SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Downloaden Sie, um offline zu lesen
World®
’16
The	Process	of	Setting	Thresholds	in	
CA	SYSVIEW	Performance	Management	
Tom	Quinn,	Sr Engineering	Services	Architect
CA	Mainframe	Solution	Center
MFX02E
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
The	“best	practice”	for	setting	mainframe	monitoring	thresholds	is	a	
process,	not	a	set	of	variables	and	numbers.	Only	you	can	decide	what	
the	most	important	variables	are	and	what	thresholds	should	be	set	for	
your	shop.	
Join	this	informative	session	to	learn	how	you	can	set	meaningful	
threshold	values	in	CA	SYSVIEW®	Performance	Management	that	are	
specific	to	your	environment	and	business	goals	for	proactive	
performance	monitoring.
Tom	Quinn
CA	Technologies
Sr Engineering	Services	
Architect,	Mainframe	
Solution	Center
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
PROCESS	OVERVIEW
HOW	CA	SYSVIEW THRESHOLDS	AND	STATES	WORK	
STEPS	IN	THE	PROCESS
INTEGRATING	WITH	MAINFRAME	TEAM	CENTER:	OPERATIONAL	INTELLIGENCE
1
2
3
4
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Setting	Thresholds	in	CA	SYSVIEW®	
Performance	Management
Process	Overview
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate
Measure
Analyze
Update
Validate
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ Setting	thresholds	is	an	on-going,	cyclical	process	that	should	
be	part	of	your	monitoring	strategy.
§ The	information	you	need	is	available	on	your	system	through	
CA	SYSVIEW	historical	data	logstreams.
§ Business	requirements	play	an	important	role	in	this	process	
as	well.
Best	Practice
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ You	must	first	understand	what	is	“normal”	and	the	variability	
of	your	workload.
§ What	is	“normal”?
– Time	of	Day
– Time	of	Month
– Day	of	the	Week
– Workload	type
Best	Practice
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Why	do	we	go	through	this	process?
§ Performance	Management	is	the	process	of	monitoring	and	
managing	end-user	experience	and	key	performance	
indicators	(KPIs).
– Availability
– Response	Time
– Throughput
– Utilization
Performance	Management
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
How	CA	SYSVIEW	States	and	Thresholds	
Work
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ CA	SYSVIEW	provides	the	ability	to	monitor	and	alert	upon	
both	thresholds	and	states.
– Thresholds	definitions	assign	numeric	warning	and	problem	limit	
values	to	a	metric	or	resource.		Thresholds	are	always	numeric.
– State	definitions	assign	a	status	to	a	specific	condition	of	a	metric	or	
resource.		States	always	have	character	values:	ACTIVE,	INACTIVE,	
ONLINE,	OFFLINE.
§ All	available	variables	in	CA	SYSVIEW	are	listed	in	the	VARS	
command	display.
How	CA	SYSVIEW	Threshold	and	State	Definitions	Work
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ Threshold	rule	types	define	the	algorithm	that	is	used	to	
determine	when	a	collected	metric	has	exceeded	the	
allowable	resource	usage.
§ Multiple	rule	types	or	checks	can	be	defined	for	a	single	
metric:
– UPPER	- if	the	metric	value	exceeds	the	warning	or	problem	limit	values
– LOWER	- If	the	metric	value	falls	below	the	warning	or	problem	limit	values
– CHANGE	- defines	the	amount	that	a	metric	can	change,	up	or	down,	in	terms	
of	standard	deviations	from	the	historical	average.
How	CA	SYSVIEW	Threshold	and	State	Definitions	Work
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ STATEs	do	not	have	multiple	rule	types.		
– STATE	exception	processing	assigns	a	status	to	the	current	state	of	a	
metric	or	resource.
§ Exception	processing,	or	threshold	processing,	is	part	of	the	
CA	SYSVIEW	data	collection	process	and	controlled	by	the	
Event	Scheduler.
How	CA	SYSVIEW	Threshold	and	State	Definitions	Work
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate
Measure
Analyze
Update
Validate
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate	is	the	process	of	reviewing	your	monitoring	strategy.
– Are	you	defining	monitoring	at	the	system	or	application	level?
– Do	you	have	business	requirements	for	monitoring	the	system	and	the	
application?
– Do	you	have	different	tiers	of	monitoring	in	place?
§ Monitoring	tiers	allow	for	the	definition	of	monitoring	levels	based	on	the	
importance	of	the	system	or	application.		
§ More	important,	or	higher	tiered	apps,	may	receive	more	monitoring	than	a	
less	important,	lower	tiered	app.
Evaluate
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Determining	ImportanceMonitoring	Tiers
– Disaster	recovery	plan
– Business	requirements
