SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Migrating to CA Workload Automation 
Consolidation and Conversion Considerations 
Tony Morelli, Vice President Solutions Delivery 
Cetan Corp 
MFX10S #CAWorld
Abstract 
Attendees of this session will learn about the new features, 
improved architecture and enhanced integration capabilities of 
CA Workload Automation (CA WLA) as well as understand the 
business value that can be obtained by migrating to these 
solutions. During this session attendees will gain an 
understanding of the Implementation Methodology and tools 
used by CA and Cetan Corp that can help organizations 
effectively plan, design and deploy their CA Workload 
Automation solution and then migrate existing batch workloads 
to the new environment. 
Tony Morelli 
Cetan Corp 
Vice President 
2 © 2014 CA. ALL RIGHTS RESERVED.
CA Workload Automation Capabilities & Differentiators 
How Do We Get There? 
Conversion Methodology Overview 
Agenda Planning & Design 
3 © 2014 CA. ALL RIGHTS RESERVED. 
Why Convert? 
Business Needs & Technical Drivers 
The Solution 
Install & Configure 
Conversion Tools & Processes 
Deploy & Support 
Enablement and Workload Activation
Cetan Corp Overview 
 Quick Facts 
– Founded 2007 
– Veteran Owned Small 
Business 
– Native American Owned 
Minority Business Enterprise 
– GSA Schedule Holder; 
#GS-35F-163BA 
– Ranked 119 Overall in 2011 - 
Inc. 500 List of Fastest 
Growing Companies 
4 © 2014 CA. ALL RIGHTS RESERVED.
Cetan Corp Overview 
 Quick Facts 
– Founded 2007 
– Veteran Owned Small Business 
– Native American Owned 
Minority Business Enterprise 
– GSA Schedule Holder; #GS-35F-163BA 
– Ranked 119 Overall in 2011 - Inc. 500 List 
of Fastest Growing Companies 
 Partnerships 
5 © 2014 CA. ALL RIGHTS RESERVED. 
– CA Technologies 
– BMC Software 
– Microsoft 
– Salesforce.com
Why Convert? 
Business Needs and Technical Drivers
Why Talk About Workload Automation? 
It’s important 
“over 70% of business processes are performed in batch rather than real time.” 
Stated by Industry Analyst in various research papers 
It’s detailed, labor intensive and the challenges are growing 
“…with the consumerization of IT, reliance on packaged applications, emergence of 
cloud, big data and mobile technologies the need to effectively manage and expand the 
integration between batch workloads and the rest of the enterprise is greater now than 
ever before.” 
Tony Morelli – This presentation 
7 © 2014 CA. ALL RIGHTS RESERVED.
Workload Automation Challenges 
Mainframe UNIX Windows Linux ERP DB Web MQ FTP Evolutionary Trends 
Silos of automation and scalability challenges 
Reliance on outdated, home-grown, OS level / basic scheduling tools 
Integration challenges between batch elements, real time workloads, FTP’s, Web, Databases, ERP’s, 
etc… 
Inability to manage to an enterprise-wide batch service level or enable critical path monitoring 
High OPEX & CAPEX due to different skill sets required for each platform/application and cost of various 
tools 
Increased exception rate (failures, missed SLA’s) and elongated recovery times 
Poor security controls and reporting 
8 © 2014 CA. ALL RIGHTS RESERVED.
Workload Automation Challenges 
Mainframe UNIX Windows Linux ERP DB Web MQ FTP Evolutionary Trends 
The Impact: 
 IT constrains the business versus serving as an enabler to growth and 
other objectives 
 Proliferation of ‘Stealth IT’, home-grown solutions and exponential growth 
in costs 
9 © 2014 CA. ALL RIGHTS RESERVED.
The Solution - CA Workload Automation 
Z/OS 
ERP 
Databases Real Time 
Applications 
Web Services 
Messaging 
Java 
UNIX 
10 © 2014 CA. ALL RIGHTS RESERVED. 
Cloud 
Enablement 
Windows 
Other OS File Transfers 
Types 
Applications 
Business 
Intelligence 
Mobile
The Solution - CA Workload Automation 
Over Three Decades of Experience & Evolution 
 Broad workload element support and enterprise coverage 
 Scalable and resilient architecture 
 Intelligent resource management and optimized workload 
throughput 
 Role-based administration and reporting 
 Single definition for entire business workload 
 Seamless application integration 
