe it. Some properties are common to all object types (for example Name and System Id), but for the most part, each object type has a different set of properties. In other words, where a Field might have a data format and length, a Rule would not; it would have an execution environment. At this early stage of your AppBuilder learning, you are not expected to know all the properties of all the object types you will encounter, they will become apparent as you progress through the course. All you need to know at the moment is that when you create an object the properties are set to default values, which you may well have to change. To see the properties for any object, press Alt + Enter from the hierarchy diagram.
  15. The goal of this process is to create a relationship between a program and date fields. The process is primarily automated through IT Discovery jobs and includes the following steps: Repository Files Merged This process involves merging the DBDTSCAN files. The language oriented DBDTSCAN files will be merged into a common global repository file. Repository Files Populated The final process of building the repository involves populating the repository file. In this step the unnormalized DBDTSCAN dataset is exploded to many additional dataset such as DBCOPY, DBCALL, DBCALLED, etc. Duplicate information is deleted and information about the same entity is merged from various records. Repository Transactions Completed This process will complete the transaction information for the repository. The DBDTSCAN repository includes information about relationships between programs and transactions. This information is merged into DBTRAN. Up to this point in the process, the transaction repository includes information about the relations between transactions and programs. The objective of this step is to complete the information regarding the relations between on-line programs and files (DDnames DSnames or DBnames).
  16. What is an Object? All objects have the following five properties: General Properties Audit - who, when, where etc... Remote Audit - when created on the Enterprise repository. Text - description of the object Keywords - help with searching for objects Some objects such as RULES also have source code associated with them.
  17. Methodology is SUN AM C-Scan language bits and bytes is SUN PM The major special purpose “exit” is MON AM; this includes exercise time The special purpose files that we use to analyze and convert systems, with their corresponding reports is MON PM Other special purpose “exits” is TUES AM; this includes exercise time, which will extend into the afternoon A Walk Through the conversion process including a case study you will do on your own is WED and THURS AM The summary is THURS PM No homework, but you’ll find that reading through the reference material and reviewing your class notes will be helpful.
  18. The first step of scanning the environment is to create a dataset of recent log activities. Depending on the client’s archiving procedures, up to 15 months of the system log files may be processed. The purpose is to identify the active jobs, programs and on-line transactions in order to reduce the conversion repository to only active components.. In this step the DBLOG dataset is created out of SMF and other monitor log files, such as Tmon, Omegamon, etc. The results are a list of jobs, programs and transactions including statistics of how often each has been used. The jobs should be tailored according to the site’s archiving procedure and system monitor type. In the case of a third party’s log manager such as MXG, a job should be tailored according to their reports. The based assumption is that these reports were verified by the client and found to be accurate.
  19. The first step of scanning the environment is to create a dataset of recent log activities. Depending on the client’s archiving procedures, up to 15 months of the system log files may be processed. The purpose is to identify the active jobs, programs and on-line transactions in order to reduce the conversion repository to only active components.. In this step the DBLOG dataset is created out of SMF and other monitor log files, such as Tmon, Omegamon, etc. The results are a list of jobs, programs and transactions including statistics of how often each has been used. The jobs should be tailored according to the site’s archiving procedure and system monitor type. In the case of a third party’s log manager such as MXG, a job should be tailored according to their reports. The based assumption is that these reports were verified by the client and found to be accurate.
  20. The first step of scanning the environment is to create a dataset of recent log activities. Depending on the client’s archiving procedures, up to 15 months of the system log files may be processed. The purpose is to identify the active jobs, programs and on-line transactions in order to reduce the conversion repository to only active components.. In this step the DBLOG dataset is created out of SMF and other monitor log files, such as Tmon, Omegamon, etc. The results are a list of jobs, programs and transactions including statistics of how often each has been used. The jobs should be tailored according to the site’s archiving procedure and system monitor type. In the case of a third party’s log manager such as MXG, a job should be tailored according to their reports. The based assumption is that these reports were verified by the client and found to be accurate.
  21. The first step of scanning the environment is to create a dataset of recent log activities. Depending on the client’s archiving procedures, up to 15 months of the system log files may be processed. The purpose is to identify the active jobs, programs and on-line transactions in order to reduce the conversion repository to only active components.. In this step the DBLOG dataset is created out of SMF and other monitor log files, such as Tmon, Omegamon, etc. The results are a list of jobs, programs and transactions including statistics of how often each has been used. The jobs should be tailored according to the site’s archiving procedure and system monitor type. In the case of a third party’s log manager such as MXG, a job should be tailored according to their reports. The based assumption is that these reports were verified by the client and found to be accurate.
  22. The first step of scanning the environment is to create a dataset of recent log activities. Depending on the client’s archiving procedures, up to 15 months of the system log files may be processed. The purpose is to identify the active jobs, programs and on-line transactions in order to reduce the conversion repository to only active components.. In this step the DBLOG dataset is created out of SMF and other monitor log files, such as Tmon, Omegamon, etc. The results are a list of jobs, programs and transactions including statistics of how often each has been used. The jobs should be tailored according to the site’s archiving procedure and system monitor type. In the case of a third party’s log manager such as MXG, a job should be tailored according to their reports. The based assumption is that these reports were verified by the client and found to be accurate.
  23. The first step of scanning the environment is to create a dataset of recent log activities. Depending on the client’s archiving procedures, up to 15 months of the system log files may be processed. The purpose is to identify the active jobs, programs and on-line transactions in order to reduce the conversion repository to only active components. In this step the DBLOG dataset is created out of SMF and other monitor log files, such as Tmon, Omegamon, etc. The results are a list of jobs, programs and transactions including statistics of how often each has been used. The jobs should be tailored according to the site’s archiving procedure and system monitor type. In the case of a third party’s log manager such as MXG, a job should be tailored according to their reports. The based assumption is that these reports were verified by the client and found to be accurate.
  24. Methodology is SUN AM C-Scan language bits and bytes is SUN PM The major special purpose “exit” is MON AM; this includes exercise time The special purpose files that we use to analyze and convert systems, with their corresponding reports is MON PM Other special purpose “exits” is TUES AM; this includes exercise time, which will extend into the afternoon A Walk Through the conversion process including a case study you will do on your own is WED and THURS AM The Summary is THURS PM No homework, but you’ll find that reading through the reference material and reviewing your class notes will be helpful.