Course Overview
This course will help the student to better understand the techniques of performance analysis and capacity planning on systems and partitions running IBM i, and to develop an appreciation of how IBM i operates and interfaces with applications. The student will build skills to better manage performance and capacity on systems and partitions running IBM i. In this course we will explain IBM i concepts, including the Technology Independent Machine Interface (TIMI), main storage pools, auxiliary storage pools, management of jobs, threads, tasks, job run-time structure, performance monitoring, data collection, and analysis of performance data. This 4-day course includes hands-on activities using performance data from IBM i systems to help the student appreciate the concepts discussed.
This course is designed for those running Power Systems on IBM i. While it includes i 7.1 content, it is suitable for those currently using prior versions of IBM i. First we will focus on teaching the performance management process, the performance considerations of key hardware components and virtualization options, and tuning options to help optimize performance. During these lectures, students should gain an appreciation of the unique storage management and work management components in the IBM i architecture, and how these components need to be managed for optimal performance. Then the class focus on the tools and techniques to monitor, analyze, and plan for performance of IBM i systems and partitions. The primary analysis tool that will be used is the Performance Data Investigator (PDI) which is included with IBM Systems Director Navigator for i. PDI is also used with IBM Systems Workload Estimator (WLE) for capacity planning activities.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Objectives
- Acquire the skills to better manage performance on systems running IBM i.
- Enhance your knowledge of IBM i storage management, job/thread/task management, and the use of performance data collection, monitoring and analysis tools to better manage IBM i work.
- Learn how to manage the latest virtualization and logical partitioning features of Power Systems for optimal performance.
- Learn the latest tools and methodologies in i6.1 and i7.1 to manage and analyze system and application performance.
- Get hands-on experience with Performance Data Investigator in Systems Director Navigator for i, and tools such as Job Watcher and Disk Watcher through hands-on lab exercises.
- Learn how to use Performance Data Investigator, IBM Workload Estimator and other performance tools to perform sizing and capacity planning on Power Systems.
- Learn methodologies for identifying and selecting appropriate performance data when planning upgrades and other capacity planning tasks.
Course Content
- Performance management process
- IBM Power Systems performance considerations
- Components of performance
- Disk performance considerations
- Logical partition performance considerations
- Work management review and tuning options
- Real-time monitoring
- Collection Services: Data collection
- Performance Data Investigator overview
- Investigating data: Collection Services
- Performance Tools reports and graphs
- Capacity planning
- Collection Services data files
- Run-time (run/wait) analysis
- Advanced Performance Analysis Investigating with Disk Watcher and Job Watcher
Course Overview
This course provides instruction on HPE BladeSystem administration and management. The portfolio overview ensures an understanding of components, configurations, and solutions. The course also covers resources and administration related to retired HPE c-Class BladeSystem products.
Course Objectives
After completing this module, students should
be able to:
• Explain the functional architecture of the HPE
BladeSystem c-Class environment
• Identify the management infrastructure
(Insight Display, Onboard Administrator)
• Review the HPE BladeSystem c-Class
retired portfolio and equipment capabilities
• Review system requirements for power and
cooling
• Identify high-level functionalities of HPE
ProLiant Generation 10 Plus (Gen10+)
servers
• Describe the HPE BladeSystem c-Class
interconnect module architecture
• Explain the HPE Virtual Connect
management tools (Virtual Connect
Manager, HPE OneView)
• Show familiarity with HPE BladeSystem
scripting
• Explain how to update the firmware on an
HPE BladeSystem
Course Content
HPE BladeSystem Administration | HE646S
Course Overview
This 5-day course is an introduction to SQL, relational database principles, and the HP NonStop™ SQL/MX product and serves as a prerequisite to more advanced NonStop SQL/MX courses. Hands-on lab sessions provide practical experience with generating SQL/MX queries to access data and creating database objects (catalogs, tables, indexes, views, and constraints).
