SlideShare une entreprise Scribd logo
1  sur  65
Turning Insight into Action with CICS Events Tom Grieve [email_address]
© IBM Corporation 2009. All Rights Reserved. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views.  They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant.  While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or   otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way.  Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.  Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment.  The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved.  Actual environmental costs and performance characteristics may vary by customer. The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM trademarks, see www.ibm.com/legal/copytrade.shtml AIX, CICS, CICSPlex, DB2, DB2 Universal Database, i5/OS, IBM, the IBM logo, IMS, iSeries, Lotus, OMEGAMON, OS/390, Parallel Sysplex, pureXML, Rational, RCAF, Redbooks, Sametime, Smart SOA, System i, System i5, System z , Tivoli, WebSphere, and z/OS. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
Business  Event Processing Bridges the Gap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT Developer Business User
IBM Event Processing products – some examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS and Event Processing An introduction to CICS as a source of events
Jun 9, 2009 "CICS is probably the most successful piece of software of all time . . . It is the mainstay of business computing throughout the world . . . Millions of users unknowingly activate CICS every day, and if it were to disappear the world economy would grind to a halt.“ Phil Manchester, Personal Computer Magazine ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CICS Although most people are blissfully unaware of CICS, they probably make use of it several times a week, for almost every commercial electronic transaction they make.  In the whole scheme of things, CICS is much more important than Microsoft Windows."   Martin Campbell-Kelly, From Airline Reservations to Sonic the Hedgehog (A History of the Software Industry)
CICS Events – a peek inside the box
CICS TS V4.1 is aimed at helping users to –  Business Flexibility and Innovation Compete   for new opportunity  by gaining insight into business processes and responding by modifying key business applications quickly and with confidence   Control costs   by simplifying IT infrastructure and improving development and operations productivity through easier-to-use interfaces and functions   –  IT  Simplification Comply  with corporate, industry and government policies to manage business risk of critical business applications –  Governance and Compliance Event Processing
CICS and Business Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Significance of Events from CICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS and event processing – overview Existing Business Logic Captured Events CICS Event Processing Event Capture Filtering Enrichment Formatting  Routing Extensible Secured Monitored etc. Development & Deployment Tools WebSphere  Business  Monitor WebSphere  Business  Events Code NOT changed CICS Transaction Server for z/OS Other  Event  Consumers Events
The event solution for CICS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A few example uses of CICS events
EP Scenario 1 – Observe business processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EP Scenario 2 – Non-invasive change to business processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EP Scenario 3 – Event Combination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example workflow for using Events in CICS
The Role-Based CICS Event Workflow Event Consumer Business Modeler Business Dashboard LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
LoB defines the business events Event Consumer Identify Business Events  Studies existing business processing and identifies business events that occur and information to be collected. May define patterns between events and specify delivery destinations or event display using other tooling. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
Application Analyst identifies events in application Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Inspects program(s) to determine how to capture the business events and collect the required data. Specifies where and how event is to be emitted. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
Systems Programmer configures the infrastructure CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Deploy Events Specifies format and destination for the captured events. Defines CICS resources to deploy the events LoB Manager Application Analyst Systems Programmer
LoB defines the business actions CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Deploy Events  Specify Business Actions Specifies the actions to take on consuming an event  LoB Manager Application Analyst Systems Programmer
LOB optionally configures a dashboard CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events  Create Event Capture Specification Deploy Events  Specify Business Actions Optionally Configure Dashboard Optionally configures a business dashboard to display metrics based on events from CICS and other components of the application system  LoB Manager Application Analyst Systems Programmer
CICS Event Specifications or… how CICS knows  where the events occur
CICS Event Specification Event policy ,[object Object],[object Object],[object Object],[object Object],Event Specification ,[object Object],[object Object],[object Object],[object Object],[object Object],Event Specification associated with  Event Capture Spec(s) ‏ ,[object Object],[object Object],[object Object],[object Object],ES ES ECS Event Binding EP Adapter Config   (Type. Q-name, tran, etc) ‏ CICS Bundle resource ES CS ES CS ES CS ES CS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CICS Event Specification Example
The event binding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS Bundle resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Deployment of Event Bindings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Names in event specifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBM Confidential
CICS Event Capture
CICS Event Capture options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Eventable CICS Commands – Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Eventable CICS Commands ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Filterable and Capturable Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction to  EP Adapters
CICS Event Processing Adapters ‘ WMQ’ EP Adapter Custom EP Adapter Transactions Security Dispatching Monitoring EVENT DISPATCHER Event Capture  Existing Business Logic WBM Internal Event CICS Event  CBE CBE XML CICS Event Tooling &  Schema EP Adapter Interface CICS  Tran ‘ TS queue’ EP Adapter CCE WBE ‘ Transaction  Start’ EP Adapter EXEC CICS  SIGNAL EVENT Sent to one of CFE WBE XML CICS TS Queue CFE Capture Point WBE Any format Anywhere CEI
CICS-provided EP Adapters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBM Confidential
Event Binding Editor The CICS event specification tooling
CICS EP Tooling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CICS Explorer Resource Perspective Showing a number of Bundle Projects in the Project Explorer, one expanded to show that it contains an event binding, and the bundle manifest
Event Binding Editor – Event Binding
Event Binding Editor  –   Event Specification
Event Binding Editor –  Event Specification (2) Another Event Specification with Name, Description and Emitted Business Information also shows where the Capture Specification is added
Event Binding Editor  –   Capture Specification
Event Binding Editor  –   Capture Specification (2)
Event Binding Editor  –   Capture Specification Filtering
Event Binding Editor  –   Filtering (2) Another Event Capture Specification showing Capture Predicates: File name specified as primary predicate
Event Binding Editor  –  Filtering (3) Example showing more predicates used to filter an event
Event Binding Editor  –   Information Sources
Event Binding Editor –   Information Sources (2) Capture Specification, showing the Information Sources panel defining how the event information is obtained from data available on the command (or from standard event context data)
Event Binding Editor  –   Information Sources Import Showing use of imported source code (copybook) to fill in the Information Sources
Event Binding Editor  –   Information Sources Import (2) Showing use of imported source code (copybook) to fill in the Information Sources
Event Binding Editor  –   Information Sources Import (3) Another example of using imported source code to fill in Information Sources
Event Binding Editor  –  EP Adapter  EP Adapter specification, showing the configuration details for WMQ Queue EP adapter, with Queue name and other WMQ parameters. The Advanced Dispatcher Options are shown, but nothing other than the defaults have been selected.
Deploying an Event Binding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary and Q&A Including a summarising scenario
Visibility, Compliance, and Business Flexibility with  CICS Events 06/09/09 CICS TS Stock Trading  Application WebSphere Business Events ,[object Object],[object Object],[object Object],WebSphere Business Monitor Stock Trade Events
CICS Event Processing Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You ! Any questions? ?

