C.3.6 Access Method

At one point in time, many installations adopted a policy of distinguishing VSAM data from non-VSAM data. The reality behind this standard was that there were many functions that were not supported for VSAM and this was an easy way to recognize that data.

The main reason for this distinction was because of old VSAM catalogs and the ²ownership² of the volume and data by VSAM. In order to avoid these problems, you had to separate the VSAM data from the non-VSAM data by catalog. We have come a long way since then and this notion is no longer needed with the use of ICF catalogs. There should be no distinction because of access method.

C.3.7 Job Name

Some installations have used the name of the job which created this data set. This is certainly a piece of information which is very likely to change. It usually says very little about what this piece of data actually is, since the job usually creates all sorts of data set types. It is not a good practice to include this information as a part of the data set name.

C.4 Common Applications - Naming Conventions

This section will focus on some of the common MVS applications that tend to put out a fair amount of data on the system and the suggestions for an associated naming convention.

C.4.1 TSO Naming Conventions

TSO certainly has a very recognizable data set naming convention. The rules are fairly simple and easy to understand:

Three levels of qualification: userid.dsname.dstype

Standard set of data set types (for example, CLIST, FORT, PLI, CNTL, and so on)

All of the TSO functions, commands and also the ISPF/PDF functions tend to complement this naming convention. Therefore, for ease of use and transportability, it is generally a good idea to maintain this convention.

Some applications run with production-type data under TSO using the standard JCL PROCs, CLISTs, and PANELS that would be used for the normal production data. For example, consider a programming application that had a naming convention of:

library.dstype.project.version.release

where:

library: (PROD, DEVL, or TEST)

dstype: (SOURCE, MACRO, LOAD, OBJ, JCL, and so on)

project: (APPLIC1, APPLIC2, . . .)

version: (V1, V2, . . .)

release: (R1, R2, . . .)

It would certainly be acceptable for unit testing on certain data to be done under a TSO user ID such that the user ID would be substituted for the ²library² and all of the remaining qualifiers would stay the same. The key point here is the

Appendix C. DFSMS Naming Conventions 549

Page 573
Image 573
IBM OS/390 manual Access Method, Job Name, Common Applications Naming Conventions, TSO Naming Conventions

OS/390 specifications

IBM OS/390, a versatile operating system, was a cornerstone in enterprise environments and played a pivotal role in mainframe computing. Released in the mid-1990s, OS/390 combined the strengths of IBM's MVS (Multiple Virtual Storage) with new features and enhancements, targeting scalability, reliability, and performance in demanding business applications.

One of the key features of OS/390 was its robust support for multiple users and processes. The system allowed thousands of concurrent users to access applications and data, ensuring high availability and minimizing downtime—a critical requirement for many large organizations. This scalability was supported through various enhancements in memory management and processor scheduling, enabling optimal resource allocation across diverse workloads.

OS/390 was known for its superior workload management capabilities. The Workload Manager (WLM) component allowed administrators to define service policies, specifying how system resources would be allocated according to the priority of tasks. This ensured that critical business processes received the necessary resources while less critical tasks were managed more flexibly.

Another significant characteristic of OS/390 was its commitment to security. The operating system provided comprehensive security features, including user authentication, data encryption, and auditing capabilities. This focus on security was vital for organizations handling sensitive data, ensuring compliance with regulations and safeguarding against unauthorized access.

OS/390 also supported advanced technologies that facilitated integration and development. The system included features like the IBM CICS (Customer Information Control System) for transaction processing and IMS (Information Management System) for database management. These technologies allowed organizations to build robust, high-performance applications tailored to specific business needs.

The ease of network integration was another strength of OS/390. With the advent of the Internet and global connectivity, OS/390 systems could easily interface with various network protocols, enabling businesses to operate in a connected world. This inclusion paved the way for many organizations to expand their capabilities and offer new services, driving digital transformation.

In conclusion, IBM OS/390 represented a significant advancement in mainframe technology, combining scalability, security, and robust workload management. Its rich feature set and support for critical enterprise applications solidified its role as a vital component of many organizations' IT infrastructures, ensuring they could meet their operational challenges head-on while supporting future growth. As technology continues to evolve, the legacy of OS/390 remains influential in the realm of computing.