SlideShare a Scribd company logo
1 of 40
© 2015 IBM Corporation
There’s a new Sheriff in Town
CICS Policy Based Management
Session 2844
Steve Zemblowski
zem@us.ibm.com
Session Abstract
My systems work perfectly—it’s the applications that are the
problem!” If you have ever said (or thought) that, then this session
is for you.
Outages do not have to be "an application issue" anymore. In
CICS TS 5, new policy-based capabilities allow you to set
thresholds on the resources that your applications are allowed to
consume. Rogue applications can be detected through various
task threshold policies, such as excessive file or database access,
repetitive program links, or abnormal storage requests. Once
detected, you have the ability to notify, to react, or to ABEND.
There’s a new sheriff in town, and it’s you. Come to this session to
learn how to exercise your new power wisely.
1
Session Agenda
• CICS Policy Based Management
• Resources
• Actions
• Policy Scope
• Summary
2
CICS Policies
• Can control the behavior of Applications and Platforms
• Define threshold conditions to manage user tasks
• Monitor the resource usage of a task
• Automatically take action when threshold is exceeded
• Detection of looping or runaway tasks
• A condition and action pair make up a policy rule
• Multiple rules can be defined in a policy
• Policies are defined in a CICS bundle
• Multiple policies can be in a single bundle
4
6
CICS Policies…
• Available Actions
• Issue a message
» DFHMP3001
• Emit an Event
• Abort the task
» Abend code AMPB or user specified
8
CICS Policies…
• Policy Based Management
• Condition and action
• Action can be:
– Emit a message
– Emit a system event
– Abend the task
Define a Policy
Threshold
breach
CICS Triggers an
action
Abend EventMessage
Trigger an action
SQL
Files
Storage
CPU An XML Policy document defines
the threshold and action
Policy Rule Types
• Database request
• File request
• Program request
• Start request
• Storage request
• Syncpoint request
• Transient Data request
• Temporary Storage request
10
Database
• Define a threshold for the
number of SQL requests
• Includes requests
issued in exits
– e.g. CICS VSAM
Transparency
12
File
• Define a threshold for the
number of FILE requests
• Applies to a specific file
command
• Not a cumulative count
• Counted whether the
command is successful
of not
• Counted for the user
task in the AOR whether
the file is local or remote
14
Program
• Define a threshold for the
number of LINK requests
• Includes a count of the
INVOKE APPLICATION
requests
16
Start
• Define a threshold for the
number of START requests
• Request counted
whether successful or
not
– e.g. XICREQ returns an
IGNORE response
– e.g. XICERES returns a
resource not available
response
18
Storage
• Define a threshold for the
amount of STORAGE
allocated to the user task
• Count includes all
GETMAIN requests for
a task
– Explicit and Implicit
• Count is decremented
when an explicit or
implicit FREEMAIN is
issued
– Not for SHARED
storage
20
Storage Requests
• Define a threshold for the
number of STORAGE
requests for the user task
• Count includes all
requests for a task
– Explicit and Implicit
• e.g. EXEC CICS
READ FILE SET
22
Syncpoint
• Define a threshold for the
number of SYNCPOINT
requests for the user task
• ROLLBACK is included
in the count
24
Time
• Define a threshold for the
amount of TIME consumed
by a user task
• CPU Time
– Check is made when a
task gives up control
– Use RUNAWAY controls
to detect a tight loop
• ELAPSED Time
– Check is made when a
task issues an EXEC
CICS command or
invokes a TRUE
• ABEND action will be
taken after the
command completes
26
Transient Data
• Define a threshold for the
number of TRANSIENT
DATA requests for the user
task
• Be aware other products
write to Transient Data
– Language Environment
for diagnostic
information
– TCP/IP Socket Interface
for CICS
28
Temporary Storage Bytes
• Define a threshold for the
amount of data written to
TEMPORARY STORAGE
by a user task
• Both WRITEQ TS and
REWRITE TS are
counted
• REWRITE TS count is
the total size of the
rewrite, not the delta
30
Temporary Storage
• Define a threshold for the
number of TEMPORARY
STORAGE requests by a
user task
