v The LOAD and FREEMAIN protocol applies only to programs de®ned as

 

RELOAD(YES). Note that HOLD is irrelevant, as CICS Program Control never

 

sees the FREEMAIN, or knows the storage location of the individual task's copy,

 

and so cannot release the program at task end. This implies that all LOADs must

 

be examined as they are all effectively LOAD HOLDs.

v The affinity relation may be GLOBAL, BAPPL, LUNAME, or USERID.

v Lifetime can be PCONV, LOGON, SIGNON, ACTIVITY, PROCESS,or SYSTEM.

 

However, the Detector always worsens LOGON and SIGNON to SYSTEM,

 

because of limitations in the way that this affinity is detected.

 

v Commands in error are ignored, because there is no load address on which to

 

match LOAD with FREEMAIN, so no data is collected.

 

LOADs with no SET option are ignored, because no load address is returned, so

 

no data is collected.

 

v A LOAD/FREEMAIN affinity is considered to be initiated from a terminal if the

 

LOAD is initiated from a terminal. Whether the FREEMAIN was so initiated or not

 

is irrelevant.

 

v Any unmatched LOADs are also reported if they have never matched by the time

 

a Detector stop occurs. They are output in a separate report section. Note that

 

on a start with restore data, they are not restored and are deleted from the

 

affinity ®le.

 

Scanner differences: Scanner ®nds all instances of LOAD and all instances of

 

FREEMAIN.

CANCEL/DELAY/POST/START

v The affinity here is between the transaction that issues the DELAY, POST or START command and the transaction that issues the CANCEL command via REQID. The match is on REQID.

v In order for another task to CANCEL a DELAY, REQID must be explicitly speci®ed on the DELAY command. If no REQID is speci®ed on a DELAY command, it cannot be canceled, and therefore cannot be detected.

 

In order for another task to CANCEL a START or POST, it is not necessary to

 

specify REQID on the command because CICS supplies a unique REQID that

 

may be used (unless START speci®es NOCHECK). So only START commands

 

that do not both specify NOCHECK and omit REQID, and all POST commands,

 

are detected.

 

v Further, data is not collected for commands that expire on entry to Interval

 

Control, because they cannot be canceled (because an element control interval

 

(ICE) is not created). DELAY and POST commands get an EXPIRED response.

 

For START commands there is no such response; so 'expired on entry' is

 

deduced if INTERVAL(0) was speci®ed. This detects most 'expired on entry'

 

STARTs, but not all.

 

v START, DELAY, and POST commands in error are ignored, so no data is

 

collected.

 

v CANCEL commands that omit REQID are ignored because they cannot cancel

 

another task. CANCEL commands that return a NOTFND response are also

 

ignored because the ICE must have expired and the CANCEL must have failed.

 

No data is collected for these.

 

v REQIDs are assumed to be unique; that is, there are no simultaneous pairs of

 

START/CANCEL using the same REQID. Having such a pair violates CICS

 

programming guidelines, and the results from CICS are unpredictable.

v The affinity relation for START may be GLOBAL, BAPPL, LUNAME, or USERID.

68 CICS Transaction Affinities Utility Guide

Page 84
Image 84
IBM OS manual Cancel/Delay/Post/Start

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.