Author: Rufus Credle
Publisher: IBM Redbooks
ISBN: 0738439738
Category : Computers
Languages : en
Pages : 396
Book Description
In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.
The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration
Author: Rufus Credle
Publisher: IBM Redbooks
ISBN: 0738439738
Category : Computers
Languages : en
Pages : 396
Book Description
In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.
Publisher: IBM Redbooks
ISBN: 0738439738
Category : Computers
Languages : en
Pages : 396
Book Description
In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.
Migration to CICS Transaction Server for z/VSE V2.1
Author: Klaus Wacker
Publisher: IBM Redbooks
ISBN: 0738442461
Category : Computers
Languages : en
Pages : 286
Book Description
The IBM® CICS® Transaction Server for z/VSE® (CICS TS for z/VSE) 2.1 provides functions to improve application programming, system programming, system management, and data security and availability. With CICS TS for z/VSE 2.1, you can use the extended functionality of Basic Security Manager. CICS TS for z/VSE 2.1 can be administrated by the IBM CICS Explorer® function on a workstation, which allows CICS management in a convenient way. This IBM Redbooks® publication provides information to help you install, tailor, and configure the CICS TS for z/VSE 2.1 product. The book is intended for IBM z/VSE customers and IBM technical personnel who are responsible for planning and migrating to IBM z/VSE 6.1 and CICS TS for z/VSE 2.1. The book also provides information to help you understand the affect of migrating to CICS TS for z/VSE 2.1. It provides detailed guidance and samples for installing and configuring CICS TS for z/VSE 2.1. Also included in the book is a description of the CICS TS for z/VSE 2.1 features and capabilities and the affect of removing obsolete functions. The book also covers security and performance issues and provides samples for first level problem determination through the use of memory dumps or the use of trace tools.
Publisher: IBM Redbooks
ISBN: 0738442461
Category : Computers
Languages : en
Pages : 286
Book Description
The IBM® CICS® Transaction Server for z/VSE® (CICS TS for z/VSE) 2.1 provides functions to improve application programming, system programming, system management, and data security and availability. With CICS TS for z/VSE 2.1, you can use the extended functionality of Basic Security Manager. CICS TS for z/VSE 2.1 can be administrated by the IBM CICS Explorer® function on a workstation, which allows CICS management in a convenient way. This IBM Redbooks® publication provides information to help you install, tailor, and configure the CICS TS for z/VSE 2.1 product. The book is intended for IBM z/VSE customers and IBM technical personnel who are responsible for planning and migrating to IBM z/VSE 6.1 and CICS TS for z/VSE 2.1. The book also provides information to help you understand the affect of migrating to CICS TS for z/VSE 2.1. It provides detailed guidance and samples for installing and configuring CICS TS for z/VSE 2.1. Also included in the book is a description of the CICS TS for z/VSE 2.1 features and capabilities and the affect of removing obsolete functions. The book also covers security and performance issues and provides samples for first level problem determination through the use of memory dumps or the use of trace tools.
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738441023
Category : Computers
Languages : en
Pages : 200
Book Description
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Publisher: IBM Redbooks
ISBN: 0738441023
Category : Computers
Languages : en
Pages : 200
Book Description
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Developing Connector Applications for CICS
Author: G. Michael Connolly
Publisher:
ISBN: 9780738432816
Category : Application software
Languages : en
Pages : 0
Book Description
Publisher:
ISBN: 9780738432816
Category : Application software
Languages : en
Pages : 0
Book Description
z/OS Identity Propagation
Author: Karan Singh
Publisher: IBM Redbooks
ISBN: 0738436062
Category : Computers
Languages : en
Pages : 182
Book Description
This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This book provides details on the RACMAP function, filter management and how to use the SMF records to provide an audit trail. In depth coverage is provided about the internal implementation of identity propagation, such as providing information about available callable services. This book examines the current exploiters of z/OS Identity Propagation and provide several detailed examples covering CICS® with CICS Transaction Gateway, DB2®, and CICS Web services with Datapower.