 SLA-based management and reporting 
 Robust support for SAP, Peoplesoft and Oracle applications 
 Critical path analysis and forecasting 
 Cloud computing support 
 Self-service for workload management 
 Mobile access 
 Streamlined end user experience 
11 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There? 
Conversion Methodology Overview
Proven Methodology 
13 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There - Conversion Methodology 
Plan and Design 
• Project Planning and Readiness Review 
• Project Team Education 
• Establish Stakeholder Communication Plan 
• Identify Business Requirements 
• Create Solution Design 
• Develop Training Plan 
Install and Configure 
• Deploy & WLA Components 
• Build Housekeeping Processes & Reports 
• Process Migration 
– Conduct Gap Analysis of conversion tools 
– Refine conversion tool(s) 
– Reengineer customized processes 
– Execute Conversion Process (see exploded view) 
• Training and Enablement 
Deploy and Support 
• Parallel Testing 
• Activation Support 
– Phased approach versus ‘Big Bang’ 
• Post Activation Support and Review 
14 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There - Conversion Methodology 
Plan and Design 
• Project Planning and Readiness Review 
• Project Team Education 
• Establish Stakeholder Communication Plan 
• Identify Business Requirements 
• Create Solution Design 
• Develop Training Plan 
Install and Configure 
• Deploy & WLA Components 
• Build Housekeeping Processes & Reports 
• Process Migration 
– Conduct Gap Analysis of conversion tools 
– Refine conversion tool(s) 
– Reengineer customized processes 
– Execute Conversion Process (see exploded view) 
• Training and Enablement 
Deploy and Support 
• Parallel Testing 
• Activation Support 
– Phased approach versus ‘Big Bang’ 
• Post Activation Support and Review 
 Mitigating Risk 
 Aligning the solution to the business 
 Calibrating the plan with the organization’s need for 
change along with its tolerance to do so 
 Accelerating the ROI of the solution 
15 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There – Define Business Requirements 
The legacy scheduling tool is typically addressed via 
automation and represents the least amount of risk in the 
overall transition to a new solution 
• External Dependencies 
• Third Party Automation Hooks 
• Locally Developed Application Integration 
• Monitoring / Notification / Resolution 
• Change Management Workflow 
• Manual ‘Input’ to Daily Workload 
Scheduling 
Tools 
• Proficiency in current tools 
• Knowledge of workload and relationship to daily 
milestones 
Automation 
Manual Processes 
Collective ‘tribal’ 
Knowledge 
R 
I 
S 
K 
16 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There - Conversion Methodology 
Plan and Design 
• Project Planning and Readiness Review 
• Project Team Education 
• Establish Stakeholder Communication Plan 
• Identify Business Requirements 
• Create Solution Design 
• Develop Training Plan 
Install and Configure 
• Deploy & WLA Components 
• Build Housekeeping Processes & Reports 
• Process Migration 
– Conduct Gap Analysis of conversion tools 
– Refine conversion tool(s) 
– Reengineer customized processes 
– Execute Conversion Process (see exploded view) 
• Training and Enablement 
Deploy and Support 
• Parallel Testing 
• Activation Support 
– Phased approach versus ‘Big Bang’ 
• Post Activation Support and Review 
17 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There – Conversion Process 
– Workload Change Freeze or Tracking 
– Data Extraction 
– Execute Conversion 
• Pre Hand-Off Validation & Adjustment 
• Load Results to run in ‘offline’ mode 
• Remediate Conversion Exceptions 
– Validation / Adjustment / Testing 
– Parallel Testing 
• Forecasting and Report Review 
• Parallel Test Analysis 
• Stakeholder Sign-Off 
– Activation 
– Post Activation Support 
Process 
should be 
executed on 
a system 
and 
application 
basis 
18 © 2014 CA. ALL RIGHTS RESERVED. 
Following the execution 
of a targeted Pilot 
conversion these tasks 
can be executed in a 
concurrent fashion for 
multiple workload 
groupings 
The decision to activate 
