SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
World®
’16
Ameren	Improves	Response	Time	to	Grid	
Outages	with	CA	Workload	Automation	Agents	
Clark	Ammons,	Workload	Automation	Software	Engineer,	Ameren
Tracey	Lary,	Programmer	Analyst	III	– AutoSys Admin,	Ameren	
MFX121S
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	
of	warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
In	this	session,	you	will	learn	about	the	unique	way	that	Ameren	uses	many	of	the	CA	Workload	
Automation	(CA	WA)	Agent	job	types	to	keep	track	of	linesmen	in	the	field	and	service	outages	
for	both	electric	and	gas	alerts.		With	the	use	of	CA	Workload	Automation	Agents,	load	balancing	
and	robust	Disaster	Recovery,	Ameren	is	able	to	respond	quickly	to	grid	outages	and	minimize	
business	disruption.
Tracey	Lary	
Ameren
Programmer	Analyst	III	
AutoSys	Administrator
Ameren
Software	Engineer	WAAE
Clark	Ammons
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
INTRODUCTIONS	
USE	OF	CA	WORKLOAD	AUTOMATION	(CA	WA)	AE	AND	JOB	TYPES	AT	AMEREN
QUESTIONS
BEST	STANDARDS	AND	PRACTICE	USE	OF	JOB	TYPES
DIFFERENT	JOB	TYPES	IN	USE	AT	AMEREN	AND	WHY
ROI	USE	OF	JOB	TYPES/STANDARDS	&	PRACTICES/DISASTER	RECOVERY
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Introductions
§ Tracey	Lary – Programmer	Analyst	III	/	AutoSys Administrator
– Support	on	the	CSS	System	and	Administrator	of	AutoSys to	ensure	that	
all	proper	standards	and	best	practices	are	kept	prior	to	deployment	to	
production,	working	Production	Control	and	ensuring	that	all	the	
process	is	followed	before	moving	from	instance	to	instance.
§ Clark	Ammons	– WAAE	Software	Engineer	and	Administrator	
– 20+	years	experience	with	product	making	best	use	to	customer,	
upgrade	from	version	to	version	to	current	version	R11.3.6	SP5	and	
Agents	with	Plugin	setups.		Setting	up	eEM/WCC,	teacher/trainer	of	
Developers	in	use	of	newest	versions	WAAE	for	Job	Scheduling.
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Plugin’s	and	Job	Types	Available
§ CA	WA	AE	Agent	Job	Types
– As	everyone	knows	went	From	3	Types	to	55!	
§ BOX	– CMD	– FW	(What	does	the	new	Types	get	you?)
§ BOX	– CMD	– FW	– DBPROC	– SQL	– DBMON	– JMSPUB	– JMSSUP		– HTTP			
– WBSVC	– FTP	– SCP	– OSAG	– OASET	– OACOPY	– PROXY	…
– Plugin’s	“database,	appservices,	oa,	proxy,	webservice,	ps …”	
– Your	job	types	are	driven	by	either	the	Agent	standard	install	or	Plugin	install	
along	with	proper	JIL	attributes	…
– Better	Security	!	!	!
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Best	Standard	and	Practices	With	Use	of	Job	Types
§ Documentation	is	the	key!!!	
§ Naming	Standards	that	you	can	reference	back	to	DevOps
§ Gvar’s,	Evar’s,	Machine’s,	Virtual	Machines	fit	Naming
§ Passwords	Stored	thru	Credentials	table,	or	WCC	tab
§ No	Changes	or	minimal	changes	to	any	JIL	when	moving	from	
Test	instance	to	Production	instance
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Job	Types	in	Use	at	Ameren	and	Why
§ Ameren
– Keep	moving	forward	and,	stop	looking	back	at	what	it	was	like
– DBPROC,	SQL,	DBTRIG,	DBMON,	OASG,	OASET,	OACOPY
§ Better	Security,	ability	to	reach	out	to	more	DB’s,	etc.
– JMSPUB,	JMSSUB,	HTTP,	POJO,	WBSVC
§ Web	Services	using	the	IBM	MQ	(Mull)	System	to	send/receive	updates	
helps	in	tracking	of	Linemen,	trucks,	service	outages,	usage,	update	to	
customers	from	when	service	is	to	be	restored	to	billing
– FTP,	SCP,	FT,	FW,	CMD	and	of	course	the	BOX
§ Why	write	a	FTP/SCP	script	when	it’s	already	done?
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Job	Types	in	Use	at	Ameren	and	Why
