PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
CONTENT AND OBJECTIVES:
Rules and Terminology
Become familiar with the concepts serving as the foundation of the IMS database.
Recognize the differences between each of the access methods.
Comparison of IMS Access Methods
Appreciate the differences between each of the access methods.
Given a case study, determine the appropriate access method that should be used.
Determine the most effective use of secondary indexing.
Given a case study, determine the appropriate use of secondary indexing.
Recognize the appropriate utilization of logical relationships.
Logical Relationships with IMS
Develop logical relationships in IMS.
Model the logical relationships for two applications; the model will be used in subsequent exercises.
Application Programming Interface
Code programs to read and write data and check for return codes.
Understand the function and features of the control blocks.
Create each of the control blocks.
Code the JCL to assemble the macros for the control blocks.
Create a DBD for a physical database; the DATASET and SEG will be provided by the instructor.
Create the PSB; specify the type of access which is permitted and the names and lengths of the sensitive segments.
IMS Complementary Products
Describe each of the components and their functions.
IMS Testing and Productivity Aids
Examine File-AID/IMS (optional).
Become familiar with the IMS Problem Investigator for z/OS.
Other IMS Facilities
Understand the recovery system built-in to IMS.
Design a recovery plan for an IMS application.
Acquire familiarity with the utilities used for accessing statistics and gathering information on performance.
Use database tools for monitoring space usage, data distribution, and performance.
IMS DB/DC Data Dictionary
Understand the role of the IMS DB/DC Data Dictionary in monitoring relationships among entities.
Use the data dictionary for listing the programs which can be used, types of transactions that can be entered, datasets that can be read and modified, and categories of data within a dataset that can be read and modified.
Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.
SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.