the converted 
workloads is the 
responsibility of the 
customer stakeholders
How Do We Get There – Conversion Tools & Processes 
19 © 2014 CA. ALL RIGHTS RESERVED. 
• CA 7 
• CA ADC2 
• CA AutoSys® (AE) 
• CA dSeries (DE) 
• CA ESP 
• CA JobTrac 
• CA Manager 
• CA Scheduler® JM 
• CA Unicenter WLM (JMO) 
• ASG BETA42 
• ASG ZEKE 
• ASG ZENA 
• BMC Control-M 
• CRON 
• IBM-TWS for DS 
• IBM-TWS for z/OS 
• Mantissa JobMaster 
• OCS Express 
• Orsyp $Universe 
• Redwood Cronacle 
• Robot Scheduler 
• Stonebranch 
• Tandem Scheduler 
• Tidal Enterprise Scheduler 
• UC4:Applications Manager (AppWorx) 
• UC4:Operations Manager (UC4:Global) 
• Windows-Task Scheduler 
BOLD names indicate that an automated conversion process exists for CA PS and Partner engagements
How Do We Get There – Enablement 
Train the Right People at the Right Time 
The role based enablement of key staff members 
and stakeholders is essential to the success of the 
conversion project 
20 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There - Conversion Methodology 
Plan and Design 
• Project Planning and Readiness Review 
• Project Team Education 
• Establish Stakeholder Communication Plan 
• Identify Business Requirements 
• Create Solution Design 
• Develop Training Plan 
Install and Configure 
• Deploy & WLA Components 
• Build Housekeeping Processes & Reports 
• Process Migration 
– Conduct Gap Analysis of conversion tools 
– Refine conversion tool(s) 
– Reengineer customized processes 
– Execute Conversion Process (see exploded view) 
• Training and Enablement 
Deploy and Support 
• Parallel Testing 
• Activation Support 
– Phased approach versus ‘Big Bang’ 
• Post Activation Support and Review 
21 © 2014 CA. ALL RIGHTS RESERVED.
How Do We Get There – Deploy & Support 
Workload Activation 
• Final Readiness Review 
– Stakeholder Sign-Off Obtained 
– Change Management Processes Executed 
– Communication to the business 
– Ancillary Elements Staged 
– Operations and Application Support Teams in Place 
– CA Support Notified 
– CA WLA Infrastructure Reviewed 
– Optimal Cut-Over Time Identified 
– ‘Bridges’ Between Solutions In Place 
• Activation 
– Produce Forecast Report for Targeted Workloads 
– Suspend Targeted Workload in Current Tool 
– Suspend Job Submission for Targeted Workload in CA WLA 
– Load Staged Workload in CA WLA 
– Load / Activate Ancillary Elements 
– Review Contents & Manually Reconcile Dependencies with Current Tool 
– Activate Small Segment of Loaded Jobs (resource based submission control) 
– Review Results & Adjust As Needed 
– Throttle Workload Up 
– Communicate Status to the Business 
• Post Activation 
– Maintain ‘Heightened’ Level of Monitoring for Activated Workloads (two – three days) 
– Review Missing Dependencies and Jobs Not Run Reports 
– Adjust Exceptions 
– Recalibrate Plan for Remaining Groups to be Converted as Needed 
– Transition to Business as Usual for Converted Workloads 
22 © 2014 CA. ALL RIGHTS RESERVED.
Please Provide Feedback 
 Session MFX10S: Migrating to CA Workload Automation 
 Access inside the CA World Mobile App 
– Click on Session Evaluation 
 If you have added this session to My Agenda, it will be listed 
OR 
– Click on My Agenda 
 Click on this session. Click Session Evaluation 
23 © 2014 CA. ALL RIGHTS RESERVED.
Thank You! 
For More Information Contact Us: 
Corporate Headquarters 
1001 Scenic Parkway 
Suite 203 
Chesapeake, VA 23323 
Federal Office 
11921 Freedom Drive 
Suite 550 
Reston, VA 20190 
Telephone: 877.423.8260 
Web Site: www.cetancorp.com 
Email: info@cetancorp.com 
Follow us on Twitter, LinkedIn and Facebook 
24 © 2014 CA. ALL RIGHTS RESERVED.
For More Information 
Insert appropriate screenshot and text overlay 
from following “More Info Graphics” slide here; 
Mainframe 
ensure it links to correct page 
To learn more about Mainframe, please visit: 
http://bit.ly/1wbiPkl 
25 © 2014 CA. ALL RIGHTS RESERVED.
For Informational Purposes Only 
© 2014 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content 
provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. 
Terms of this Presentation 
26 © 2014 CA. ALL RIGHTS RESERVED.

