SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
World®
’16
Configuring	CA	Workload	Automation	AE	
for	optimal	results
Mike	Woods,	CA	Technologies,	Principal	Engineering	Services	Architect
MFX10E
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
As	CA	Workload	Automation	AE	(CA	WLA	AE)	administrators,	providing	a	robust	
and	efficient	environment	is	critical.	This	session	will	cover	managing	configuration	
parameters	in	the	scheduling	engine	as	well	as	the	UI	to	ensure	smooth	operation.	
This	session	will	discuss	how	to	configure	CA	Workload	Automation	AE	(AutoSys®)	
to	improve	efficiency	and	reduce	problems	related	to	configuration.	
Michael	
Woods
CA	Technologies
Principal	Engineering	
Services		Architect
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
WHAT	ARE	BEST	PRACTICES
WORKLOAD	AUTOMATION	AE
WORKLOAD	CONTROL	CENTER
EMBEDDED	ENTITLEMENTS	MANAGER
Q	&	A
1
2
3
4
5
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	is	a	Best	Practice?
Normally	reduces	issues	
§ Not	always	the	same	as	taking	the	defaults
§ Has	a	greater	usage	in	client	base
§ Less	chance	for	issues	going	forward
Not	always	best	for	you
§ You	may	have	unique	requirements
§ One	size	does	not	always	fit	all
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ DBMAINT	– Deletes	old	data	from	the	database
– Default	is	to	run	at	3:30
– Should	be	set	to	run	at	a	low	period
– High	volume	shops	may	want	to	run	more	than	once	a	day
– Controlled	by	DBMaintTime setting
– When	submitted	via	scheduler	will	throw	an	alarm	if	errors	occur
– DBMaintCmd
§ Default	$AUTOSYS/bin/DBMaint
§ Will	not	pick	up	any	changes	to	DBMaint	script
Configuration	Settings
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ IP	Caching	– Default	behavior	is	to	cache	the	IP	address	for	
agents	to	improve	performance.
– Controlled	with	EnableIPCaching=0|1
0	means	that	a	dns lookup	will	occur	for	each	job	run.		Same	as	older	
releases
1	means	that	the	initial	lookup	result	will	be	saved	and	reused.
– as_server impact
0	means	that		a	dns lookup	will	be	used	for	outbound	communication
1	means	to	use	the	same	IP	address	used	for	inbound	will	be	used	for	
outbound	communication
Configuration	Settings
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ LOCALHOST	Jobs	defined	with	localhost	run	where	the	active	
scheduler	is	located
– That	machine	must	be	defined.
– Can	be	controlled	by	LocalMachineDefinition=name	
§ If	not	defined	defaults	to	the	hostname	output
Configuration	Settings
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ Instance	Wide	Encryption
§ Used	for	any	communication	to	the	Application	Server
– WCC
– CLI
– SDK
§ Unrelated	to	encryption	key	used	for	agent	communication
Configuration	Settings
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ Instance	Wide	Encryption
§ UseEncryption=0|1|2
0		Specifies	that	no	encryption	is	used
1	Specifies	that	a	default	encryption	key	is	used,	the	default
2	Specifies	that	a	custom	32	hex	key	or	16	character	pass	phrase	is	used
§ Best	practice	for	a	production	environment	is	to	use	a	custom	
key.
Configuration	Settings
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ Instance	Wide	Encryption
– Must	be	set	to	0	(None)	when	R11	agents	are	used
– Client	and	WCC	configuration	must	match	in	order	to	communicate
– Recommend	using	a	different	key	per	tier	to	prevent	accidental	test	
jobs	running	in	production
Configuration	Settings
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ Statistical	aggregation	– used	to	report	on	scheduler,	event	
and	job	statistics
– Used	by	WCC	reports
– Used	by	autoaggr to	generate	cli	reports
– Stores	data	by	hour,	daily,	weekly	and	monthly	units
– Set	with	AggregateStatistics=0|1
0	Do	not	aggregate	statistics
1	statistics	are	aggregated,	this	is	the	default	since	11.3.6	SP2
Configuration	Settings
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ Security	modes
– Internal	Security	– Same	model	as	legacy	releases
– External	Security	– Uses	Embedded	Entitlements	Manager	(EEM)
§ Recommended	to	provide	granular	security	to	meet	compliance	
requirements.
§ Work	with	your	security	team	to	create	the	best	filters	to	improve	
performance.		User	and	Group	filters	are	available.
Implementation
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	AE
§ Global	Variables
– Use	same	naming	convention	as	jobs	to	make	securing	easier
– Do	not	assign	as	conditions	to	too	many	jobs
§ Changes	to	value	drive	the	scheduler	to	validate	all	associated	jobs
§ Can	impact	performance
– Could	a	Threshold	resource	work	better?
Implementation
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Workload	Control	Center
§ Views
– Create	global	views	that	meet	the	needs	of	your	different	users:	
Operations,	Application	teams
– Restrict	views	to	views	<	5000	
– Limit	who	can	create	views
– Duplicate	or	wildcard	for	ALL	can	hurt	performance
Implementation
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Workload	Control	Center
§ If	11.3	or	higher,	go	to	11.4	for	new	features	and	better	
performance
– Requires	EEM	12.51
§ If	11.3.6	CA	WLA	AE	and	using	EEM,	use	a	global	ECLI	user	and	
restrict	access	to	the	Credentials	tab
Implementation
