This IBM Redbooks publication provides information to help Systems Programmers plan for merging systems into a sysplex. zSeries systems are highly flexibile systems capable of processing many workloads. As a result, there are many things to consider when merging independent systems into the more closely integrated environment of a sysplex. This book will help you identify these issues in advance and thereby ensure a successful project.
This IBM® Redbooks® publication provides advice and guidance for IBM z/OS® Version 1, Release 10 and subsystem system programmers. z/OS is an IBM flagship operating system for enterprise class applications, particularly those with high availability requirements. But, as with every operating system, z/OS requires planned IPLs from time to time. This book also provides you with easily accessible and usable information about ways to improve your mean time to recovery (MTTR) by helping you achieve the following objectives: - Minimize the application down time that might be associated with planned system outages. - Identify the most effective way to reduce MTTR for any time that you have a system IPL. - Identify factors that are under your control and that can make a worthwhile difference to the startup or shutdown time of your systems.
This IBM® Redbooks® publication describes the IBM zPDT® 2016 Sysplex Extensions, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing, sysplex up and running with minimal time and effort. This package is designed and tested to be installed on top of a standard ADCD environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS® 2.1 or z/OS 2.2 sysplex that runs under ADCD in a zPDT environment. This package differs from the previous zPDT sysplex package in that it provides working examples of more sysplex exploiters. It also is designed to adhere to IBM's sysplex best practice recommendations, in as far as is possible in a zPDT environment. Although the package was not tested with IBM Rational® Development and Test for IBM System z® (RD&T), it might be used to reduce the effort to create a fully functional sysplex under RD&T. Conceptually, the package might also be restored and used as a template to create a sysplex environment that is running on a real IBM z SystemsTM CPC. The target audience for this document is system programmers that are responsible for designing, creating, and maintaining IBM Parallel Sysplex® environments. It can also be beneficial to developers that currently maintain their own ADCD environments and want to extend them to add sysplex functions.
This IBM® Redbooks® publication describes the IBM System z® Personal Development Tool (IBM zPDT®) Sysplex Extensions 2020, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing sysplex up and running with minimal time and effort. This book is a significant revision of zPDT 2017 Sysplex Extensions, SG24-8386. This package is designed and tested to be installed on top of a standard Application Developer Controlled Distribution (ADCD) environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS® 2.4 sysplex that runs under IBM z/VM® in a zPDT environment. This package differs from the zPDT sysplex package delivered in IBM zPDT Guide and Reference System z Personal Development Tool, SG24-8205, in that it provides working examples of more sysplex exploiters. It also is designed to adhere to IBM's sysplex best practice recommendations, in as far as is possible in a zPDT environment. Although the package was not tested with IBM Z® Development and Test Environment (previously known as RD&T), it may be used to reduce the effort to create a fully functional sysplex under zD&T. Conceptually, the package might also be restored and used as a template to create a sysplex environment that is running on a real IBM Z CPC. The target audience for this document is system programmers who are responsible for designing, creating, and maintaining IBM Parallel Sysplex® environments. It can also be beneficial to developers who currently maintain their own ADCD environments and want to extend them to add sysplex functions.
DFSMSrmm from IBM® is the full function tape management system available in IBM OS/390® and IBM z/OS®. With DFSMSrmm, you can manage all types of tape media at the shelf, volume, and data set level, simplifying the tasks of your tape librarian. Are you a new DFSMSrmm user? Then, this IBM Redbooks® publication introduces you to the DFSMSrmm basic concepts and functions. You learn how to manage your tape environment by implementing the DFSMSrmm management policies. Are you already using DFSMSrmm? In that case, this publication provides the most up-to-date information about the new functions and enhancements introduced with the latest release of DFSMSrmm. You will find useful information for implementing these new functions and getting more benefits from DFSMSrmm. Do you want to test DFSMSrmm functions? If you are using another tape management system and are thinking about converting to DFSMSrmm, you can start DFSMSrmm and run it in parallel with your current system for testing purposes. This book is intended to be a starting point for new professionals and a handbook for using the basic DFSMSrmm functions. To learn about some of the newer DFSMSrmm functions and features refer to Redbooks Publication What is New in DFSMSrmm, SG24-8529.
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the Security Server and Communication Server components. This book describes z/OS and other operating systems and additional software that leverage the building blocks of System z hardware to provide solutions to business security needs. This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
The ABCs of z/OS® System Programming is an eleven-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection will serve as a powerful learning tool. The contents of the volumes are: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-Managed Storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP and VTAM® Volume 5: Base and Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, Automatic Restart Management (ARM), Geographically Dispersed Parallel SysplexTM (GPDS), availability in the zSeries® environment Volume 6: Introduction to security, RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, Enterprise identity mapping (EIM), and firewall technologies Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX® System Services Volume 10: Introduction to z/Architecture®, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, RMF, and SMF Volume 12: WLM Volume 13: JES3
This IBM® Redbooks® publication positions the use of System Logger log streams as a repository for System Management Facilities (SMF) data against the previous use of Virtual Storage Access Method (VSAM) data sets for SMF data. This book expands on existing material by covering not just the implementation steps, but also by looking at how you use SMF data today, and using that information to help you identify the most appropriate repository for your SMF data. If it transpires that log streams are appropriate for some or all of your SMF data, this book provides all the guidance that you are likely to require for a successful migration to this new paradigm. The target audience for this document is system programmers and anyone who uses SMF data.
In this IBM® Redbooks® publication, we discuss CICS®, which stands for Customer Information Control System. It is a general-purpose transaction processing subsystem for the z/OS® operating system. CICS provides services for running an application online where, users submit requests to run applications simultaneously. CICS manages sharing resources, the integrity of data, and prioritizes execution with fast response. CICS authorizes users, allocates resources (real storage and cycles), and passes on database requests by the application to the appropriate database manager, such as DB2®. We review the history of CICS and why it was created. We review the CICS architecture and discuss how to create an application in CICS. CICS provides a secure, transactional environment for applications that are written in several languages. We discuss the CICS-supported languages and each language's advantages in this Redbooks publication. We analyze situations from a system programmer's viewpoint, including how the systems programmer can use CICS facilities and services to customize the system, design CICS for recovery, and manage performance. CICS Data access and where the data is stored, including Temporary storage queues, VSAM RLS, DB2, IMSTM, and many others are also discussed.