The Next Generation of Distributed IBM CICS

You must ensure that the CICS user ID (cics) is a member of the mqm group, so that the CICS code has the authority to call WebSphere MQ. Create a system user called ... Figure 4-5 Distributed CICS connected to mainframe CICS using CICS.

Author: Raghavendran Srinivasan

Publisher: IBM Redbooks

ISBN: 9780738440576

Category: Computers

Page: 522

View: 904

DOWNLOAD →

This IBM® Redbooks® publication describes IBM TXSeries® for Multiplatforms, which is the premier IBM distributed transaction processing software for business-critical applications. Before describing distributed transaction processing in general, we introduce the most recent version of TXSeries for Multiplatforms. We focus on the following areas: The technical value of TXSeries for Multiplatforms New features in TXSeries for Multiplatforms Core components of TXSeries Common TXSeries deployment scenarios Deployment, development, and administrative choices Technical considerations It also demonstrates enterprise integration with products, such as relational database management system (RDBMS), IBM WebSphere® MQ, and IBM WebSphere Application Server. In addition, it describes system customization, reviewing several features, such as capacity planning, backup and recovery, and high availability (HA). We describe troubleshooting in TXSeries. We also provide details about migration from version to version for TXSeries. A migration checklist is included. We demonstrate a sample application that we created, called BigBlueBank, its installation, and the server-side and client-side programs. Other topics in this book include application development and system administration considerations. This book describes distributed IBM Customer Information Control System (IBM CICS®) solutions, and how best to develop distributed CICS applications.

Distributed CICS

A distributed programming link ( DPL ) causes a given program to be executed on a remote system . A transaction might use more than one program , and selected programs can be on different CICS systems . This is not transparent to the ...

Author: William R. Ogden

Publisher: John Wiley & Sons Incorporated

ISBN: UOM:35128001647955

Category: Computers

Page: 267

View: 308

DOWNLOAD →

Here is a wealth of practical guidance for systems managers responding to rapid changes in computing technology and who want to know where these changes will take them. Starting with a thorough description of CICS and OLTP, the book explores exactly why CICS offers an attractive path for moving selected OLTP applications from mainframes to smaller platforms.

Designing and Programming CICS Applications

Integrating Existing Mainframe Applications with New Technologies John Horswill, Members of the CICS Development Team at ... ORB, 113 Distributed Processing Layer (DPL), 258 Distributed Program Link (DPL), 52 distribution, CICS used in, ...

Author: John Horswill

Publisher: "O'Reilly Media, Inc."

ISBN: 9781449313036

Category: Computers

Page: 414

View: 400

DOWNLOAD →

CICS is an application server that delivers industrial-strength, online transaction management for critical enterprise applications. Proven in the market for over 30 years with many of the world's leading businesses, CICS enables today's customers to modernize and extend their applications to take advantage of the opportunities provided by e-business while maximizing the benefits of their existing investments.Designing and Programming CICS Applications will benefit a diverse audience. It introduces new users of IBM's mainframe (OS/390) to CICS features. It shows experienced users how to integrate existing mainframe systems with newer technologies, including the Web, CORBA, Java, CICS clients, and Visual Basic; as well as how to link MQSeries and CICS.Each part of Designing and Programming CICS Applications addresses the design requirements for specific components and gives a step-by-step approach to developing a simple application. The book reviews the basic concepts of a business application and the way CICS meets these requirements. It then covers a wide range of application development technologies, including VisualAge for Java, WebSphere Studio, and Visual Basic. Users learn not only how to design and write their programs but also how to deploy their applications.Designing and Programming CICS Applications shows how to: Develop and modify existing COBOL applications Become familiar with the CICS Java environment and write a simple Java wrapper for a COBOL application Develop a web front end using servlets, JSP and JavaBeans. Link the web front end to an existing COBOL application using CORBA Write a Visual Basic application to develop a customer GUI Link an existing COBOL application using a CICS Client ECI call Develop a Java application using Swing as an MQSeries Client Use the MQSeries-CICS bridge to access an existing COBOL application Whether for working with thousands of terminals or for a client/server environment with workstations and LANs exploiting modern technology such as graphical interfaces or multimedia, Designing and Programming CICS Applications delivers the power to create, modernize and extend CICS applications.

