Detector

(continued)

 

 

 

saving data 17

 

 

 

 

starting data collection

33

 

 

stopping data collection

35

 

 

table manager diagnostics

77

 

what is detected

13

 

 

 

what is not detected 14

 

 

worsening of affinities lifetimes

14

worsening of affinities relations

14

diagnostics

 

 

 

 

 

CAFB request queue manager

80

data formatter 80

 

 

 

table manager

77

 

 

 

dynamic transaction routing

 

 

 

bene®ts

3

 

 

 

 

compared to static routing

1

 

cost

3

 

 

 

 

 

overview

1

 

 

 

 

G

global affinity relation 4

H

HEADER statements, Builder 58

HOLD commands 66

I

installing the affinity utility program creating the VSAM ®les 21 data space size 21 overview 21

restarting your CICS region 23 tailoring your CICS startup job 23

L

lifetime of affinities

 

 

activity

5

 

 

 

logon 5

 

 

 

overview

4

 

 

 

permanent

5

 

 

process

5

 

 

 

pseudoconversation

5

signon

5

 

 

 

system

5

 

 

 

worsening

14

 

 

log off, detection of

14

 

logon affinity lifetime

5

 

LUname affinity relation

4

P

permanent affinity lifetime 5 process 5

programming techniques for transaction affinity safe 6

suspect 6 unsafe 6

protecting applications from one another 7 pseudoconversation affinity lifetime 5 pseudoconversation end, 13

R

relation of affinities

 

 

 

 

 

BAPPL

4

 

 

 

 

 

 

global

4

 

 

 

 

 

 

LUname 4

 

 

 

 

 

overview

4

 

 

 

 

 

userid

4

 

 

 

 

 

 

worsening

14

 

 

 

 

 

RELEASE commands

66

 

 

 

Reporter

41

 

 

 

 

 

 

affinity transaction group de®nitions, producing 46

affinity transaction groups, modifying

48

compressing affinity data

49

 

output

42

 

 

 

 

 

 

output report 43

 

 

 

 

output report (example)

43

 

 

overview

18

 

 

 

 

 

running

31, 41

 

 

 

 

 

understanding the affinities

48

 

using the report

47

 

 

 

 

reports

 

 

 

 

 

 

 

affinity report, Reporter

43

 

 

analyzing, useful tips

75

 

 

creating a detailed report, Scanner

27

creating a summary report, Scanner

25

data sets processed report, Builder

61

detailed, contents of

28

 

 

 

detailed report, Scanner

27

 

 

empty transaction groups report, Builder 61

error report, Builder

62

 

 

 

group merge report, Builder

61

 

requesting region

2

 

 

 

 

routing region

2

 

 

 

 

 

S

safe programming techniques

6

 

saving data

16

 

 

 

 

Scanner

 

 

 

 

 

creating a detailed report

27

 

input parameters

27

 

 

output contents

28

 

 

creating a summary report

25

 

input parameters

25

 

 

output contents

26

 

 

overview

12

 

 

 

 

running

25

 

 

 

 

sign off, detection of

14

 

 

signon affinity lifetime

5

 

 

static transaction routing

 

 

compared to dynamic routing

1

summary report (Scanner)

 

 

creating

25

 

 

 

 

output contents

26

 

 

 

output example

27

 

 

 

suspect programming techniques

6

system affinity lifetime

5

 

 

82 CICS Transaction Affinities Utility Guide

Page 98
Image 98
IBM OS manual Bappl

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.