Chapter 5. Running the Detector

This chapter describes how to run the Detector that runs in a CICS region looking for instances of API commands that could cause transaction affinity.

This chapter describes how to perform the following functions:

vªDisplaying the Detector control screenº on page 32

vªStarting the collection of affinity dataº on page 33

vªPausing the collection of affinity dataº on page 34

vªResuming the collection of affinity dataº on page 34

vªStopping the collection of affinity dataº on page 35

vªChanging the Detector optionsº on page 36

vªDetector errorsº on page 39

The commands looked for are those listed in ªCommands detected by the

Transaction Affinities Utilityº on page 11.

You can run the Detector either at a CICS 3270-type terminal (through interactive screens or single-line commands), from a console, or from an application program. This chapter primarily describes how to use the Detector through the interactive screens at a CICS terminal, but also gives equivalent commands to use at a terminal, at a console, or in an application program.

For an overview of the Detector, see ªThe Detector componentº on page 12.

You can control the Detector by:

vChanging the state

This is described in topics ªStarting the collection of affinity dataº on page 33 through ªStopping the collection of affinity dataº on page 35.

vChanging the options

The options that you can select are shown in Figure 7 on page 36, and described in ªChanging the Detector optionsº on page 36.

You can optimize the performance of the Detector; that is, you should consider doing the following:

vPausing the collection of data during peak workloads. You can continue the collection of data when the workloads have decreased.

vCollecting data for one affinity type at a time. This can be of particular value for the temporary storage affinity type.

vCollecting data for a restricted set of transaction identi®ers by specifying the pre®x of those transactions in which you are interested.

For information about how to specify the affinity types and transaction identi®er pre®x for which data is to be collected, see ªChanging the Detector optionsº on page 36.

© Copyright IBM Corp. 1994, 1999

31

Page 47
Image 47
IBM OS manual Running the Detector, Changing the state, Changing the options

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.