PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Programmer
System Designer
System Programmer
IT Professional
DATES:
CONTENT AND OBJECTIVES:
VSAM: Introduction and Overview
Review the clusters in different VSAM datasets.
Access Method Services
Demonstrate sequence errors and replace the content of the dataset; this is the REUSE command.
VSAM Datasets
Identify the relationships between the base and indexes.
Application Programming
Code a COBOL, Assembler, or PL/1 program that accesses and updates a KSDS without the AIX and another program that uses the AIX.
DEFINE and BLDINDEX commands.
Alternate Indexes and Paths
Define an AIX for the KSDS from the previous exercise.
VSAM Components and Evolution
Examine the details of a KSDS with AIX LISTCAT.
Locate import and information such as statistics, attributes, index levels, CI sizes and track sizes.
Calculate ratios to determine if the dataset is operating efficiently.
Change the attribute of a VSAM dataset.
Export a KSDS, delete the KSDS and import the exported dataset.
KSDS Structure
Identify the components and relationships in a KSDS with an AIX.
The Cluster on the Disk
Identify the components and relationships in an ESDS and RRDS.
Tuning AMS: DEFINE CLUSTER
Run a load operation with the SPEED command and another with the RECOVERY command.
Identify the difference in performance.
Alternative Indexes and Paths
Dump an AIX with IDCAMS and review the control information and pointers.
Programming for Performance
Given an existing VSAM dataset, determine whether the file is performing efficiently.
Identify the cause of the problem and resolve the problem.
There will be more than one problem which needs to be resolved.
Strings and Buffer Pools
Calculate string count for an application design.
Monitoring for Performance
Determine whether the structure of a VSAM dataset is intact and operating properly.
Virtual Classroom
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.
CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.
Certain courses only should be taught by the source software company training company and open source purveyor.