v Lifetime can be PCONV, LOGON, SIGNON, ACTIVITY, PROCESS, SYSTEM, or

 

PERMANENT. The PROTECT option determines whether SYSTEM or

 

PERMANENT would be used. However, the Detector always worsens LOGON

 

and SIGNON to SYSTEM or PERMANENT, because of limitations in the way that

 

this affinity is detected.

The affinity relation for DELAY and POST may be GLOBAL, BAPPL, LUNAME,

 

or USERID.

v Lifetime can be only SYSTEM, PROCESS, ACTIVITY, or PCONV. If the affinity

 

relation is LUNAME or USERID, the lifetime must be PCONV because neither

 

DELAY nor POST exist beyond task termination.

 

v If the transaction speci®ed on a START or CANCEL command is de®ned as

 

remote, or a remote SYSID was speci®ed on the command so that the command

 

is function shipped to a remote CICS region, no data is collected. (It is not

 

possible to function ship POST or DELAY commands.)

 

v A CANCEL affinity is considered to be initiated from a terminal if the START,

 

DELAY or POST is initiated from a terminal. Whether the CANCEL was so

 

initiated or not is irrelevant.

 

Scanner differences: Scanner detects all instances of POST, all instances of DELAY

 

REQID, all instances of CANCEL REQID, and all instances of START that either

 

omit NOCHECK or specify REQID or specify TERMID (because of RETRIEVE

 

WAIT affinity).

 

SPI commands

 

v The commands included here are INQUIRE, SET, CREATE, DISCARD, ENABLE,

 

DISABLE, EXTRACT EXIT, COLLECT STATISTICS, PERFORM, and RESYNC.

v CBTS BROWSE COMMANDS are treated as inquire COMMANDS.

 

v The affinity here is not an affinity between transactions, but rather an affinity with

 

the system on which the command was issued; that is, a transaction-system

 

affinity. Such affinities do not generate transaction affinity groups, because it does

 

not generally make sense to dynamically route such transactions.

 

v The use of these commands does require reporting, however, because the

 

system programmer should be aware of the transactions and programs that issue

 

such commands.

 

Scanner differences: None.

WAIT commands

vThe affinity here is really an inter-transaction affinity between the issuer of the WAIT EVENT, WAIT EXTERNAL, or WAITCICS command, and one or more posters. However, the poster of the ECB(s) associated with the WAIT command cannot be detected, because this is not performed via the CICS API. Only half the affinity can be detected.

vThis means affinity transaction groups cannot be created, because the affinity degenerates to an affinity with the system on which the WAIT command was issued; that is, a transaction-system affinity.

vThe use of WAIT commands does require reporting, however, because the system programmer should be aware of the transactions and programs that issue such commands, and should attempt to locate the posters and so create the correct inter-transaction affinity groups.

Scanner differences: None.

Appendix A. Details of what is detected 69

Page 85
Image 85
IBM OS manual SPI commands, Wait commands

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.