Contenu connexe

Tendances

Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...BMC Software
 
SmartCloud Control Desk Roadmap
SmartCloud Control Desk RoadmapSmartCloud Control Desk Roadmap
SmartCloud Control Desk RoadmapIBM Danmark
 
Uc4 wp one_automation_us
Uc4 wp one_automation_usUc4 wp one_automation_us
Uc4 wp one_automation_usLockheed Martin
 
Mobile device management
Mobile device managementMobile device management
Mobile device managementMalin De Silva
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategyRMayo22
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentationAshita Mehra
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Precisely
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federalJohn McDonald
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiIBM Sverige
 
ca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebookca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebookTiffany Hamilton
 
HRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCSHRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCSIBM India Smarter Computing
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Citrix
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business caseTripleValue
 

Tendances (18)

Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
WSO2ConAsia2016-Prabath
WSO2ConAsia2016-PrabathWSO2ConAsia2016-Prabath
WSO2ConAsia2016-Prabath
 
Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...Middleware Management: Real-time visibility and root-cause analysis - less do...
Middleware Management: Real-time visibility and root-cause analysis - less do...
 
SmartCloud Control Desk Roadmap
SmartCloud Control Desk RoadmapSmartCloud Control Desk Roadmap
SmartCloud Control Desk Roadmap
 
Uc4 wp one_automation_us
Uc4 wp one_automation_usUc4 wp one_automation_us
Uc4 wp one_automation_us
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategy
 
Esm 5 08 V3
Esm 5 08  V3Esm 5 08  V3
Esm 5 08 V3
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federal
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
ca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebookca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebook
 
HRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCSHRG Assessment:Comparing IBM PureSystems and Cisco UCS
HRG Assessment:Comparing IBM PureSystems and Cisco UCS
 
Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
 

Similaire à Turning Insight into Action with CICS Events

AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...WASdev Community
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4Susan Yoskin
 
OpenWhisk Introduction
OpenWhisk IntroductionOpenWhisk Introduction
OpenWhisk IntroductionIoana Baldini
 
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...nick_garrod
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finaleileendohertysmith
 
Z cloud with technical details
 Z cloud with technical details Z cloud with technical details
Z cloud with technical detailsJim Porell
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthIBM Danmark
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudVincent Burckhardt
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewSuzanne Livingston
 