§ Each	time	you	are	in	the	evaluation	phase	of	this	process	you	
will	review	all	systems,	applications	or	business	requirements	
to	look	for	new	or	changed	requirements.
Evaluate
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate
Measure
Analyze
Update
Validate
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Measure	is	the	process	of	monitoring	your	systems	and	
gathering	the	data	required	to	analyze	both	your	system	data	
and	the	effectiveness	of	your	thresholds.
§ By	having	CA	SYSVIEW	installed,	configured	and	continually	
running	and	collecting	data	you	have	the	ability	to	measure	
your	system’s	performance	and	the	effectiveness	of	your	
thresholds.	
Measure
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ In	CA	SYSVIEW,	it	is	recommended	to	collect	exception	data	by	
utilizing	the	Exception	Log	capabilities	(XLOG),	and	historical	
data	through	the	various	CA	SYSVIEW	logstreams and	CA	
SYSVIEW	SMF	255	records.
§ Besides	the	XLOG,	the	other	logstreams include	IMS	region	
and	summary	records;	MQ	history	records;	CICS	detail,	
summary	and	system	records;	and	historical	PLOT	records.
Measure
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ Audit	log	and	CICS	Exec	Interface	Trace	are	available	log	data	types	that	
are	not	necessarily	used	in	this	process.
§ It	is	recommended	you	gather	the	historical	record	types	that	you	are	able	
to	in	order	to	best	provide	you	with	the	necessary	data	to	make	
meaningful	decisions	regarding	threshold	levels.		This	data	will	be	
reviewed	both	on-line	and	through	batch	reporting.
§ https://docops.ca.com/display/CSPM10/Usage+of+SMF+Records
Measure
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate
Measure
Analyze
Update
Validate
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Analyze is	the	process	of	reviewing	your	measured	data	to	determine	what	
metrics	need	thresholds,	what	those	thresholds	should	be,	and	how	effective	
your	thresholds	are.		
The	very	first	time	you	go	through	this	process,	this	will	be	the	most	time-
consuming.		Analyze	may	be	the	most	important	step	in	the	process	cycle.
Analyze
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Where	do	I	begin?
§ CA	SYSVIEW	contains	many	out	of	the	box	thresholds	as	
examples
§ A	good	place	to	start	is	with	the	CA	SYSVIEW	VARS command
– VARS	lists	all	of	the	metrics	that	can	be	used	for	thresholding
Analyze
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
PLOTLOG
§ As	an	example,	PLOTLOG	displays	hourly	interval	records	for	
z/OS	and	subsystem	data	collection	metrics.		
§ A	log	can	potentially	contain	a	large	number	of	records,	
therefore	it	is	recommended	to	use	the	FILTER	command	
within	the	PLOTLOG	command	display	(CA	SYSVIEW	r14.1	and	
greater)	to	limit	the	data	you	wish	to	search	and	return.
Analyze
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
PLOTLOG	Example	– CPU	usage
Analyze
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Analyze
CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP CP
12:0
0:00	
AM
1:00:
00	
AM
2:00:
00	
AM
3:00:
00	
AM
4:00:
00	
AM
5:00:
00	
AM
6:00:
00	
AM
7:00:
00	
AM
8:00:
00	
AM
9:00:
00	
AM
10:0
0:00	
AM
11:0
0:00	
AM
12:0
0:00	
PM
1:00:
00	
PM
2:00:
00	
PM
3:00:
00	
PM
4:00:
00	
PM
5:00:
00	
PM
6:00:
00	
PM
7:00:
00	
PM
8:00:
00	
PM
9:00:
00	
PM
10:0
0:00	
PM
11:0
0:00	
PM
CA11
Average	of	Average 0.3540.3220.3210.3940.4420.4010.4220.3840.4150.4580.556 0.58 0.5760.5890.5550.5130.4710.4590.4840.4850.4770.4370.5380.397
Average	of	Minimum 0.173 0.17 0.1640.2170.2180.2230.2150.2140.2260.2780.3630.3930.404 0.42 0.3830.3480.3240.2940.3340.3460.3310.2730.2920.209
Average	of	Maximum 0.6910.6070.6290.6990.7210.6990.7240.6330.7390.7620.771 0.79 0.7320.7790.7760.7460.6770.6480.6870.6620.6640.6940.8510.687
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
%
AVG	GP%	by	Hour
01/17	- 02/04/2016
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
This	data	should	start	to	give	insight	to	your	system.
– Are	there	certain	times	of	days	we	see	spikes?
– Are	there	periods	of	time	that	are	consistently	higher	or	at	100%?
Based	on	these	trends,	think	again	about	your	workload.
– Time	of	day	– batch	window?	
– Time	of	month,	year
Once	you	start	to	understand	your	data,	system	and	business	
requirements	you	can	start	to	set	meaningful	thresholds.
Analyze
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
CICS
§ MENU	CHISTORY	is	a	great	place	to	start	to	look	at	your	CICS	
historical	data.
– Remember:	you	must	be	collecting	CICS	historical	data	in	the	CA	
SYSVIEW	logstreams to	use	these	commands.
– CREVIEW	– by	region,	the	number	of	transactions	that	ran	in	the	past	