Course Objectives
- Describe relational database concepts and terminology
- Describe the HP NonStop™ SQL/MX processes and objects
- Start a mxci session and use ANSI names SQL/MX database objects
- Describe the basic process to write queries and the tools to evaluate the query performance
- Use the mxci SELECT statement and predicates to retrieve data from single tables
- List the types of functions supported in SQL/MX
- Retrieve data from:
- multiple tables using joins and union operations
- from derived tables using query expressions
- using subqueries
- Create a SQL/MX database (Catalog, Schema,Tables, Indexes, Views and Constraints)
- Modify data in a table using SQL/MX INSERT,UPDATE, and DELETE statements
- Describe the SQL/MX access options and isolation levels
- Describe SQL/MX database management functions
Course Overview
This course is designed to teach you how to use the Hardware Configuration Definition (HCD) of z/OS to create an I/O configuration and dynamically alter the I/O configuration.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Objectives
After this course participants should be able to:
- Describe new zSeries processor technology
- Code new zSeries processors (z990 to z10)
- Code ESCON channels and ESCON CTCs
- Code FICON channels and FICON CTCs
- Code Coupling Facilities (CF) and CF links
- Code cascaded FICON Director
- Create an IODF work file on a z processor from scratch
- Use CHPID mapping tool to create a validated work IODF
- Use work IODF and create a production IODF
- Perform Dynamic I/O changes on a real z/OS system
- Build a LOADxx parmlib member for initial program load (IPL)
- View configuration graphically
- Create appropriate configuration reports
Course Content
Day 1
- (00:30) Welcome
- (01:00) Unit 1: HCD introduction
- (00:30) Unit 2: IOCP and MVSCP macro review
- (00:30) Unit 3: HCD dialog
- (01:00) Unit 4: LPAR and logical control units
- (02:00) Unit 5: ESCON Directors
- (00:15) Unit 6: OSAs, HiperSockets, and routers
- (00:30) Exercise 1: Overview of lab environment
- (00:45) Exercise 2: HCD familiarity
Day 2
- (00:30) Unit 7: Review of zSeries hardware
- (01:30) Unit 8: z990, z9, z10, and HCD
- (01:00) Unit 9: FICON, FICON CTCs, and FICON directors
- (03:00) Exercise 3: Coding a zSeries 2094
- (06:00) Exercise 4: Add ESCON directors to your configuration
- (00:30) Exercise 5: Add FICON directors to your configuration (optional)
Day 3
- (01:00) Unit 10: Planning and migration
- (01:00) Unit 11: IPL and LOADxx member
- (00:45) Unit 12: Dynamic I/O reconfiguration
- (00:30) Exercise 6: Incremental migration from IOCP deck (optional)
- (00:30) Exercise 7: Building a LOADxx member
- (01:00) Exercise 8: Perform dynamic I/O
Day 4
- (01:00) Unit 13: z10 HCD and using CMT
- (01:00) Unit 14: ESCON CTCs for sysplex
- (00:45) Unit 15: HCD and parallel sysplex
- (00:45) Exercise 9: Coding a 2097 using the CMT
- (00:30) Exercise 10: Coding CFs and CF links including z10 CIB links
- (00:20) Exercise 11: Coding sysplex CTCs (optional)
Course Overview
This course is for C, TAL, and pTAL developers. Learn how to use the Guardian Application Program Interface (API) to obtain operating system services including interprocess communication, process creation, Enscribe file access, and more. This course is 60 percent lecture and 40 percent handson labs using HPE NonStop servers
Course Objectives
At the conclusion of this course you should be
able to:
• Code for interprocess communication
• Develop applications that access Enscribe
files
• Handle terminal input and output
• Identify different types of system messages
• Create and manage new processes
• Available timing facilities
• Know how nowait I/O can be used to
improve application performance
Course Content
Course Datasheet Template (hpe.com)
Course Overview
Introduction to concepts and fundamental skills for Linux users who run applications and services in Linux environments, but do not perform Linux system administration.
Getting Started with Linux Fundamentals (RH104) is designed for IT professionals and business users who access Linux systems, and run Linux-based applications and services, but have little to no previous UNIX or Linux experience. This course introduces Linux concepts and fundamental skills to Linux users who do not manage or administer Linux systems. Professionals who require system administration skills should instead take Red Hat System Administration I (RH124).