Weitere ähnliche Inhalte

Was ist angesagt?

Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and PropertiesSaadi Rahman
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloudsolarisyourep
 
Resource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingResource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingMasoumeh_tajvidi
 
DRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareDRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareTanawit Chansuchai
 
IBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine WorkloadsIBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine WorkloadsUlf Troppens
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 
Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)
Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)
Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)Drew Fustini
 
Presentation oracle super cluster t5-8 technical deep dive
Presentation   oracle super cluster t5-8 technical deep divePresentation   oracle super cluster t5-8 technical deep dive
Presentation oracle super cluster t5-8 technical deep divesolarisyougood
 
Best Practices for the Most Impactful Oracle Database 18c and 19c Features
Best Practices for the Most Impactful Oracle Database 18c and 19c FeaturesBest Practices for the Most Impactful Oracle Database 18c and 19c Features
Best Practices for the Most Impactful Oracle Database 18c and 19c FeaturesMarkus Michalewicz
 
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System mentoresd
 
MAA Best Practices for Oracle Database 19c
MAA Best Practices for Oracle Database 19cMAA Best Practices for Oracle Database 19c
MAA Best Practices for Oracle Database 19cMarkus Michalewicz
 
Understand oracle real application cluster
Understand oracle real application clusterUnderstand oracle real application cluster
Understand oracle real application clusterSatishbabu Gunukula
 
IBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparisonIBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparisonejlp12
 
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres OpenBruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres OpenPostgresOpen
 
MySQL Community and Commercial Edition
MySQL Community and Commercial EditionMySQL Community and Commercial Edition
MySQL Community and Commercial EditionMario Beck
 

Was ist angesagt? (20)

Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and Properties
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Resource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingResource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computing
 
DRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareDRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam Software
 
IBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine WorkloadsIBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine Workloads
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
seL4 intro
seL4 introseL4 intro
seL4 intro
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
Cs8493 unit 3
Cs8493 unit 3Cs8493 unit 3
Cs8493 unit 3
 
Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)
Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)
Linux on RISC-V with Open Source Hardware (Open Source Summit Japan 2020)
 
Linux Kernel I/O Schedulers
Linux Kernel I/O SchedulersLinux Kernel I/O Schedulers
Linux Kernel I/O Schedulers
 
Presentation oracle super cluster t5-8 technical deep dive
Presentation   oracle super cluster t5-8 technical deep divePresentation   oracle super cluster t5-8 technical deep dive
Presentation oracle super cluster t5-8 technical deep dive
 
Best Practices for the Most Impactful Oracle Database 18c and 19c Features
Best Practices for the Most Impactful Oracle Database 18c and 19c FeaturesBest Practices for the Most Impactful Oracle Database 18c and 19c Features
Best Practices for the Most Impactful Oracle Database 18c and 19c Features
 
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System
 
MAA Best Practices for Oracle Database 19c
MAA Best Practices for Oracle Database 19cMAA Best Practices for Oracle Database 19c
MAA Best Practices for Oracle Database 19c
 
Understand oracle real application cluster
Understand oracle real application clusterUnderstand oracle real application cluster
Understand oracle real application cluster
 
IBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparisonIBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparison
 
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres OpenBruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
 
MySQL Community and Commercial Edition
MySQL Community and Commercial EditionMySQL Community and Commercial Edition
MySQL Community and Commercial Edition
 
Oracle Database 12c : Multitenant
Oracle Database 12c : MultitenantOracle Database 12c : Multitenant
Oracle Database 12c : Multitenant
 

Ähnlich wie Migrating to CA Workload Automation - Consolidation and Conversion Considerations

Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...CA Technologies
 
An Agile Approach to Accelerate Mass Migration
An Agile Approach to Accelerate Mass MigrationAn Agile Approach to Accelerate Mass Migration
An Agile Approach to Accelerate Mass MigrationAmazon Web Services
 
The 3 Pillars of Remote Application Development
The 3 Pillars of Remote Application DevelopmentThe 3 Pillars of Remote Application Development
The 3 Pillars of Remote Application DevelopmentJenna Starmer
 
Rapidly Deploy Budgeting and Forecasting with Oracle and Perficient
Rapidly Deploy Budgeting and Forecasting with Oracle and PerficientRapidly Deploy Budgeting and Forecasting with Oracle and Perficient
Rapidly Deploy Budgeting and Forecasting with Oracle and PerficientPerficient, Inc.
 