§ Database	Job	Types
– Has	removed	the	need	to	write	a	script	to	attach	to	database	then	execute	the	
needed	command	on	database.		Made	system	more	secure	as	the	ID’s	are	
stored	in	the	Credential	Table.		No	need	to	have	another	script	looking	at	the	
DB	to	see	if	it’s	completed	or	failed.		It’s	all	done	thru	AutoSys.
§ Web	Services	Job	Type
– JMSPUB/SUB(MQ	Sys)	Reading	and	updating	tables	and	rows	to	then	help	in	
updating	of	the	web	that	either	the	customer	can	see	or	in	house	can	view	to	
ensure	faster	response	time	when	there	is	a	need	from	outages	or	it’s	keeping	
track	of	the	usage	that	customers	can	log	in	and	view.
Job	Types	|	Standards	&	Practices	|	Disaster	Recovery	|		R	O	I
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Job	Types	in	Use	at	Ameren	and	Why
§ Web	Services	Job	Type
– HTTP	can	now	be	used	to	either	hit(GET)	a	URL	and	start	a	process	thru	the	
automated	process	or	can	POST	and	wait	for	information	to	return	from	
the	service.	
– WBSVC	using	SOAPui now	doing	the	triggering	of	many	other	types	of	web	
services	that	track	if	weather	is	good	or	bad,	making	decisions	to	run	or	not.
§ PROXY
– Creating	up	to	six	additional	servers	to	run	processes	on	without	the	need	for	
an	Agent,	this	is	when	you	only	have	a	need	to	run	minimal	number	of	
processes	on	this	server	going	thru	SSH2	and	reporting	back	when	complete.
Job	Types	|	Standards	&	Practices	|	Disaster	Recovery	|		R	O	I
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Standards	&	Practices	/	Disaster	Recovery
§ Standards	&	Practices
– You	have	documentation	that	all	have	accepted	and,	what	better	way	can	you	
run	a	shop	than	when	everyone	is	practicing	the	same	things	making	your	
setup’s,	alerts,	and	migrations	clean	when	moving	from	Test	to	Prod.
§ Disaster	Recovery
– Not	using	HA	however,	using	a	virtual	machine	to	run	the	Scheduler/App	
Server	on	with	only	some	backup	processes	being	done	keeps	things	clean	on	
server.		With	Oracle	Datagaurd replicating	the	data	to	another	location	its	very	
simple	to	move	from	primary	to	secondary	with	very	little	downtime.
Job	Types	|	Standards	&	Practices	|	Disaster	Recovery	|		R	O	I
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
ROI
§ Return	on	Investment
– Job	Types	lower	the	number	of	hours	that	DevOps	uses	to	setup	processes	
when	there	is	less	scripting	that	needs	to	be	done.		No	more	need	to	add	DB	
Clients	on	every	machine	and,	your	security	is	better	safeguarded.	Time	is	
freed	up	to	move	on	to	other	projects.	Customers	service	is	returned	in	much	
better	and	timely	fashion,	makes	everyone	happy!
– Good	Standards	&	Practices	keep	your	JIL	clean	and	reduces	the	amount	of	
work	when	promoting	your	jobs	across	to	next	instance.		Less	number	of	
Agents	are	needed	in	a	shop	as	you	take	advantage	of	the	many	job	types.
– Having	a	DR	system	that	has	been	tested	and	proven	is	a	two	fold,	less	
equipment	needed	as	well	as	software	and	recovery	is	just	a	fast.
Job	Types	|	Standards	&	Practices	|	Disaster	Recovery	|		R	O	I
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX180S	
How	to	Have	a	Voice	in	Product	Enhancements	through	
CA	Ideation	and	Validation	Communities
11/17/2016	at	3:00	pm
Jasmine	B
MFX151S
Complements	Will	Get	You	Everywhere:	How	Do	CA	
Workload	Automation	iDash and	CA	Workload	
Automation	AE	SP4	Complement	Each	Other?
11/17/2016	at	3:45	pm
Jasmine	C
MFX136S
Delivering	CA	Workload	Automation	from	a	
Saas Platform
11/17/2016	at	4:30	pm
Jasmine	B
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.16 @CAWORLD					#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

