MVS Control Blocks

MVS Control Blocks
Author: Hank A. Murphy
Publisher: McGraw-Hill Companies
Total Pages: 488
Release: 1995
Genre: Computers
ISBN:

This book is a highly technical treatment of the internal logic of IBM's MVS mainframe operating system. Seasoned system programmers who desire a very detailed reference will find it extremely useful in fine tuning, troubleshooting/problem determination, systems software development, and much more.

VSAM Demystified

VSAM Demystified
Author: Mary Lovelace
Publisher: IBM Redbooks
Total Pages: 458
Release: 2022-08-24
Genre: Computers
ISBN: 0738437433

Virtual Storage Access Method (VSAM) is one of the access methods used to process data. Many of us have used VSAM and work with VSAM data sets daily, but exactly how it works and why we use it instead of another access method is a mystery. This book helps to demystify VSAM and gives you the information necessary to understand, evaluate, and use VSAM properly. This book also builds upon the subject of Record Level Sharing and DFSMStvs. It clarifies VSAM functions for application programmers who work with VSAM. The practical, straightforward approach should dispel much of the complexity associated with VSAM. Wherever possible an example is used to reinforce a description of a VSAM function. This IBM® Redbooks® publication is intended as a supplement to existing product manuals. It is intended to be used as an initial point of reference for VSAM functions.

ABCs of z/OS System Programming Volume 13

ABCs of z/OS System Programming Volume 13
Author: Paul Rogers
Publisher: IBM Redbooks
Total Pages: 1038
Release: 2012-02-07
Genre: Computers
ISBN: 0738436259

A major goal of operating systems is to process jobs while making the best use of system resources. Thus, one way of viewing operating systems is as resource managers. Before job processing, operating systems reserve input and output resources for jobs. During job processing, operating systems manage resources such as processors and storage. After job processing, operating systems free all resources used by the completed jobs, making the resources available to other jobs. This process is called resource management. There is more to the processing of jobs than the managing of resources needed by the jobs. At any instant, a number of jobs can be in various stages of preparation, processing, and post-processing activity. To use resources efficiently, operating systems divide jobs into parts. They distribute the parts of jobs to queues to wait for needed resources. Keeping track of where things are and routing work from queue to queue is called workflow management, and is a major function of any operating system. JES3 considers job priorities, device and processor alternatives, and installation-specified preferences in preparing jobs for processing job output. This IBM® Redbooks® publication describes a JES3 environment that includes the following: - Single-system image - Workload balancing - Availability - Control flexibility - Physical planning flexibility.

A Guide to JES3 to JES2 Migration

A Guide to JES3 to JES2 Migration
Author: Lydia Parziale
Publisher: IBM Redbooks
Total Pages: 288
Release: 2019-11-06
Genre: Computers
ISBN: 0738458201

This IBM® Redbooks® publication provides information to help clients that have JES3 and want to migrate to JES2. It provides a comprehensive list of the differences between the two job entry subsystems and provides information to help you determine the migration effort and actions. This book considers the features of JES2 as available on releases of IBM z/OS® V2R3 and V2R4. It should be used with JES3 to JES2 Migration Considerations, SG24-8083. This publication is divided into three parts: Part 1, "Planning to migrate from JES3 to JES2" on page 1, gives you information to make the decision and plan your migration. Part 2, "Use case study" on page 111, provides a Use Case Study that is based on an actual customer experience in a successful migration. Part 3, "Appendixes" on page 193, provides an appendix with sample tools that can help the migration process and exploitation of some of the new JES2 functions. This book is aimed at operations personnel, system programmers, and application developers

IBM IMS Version 12 Technical Overview

IBM IMS Version 12 Technical Overview
Author: Paolo Bruni
Publisher: IBM Redbooks
Total Pages: 510
Release: 2011-10-25
Genre: Computers
ISBN: 073843616X

IBM® Information Management System (IMSTM) provides leadership in performance, reliability, and security to help you implement the most strategic and critical enterprise applications. IMS also keeps pace with the IT industry. IMS, Enterprise Suite 2.1, and IMS Tools continue to evolve to provide value and meet the needs of enterprise customers. With IMS 12, integration and open access improvements provide flexibility and support business growth requirements. Manageability enhancements help optimize system staff productivity by improving ease of use and autonomic computing facilities and by providing increased availability. Scalability improvements have been made to the well-known performance, efficiency, availability, and resilience of IMS by using 64-bit storage. IBM IMS Enterprise Suite for z/OS® V2.1 components enhance the use of IMS applications and data. In this release, components (either orderable or downloaded from the web) deliver innovative new capabilities for your IMS environment. They enhance connectivity, expand application development, extend standards and tools for a service-oriented architecture (SOA), ease installation, and provide simplified interfaces. This IBM Redbooks® publication explores the new features of IMS 12 and Enterprise Suite 2.1 and provides an overview of the IMS tools. In addition, this book highlights the major new functions and facilitates database administrators in their planning for installation and migration.

Model Based Process Control

Model Based Process Control
Author: T.J. McAvoy
Publisher: Elsevier
Total Pages: 166
Release: 2014-06-28
Genre: Computers
ISBN: 148329823X

Presented at this workshop were mathematical models upon which process control is based and the practical applications of this method of control within industry; case studies include examples from the paper and pulp industry, materials industry and the chemical industry, among others. From these presentations emerged a need for further research and development into process control. Containing 19 papers these Proceedings will be a valuable reference work for all those involved in the designing of continuous production processes for industry and for the end user involved in the practical application of process control within their manufacturing process.

ABCs of z/OS System Programming Volume 8

ABCs of z/OS System Programming Volume 8
Author: Paul Rogers
Publisher: IBM Redbooks
Total Pages: 396
Release: 2012-07-26
Genre: Computers
ISBN: 0738436828

The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection serves as a powerful technical tool. . This IBM Redbooks® publication, Volume 8, shows you how to: - Adopt a systematic and thorough approach to dealing with problems and identifying the different types of problems - Determine where to look for diagnostic information and how to obtain it - Interpret and analyze the diagnostic data collected - Escalate problems to the IBM Support Center when necessary - Collect and analyze diagnostic data—a dynamic and complex process - Identify and document problems, collect and analyze pertinent diagnostic data and obtain help as needed, to speed you on your way to problem resolution The content of the volumes is as follows Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment® Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM® Volume 5: Base and Parallel Sysplex® , System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel SysplexTM (GDPS® ) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries® firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint® Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/ArchitectureTM , zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, WLM, RMFTM , and SMF

Computerworld

Computerworld
Author:
Publisher:
Total Pages: 124
Release: 1984-07-23
Genre:
ISBN:

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
Author: Axel Buecker
Publisher: IBM Redbooks
Total Pages: 332
Release: 2016-03-22
Genre: Computers
ISBN: 0738440108

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the Security Server and Communication Server components. This book describes z/OS and other operating systems and additional software that leverage the building blocks of System z hardware to provide solutions to business security needs. This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.