The People Model and Cloud Transformation | AWS Public Sector Summit 2016
The People Model and Cloud Transformation | AWS Public Sector Summit 2016The People Model and Cloud Transformation | AWS Public Sector Summit 2016
The People Model and Cloud Transformation | AWS Public Sector Summit 2016Amazon Web Services
 
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...ssuser835d1a
 
Designing Enterprise Applications for Speed and Agility
Designing Enterprise Applications for Speed and AgilityDesigning Enterprise Applications for Speed and Agility
Designing Enterprise Applications for Speed and AgilityKenandy
 
Clover Infotech Corporate PPT
Clover Infotech Corporate PPTClover Infotech Corporate PPT
Clover Infotech Corporate PPTSwetha Elias
 
CollabNet Houston Workshop Live Enterpise agility_11.12.14
CollabNet Houston Workshop Live Enterpise agility_11.12.14CollabNet Houston Workshop Live Enterpise agility_11.12.14
CollabNet Houston Workshop Live Enterpise agility_11.12.14dennisn129CBN
 
AWS Large Scale Migrations - Jan 2016
AWS Large Scale Migrations - Jan 2016AWS Large Scale Migrations - Jan 2016
AWS Large Scale Migrations - Jan 2016Amazon Web Services
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCCA Technologies
 
CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...
CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...
CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...TheConnectedCause
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Jeff Jakubiak
 
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio MigrationWhere to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio MigrationAmazon Web Services
 
Australian Cloud and Data Centre Strategy Summit 2016 gus sabatino
Australian Cloud and Data Centre Strategy Summit 2016   gus sabatinoAustralian Cloud and Data Centre Strategy Summit 2016   gus sabatino
Australian Cloud and Data Centre Strategy Summit 2016 gus sabatinoGus Sabatino
 
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...Amazon Web Services
 
Carden carrieresume2016
Carden carrieresume2016Carden carrieresume2016
Carden carrieresume2016Carrie Carden
 

Ähnlich wie Migrating to CA Workload Automation - Consolidation and Conversion Considerations (20)

Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
 
An Agile Approach to Accelerate Mass Migration
An Agile Approach to Accelerate Mass MigrationAn Agile Approach to Accelerate Mass Migration
An Agile Approach to Accelerate Mass Migration
 
The 3 Pillars of Remote Application Development
The 3 Pillars of Remote Application DevelopmentThe 3 Pillars of Remote Application Development
The 3 Pillars of Remote Application Development
 
Rapidly Deploy Budgeting and Forecasting with Oracle and Perficient
Rapidly Deploy Budgeting and Forecasting with Oracle and PerficientRapidly Deploy Budgeting and Forecasting with Oracle and Perficient
Rapidly Deploy Budgeting and Forecasting with Oracle and Perficient
 
The People Model and Cloud Transformation | AWS Public Sector Summit 2016
The People Model and Cloud Transformation | AWS Public Sector Summit 2016The People Model and Cloud Transformation | AWS Public Sector Summit 2016
The People Model and Cloud Transformation | AWS Public Sector Summit 2016
 
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
 
Ensuring Success in the Cloud (1)
Ensuring Success in the Cloud (1)Ensuring Success in the Cloud (1)
Ensuring Success in the Cloud (1)
 
Migration Planning
Migration PlanningMigration Planning
Migration Planning
 
Designing Enterprise Applications for Speed and Agility
Designing Enterprise Applications for Speed and AgilityDesigning Enterprise Applications for Speed and Agility
Designing Enterprise Applications for Speed and Agility
 
Clover Infotech Corporate PPT
Clover Infotech Corporate PPTClover Infotech Corporate PPT
Clover Infotech Corporate PPT
 
0916 resume
0916  resume0916  resume
0916 resume
 
CollabNet Houston Workshop Live Enterpise agility_11.12.14
CollabNet Houston Workshop Live Enterpise agility_11.12.14CollabNet Houston Workshop Live Enterpise agility_11.12.14
CollabNet Houston Workshop Live Enterpise agility_11.12.14
 
AWS Large Scale Migrations - Jan 2016
AWS Large Scale Migrations - Jan 2016AWS Large Scale Migrations - Jan 2016
AWS Large Scale Migrations - Jan 2016
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 
CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...
CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...
CRMready Webinar Series - Part 3 - How to Make Your Nonprofit’s CRM Implement...
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?
 