Publisher: IBM Redbooks
ISBN: 0738436062
Category : Computers
Languages : en
Pages : 182
Book Description
This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This book provides details on the RACMAP function, filter management and how to use the SMF records to provide an audit trail. In depth coverage is provided about the internal implementation of identity propagation, such as providing information about available callable services. This book examines the current exploiters of z/OS Identity Propagation and provide several detailed examples covering CICS® with CICS Transaction Gateway, DB2®, and CICS Web services with Datapower.
DataPower SOA Appliance Administration, Deployment, and Best Practices
Author: Gerry Kaplan
Publisher: IBM Redbooks
ISBN: 0738435708
Category : Computers
Languages : en
Pages : 300
Book Description
This IBM® Redbooks® publication focuses on operational and managerial aspects for DataPower® appliance deployments. DataPower appliances provide functionality that crosses both functional and organizational boundaries, which introduces unique management and operational challenges. For example, a DataPower appliance can provide network functionality, such as load balancing, and at the same time, provide enterprise service bus (ESB) capabilities, such as transformation and intelligent content-based routing. This IBM Redbooks publication provides guidance at both a general and technical level for individuals who are responsible for planning, installation, development, and deployment. It is not intended to be a "how-to" guide, but rather to help educate you about the various options and methodologies that apply to DataPower appliances. In addition, many chapters provide a list of suggestions.
Publisher: IBM Redbooks
ISBN: 0738435708
Category : Computers
Languages : en
Pages : 300
Book Description
This IBM® Redbooks® publication focuses on operational and managerial aspects for DataPower® appliance deployments. DataPower appliances provide functionality that crosses both functional and organizational boundaries, which introduces unique management and operational challenges. For example, a DataPower appliance can provide network functionality, such as load balancing, and at the same time, provide enterprise service bus (ESB) capabilities, such as transformation and intelligent content-based routing. This IBM Redbooks publication provides guidance at both a general and technical level for individuals who are responsible for planning, installation, development, and deployment. It is not intended to be a "how-to" guide, but rather to help educate you about the various options and methodologies that apply to DataPower appliances. In addition, many chapters provide a list of suggestions.
Using IBM CICS Transaction Server Channels and Containers
Author: Steve Burghard
Publisher: IBM Redbooks
ISBN: 0738440507
Category : Computers
Languages : en
Pages : 276
Book Description
This IBM® Redbooks® publication describes the new channels and containers support in IBM Customer Information Control System (CICS®) Transaction Server V5.2. The book begins with an overview of the techniques used to pass data between applications running in CICS. This book describes the constraints that these data techniques might be subject to, and how a channels and containers solution can provide solid advantages alongside these techniques. These capabilities enable CICS to fully comply with emerging technology requirements in terms of sizing and flexibility. The book then goes on to describe application design, and looks at implementing channels and containers from an application programmer point of view. It provides examples to show how to evolve channels and containers from communication areas (COMMAREAs). Next, the book explains the channels and containers application programming interface (API). It also describes how this API can be used in both traditional CICS applications and a Java CICS (JCICS) applications. The business transaction services (BTS) API is considered as a similar yet recoverable alternative to channels and containers. Some authorized program analysis reports (APARs) are introduced, which enable more flexible web services features by using channels and containers. The book also presents information from a systems management point of view, describing the systems management and configuration tasks and techniques that you must consider when implementing a channels and containers solution. The book chooses a sample application in the CICS catalog manager example, and describes how you can port an existing CICS application to use channels and containers rather than using COMMAREAs.
