PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Programmer
System Analyst
System Programmer
IT Professional
DATES:
CONTENT AND OBJECTIVES:
New Features and Functions
Using the CICS Service Flow Feature, enable creation of adapters for integrating business applications to provide effective re-use of existing assets.
Learn how to integrate CICS Transaction Server with modern development environments.
Web Services
Allow CICS applications to be exposed as web services.
Understand how a CICS application can participate in a heterogeneous web services environment as a service requester, as a service provider, or both.
HTTP Support
Change the configuration information in the IBM HTTP Server to provide service using the CICS business logic interface.
Learn how to redirect an HTTP request for CICS as an HTTP server to another URL using a URIMAP definition.
OTE Exploitation: OTE - Open Transaction Environment
Become knowledgeable with a new class of TCB: Task Control Blocks; called an open TCB.
Learn how an open TCB can be used by threadsafe applications.
Learn that an open TCB can be assigned to a CICS task for the life of the CICS task and multiple OTE Task Control Blocks can run concurrently in CICS.
Learn that a threadsafe application is defined as a program which uses appropriate serialization techniques, such as compare and swap or enqueue, when accessing any shared resource(s).
Recognize that a threadsafe application must be capable of running concurrently on multiple TCBs, and must not rely on quasi-reentrancy to serialize access to shared resources and storage.
Enhanced Inter-program Data Transfer
Learn that containers are named blocks of data designed for passing information between programs; they are functional COMMAREAs.
Recognize that programs can pass any number of containers between each other.
Learn that containers are grouped together in sets called channels; a channel is analogous to a parameter list.
Establish guidelines for designing a channel.
Enterprise Management
Become familiar with IBM’s implementation of the ARM: Application Response Measurement standard.
Learn how EWLM: Enterprise Workload Manager extends the capabilities of the z/OS Workload Manager to all members of the IBM eServer family.
Understand how EWLM can be used for end-to-end workload monitoring in distributed environments which contain multiple, interacting, server products.
Security Enhancements
Become familiar with WSS-Web Services Security: SOAP Message Security.
Recognize the set of enhancements to SOAP messaging which provide message integrity and confidentiality.
Examine how WSS: SOAP Message Security is extensible and can accommodate a variety of security models and encryption technologies.
Understand how password expiration management has been enhanced to include the ESI: External Security Interface.
Recognize that the ESI is not part of CICS Transaction server for z/OS; however, it allows a non-CICS application to invoke services provided by advanced APPC PEM.
Become aware of the fact that ESI provides additional functions which make it easier for a non-CICS application to change and verify a password.
Installation and Migration Considerations
Plan for moving to a client/server environment.
Become familiar with the installation and migration procedures in a CICS/Db2 environment.
CICS Tools
Become familiar with the new features of CICS Explorer.
Understand and apply the featureset of CICS Performance Analyzer.
Virtual Classroom
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.
CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.
Certain courses only should be taught by the source software company training company and open source purveyor.