Migration to CICS Transaction Server for z/VSE V2.1

Migration to CICS Transaction Server for z/VSE V2.1

Author: Klaus Wacker

Publisher: IBM Redbooks

Published: 2017-05-10

Total Pages: 286

ISBN-13: 0738442461

DOWNLOAD EBOOK

The IBM® CICS® Transaction Server for z/VSE® (CICS TS for z/VSE) 2.1 provides functions to improve application programming, system programming, system management, and data security and availability. With CICS TS for z/VSE 2.1, you can use the extended functionality of Basic Security Manager. CICS TS for z/VSE 2.1 can be administrated by the IBM CICS Explorer® function on a workstation, which allows CICS management in a convenient way. This IBM Redbooks® publication provides information to help you install, tailor, and configure the CICS TS for z/VSE 2.1 product. The book is intended for IBM z/VSE customers and IBM technical personnel who are responsible for planning and migrating to IBM z/VSE 6.1 and CICS TS for z/VSE 2.1. The book also provides information to help you understand the affect of migrating to CICS TS for z/VSE 2.1. It provides detailed guidance and samples for installing and configuring CICS TS for z/VSE 2.1. Also included in the book is a description of the CICS TS for z/VSE 2.1 features and capabilities and the affect of removing obsolete functions. The book also covers security and performance issues and provides samples for first level problem determination through the use of memory dumps or the use of trace tools.


The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration

The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration

Author: Rufus Credle

Publisher: IBM Redbooks

Published: 2014-08-08

Total Pages: 396

ISBN-13: 0738439738

DOWNLOAD EBOOK

In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.


Security on IBM z/VSE

Security on IBM z/VSE

Author: Helmut Hellner

Publisher: IBM Redbooks

Published: 2018-06-14

Total Pages: 472

ISBN-13: 0738456918

DOWNLOAD EBOOK

One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.


Introduction to the New Mainframe: z/VM Basics

Introduction to the New Mainframe: z/VM Basics

Author: Lydia Parziale

Publisher: IBM Redbooks

Published: 2008-01-10

Total Pages: 468

ISBN-13: 0738488550

DOWNLOAD EBOOK

This textbook provides students with the background knowledge and skills necessary to begin using the basic functions and features of z/VM Version 5, Release 3. It is part of a series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to be literate in personal computing and have some computer science or information systems background. Others who will benefit from this textbook include z/OS professionals who would like to expand their knowledge of other aspects of the mainframe computing environment. This course can be used as a prerequisite to understanding Linux on System z. After reading this textbook and working through the exercises, the student will have received a basic understanding of the following topics: The Series z Hardware concept and the history of the mainframe Virtualization technology in general and how it is exploited by z/VM Operating systems that can run as guest systems under z/VM z/VM components The z/VM control program and commands The interactive environment under z/VM, CMS and its commands z/VM planning and administration Implementing the networking capabilities of z/VM Tools to monitor the performance of z/VM systems and guest operating systems The REXX programming language and CMS pipelines Security issues when running z/VM


Threadsafe Considerations for CICS

Threadsafe Considerations for CICS

Author: Chris Rayns

Publisher: IBM Redbooks

Published: 2012-04-05

Total Pages: 416

ISBN-13: 0738436690

DOWNLOAD EBOOK

Beginning with IBM® CICS® Version 2, applications can run on TCBs apart from the QR TCB, which has positive implications for improving system throughput and for implementing new technologies inside of CICS. Examples of implementing new technologies include using the IBM MVSTM Java virtual machine (JVM) inside CICS and enabling listener tasks written for other platforms to be imported to run under CICS. The newest release, CICS Transaction Server for z/OS® (CICS TS) V4.2, includes scalability enhancements so that you can perform more work more quickly in a single CICS system. The advantage of this enhancement is that you can increase vertical scaling and decrease the need to scale horizontally, reducing the number of regions that are required to run the production business applications. The scalability enhancements in CICS TS V4.2 fall into two broad areas, which are increased usage of open transaction environment (OTE) and of 64-bit storage. This IBM Redbooks® publication is a comprehensive guide to threadsafe concepts and implementation for IBM CICS. This book explains how systems programmers, applications developers, and architects can implement threadsafe applications in an environment. It describes the real-world experiences of users, and our own experiences, of migrating applications to be threadsafe. This book also highlights the two most critical aspects of threadsafe applications: system performance and integrity.


OSA-Express Implementation Guide

OSA-Express Implementation Guide

Author: Mike Ebbers

Publisher: IBM Redbooks

Published: 2014-06-04

Total Pages: 290

ISBN-13: 0738439436

DOWNLOAD EBOOK

This IBM® Redbooks® publication will help you to install, tailor, and configure the Open Systems Adapter (OSA) features that are available on IBM zEnterprise® servers. It focuses on the hardware installation and the software definitions that are necessary to provide connectivity to LAN environments. This information will help you with planning and system setup. This book also includes helpful utilities and commands for monitoring and managing the OSA features. This information will be helpful to systems engineers, network administrators, and system programmers who plan for and install OSA features. The reader is expected to have a good understanding of IBM System z® hardware, Hardware Configuration Definition (HCD) or the input/output configuration program (IOCP), Open Systems Adapter Support Facility (OSA/SF), Systems Network Architecture/Advanced Peer-to-Peer Networking (SNA/APPN), and TCP/IP protocol.


Improving z/OS Application Availability by Managing Planned Outages

Improving z/OS Application Availability by Managing Planned Outages

Author: Frank Kyne

Publisher: IBM Redbooks

Published: 2014-12-22

Total Pages: 328

ISBN-13: 0738440213

DOWNLOAD EBOOK

This IBM® Redbooks® publication is intended to make System Programmers, Operators, and Availability Managers aware of the enhancements to recent releases of IBM z/OS® and its major subsystems in the area of planned outage avoidance. It is a follow-on to, rather than a replacement for, z/OS Planned Outage Avoidance Checklist, SG24-7328. Its primary objective is to bring together in one place information that is already available, but widely dispersed. It also presents a different perspective on planned outage avoidance. Most businesses care about application availability rather than the availability of a specific system. Also, a planned outage is not necessarily a bad thing, if it does not affect application availability. In fact, running for too long without an IPL or subsystem restart might have a negative impact on application availability because it impacts your ability to apply preventive service. Therefore, this book places more focus on decoupling the ability to make changes and updates to your system from IPLing or restarting your systems.