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio MigrationWhere to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio Migration
 
Australian Cloud and Data Centre Strategy Summit 2016 gus sabatino
Australian Cloud and Data Centre Strategy Summit 2016   gus sabatinoAustralian Cloud and Data Centre Strategy Summit 2016   gus sabatino
Australian Cloud and Data Centre Strategy Summit 2016 gus sabatino
 
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
 
Carden carrieresume2016
Carden carrieresume2016Carden carrieresume2016
Carden carrieresume2016
 

Mehr von CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Migrating to CA Workload Automation - Consolidation and Conversion Considerations

  • 1. Migrating to CA Workload Automation Consolidation and Conversion Considerations Tony Morelli, Vice President Solutions Delivery Cetan Corp MFX10S #CAWorld
  • 2. Abstract Attendees of this session will learn about the new features, improved architecture and enhanced integration capabilities of CA Workload Automation (CA WLA) as well as understand the business value that can be obtained by migrating to these solutions. During this session attendees will gain an understanding of the Implementation Methodology and tools used by CA and Cetan Corp that can help organizations effectively plan, design and deploy their CA Workload Automation solution and then migrate existing batch workloads to the new environment. Tony Morelli Cetan Corp Vice President 2 © 2014 CA. ALL RIGHTS RESERVED.
  • 3. CA Workload Automation Capabilities & Differentiators How Do We Get There? Conversion Methodology Overview Agenda Planning & Design 3 © 2014 CA. ALL RIGHTS RESERVED. Why Convert? Business Needs & Technical Drivers The Solution Install & Configure Conversion Tools & Processes Deploy & Support Enablement and Workload Activation
  • 4. Cetan Corp Overview  Quick Facts – Founded 2007 – Veteran Owned Small Business – Native American Owned Minority Business Enterprise – GSA Schedule Holder; #GS-35F-163BA – Ranked 119 Overall in 2011 - Inc. 500 List of Fastest Growing Companies 4 © 2014 CA. ALL RIGHTS RESERVED.
  • 5. Cetan Corp Overview  Quick Facts – Founded 2007 – Veteran Owned Small Business – Native American Owned Minority Business Enterprise – GSA Schedule Holder; #GS-35F-163BA – Ranked 119 Overall in 2011 - Inc. 500 List of Fastest Growing Companies  Partnerships 5 © 2014 CA. ALL RIGHTS RESERVED. – CA Technologies – BMC Software – Microsoft – Salesforce.com
  • 6. Why Convert? Business Needs and Technical Drivers
  • 7. Why Talk About Workload Automation? It’s important “over 70% of business processes are performed in batch rather than real time.” Stated by Industry Analyst in various research papers It’s detailed, labor intensive and the challenges are growing “…with the consumerization of IT, reliance on packaged applications, emergence of cloud, big data and mobile technologies the need to effectively manage and expand the integration between batch workloads and the rest of the enterprise is greater now than ever before.” Tony Morelli – This presentation 7 © 2014 CA. ALL RIGHTS RESERVED.
  • 8. Workload Automation Challenges Mainframe UNIX Windows Linux ERP DB Web MQ FTP Evolutionary Trends Silos of automation and scalability challenges Reliance on outdated, home-grown, OS level / basic scheduling tools Integration challenges between batch elements, real time workloads, FTP’s, Web, Databases, ERP’s, etc… Inability to manage to an enterprise-wide batch service level or enable critical path monitoring High OPEX & CAPEX due to different skill sets required for each platform/application and cost of various tools Increased exception rate (failures, missed SLA’s) and elongated recovery times Poor security controls and reporting 8 © 2014 CA. ALL RIGHTS RESERVED.
  • 9. Workload Automation Challenges Mainframe UNIX Windows Linux ERP DB Web MQ FTP Evolutionary Trends The Impact:  IT constrains the business versus serving as an enabler to growth and other objectives  Proliferation of ‘Stealth IT’, home-grown solutions and exponential growth in costs 9 © 2014 CA. ALL RIGHTS RESERVED.
  • 10. The Solution - CA Workload Automation Z/OS ERP Databases Real Time Applications Web Services Messaging Java UNIX 10 © 2014 CA. ALL RIGHTS RESERVED. Cloud Enablement Windows Other OS File Transfers Types Applications Business Intelligence Mobile