Publisher: IBM Redbooks
ISBN: 0738440507
Category : Computers
Languages : en
Pages : 276
Book Description
This IBM® Redbooks® publication describes the new channels and containers support in IBM Customer Information Control System (CICS®) Transaction Server V5.2. The book begins with an overview of the techniques used to pass data between applications running in CICS. This book describes the constraints that these data techniques might be subject to, and how a channels and containers solution can provide solid advantages alongside these techniques. These capabilities enable CICS to fully comply with emerging technology requirements in terms of sizing and flexibility. The book then goes on to describe application design, and looks at implementing channels and containers from an application programmer point of view. It provides examples to show how to evolve channels and containers from communication areas (COMMAREAs). Next, the book explains the channels and containers application programming interface (API). It also describes how this API can be used in both traditional CICS applications and a Java CICS (JCICS) applications. The business transaction services (BTS) API is considered as a similar yet recoverable alternative to channels and containers. Some authorized program analysis reports (APARs) are introduced, which enable more flexible web services features by using channels and containers. The book also presents information from a systems management point of view, describing the systems management and configuration tasks and techniques that you must consider when implementing a channels and containers solution. The book chooses a sample application in the CICS catalog manager example, and describes how you can port an existing CICS application to use channels and containers rather than using COMMAREAs.
CICS and SOA: Architecture and Integration Choices
Author: Chris Rayns
Publisher: IBM Redbooks
ISBN: 0738436739
Category : Computers
Languages : en
Pages : 322
Book Description
The service-oriented architecture (SOA) style of integration involves breaking an application down into common, repeatable services that can be used by other applications (both internal and external) in an organization, independent of the computing platforms on which the business and its partners rely. In recent years CICS® has added a variety of support for SOA and now provides near seamless connectivity with other IT environments. This IBM® Redbooks® publication helps IT architects to select, plan, and design solutions that integrate CICS applications as service providers and requesters. First, we provide an introduction to CICS service enablement and introduce the architectural choices and technologies on which a CICS SOA solution can be based. We continue with an in-depth analysis of how to meet functional and non-functional requirements in the areas of application interface, security, transactional scope, high availability, and scalability. Finally, we document three integration scenarios to illustrate how these technologies have been used by customers to build robust CICS integration solutions.
Publisher: IBM Redbooks
ISBN: 0738436739
Category : Computers
Languages : en
Pages : 322
Book Description
The service-oriented architecture (SOA) style of integration involves breaking an application down into common, repeatable services that can be used by other applications (both internal and external) in an organization, independent of the computing platforms on which the business and its partners rely. In recent years CICS® has added a variety of support for SOA and now provides near seamless connectivity with other IT environments. This IBM® Redbooks® publication helps IT architects to select, plan, and design solutions that integrate CICS applications as service providers and requesters. First, we provide an introduction to CICS service enablement and introduce the architectural choices and technologies on which a CICS SOA solution can be based. We continue with an in-depth analysis of how to meet functional and non-functional requirements in the areas of application interface, security, transactional scope, high availability, and scalability. Finally, we document three integration scenarios to illustrate how these technologies have been used by customers to build robust CICS integration solutions.
IBM CICS and Liberty: What You Need to Know
Author: Hernan Cunico
Publisher: IBM Redbooks
ISBN: 0738441368
Category : Computers
Languages : en
Pages : 252
Book Description
This IBM® Redbooks® publication, intended for architects, application developers, and system programmers, describes how to design and implement Java web-based applications in an IBM CICS® Liberty JVM server. This book is based on IBM CICS Transaction Server V5.3 (CICS TS) using the embedded IBM WebSphere® Application Server Liberty V8.5.5 technology. Liberty is an asset to your organization, whether you intend to extend existing enterprise services hosted in CICS, or develop new web-based applications supporting new lines of business. Fundamentally, Liberty is a composable, dynamic profile of IBM WebSphere Application Server that enables you to provision Java EE technology on a feature-by-feature basis. Liberty can be provisioned with as little as the HTTP transport and a servlet web container, or with the entire Java EE 6 Web Profile feature set depending on your application requirements. This publication includes a Technology Essentials section for architects and application developers to help understand the underlying technology, an Up-and-Running section for system programmers implementing the Liberty JVM server for the first time, and a set of real-life application development scenarios.