Making People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and AnalyzableMaking People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and AnalyzableWeiwei Yang
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Derek Baron
 
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and RoadmapDaniel Berg
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Michael Elder
 
Future Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaSFuture Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaSPeter Coffee
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data SheetÉric Guay
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentAntonio Rolle
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 

Similaire à Turning Insight into Action with CICS Events (20)

AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4
 
OpenWhisk Introduction
OpenWhisk IntroductionOpenWhisk Introduction
OpenWhisk Introduction
 
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
 
Z cloud with technical details
 Z cloud with technical details Z cloud with technical details
Z cloud with technical details
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and Growth
 
NZS-2990 Made with IBM - Mobile-ready Systems of Record
NZS-2990 Made with IBM - Mobile-ready Systems of RecordNZS-2990 Made with IBM - Mobile-ready Systems of Record
NZS-2990 Made with IBM - Mobile-ready Systems of Record
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
Making People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and AnalyzableMaking People Flow in Cities Measurable and Analyzable
Making People Flow in Cities Measurable and Analyzable
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
 
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
 
Portal on the Cloud
Portal on the CloudPortal on the Cloud
Portal on the Cloud
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
 
Future Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaSFuture Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaS
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data Sheet
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 

Plus de CICS ROADSHOW

Business Analytics Em Plataforma Hibrida Alexos
Business Analytics Em Plataforma Hibrida   AlexosBusiness Analytics Em Plataforma Hibrida   Alexos
Business Analytics Em Plataforma Hibrida AlexosCICS ROADSHOW
 
SystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - AlexosSystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - AlexosCICS ROADSHOW
 
Problem Determination Tools
Problem Determination ToolsProblem Determination Tools
Problem Determination ToolsCICS ROADSHOW
 
La Cics Tools Overview April 2009
La   Cics Tools Overview   April 2009La   Cics Tools Overview   April 2009
La Cics Tools Overview April 2009CICS ROADSHOW
 
Cics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And PhpCics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And PhpCICS ROADSHOW
 
Cics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical OverviewCics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical OverviewCICS ROADSHOW
 
Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009CICS ROADSHOW
 
Cics Explorer April 2009
Cics Explorer April 2009Cics Explorer April 2009
Cics Explorer April 2009CICS ROADSHOW
 

Plus de CICS ROADSHOW (10)

Business Analytics Em Plataforma Hibrida Alexos
Business Analytics Em Plataforma Hibrida   AlexosBusiness Analytics Em Plataforma Hibrida   Alexos
Business Analytics Em Plataforma Hibrida Alexos
 
SystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - AlexosSystemZ - Apresentacao de Brasilia System z - Alexos
SystemZ - Apresentacao de Brasilia System z - Alexos
 
Problem Determination Tools
Problem Determination ToolsProblem Determination Tools
Problem Determination Tools
 
R Dz7.5 Overview
R Dz7.5 OverviewR Dz7.5 Overview
R Dz7.5 Overview
 
La Cics Tools Overview April 2009
La   Cics Tools Overview   April 2009La   Cics Tools Overview   April 2009
La Cics Tools Overview April 2009
 
Cics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And PhpCics Web 2.0 With Atom Feeds And Php
Cics Web 2.0 With Atom Feeds And Php
 
Cics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical OverviewCics Ts 4.1 Technical Overview
Cics Ts 4.1 Technical Overview
 
Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009Cics Tools Portfolio Apr 2009
Cics Tools Portfolio Apr 2009
 
Cics Explorer April 2009
Cics Explorer April 2009Cics Explorer April 2009
Cics Explorer April 2009
 
Cics Connectivity
Cics ConnectivityCics Connectivity
Cics Connectivity
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Turning Insight into Action with CICS Events