  • 11. The Solution - CA Workload Automation Over Three Decades of Experience & Evolution  Broad workload element support and enterprise coverage  Scalable and resilient architecture  Intelligent resource management and optimized workload throughput  Role-based administration and reporting  Single definition for entire business workload  Seamless application integration  SLA-based management and reporting  Robust support for SAP, Peoplesoft and Oracle applications  Critical path analysis and forecasting  Cloud computing support  Self-service for workload management  Mobile access  Streamlined end user experience 11 © 2014 CA. ALL RIGHTS RESERVED.
  • 12. How Do We Get There? Conversion Methodology Overview
  • 13. Proven Methodology 13 © 2014 CA. ALL RIGHTS RESERVED.
  • 14. How Do We Get There - Conversion Methodology Plan and Design • Project Planning and Readiness Review • Project Team Education • Establish Stakeholder Communication Plan • Identify Business Requirements • Create Solution Design • Develop Training Plan Install and Configure • Deploy & WLA Components • Build Housekeeping Processes & Reports • Process Migration – Conduct Gap Analysis of conversion tools – Refine conversion tool(s) – Reengineer customized processes – Execute Conversion Process (see exploded view) • Training and Enablement Deploy and Support • Parallel Testing • Activation Support – Phased approach versus ‘Big Bang’ • Post Activation Support and Review 14 © 2014 CA. ALL RIGHTS RESERVED.
  • 15. How Do We Get There - Conversion Methodology Plan and Design • Project Planning and Readiness Review • Project Team Education • Establish Stakeholder Communication Plan • Identify Business Requirements • Create Solution Design • Develop Training Plan Install and Configure • Deploy & WLA Components • Build Housekeeping Processes & Reports • Process Migration – Conduct Gap Analysis of conversion tools – Refine conversion tool(s) – Reengineer customized processes – Execute Conversion Process (see exploded view) • Training and Enablement Deploy and Support • Parallel Testing • Activation Support – Phased approach versus ‘Big Bang’ • Post Activation Support and Review  Mitigating Risk  Aligning the solution to the business  Calibrating the plan with the organization’s need for change along with its tolerance to do so  Accelerating the ROI of the solution 15 © 2014 CA. ALL RIGHTS RESERVED.
  • 16. How Do We Get There – Define Business Requirements The legacy scheduling tool is typically addressed via automation and represents the least amount of risk in the overall transition to a new solution • External Dependencies • Third Party Automation Hooks • Locally Developed Application Integration • Monitoring / Notification / Resolution • Change Management Workflow • Manual ‘Input’ to Daily Workload Scheduling Tools • Proficiency in current tools • Knowledge of workload and relationship to daily milestones Automation Manual Processes Collective ‘tribal’ Knowledge R I S K 16 © 2014 CA. ALL RIGHTS RESERVED.
  • 17. How Do We Get There - Conversion Methodology Plan and Design • Project Planning and Readiness Review • Project Team Education • Establish Stakeholder Communication Plan • Identify Business Requirements • Create Solution Design • Develop Training Plan Install and Configure • Deploy & WLA Components • Build Housekeeping Processes & Reports • Process Migration – Conduct Gap Analysis of conversion tools – Refine conversion tool(s) – Reengineer customized processes – Execute Conversion Process (see exploded view) • Training and Enablement Deploy and Support • Parallel Testing • Activation Support – Phased approach versus ‘Big Bang’ • Post Activation Support and Review 17 © 2014 CA. ALL RIGHTS RESERVED.
  • 18. How Do We Get There – Conversion Process – Workload Change Freeze or Tracking – Data Extraction – Execute Conversion • Pre Hand-Off Validation & Adjustment • Load Results to run in ‘offline’ mode • Remediate Conversion Exceptions – Validation / Adjustment / Testing – Parallel Testing • Forecasting and Report Review • Parallel Test Analysis • Stakeholder Sign-Off – Activation – Post Activation Support Process should be executed on a system and application basis 18 © 2014 CA. ALL RIGHTS RESERVED. Following the execution of a targeted Pilot conversion these tasks can be executed in a concurrent fashion for multiple workload groupings The decision to activate the converted workloads is the responsibility of the customer stakeholders