The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration

Sysplex Distributor LPAR CICS Round robin distribution Gateway Dynamic Dynamic daemon Server Server Distributing CICS Selection Selection Stack Failover route to backup LPAR WLM CICSCICS VIPA Health=0% CICSCICS Gateway Dynamic Dynamic ...

Author: Rufus Credle

Publisher: IBM Redbooks

ISBN: 9780738439730

Category: Computers

Page: 396

View: 200

DOWNLOAD →

In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.

IBM CICS and the Coupling Facility Beyond the Basics

The TDQ is defined with the same name in all target CICS regions, allowing the name component of the WRITEQ command to ... If these activities occur within CICS, especially groups of sysplex-distributed CICS regions, a named counter ...

Author: Arndt Eade

Publisher: IBM Redbooks

ISBN: 9780738443041

Category: Computers

Page: 78

View: 232

DOWNLOAD →

It's easy to look at the title of a book and think "that's old news" or "I already know all there is to know on that subject." But before you dismiss this publication, consider just how far the IBM® Parallel Sysplex® architecture has come. From the early days the mainframe has embraced a shared everything approach. The original designers coded IBM z/OS® (called IBM MVSTM or IBM OS/390® back then) with the functionality necessary for the operating system to create the repositories, manage the data flow, and ensure the integrity of the systems involved. From there, the middleware systems provided the exploitation and advanced functions to mature the technology. The component in the middle of all this great technology can easily be taken for granted. That is the IBM Coupling Facility. This IBM Redbooks® publication discusses both traditional uses for the IBM Coupling Facility technology and new ways to use it with products such as IBM CICS®. You can learn how to perform new functions and have these functions benefit from the scalability and availability achieved only in a mainframe ecosystem. Open standards are a large part of considerations today, as most companies run IT shops with a mix of technology components. As the world embraces these technologies, it is necessary to understand how to mix the world of mainframe architectures and products with other open architectures. This mix allows the best tool to be used to solve processing needs, at the right cost and service levels. Often the functions needed for modern processing can be found in house, in places where staff are skilled and that already deliver the robust production environments you count on daily. This book discusses these modern functions and how to achieve them with CICS use of the IBM Coupling Facility. You will learn how one IBM client, Walmart, took these concepts far beyond the original design as they share their experiences and even share code examples to help you get started. The last chapter of this book shows what can be achieved when a combination of old and new functions are use together. Even if you have familiarity with what could be done with the IBM Coupling Facility in the past, there is much to learn and deploy in a modern world. Those who are familiar with the IBM Coupling Facility might find the content of this book helpful. Additionally, readers who are considering how to use the IBM Coupling Facility technology within their environment might also find useful information in the chapters that follow

Enterprise SOA

CICS can even participate in distributed transactions, for example using JCA. However, as discussed in Chapter 8, distributed transactions must be handled with care. Because CICS programs usually execute on systems with very high load ...

Author: Dirk Krafzig

Publisher: Prentice Hall Professional

ISBN: 9780131465756

Category: Computers

Page: 382

View: 634

DOWNLOAD →

Learn to apply the significant promise of SOA to overcome the formidable challenges of distributed enterprise development.

Network World

By Michael Cooney New York Users looking for easier ways to control, monitor and automate activities within distributed CICS environments will get some help this week when IBM introduces a new, more powerful version of its CICSPlex ...

Author:

Publisher:

ISBN:

Category:

Page: 72

View: 318

DOWNLOAD →

For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce.

Reduce Risk and Improve Security on IBM Mainframes Volume 3 Mainframe Subsystem and Application Security

Figure 4-9 shows a sample CICS region report obtained by selecting option 1 from the previous window. ... regardless of where the identity information was created, strengthening accountability across distributed environments.

Author: Axel Buecker

Publisher: IBM Redbooks

ISBN: 9780738441023

Category: Computers

Page: 192

View: 839

DOWNLOAD →

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

Open Distributed Processing and Distributed Platforms

Due to the heterogeneity of the underlying systems (from PCs to mainframes), having an integrated view is particularly important for managing the distributed application CICS. In this section, we will describe how the GAMOCs can be ...

