Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - CICS Transaction Server: Command Level Programming - Advanced

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


MFCIC03B

CICS Transaction Server: Command Level Programming - Advanced
DURATION: 5 days

FEE: $2,975

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Programmer
  • System Analyst
  • System Designer
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. Handling Exception Conditions
      • Code a program to handle file I/O errors.
      • Recognize the advantages and disadvantages of using the HANDLE commands.
      • Code a program using the HANDLE CONDITION.
      • Code the same program without the HANDLE CONDITION.
    2. File Control
      • Use generic keys in a VSAM KSDS.
      • Code an application that access records using a partial key in the primary key.
      • Code a pseudo conversational program which performs a query on a VSAM KSDS and displays the results.
    3. VSAM Performance and Design
      • Understand how to design, code, and test a modular CICS program.
      • Given a case study, design the modules for a CICS application.
      • The case study will be analyzed in terms of its design techniques, response time issues, and completeness.
    4. Temporary Storage
      • Handle the processing of running out of temporary storage memory.
    5. Debugging
      • Execute programs and debug common errors with Abend-AID and CEDF.
      • Additional tools can also be used.
    6. VSAM Record Level Sharing
      • Access a VSAM dataset using the enhanced API for VSAM RLS.
      • Monitor the locks on the dataset.
    7. Performance Topics
      • Given a poorly written program, determine the best methods for performing a recode into a well written and efficient program.
      • Determine the strings and buffers that should be defined for a heavily access dataset.
    8. CICS Design Considerations
      • Given a case study, determine the CICS techniques and resources used in the design of the program.
      • The following issues will be analyzed: 1- Data passing techniques. 2- Performance. 3- Sharing data between partitions. 4- locking and long running programs.
    9. Dynamic Storage
      • Create a stack with routines to pop and push the stack.

    Virtual Classroom   Blended Learning    

Synchronous
Instruction
Asynchronous
Instruction

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.