  • 1. Turning Insight into Action with CICS Events Tom Grieve [email_address]
  • 2. © IBM Corporation 2009. All Rights Reserved. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM trademarks, see www.ibm.com/legal/copytrade.shtml AIX, CICS, CICSPlex, DB2, DB2 Universal Database, i5/OS, IBM, the IBM logo, IMS, iSeries, Lotus, OMEGAMON, OS/390, Parallel Sysplex, pureXML, Rational, RCAF, Redbooks, Sametime, Smart SOA, System i, System i5, System z , Tivoli, WebSphere, and z/OS. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. CICS and Event Processing An introduction to CICS as a source of events
  • 11.
  • 12. CICS Events – a peek inside the box
  • 13. CICS TS V4.1 is aimed at helping users to – Business Flexibility and Innovation Compete for new opportunity by gaining insight into business processes and responding by modifying key business applications quickly and with confidence Control costs by simplifying IT infrastructure and improving development and operations productivity through easier-to-use interfaces and functions – IT Simplification Comply with corporate, industry and government policies to manage business risk of critical business applications – Governance and Compliance Event Processing
  • 14.
  • 15.
  • 16. CICS and event processing – overview Existing Business Logic Captured Events CICS Event Processing Event Capture Filtering Enrichment Formatting Routing Extensible Secured Monitored etc. Development & Deployment Tools WebSphere Business Monitor WebSphere Business Events Code NOT changed CICS Transaction Server for z/OS Other Event Consumers Events
  • 17.
  • 18. A few example uses of CICS events
  • 19.
  • 20.
  • 21.
  • 22. Example workflow for using Events in CICS
  • 23. The Role-Based CICS Event Workflow Event Consumer Business Modeler Business Dashboard LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
  • 24. LoB defines the business events Event Consumer Identify Business Events Studies existing business processing and identifies business events that occur and information to be collected. May define patterns between events and specify delivery destinations or event display using other tooling. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
  • 25. Application Analyst identifies events in application Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Inspects program(s) to determine how to capture the business events and collect the required data. Specifies where and how event is to be emitted. LoB Manager Application Analyst Systems Programmer CICS TS Existing Application CICS Event Processing Support
  • 26. Systems Programmer configures the infrastructure CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Deploy Events Specifies format and destination for the captured events. Defines CICS resources to deploy the events LoB Manager Application Analyst Systems Programmer
  • 27. LoB defines the business actions CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Deploy Events Specify Business Actions Specifies the actions to take on consuming an event LoB Manager Application Analyst Systems Programmer
  • 28. LOB optionally configures a dashboard CICS TS Existing Application CICS Event Processing Support Event Consumer Business Modeler Business Dashboard Identify Business Events Create Event Capture Specification Deploy Events Specify Business Actions Optionally Configure Dashboard Optionally configures a business dashboard to display metrics based on events from CICS and other components of the application system LoB Manager Application Analyst Systems Programmer
  • 29. CICS Event Specifications or… how CICS knows where the events occur
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Introduction to EP Adapters
  • 42. CICS Event Processing Adapters ‘ WMQ’ EP Adapter Custom EP Adapter Transactions Security Dispatching Monitoring EVENT DISPATCHER Event Capture Existing Business Logic WBM Internal Event CICS Event CBE CBE XML CICS Event Tooling & Schema EP Adapter Interface CICS Tran ‘ TS queue’ EP Adapter CCE WBE ‘ Transaction Start’ EP Adapter EXEC CICS SIGNAL EVENT Sent to one of CFE WBE XML CICS TS Queue CFE Capture Point WBE Any format Anywhere CEI
  • 43.
  • 44. Event Binding Editor The CICS event specification tooling
  • 45.
  • 46. CICS Explorer Resource Perspective Showing a number of Bundle Projects in the Project Explorer, one expanded to show that it contains an event binding, and the bundle manifest
  • 47. Event Binding Editor – Event Binding
  • 48. Event Binding Editor – Event Specification
  • 49. Event Binding Editor – Event Specification (2) Another Event Specification with Name, Description and Emitted Business Information also shows where the Capture Specification is added
  • 50. Event Binding Editor – Capture Specification
  • 51. Event Binding Editor – Capture Specification (2)
  • 52. Event Binding Editor – Capture Specification Filtering
  • 53. Event Binding Editor – Filtering (2) Another Event Capture Specification showing Capture Predicates: File name specified as primary predicate
  • 54. Event Binding Editor – Filtering (3) Example showing more predicates used to filter an event
  • 55. Event Binding Editor – Information Sources
  • 56. Event Binding Editor – Information Sources (2) Capture Specification, showing the Information Sources panel defining how the event information is obtained from data available on the command (or from standard event context data)
  • 57. Event Binding Editor – Information Sources Import Showing use of imported source code (copybook) to fill in the Information Sources
  • 58. Event Binding Editor – Information Sources Import (2) Showing use of imported source code (copybook) to fill in the Information Sources
  • 59. Event Binding Editor – Information Sources Import (3) Another example of using imported source code to fill in Information Sources
  • 60. Event Binding Editor – EP Adapter EP Adapter specification, showing the configuration details for WMQ Queue EP adapter, with Queue name and other WMQ parameters. The Advanced Dispatcher Options are shown, but nothing other than the defaults have been selected.
  • 61.
  • 62. Summary and Q&A Including a summarising scenario
  • 63.
  • 64.
  • 65. Thank You ! Any questions? ?