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Workload	Control	Center Continued
§ Let	users	have	self-service	in	production	to	relieve	Operations	
from	getting	overwhelmed	and	potentially	less	error	prone
– Must	be	auditable
– Must	be	secured
§ EEM	can	audit	this	activity,	your	policy	secures	it
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Workload	Control	Center
§ Check	tuning	guide	for	specific	instructions
– Java.Maxmemory	is	major	one
– Two	tomcats
– 32	bit	– should	not	exceed	1G
– 64	bit	– can	be	set	larger,	check	what	is	available	on	your	system
Performance	Tuning
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Workload	Control	Center	Performance	Tuning
§ Linux
install_dir/tomcat/conf/wrapper.conf
#	Uncomment	this	line	if	the	entropy	of	the	UNIX	machine	is	low	to	speed	up	
encryption
#	The	dot	between	/dev	and	/urandom	is	not	a	mistake
wrapper.java.additional.101=-Djava.security.egd=file:/dev/./urandom
Is	now	the	default	setting
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users
Define	the	roles	you	need:
§ Admin
§ Operations
§ Scheduler
§ Application	developer
§ Line	or	business	user
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users	Continued
§ Define	what	tabs	(applications)	each	role	should	have
§ What	servers	should	they	have	access	to?
– Development,	UAT,	Production
§ What	tabs	per	server?
– Edit	for	dev,	but	not	for	prod?
– Sendevent/monitoring	in	prod,	but	no	edit	
§ What	views	should	they	have?
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users
One	security	mode	available:
§ Security	is	used	to	determine	what	will	be	displayed
– Remove	unused	tabs
– Reduce	questions/issues	on	features	not		used	or	wanted
§ Use	security	to	protect	what	needs	protection	and	also	to	
reduce	the	noise
– Show	what	they	are	interested	in
Using	Security
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users
There	are	50+	job	types.
§ How	many	are	required?
§ Do	you	have	Oracle®	E	Business?
§ Do	you	have	SAP®?
§ Do	you	have	PeopleSoft?
§ Do	you	have	z/OS?
§ Do	you	allow	FTP?
Configuration	Options
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users
§ General	notes	for	running	commands	for	job	types:
— User_name:	EEM	user,	local	user	with	access	
— Password:	Users	EEM	password
— Application_name: qedit	or	appedit
§ Command	must	be	run	with	a	userid	able	to	update	log	files	
§ Use	the	userid	designated	at	install	as	the	run	as	user
§ The	default	is	root
Batch	Interfaces
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users
Creating	a	list	of	desired	job	types:
§ List	available	job	types	to	see	what	is	currently	available	and	not	
available:
filter_jobtypes	-u	user_name -p	password -t	application_name	-l	
§ Remove	job	types	from	being	displayed:
filter_jobtypes	-u	user_name	-p	password -t	application_name	–r	
all|jobtype1[,jobtype2,…,jobtypex]
Batch	Interfaces Continued
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users
Creating	a	list	of	desired	job	types:
§ Add	job	types	to	available	list:
filter_jobtypes	-u	user_name	-p	password -t	application_name	-a	
all|jobtype1[,jobtype2,…,jobtypex]
Batch	Interfaces Continued
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	the	Environment	For	Users
Creating	views	in	batch:
§ Export	a	sample	view	that	has	your	standards
– wcc_monitor -u	user_name	-p	password	–x	export_file	–view	
sampleView
§ Edit	exported	view	to	replace	view	name	to	‘XXXX’
§ Create	script	to	‘sed’	template	and	replace	‘XXXX’	with	your	application	
prefix	using	your	naming	convention
§ Import	views:
wcc_monitor	-u	user_name	-p	password	–i	input_file
Batch	Interfaces Continued
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Workload	Automation	Agents
§ Defined	Managers
– Do	not	add	unused	managers
§ Increases	unsent	messages	if	manager	does	not	recognize	agent
§ Makes	the	manager	deal	with	unwanted	message	(Junk	mail)
§ Legacy	settings
– If	coming	from	a	pre	11.3,	use	them	to	get	the	same	behavior
– If	brand	new,	then	not	as	important,	but	you	need	to	set	standards	on	
how	the	agents	will	behave	for	your	end	users.		Using	common	settings	
will	make	life	easier
Implementation
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX12E
Critical	Path	Analysis	with	CA	Workload	Automation	(AE)	
iDash	– Overview
11/14/2016	at	10:00	am
Banyan	A/B
MFX20E
Beyond	the	CA	Workload	Automation	AE	CLI	–
Leveraging	CA	WLA	AE	Web	Services
11/14/2016	at	5:00	pm
Jasmine	C
MFX27E
Planning	Disaster	Recovery	for	CA	Workload	Automation	
AE
11/15/2016	at	9:00	am
Jasmine	C
MFX122S Vision	and	Roadmap:	CA	Workload	Automation	AE	
11/16/2016	at	12:45pm
Banyan	A/B
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Modern	
Workload	
Automation	
CA	WLA	DE
MF	and	Workload	
Automation
Seamless	
Application
Automation
Agents	&	Advanced	
Integrations
MF	and	Workload	
Automation
CA	Conversion	
as	a	Service	
CA	Workload	
Automation
MF	and	Workload	
Automation
Innovations:	
Cross	Enterprise	
Workload	
Automation
CA	WLA	AE	&	DE
MF	and	Workload	
Automation
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.32 @CAWORLD					#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you
Stay	connected	at	communities.ca.com