Publisher: IBM Redbooks
ISBN: 0738441368
Category : Computers
Languages : en
Pages : 252
Book Description
This IBM® Redbooks® publication, intended for architects, application developers, and system programmers, describes how to design and implement Java web-based applications in an IBM CICS® Liberty JVM server. This book is based on IBM CICS Transaction Server V5.3 (CICS TS) using the embedded IBM WebSphere® Application Server Liberty V8.5.5 technology. Liberty is an asset to your organization, whether you intend to extend existing enterprise services hosted in CICS, or develop new web-based applications supporting new lines of business. Fundamentally, Liberty is a composable, dynamic profile of IBM WebSphere Application Server that enables you to provision Java EE technology on a feature-by-feature basis. Liberty can be provisioned with as little as the HTTP transport and a servlet web container, or with the entire Java EE 6 Web Profile feature set depending on your application requirements. This publication includes a Technology Essentials section for architects and application developers to help understand the underlying technology, an Up-and-Running section for system programmers implementing the Liberty JVM server for the first time, and a set of real-life application development scenarios.
IBM CICS Performance Series: CICS TS for z/OS V5 Performance Report
Author: Ian Burnett
Publisher: IBM Redbooks
ISBN: 0738457930
Category : Computers
Languages : en
Pages : 262
Book Description
This IBM Redbooks® publication gives a broad understanding of several important concepts that are used when describing IBM CICS Transaction Server (TS) for IBM z/OS (CICS TS) performance. This publication also describes many of the significant performance improvements that can be realized by upgrading your environment to the most recent release of CICS TS. This book targets the following audience: Systems Architects wanting to understand the performance characteristics and capabilities of a specific CICS TS release. Capacity Planners and Performance Analysts wanting to understand how an upgrade to the latest release of CICS TS affects their environment. Application Developers wanting to design and code highly optimized applications for deployment into a CICS TS environment. This book covers the following topics: A description of the factors that are involved in the interaction between IBM z® Systems hardware and a z/OS software environment. A definition of key terminology that is used when describing the results of CICS TS performance benchmarks. A presentation of how to collect the required data (and the methodology used) when applying Large Scale Performance Reference (LSPR) capacity information to a CICS workload in your environment. An outline of the techniques that are applied by the CICS TS performance team to achieve consistent and accurate performance benchmark results. High-level descriptions of several key workloads that are used to determine the performance characteristics of a CICS TS release. An introduction to the open transaction environment and task control block (TCB) management logic in CICS TS, including a reference that describes how several configuration attributes combine to affect the behavior of the CICS TS dispatcher. Detailed information that relates to changes in performance characteristics between successive CICS TS releases, covering comparisons that relate to CICS TS V4.2, V5.1, V5.2, V5.3, V5.4, and V5.5. The results of several small performance studies to determine the cost of using a specific CICS functional area.
Publisher: IBM Redbooks
ISBN: 0738457930
Category : Computers
Languages : en
Pages : 262
Book Description
This IBM Redbooks® publication gives a broad understanding of several important concepts that are used when describing IBM CICS Transaction Server (TS) for IBM z/OS (CICS TS) performance. This publication also describes many of the significant performance improvements that can be realized by upgrading your environment to the most recent release of CICS TS. This book targets the following audience: Systems Architects wanting to understand the performance characteristics and capabilities of a specific CICS TS release. Capacity Planners and Performance Analysts wanting to understand how an upgrade to the latest release of CICS TS affects their environment. Application Developers wanting to design and code highly optimized applications for deployment into a CICS TS environment. This book covers the following topics: A description of the factors that are involved in the interaction between IBM z® Systems hardware and a z/OS software environment. A definition of key terminology that is used when describing the results of CICS TS performance benchmarks. A presentation of how to collect the required data (and the methodology used) when applying Large Scale Performance Reference (LSPR) capacity information to a CICS workload in your environment. An outline of the techniques that are applied by the CICS TS performance team to achieve consistent and accurate performance benchmark results. High-level descriptions of several key workloads that are used to determine the performance characteristics of a CICS TS release. An introduction to the open transaction environment and task control block (TCB) management logic in CICS TS, including a reference that describes how several configuration attributes combine to affect the behavior of the CICS TS dispatcher. Detailed information that relates to changes in performance characteristics between successive CICS TS releases, covering comparisons that relate to CICS TS V4.2, V5.1, V5.2, V5.3, V5.4, and V5.5. The results of several small performance studies to determine the cost of using a specific CICS functional area.