PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Programmer
System Analyst
System Designer
IT Professional
DATES:
CONTENT AND OBJECTIVES:
Handling Exception Conditions
Code a program to handle file I/O errors.
Recognize the advantages and disadvantages of using the HANDLE commands.
Code a program using the HANDLE CONDITION.
Code the same program without the HANDLE CONDITION.
File Control
Use generic keys in a VSAM KSDS.
Code an application that access records using a partial key in the primary key.
Code a pseudo conversational program which performs a query on a VSAM KSDS and displays the results.
VSAM Performance and Design
Understand how to design, code, and test a modular CICS program.
Given a case study, design the modules for a CICS application.
The case study will be analyzed in terms of its design techniques, response time issues, and completeness.
Temporary Storage
Handle the processing of running out of temporary storage memory.
Debugging
Execute programs and debug common errors with Abend-AID and CEDF.
Additional tools can also be used.
VSAM Record Level Sharing
Access a VSAM dataset using the enhanced API for VSAM RLS.
Monitor the locks on the dataset.
Performance Topics
Given a poorly written program, determine the best methods for performing a recode into a well written and efficient program.
Determine the strings and buffers that should be defined for a heavily access dataset.
CICS Design Considerations
Given a case study, determine the CICS techniques and resources used in the design of the program.
The following issues will be analyzed: 1- Data passing techniques. 2- Performance. 3- Sharing data between partitions. 4- locking and long running programs.
Dynamic Storage
Create a stack with routines to pop and push the stack.
Web-based Training
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.
SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.