24	hours	and	an	hourly	breakdown	of	those	transactions.
– CSYSDATA	– by	region,	15-minute	interval	summary.
Analyze
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
CICS
§ History	continued
– CTRANLOG	– every	CICS	transaction	that	ran	on	your	system.
§ Useful	for	setting	transaction	specific	thresholds	or	exclusion	rules.
– CTRANSUM	– summary	of	CTRANLOG	in	15-minute	intervals.
Analyze
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Report	Writer
§ Batch	reporting	against	this	same	historical	data	that	is	being	
accessed	by	the	online	commands.
§ As	an	example	– all	CICS	transactions	that	executed	each	day,	
the	average,	minimum,	maximum	lifetime	and	CPU.
Analyze
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Copyright (C) 2015 CA Technologies, Inc. EXPLORE Report Writer Release: 14.1 07/06/15 20
FROM 01/27/16 20.27.00 MONTHLY CICS TRANSACTION DETAIL REPORT 1 PAGE 1
TO 01/30/16 20.27.25 RESPONSE TIME AND CPU ANALYSIS REPORT DATE 02/10/16 11.44
SHIFT NONE
EACH MONTH
PERIOD NONE
TRAN TRANS AVG TRANS MIN TRANS MAX TRANS AVG MIN MAX
DATE ID COUNT LIFETIME LIFETIME LIFETIME CPU CPU CPU
-------- -------- -------- ---------- ---------- ---------- ---------- ---------- ----------
01/01/16 CSOL 137 1887.437 1887.424 1887.552 0.000154 0.000125 0.001341
CWBG 72 0.002459 0.000404 0.137902 0.000397 0.000349 0.000653
CRSQ 9 0.000449 0.000371 0.000677 0.000360 0.000317 0.000601
CRMF 6 0.004195 0.000452 0.022358 0.000598 0.000401 0.001314
TKOA 1 3.967686 3.967686 3.967686 0.371662 0.371662 0.371662
CSKL 1 1.734323 1.734323 1.734323 0.028685 0.028685 0.028685
CSFU 1 0.539743 0.539743 0.539743 0.008386 0.008386 0.008386
CATR 1 0.010191 0.010191 0.010191 0.001518 0.001518 0.001518
-------- -------- -------- ---------- ---------- ---------- ---------- ---------- ----------
SUMMARY 228 1134.146 0.000371 1887.552 0.002047 0.000125 0.371662
-------- -------- -------- ---------- ---------- ---------- ---------- ---------- ----------
Analyze
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ Once	you	have	this	information	you	can	start	to	build	your	
threshold	definitions.		
§ Ask	yourself	these	additional	questions:
– Are	there	company	standards	for	warning	or	problem	thresholds?
§ Ex.	A	warning	threshold	is	10%	less	than	a	problem	threshold
– Are	there	business	requirements	for	CPUor elapsed	(response)	time?
– Are	there	transactions	that	are	critical	to	our	business?
Analyze
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate
Measure
Analyze
Update
Validate
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Update	is	the	process	of	adding	new	or	updating	existing	
thresholds	as	needed	based	on	your	analysis	of	the	data.		
§ In	CA	SYSVIEW	this	is	done	either	through	the	command	
displays	or	through	updating	the	CA	SYSVIEW	PARMLIB	
members.		
– Which	one	depends	on	how	CA	SYSVIEW	and	its	data	collectors	are	
started	– WARM	vs	COLD.
Update
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
SubSystem
CA	SYSVIEW	Command PARMLIB	Member
Thresholds States Threshold States
z/OS THRESH STATES MVSTHRSH MVSSTATE
CICS CTHRESH CSTATES CTHRESH CSTATES
IMS IMSTHRSH IMSSTATE IMSTHRSH IMSSTATE
MQ MQTHRESH MQSTATES MQSTHRSH MQSSTATE
TCPIP TCPTHRSH TCPSTATE TCPTHRSH TCPSTATE
Update
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate
Measure
Analyze
Update
Validate
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Validate is	the	process	of	verifying	your	thresholds	are	accurately	being	
triggered	and	exceptions	are	raised	as	expected.
ALERTS
– To	validate	your	threshold	levels	look	at	the	ALERTS	and	ALERTSUM	commands	
within	SYSVIEW.		If	you	are	writing	exceptions	to	the	XLOG	you	can	view	all	
triggered	exceptions	through	the	XLOG	command	and	also	run	batch	reports	
using	the	SYSVIEW	Report	Writer	against	the	XLOG	datasets.
Validate
39 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Example	report	against	the	CA	SYSVIEW	Exception	Log	(XLOG)
START VARIABLE RESOURCE EXC THRSHOLD MAX MIN WARNING PROBLEM
DATE TIME NAME 1 STATUS VALUE VALUE VALUE VALUE VALUE
-------- ------------ -------- -------- -------- -------- -------- -------- -------- --------
03/17/16 01.17.00.010 IMPLMAX IMSD WARNING 103K 105K 105K 98304 131K
01.17.00.011 IMPLSIZE IMSD PROBLEM 101K 104K 104K 60000 80000
01.18.00.014 IMPLMAX IMSD WARNING 104K 106K 106K 98304 131K
01.19.00.012 IMSLFULL IMSD PROBLEM 1 1 1 1 1
01.21.00.024 IMPLSIZE IMSD NORMAL 57344 57344 57344 60000 80000
01.23.00.010 IMPLSIZE IMSD WARNING 73728 73728 73728 60000 80000
01.24.00.017 IMPLSIZE IMSD NORMAL 32768 32768 32768 60000 80000
