Userid

 

A group of transactions where all instances of the transactions that are

 

initiated from a terminal and executed on behalf of the same userid must

execute in the same target region for the lifetime of the affinity. The affinity

 

lifetime for userid relations can be pseudoconversation, signon, system, or

 

permanent.

 

Affinity lifetimes

The affinity lifetime determines when the affinity is ended.An affinity lifetime can be

 

classi®ed as one of:

 

System

 

The affinity lasts for as long as the target region exists, and ends whenever

the target region terminates (at a normal, immediate, or abnormal

 

termination). (The resource shared by transactions that take part in the

 

affinity is not recoverable across CICS restarts.)

 

Permanent

 

The affinity extends across all CICS restarts. (The resource shared by

 

transactions that take part in the affinity is recoverable across CICS

 

restarts.) This is the most restrictive of all the inter-transaction affinities.

Process

The affinity exists until the process completes.

Activity

The affinity exists until the activity completes.

 

Pseudoconversation

 

The (LUname or userid) affinity lasts for the whole pseudoconversation, and

 

ends when the pseudoconversation ends at the terminal.

 

Logon

 

The (LUname) affinity lasts for as long as the terminal remains logged on to

 

CICS, and ends when the terminal logs off.

 

Signon

 

The (userid) affinity lasts for as long as the user is signed on, and ends

 

when the user signs off.

Notes:

1.For userid affinities, the pseudoconversation and signon lifetimes are possible only in those situations where one user per userid is permitted. Such lifetimes are meaningless if multiple users are permitted to be signed on with the same userid at the same time (at different terminals).

2.If an affinity is both userid and LUname (that is, all instances of all transactions in the group were initiated from the same terminal and by the same userid), LUname takes precedence.

CICS programming techniques for transaction affinity

Associated with transaction affinity, there are three broad categories of CICS programming techniques:

vSafe programming techniques

vUnsafe programming techniques

vSuspect programming techniques

Chapter 1. Introducing transaction affinities 5

Page 21
Image 21
IBM OS manual Affinity lifetimes, Cics programming techniques for transaction affinity

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.