Author: Jerome Rolia

Publisher: Springer

ISBN: 9780387351889

Category: Computers

Page: 329

View: 889

DOWNLOAD →

Advances in computer networking have allowed computer systems across the world to be interconnected. Open Distributed Processing (ODP) systems are those that support heterogenous distributed applications both within and between autonomous organizations. Many challenges must be overcome before ODP systems can be fully realized. This book describes the recent advances in the theory and practice of developing, deploying and managing open distributed systems. Applications of these systems include but are not limited to telecommunication, medical and large scale transaction processing and electronic commerce systems. All of these are currently developed on distributed platforms. For anybody working in industry or research in this field, Open Distributed Processing and Distributed Platforms will prove an invaluable text.

z OS Identity Propagation

CICS TG/TXNLOG log (with CICS SupportPac CH51 applied) Example 8-11 shows the results from the CICS TG TXNLOG show no DistID information. Example 8-11 CICS TG TXNLOG: No distributed identity flowed from WebSphere Application Server into ...

Author: Karan Singh

Publisher: IBM Redbooks

ISBN: 9780738436067

Category: Computers

Page: 182

View: 709

DOWNLOAD →

This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This book provides details on the RACMAP function, filter management and how to use the SMF records to provide an audit trail. In depth coverage is provided about the internal implementation of identity propagation, such as providing information about available callable services. This book examines the current exploiters of z/OS Identity Propagation and provide several detailed examples covering CICS® with CICS Transaction Gateway, DB2®, and CICS Web services with Datapower.

Cooperative Information Systems

Distributed CICS had more limited success, but both would be engulfed by the growth of the web and the emergence of the application server. Both Tuxedo and CICS had an abstraction that was optimized for distribution.

Author: Carlo Batini

Publisher: Springer

ISBN: 9783540447511

Category: Computers

Page: 456

View: 804

DOWNLOAD →

This book constitutes the refereed proceedings of the 8th International Conference on Cooperative Information Systems, CoopIS 2001, held in Trento, Italy in September 2001. The 29 revised full papers presented together with three invited contributions were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on agent and systems; information integration; middleware, platforms, and architectures; models; multi and federated database systems; Web information systems; workflow management systems; and recommendation and information seeking systems.

Exploring IBM E business Software

The CICS transaction would start and display an electronic form ( often called a map ) for the clerk . ... In short , CICS , particularly Distributed CICS , can be an important part of an e - business architecture .

Author: Casey Young

Publisher: Maximum Press

ISBN: 1931644004

Category: Computers

Page: 336

View: 369

DOWNLOAD →

This detailed look at IBM’s software products for e-business enables IBM users to gain a fundamental understanding of e-business architecture, where IBM software products fit into that architecture, and where to go to get more information. The main products and platforms for development tools and components, application server software, and secure network and management software are described. This book also distinguishes between two or more IBM software products that appear to serve the same purpose but really have different applications. Key products covered include DB2, Web Sphere, Lotus Domino, and Tivoli. This replaces 1885068581.

Enterprise Application Integration

IMS and CICS originated on the mainframe and retain a strong single processor flavor. As might be expected, coordinating transactions across distributed systems raises significant problems that are not encountered in a ...