Contenu connexe

Tendances

Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...CA Technologies
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashCA Technologies
 
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsPre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsCA Technologies
 
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...CA Technologies
 
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AE
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AEPre-Con Ed: Planning Disaster Recovery for CA Workload Automation AE
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AECA Technologies
 
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...CA Technologies
 
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...CA Technologies
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
 
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesPre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesCA Technologies
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksCA Technologies
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentCA Technologies
 
Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
 
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...CA Technologies
 
The Installation and Deployment of a State of the Art Content Management Solu...
The Installation and Deployment of a State of the Art Content Management Solu...The Installation and Deployment of a State of the Art Content Management Solu...
The Installation and Deployment of a State of the Art Content Management Solu...CA Technologies
 
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...CA Technologies
 
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksPre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksCA Technologies
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...CA Technologies
 
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...CA Technologies
 

Tendances (20)

Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
 
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsPre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
 
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
 
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AE
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AEPre-Con Ed: Planning Disaster Recovery for CA Workload Automation AE
Pre-Con Ed: Planning Disaster Recovery for CA Workload Automation AE
 
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
 
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
 
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesPre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
 
Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
 
The Installation and Deployment of a State of the Art Content Management Solu...
The Installation and Deployment of a State of the Art Content Management Solu...The Installation and Deployment of a State of the Art Content Management Solu...
The Installation and Deployment of a State of the Art Content Management Solu...
 
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
 
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksPre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
 
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
 

Similaire à Case Study: Ameren Improves Response time to Grid Outages with CA Workload Automation Agents

Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...CA Technologies
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...CA Technologies
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring CA Technologies
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementCA Technologies
 
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part ICA Technologies
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Technologies
 
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IIApplication Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IICA Technologies
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesCA Technologies
 
Launch CRP129P User Manual
Launch CRP129P User ManualLaunch CRP129P User Manual
Launch CRP129P User ManualTim Miller
 
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release AutomationCase Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release AutomationCA Technologies
 
Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...
Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...
Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...Amazon Web Services
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2CA Technologies
 
Mclarens Article
Mclarens ArticleMclarens Article
Mclarens ArticleMark Rogers
 
Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...
Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...
Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...Amazon Web Services
 
Brief Summary Presentation 2009
Brief Summary Presentation 2009Brief Summary Presentation 2009
Brief Summary Presentation 2009gcatania
 
Special Report : The Truth About TMA s
Special Report : The Truth About TMA sSpecial Report : The Truth About TMA s
Special Report : The Truth About TMA sA1RoadlinesAustralia
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementCA Technologies
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowCA Technologies
 
Fraud Prevention and Detection on AWS
Fraud Prevention and Detection on AWSFraud Prevention and Detection on AWS
Fraud Prevention and Detection on AWSAmazon Web Services
 
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...CA Technologies
 

Similaire à Case Study: Ameren Improves Response time to Grid Outages with CA Workload Automation Agents (20)

Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
 
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and Maintenance
 
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IIApplication Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
 
Launch CRP129P User Manual
Launch CRP129P User ManualLaunch CRP129P User Manual
Launch CRP129P User Manual
 
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release AutomationCase Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
 
Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...
Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...
Modernize your data warehouse with Amazon Redshift - ADB305 - Santa Clara AWS...
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
Mclarens Article
Mclarens ArticleMclarens Article
Mclarens Article
 
Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...
Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...
Modernizing your data warehouse using Amazon Redshift - ADB303 - Chicago AWS ...
 
Brief Summary Presentation 2009
Brief Summary Presentation 2009Brief Summary Presentation 2009
Brief Summary Presentation 2009
 
Special Report : The Truth About TMA s
Special Report : The Truth About TMA sSpecial Report : The Truth About TMA s
Special Report : The Truth About TMA s
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Fraud Prevention and Detection on AWS
Fraud Prevention and Detection on AWSFraud Prevention and Detection on AWS
Fraud Prevention and Detection on AWS
 
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
Pre-Con Ed: Beyond Software Compliance: Show Me the Money - Simulation and Op...
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Dernier

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 

Dernier (20)

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 

Case Study: Ameren Improves Response time to Grid Outages with CA Workload Automation Agents