Contenu connexe

Tendances

Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...CA Technologies
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...CA Technologies
 
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...CA Technologies
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
 
Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
 
Pre Con Ed: Optimize Cloud Services and Operations With CA Process Automation
Pre Con Ed: Optimize Cloud Services and Operations With CA Process AutomationPre Con Ed: Optimize Cloud Services and Operations With CA Process Automation
Pre Con Ed: Optimize Cloud Services and Operations With CA Process AutomationCA Technologies
 
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...CA Technologies
 
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...CA Technologies
 
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...CA Technologies
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...CA Technologies
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformCA Technologies
 
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksPre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksCA Technologies
 
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...CA Technologies
 
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...CA Technologies
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...CA Technologies
 
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...CA Technologies
 
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...CA Technologies
 
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12CA Technologies
 
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...CA Technologies
 

Tendances (20)

Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
 
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
Pre-Con Ed: How to move from SAP, Oracle and PeopleSoft Adapters to the CA Wo...
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
 
Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?Pre-Con Ed: What’s New With Workload Automation DE R12?
Pre-Con Ed: What’s New With Workload Automation DE R12?
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Pre Con Ed: Optimize Cloud Services and Operations With CA Process Automation
Pre Con Ed: Optimize Cloud Services and Operations With CA Process AutomationPre Con Ed: Optimize Cloud Services and Operations With CA Process Automation
Pre Con Ed: Optimize Cloud Services and Operations With CA Process Automation
 
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
 
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
 
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS Platform
 
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksPre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
 
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
 
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...
Pre-Con Ed: Optimizing System and Network Performance Part II: What's New in ...
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
 
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
 
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
 
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
 
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...
 

Similaire à Configuring CA Workload Automation AE for Optimal Results

Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesCA Technologies
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®CA Technologies
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2CA Technologies
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring CA Technologies
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Technologies
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowCA Technologies
 
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationPre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationCA Technologies
 
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersPre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersCA Technologies
 
Pre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APM
Pre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APMPre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APM
Pre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APMCA Technologies
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...CA Technologies
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolCA Technologies
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA DatacomCA Technologies
 
Tech Talk: CA Agile Central Made Easy
Tech Talk: CA Agile Central Made EasyTech Talk: CA Agile Central Made Easy
Tech Talk: CA Agile Central Made EasyCA Technologies
 
Key to Optimizing Efficiency and Performance: Automate Everything Possible
Key to Optimizing Efficiency and Performance: Automate Everything PossibleKey to Optimizing Efficiency and Performance: Automate Everything Possible
Key to Optimizing Efficiency and Performance: Automate Everything PossibleCA Technologies
 
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...CA Technologies
 
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...CA Technologies
 
Tech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team CenterTech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team CenterCA Technologies
 

Similaire à Configuring CA Workload Automation AE for Optimal Results (20)

Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and Maintenance
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationPre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
 
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersPre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
 
Pre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APM
Pre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APMPre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APM
Pre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APM
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Tech Talk: CA Agile Central Made Easy
Tech Talk: CA Agile Central Made EasyTech Talk: CA Agile Central Made Easy
Tech Talk: CA Agile Central Made Easy
 
Key to Optimizing Efficiency and Performance: Automate Everything Possible
Key to Optimizing Efficiency and Performance: Automate Everything PossibleKey to Optimizing Efficiency and Performance: Automate Everything Possible
Key to Optimizing Efficiency and Performance: Automate Everything Possible
 
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
Tech Talk: Use CA Application Performance Management and Jenkins to Turbochar...
 
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
 
Tech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team CenterTech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team Center
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Dernier

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Dernier (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Configuring CA Workload Automation AE for Optimal Results