01.26.00.018 IMPLSIZE IMSD PROBLEM 102K 104K 104K 60000 80000
01.27.00.019 IMPLSIZE IMSD PROBLEM 104K 106K 106K 60000 80000
01.31.00.014 IMSLARCH IMSD NORMAL 1 1
01.31.00.016 IMSLFULL IMSD NORMAL 1 1
01.34.00.006 IMSLARCH IMSD PROBLEM 1 1 1 1 1
Validate
40 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
Evaluate
Measure
Analyze
Update
Validate
41 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mainframe	Team	Center:	Operational	
Intelligence
42 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ SYSVIEW	r14.2	introduced	Mainframe	Team	Center:	
Operational	Intelligence		(MTC-OI)
Mainframe	Team	Center:	Operational	Intelligence
43 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ The	core	benefits	of	MTC-OI
– MTC-OI	is	about	predictive	analysis,	creating	dynamic	thresholds	based	
on	historical	performance
§ There	are	other	benefits	of	MTC-OI	as	well
– You	can	visualize	and	explore	historical	CA	SYSVIEW	data	that	has	been	
analyzed	to	determine	a	normal	baseline
– MTC-OI	models	this	historical	data	provided	by	CA	SYSVIEW	and	
determines	what’s	normal	for	your	environment
Mainframe	Team	Center:	Operational	Intelligence
44 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	CA	SYSVIEW
§ MTC-OI	enables	you	to	do	the	following:
– Easily	access	historical	data	from	your	system.
– View	a	historical	graph	of	a	metric	that	is	overlaid	with	actual	data	and	
colored	bands	that	illustrate	likeliness	of	metric	performance.	A	"green	
highway"	is	produced	from	analysis	using	Western	Electric	rules.
– Perform	analysis	to	answer	questions	about	a	specific	metric,	such	as:
§ What	is	normal	for	this	metric	in	my	shop?
§ Is	the	current	value	of	this	metric	outside	of	the	expected	value?
§ Based	on	past	observations,	how	tightly	could	I	set	a	threshold	without	
producing	too	many	false-positive	alarms
Mainframe	Team	Center:	Operational	Intelligence
45 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	SYSVIEW	PM
So	how	does	this	process	change	with	Mainframe	Team	Center-
Operational	Intelligence?
§ With	MTC-OI	the	Analyze	phase	will	improve	for	some	metrics	
by	modeling	the	historical	data	for	you	and	graphically	
displaying	the	expected	behavior.
– Can	eliminate	the	need	to	run	batch	reports	against	your	historical	data	
to	determine	these	boundaries
Mainframe	Team	Center:	Operational	Intelligence
46 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	SYSVIEW	PM
What	data	is	modeled	in	MTC-OI?
§ SYSTEM	Interval	Data
– PLOTLOG 255.2	records
§ CICS	Transaction	Summary	Data
– CTRANSUM 255.25	records
§ CICS	System	Interval	Data
– CSYSDATA 255.28	records
Mainframe	Team	Center:	Operational	Intelligence
47 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Process	of	Setting	Thresholds	in	SYSVIEW	PM
§ MTC-OI	can	assist	you	in	the	process	of	setting	thresholds	in	
SYSVIEW
§ MTC-OI	generates	its	own	predictive	alerts	after	analyzing	and	
modeling	your	data	and	will	continue	to	adjust	dynamic	
thresholds	as	more	data	is	provided	into	the	modeling	engine
§ The	process	of	setting	thresholds	requires	you	to	combine	
business	requirements	and	system	information	to	use	the	
most	meaningful	values.
Mainframe	Team	Center:	Operational	Intelligence
48 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX154E Ideation:	Intelligent	Mainframe	Management	– Be	Part	of	
Shaping	the	Future! 11/14/2016	at	4:45	pm
MFX05E Predicting	the	Fire	with		Operational	Intelligence	
11/15/2016	at	9:00	am
MFX06E How	to	Get	Operational	Intelligence	Up	and	Running	in	a	
Day 11/15/2016	at	10:00	am
MFX07E So	You’re	a	New	Systems	Operator	– Who	Ya Gonna Call?		
11/15/2016	at	11:00	am
MFX144E Improving	Your	Response	to	Events	– Performance	First	
Responders	 11/15/2016	at	1:00	pm
MFX145E Operational	Intelligence	– Monitoring	the	Past	to	Better	
Understand	Today	 11/15/2016	at	2:45	pm
MFX146E Mainframe	Operational	Intelligence	– Predicting	the	
Future 11/15/2016	at	4:00	pm
49 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos	in	the	Mainframe	Theater:
Intelligent
Mainframe:	
Advanced	
Analytics	
CA	Mainframe	Operations	
Intelligence:
Performance	&	Network	Mgmt
Application	Monitoring
Events	&	Automation	
Intelligent	
Mainframe:		
Automation
CA	Mainframe	Operations	
Intelligence	
CA	OPS/MVS®	Event	Management	
&	Automation
Intelligent	
Mainframe:		
End-to-End	
Performance	
CA	Cross-Enterprise	APM	
CA	Mainframe	Application	Tuner
CA	UIM	for	z	Systems	
Intelligent	
Mainframe:		
Storage	
Management	
CA	Vantage	SRM	
CA	1®	Tape	Management	
System
50 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
51 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com