Author: William A. Ruh

Publisher: John Wiley & Sons

ISBN: 9780471437864

Category: Computers

Page: 224

View: 848

DOWNLOAD →

Learn to utilize today's hottest EAI technologies to ensureinteroperability across your organization What exactly is enterprise application integration (EAI)? Whatmakes this $300 million market so hot that it's expected to grow to$6.5 billion in the next two years? How do you apply it in the realworld? Whether you're an IT professional or systems architect,business manager or software developer, if you're looking into EAIas a solution for unifying applications and systems across theenterprise, then the answers are in this book.You'll find acomplete and unbiased survey of the different technologies,architectures, and approaches available for EAI implementations,including pros and cons, clear explanations of all concepts, andfirst-rate guidance on how to choose the best EAI strategy for yourcompany. The authors draw on their pioneering work with earlyimplementations to show you how to: Define your specific integration problem in a useful form thatenables a real solution Develop your own EAI architecture and ensure interoperabilityof legacy, stovepipe, COTS, client-server and modern technologyapplications Choose the best among messaging architecture, objectarchitecture, and transaction architecture Work with the best implementation technologies, includingMicrosoft's COM+, the OMG's CORBA, and Sun's EJB Utilize the proven Secure Application Integration Methodology(SAIM) Wiley Tech Briefs Focused on the needs of the corporate IT and business manager, theTech Briefs series provides in-depth information on a new oremerging technology, solutions, and vendor offerings available inthe marketplace. With their accessible approach, these books willhelp you get quickly up-to-speed on a topic so that you caneffectively compete, grow, and better serve your customers.

Network World

... from an IBM host to one or more RS/6000 machines in a distributed computing environment. In addition, AIX CICS/6000 supports applications written in COBOL, C and a variety of popular SQL relational database management systems.

Author:

Publisher:

ISBN:

Category:

Page: 60

View: 334

DOWNLOAD →

For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce.

Computerworld

Digital Users parry, page 76 SunGard stung by virus IBM kicks in With added CICS support Systems management support planned ... But he added that CICSPlex support is a crucial element in making a distributed CICS environment feasible.

Author:

Publisher:

ISBN:

Category:

Page: 126

View: 844

DOWNLOAD →

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.

Security Functions of IBM DB2 10 for z OS

Figure 7-15 shows a sample configuration to support z/OS identity propagation, including multiple CICS and DB2. ... RACF z/OS sysplex CICS Distriibuted identity RACF DB2 i Distributedidentity Distributed identity z/OS sysplex Figure ...

Author: Paolo Bruni

Publisher: IBM Redbooks

ISBN: 9780738436036

Category: Computers

Page: 456

View: 895

DOWNLOAD →

IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority. The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system. In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration. DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model. This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.

COM and CORBA Side by Side

MVS / CICS Application 1 MVS / CICS Application 2 Distributed Object Wrapper 1 Distributed Object Wrapper 2 Server Side ( MVS ) Client Side Client 1 Client 2 Client 3 Figure 5-1 . A distributed object wrapper approach .

Author: Jason Pritchard

Publisher: Addison-Wesley Professional

ISBN: 0201379457

Category: Computers

Page: 430

View: 146

DOWNLOAD →

Pritchard has experience in both the technologies that many consider competing architectures for creating distributed software solutions. He explains the strengths and weaknesses of each, noting that they have many other differences besides supporting different operating system platforms. He suggests when developers should one or the other. Annotation copyrighted by Book News, Inc., Portland, OR

Semantics of Specification Languages SoSL

2 CICS and Distributed Computing The next major developments in Z resulted from work on two projects which started at the PRG in 1982. These were the Distributed Computing Project and the IBM CICS project. 2.1 The IBM Project CICS is ...

Author: Derek J. Andrews

Publisher: Springer Science & Business Media

ISBN: 9781447132295

Category: Computers

Page: 357

View: 660

DOWNLOAD →

SoSL was the first International Workshop on Semantics of Specification Languages, held from 25-27 October 1993 in Utrecht, the Netherlands. The workshop was organized by the Department of Philosophy of Utrecht University with financial support from the Nationale Faciliteit Informatica of the Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO), and under the auspices of the British Computer Society'S specialist group in Formal Aspects of Computing Science (BCS FACS). The concern of the workshop was the semantics of specification languages, and the issues closely related to this area, such as type checking and the justification of proof rules and proof obligations. Its aim was the exchange of problems and ideas in this field of formal methods, and the identification of common programs of work for further investigation. The program of SoSL consisted of 3 invited lectures presenting the developments of the semantics of 3 major specification languages. Furthermore, there were 16 presentations of submitted papers. This volume provides a direct account of the workshop. It contains 3 papers that match the invited lectures and the 16 selected papers. The editors want to thank all those who have contributed to the workshop; the Program Committee and the referees for selecting the contributed papers, the invited speakers for their interesting talks, the Organizing Committee for all their efforts, and of course the participants. We have the feeling that the workshop was worthwhile and should be repeated.