Course Objectives
- Introducing Linux by comparing user-relevant component distinctions between popular Linux distributions
- Logging in and out of local and remote Linux systems, both with passwords and by using passwordless keys
- Working with a graphical desktop environment and applications
- Working from a command line, including operating shell environments and programs
- Navigating Linux file systems and locating and running programs and applications
- Distinguishing between text and binary files, and using various editing tools to modify text files
- Organizing files and directories, and configuring permissions to provide file security
- Verifying core system configuration, such as network addresses, running services, and storage space
Course Content
Introduction to Linux
Define and explain the purpose of Linux, and Linux distributions.
Accessing a Linux System
Interact with the GNOME desktop, and query the terminal environment.
Managing Files in Linux
Use graphical and command-line tools to create and modify text files, and to identify binary files.
File Systems Overview
View and manage file organization in a Linux system.
Users and File Permissions
Interact with user accounts and identify file permissions.
Obtaining and Installing Software Packages
Obtain and install software from official repositories and other sources.
Linux Networking and System Resources
Describe fundamental concepts of networking, verify network settings, and monitor system resources.
Course Overview
This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment.
This course consists of a mixture of theoretical and practical sections. The major objective of the course is to familiarize the students with the everyday activities involved in working in a z/OS environment. Therefore, the main focus is on the class exercises.
This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, z/OS Management Facility, UNIX System Services shell, and BookManager.
This course consists of several independent modules. The modules, including the lab exercises, stand on their own and do not depend on any other content.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Objectives
After this course participants should be able to:
- Summarize the components of the IBM Z platform.
- Interpret the benefits of security in a z/OS environment.
- Analyze how TSO ISPF panels manage the z/OS environment.
- Implement TSO commands to manage the z/OS environment.
- Distinguish the purpose and functions of JES and JCL.
- Describe the purpose, benefits, and functions provided by z/OSMF.
- Execute UNIX processes.
Course Content
This course teaches:
- How to log on to the z/OS system.
- How to work with TSO/E, ISPF/PDF, and the UNIX System Services shell.
- How to create, copy, rename, and delete z/OS data sets.
- How to work with UNIX System Services files.
- How to execute CLISTs and REXX execs.
- How to submit jobs for execution and view the output online.
Day 1
- Unit 1 – Review of ESA/390 and z/Architecture and z/OS
- Unit 2 – An Introduction to ISPF, ISPF/PDF, and RACF
- Unit 3 – Working with ISPF/PDF(Part 1)
Day 2
- Unit 3 – Working with ISPF/PDF(Part 2)
Day 3
- Unit 4 : TSO Commands
- Unit 5 Working with JCL (continued)
Day 4
- Review
- Unit 6 UNIX system Services (part 1)
Day 5
- Unit 6 UNIX system (Part 2)
- Review and close out
Course Overview
This course prepares you to be a more effective security administrator as you gain experience and confidence in using the RACF component of the z/OS Security Server. To reinforce lectures, the course offers hands-on exercises where you use the RACF component of the z/OS Security Server to define users, set up group structures, define general resources, protect z/OS data sets, and use several RACF utilities.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Objectives
- Identify the security requirements of a system
- Evaluate the facilities and options of RACF
- Define users to RACF
- Set up a RACF group structure
- Use RACF to protect resources
- Select options to tailor RACF
- Evaluate and implement RACF database and performance options
- Identify tools available for auditing
- Administer the system so that it is consistent with the installation’s security goals
Course Content
Day 1
- Welcome
- Unit 1 – Security and RACF overview
- Unit 2 – Administering groups and users
- Exercise 1 – Log on to the lab system
- Exercise 2 – Defining a RACF group structure
- Exercise 3 – User administration
Day 2
- Exercise review
- Unit 2 – Administering groups and users (continued)
- Exercise 4 – Delegating security administration
- Unit 3 – Protecting z/OS data sets
- Exercise 5 – Protecting z/OS data sets: Part 1
Day 3
- Exercise 5 – Protecting z/OS data sets: Part 1 (continued)
- Exercise 6 – Protecting z/OS data sets: Part 2 Exercise review
- Unit 4 – Introduction to user administration and delegation and general resources
- Exercise 7 – Password reset granularity
- Unit 5 – RACF database, tables, and performance options
Day 4
- Unit 6 – RACF utilities and exits
- Unit 7 – RACF options
- Unit 8 – Auditing the RACF environment
- Exercise 8 – Using RACF for TSO administration (Optional)
- Exercise 9 – RACF utilities (Optional)
- Exercise 10 – RACF monitoring
Day 5
- Exercise review
- Unit 9 – Storage management and RACF
- Unit 10 – Security for JES facilities
- Unit 11 – Security classification
Course Overview
This course prepares you to implement and manage DFSMShsm (DFSMS hierarchical storage manager). You will learn how to automate the storage management tasks, which optimize DASD space utilization and provide data availability. You will be taught basic DFSMShsm terminology and concepts, and you will examine the functions and interfaces used to tailor DFSMShsm processing to meet your installation’s storage management requirements.