Weitere ähnliche Inhalte

Ähnlich wie Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®

Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...CA Technologies
 
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...CA Technologies
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksCA Technologies
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring CA Technologies
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps CA Technologies
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...CA Technologies
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...CA Technologies
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
 
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...CA Technologies
 
Pre-Con Education: Shift-Left Performance Testing for Shift-Forward Quality
Pre-Con Education: Shift-Left Performance Testing for Shift-Forward QualityPre-Con Education: Shift-Left Performance Testing for Shift-Forward Quality
Pre-Con Education: Shift-Left Performance Testing for Shift-Forward QualityCA Technologies
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA DatacomCA Technologies
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...CA Technologies
 
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...CA Technologies
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...CA Technologies
 
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...CA Technologies
 
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...CA Technologies
 
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksPre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksCA Technologies
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesCA Technologies
 
CA BlazeMeter Essentials
CA BlazeMeter EssentialsCA BlazeMeter Essentials
CA BlazeMeter EssentialsCA Technologies
 

Ähnlich wie Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW® (20)

Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
 
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
Tech Talk: Get the Entire Picture: End-To-End Infrastructure and App Monitoring
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
 
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
 
Pre-Con Education: Shift-Left Performance Testing for Shift-Forward Quality
Pre-Con Education: Shift-Left Performance Testing for Shift-Forward QualityPre-Con Education: Shift-Left Performance Testing for Shift-Forward Quality
Pre-Con Education: Shift-Left Performance Testing for Shift-Forward Quality
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
 
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
 
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
Pre-Con Ed: Accelerate MTTR using CA SYSVIEW® and CA Mainframe Application Tu...
 
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
Hands-On Lab: Simplify Configuration with CA Application Performance Manageme...
 
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and TricksPre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
 
CA BlazeMeter Essentials
CA BlazeMeter EssentialsCA BlazeMeter Essentials
CA BlazeMeter Essentials
 

Mehr von CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®