  • 19. How Do We Get There – Conversion Tools & Processes 19 © 2014 CA. ALL RIGHTS RESERVED. • CA 7 • CA ADC2 • CA AutoSys® (AE) • CA dSeries (DE) • CA ESP • CA JobTrac • CA Manager • CA Scheduler® JM • CA Unicenter WLM (JMO) • ASG BETA42 • ASG ZEKE • ASG ZENA • BMC Control-M • CRON • IBM-TWS for DS • IBM-TWS for z/OS • Mantissa JobMaster • OCS Express • Orsyp $Universe • Redwood Cronacle • Robot Scheduler • Stonebranch • Tandem Scheduler • Tidal Enterprise Scheduler • UC4:Applications Manager (AppWorx) • UC4:Operations Manager (UC4:Global) • Windows-Task Scheduler BOLD names indicate that an automated conversion process exists for CA PS and Partner engagements
  • 20. How Do We Get There – Enablement Train the Right People at the Right Time The role based enablement of key staff members and stakeholders is essential to the success of the conversion project 20 © 2014 CA. ALL RIGHTS RESERVED.
  • 21. How Do We Get There - Conversion Methodology Plan and Design • Project Planning and Readiness Review • Project Team Education • Establish Stakeholder Communication Plan • Identify Business Requirements • Create Solution Design • Develop Training Plan Install and Configure • Deploy & WLA Components • Build Housekeeping Processes & Reports • Process Migration – Conduct Gap Analysis of conversion tools – Refine conversion tool(s) – Reengineer customized processes – Execute Conversion Process (see exploded view) • Training and Enablement Deploy and Support • Parallel Testing • Activation Support – Phased approach versus ‘Big Bang’ • Post Activation Support and Review 21 © 2014 CA. ALL RIGHTS RESERVED.
  • 22. How Do We Get There – Deploy & Support Workload Activation • Final Readiness Review – Stakeholder Sign-Off Obtained – Change Management Processes Executed – Communication to the business – Ancillary Elements Staged – Operations and Application Support Teams in Place – CA Support Notified – CA WLA Infrastructure Reviewed – Optimal Cut-Over Time Identified – ‘Bridges’ Between Solutions In Place • Activation – Produce Forecast Report for Targeted Workloads – Suspend Targeted Workload in Current Tool – Suspend Job Submission for Targeted Workload in CA WLA – Load Staged Workload in CA WLA – Load / Activate Ancillary Elements – Review Contents & Manually Reconcile Dependencies with Current Tool – Activate Small Segment of Loaded Jobs (resource based submission control) – Review Results & Adjust As Needed – Throttle Workload Up – Communicate Status to the Business • Post Activation – Maintain ‘Heightened’ Level of Monitoring for Activated Workloads (two – three days) – Review Missing Dependencies and Jobs Not Run Reports – Adjust Exceptions – Recalibrate Plan for Remaining Groups to be Converted as Needed – Transition to Business as Usual for Converted Workloads 22 © 2014 CA. ALL RIGHTS RESERVED.
  • 23. Please Provide Feedback  Session MFX10S: Migrating to CA Workload Automation  Access inside the CA World Mobile App – Click on Session Evaluation  If you have added this session to My Agenda, it will be listed OR – Click on My Agenda  Click on this session. Click Session Evaluation 23 © 2014 CA. ALL RIGHTS RESERVED.
  • 24. Thank You! For More Information Contact Us: Corporate Headquarters 1001 Scenic Parkway Suite 203 Chesapeake, VA 23323 Federal Office 11921 Freedom Drive Suite 550 Reston, VA 20190 Telephone: 877.423.8260 Web Site: www.cetancorp.com Email: info@cetancorp.com Follow us on Twitter, LinkedIn and Facebook 24 © 2014 CA. ALL RIGHTS RESERVED.
  • 25. For More Information Insert appropriate screenshot and text overlay from following “More Info Graphics” slide here; Mainframe ensure it links to correct page To learn more about Mainframe, please visit: http://bit.ly/1wbiPkl 25 © 2014 CA. ALL RIGHTS RESERVED.
  • 26. For Informational Purposes Only © 2014 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. Terms of this Presentation 26 © 2014 CA. ALL RIGHTS RESERVED.