Hands-on lab exercises enable you to perform a step-by-step implementation.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Objectives
- Understand the relationship between DFSMShsm and DFSMS and get an overview of the functions of DFSMShsm and its operating environment.
- Understand the DFSMShsm activities for Primary and Secondary Space Management and setup the required configuration for automatic space management.
- Authorize special users for DFSMShsm commands and perform space management functions using authorized DFSMShsm commands.
- Understand the DFSMShsm activities for Availability Management and setup the required configuration for automatic availability management.
- Implement the Automatic Backup and Recovery Support (ABARS), and perform data set and volume management using authorized DFSMShsm commands.
- Understand DFSMShsm processing in large systems.
- Understand recovery using ABARS, recovery from data set or volume loss, recovery of control data sets and journals.
- Use the AUDIT command to detect and fix discrepancies and the LIST, QUERY and FIXCDS commands to correct error situations.
- Manage and monitor DFSMShsm using log data sets and statistical information as well as manage DFSMShsm tapes.
Course Content
Day 1
- Welcome and introduction
- Unit 1: Overview DFSMShsm functions and environment Exercise 1: ISMF introduction
Day 2
- Exercise 1: Review
- Unit 2: Space management
- Exercise 2: Preparing DFSMShsm for space management Unit 3: Command space management
- Exercise 3: Command space management
Day 3
- Exercise 3: Review
- Unit 4: Availability management
- Exercise 4: Preparing DFSMShsm for availability management Unit 5: Command availability management
- Exercise 5: Command availability management
Day 4
- Exercise 5: Review
- Unit 6: DFSMShsm in large systems Unit 7: Recovery
- Exercise 6: Recovery
- Unit 8: DFSMShsm forward recovery Exercise 7: Forward recovery
Day 5
- Exercise 7: Review
- Unit 9: Managing and monitoring DFSMShsm
Course Overview
This course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Objectives
- Establish a DFSMS configuration to automatically enforce your installation’s storage management policies
- Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups
- Create and test automatic class selection (ACS) routines
- Convert volumes and move data to system-managed volumes with data
- facility data set services (DFSMSdss)
- Specify appropriate management class and storage group parameters for
- DFSMShsm processing of system-managed data sets
- Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands
- Develop a DFSMS implementation plan
Course Content
Day 1
- Welcome
- Unit 1 – Course introduction and DFSMS overview Lab 1 – ISMF
- Lab 1 – Review
- Unit 2 – Activating SMS
Day 2
- Lab 2 – Activating SMS with minimal configuration
- Lab 2 – Review
- Unit 3 – Writing ACS routines
- Unit 4 – Managing temporary data sets Lab 3 – Managing temporary data sets
Day 3
- Lab 3 – Review
- Unit 5 – Exploiting DFSMS
- Unit 6 – Managing permanent data sets Lab 4 – Managing permanent data sets
Day 4
- Lab 4 – Review
- Unit 7 – Using NaviQuest
- Unit 8 – Device preparation and data movement Lab 5 – Volume and data set conversion to SMS Lab 5 – Review
- Unit 9 – Controlling DFSMS Lab 6 – System operations
- Unit 10 – Additional considerations