• REWRITE TS is
counted as a WRITEQ
• Request are counted
whether successful or
not
• Synchronous events to
temporary storage are
counted
32
Policy Exceptions
• Policies do not apply to:
• CICS system tasks
– Includes CPLT at systems initialization
• All terminal initiated CICS supplied transactions
– Except CECI
• All user tasks started by event processing
• All non-terminal CICS supplied transactions
– Except:
• All web interface tasks
• All CICS MQ bridge tasks
• All CICS mirror transactions
• All Liberty initiated transactions
• All CICS pipeline tasks
34
Policy Scope
• Policies are deployed to a specific scope
• Application scope
• Operation within an application scope
• Platform scope
• No scope (e.g. Region scope)
• Policies are defined in CICS bundles
• Scope is determined by where the bundle is deployed
– Platform: packaged as part of the platform and deployed during
platform installation
– Application: packaged as part of the application and deployed when
the application is installed
– Operation: policy associated with the entry point (operation)
– Region: defined in the CSD and installed in any CICS region
36
Policy Scope…
• Associating a policy with an operation
• A PROGRAM or URIMAP can be an entry point and thus
provide an operation to which policy can be applied
38
Policy Scope…
• Configuration example
4040
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy Scope…
• No scope (Region scope)
Region
Task Task Task Task
Policy
Policy Scope…
• Platform scope
44
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy
Policy Scope…
• Application scope
46
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P
Policy
Binding B2P
Operation
Policy Scope…
• Operation scope
48
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy
Policy Scope…
• Application scope – Multi-versioning
50
Application A 1.0.0
Platform P
Operation
Application A 1.0.1
Operation Operation
Binding A2P 1.0.0
Policy P
Binding A2P 1.0.1
Operation
Policy P’Policy Q Policy Q
Policy Scope…
• An example of a multiple policies being applied
Monitoring
• Performance class group, DFHCICS
• MPPRTXCD
» Number of policy rule thresholds that this task has exceeded
• Performance Analyzer 52
• Sample forms provided for current policies
System Events
 Capture events when:
– DB2 connection status changes
– FILE enable status changes
– FILE open status changes
– CICS message is issued
– Unhandled transaction abends
– Current active tasks for a TRANCLASS goes above or below a
certain percentage of MAXACTIVE
– Current active task in a region goes above or below a certain
percentage of MAXTASKs
56
Differences between Policies and Events
• Events
• Emitted when something of interest happens
– e.g. Transaction abend
• Convey information about what happened
• Cannot control or constrain processing
• Policies
• Define a contract on how the system/application is to behave
– Define a boundary within the task can execute
• Apply to instances of user tasks
• Can enforce the rules with in a policy
– Tasks that break the rules are subject to the specified action
58
Documentation (SG24-8114)
CICS Transaction Server V5,3 open beta
• New Policy Rules
• Name Counter Server
– GET COUNTER|DCOUNTER
• Temporary Storage
– Support for Shared TS
• WebSphere MQ
– Number of MQ requests
• IMS
– Number of DBCTL calls
• New Entry Point
• Transaction
– Allows association of a policy with a TRANID
62
What’s next…
More of my sessions
#2809 Five compelling reasons for creating a CICS Cloud
#2844 There’s a new Sheriff in Town – CICS Policy Based Management
#6638 Upgrading to CICS 52
More Cloud sessions
#4156 Twist and Cloud - How customers make CICS dance
#3034 Build a WebSphere Linux Cloud on System z: from roll your own to pre-integrated
#3239 Using cloud techniques and technologies to make your mainframe more efficient
Collect a z Passport sticker here, and at…
@IBM_CICS slideshare.net/IBM_CICSfacebook.com/IBMCICS ibm.com/cics
WIN!
Get a lightning start: Key InterConnect 2015 sessions
#2829 Mon 2:00-3:00 Liberté, Égalité, Fraternité—Viva the CICS and WebSphere Mini Revolution
#1670 Tue 3:30-4:30 IBM WebSphere Liberty z/OS Connect: A Technical Introduction
#4032 Wed 9:30-10:30 Meet the Winners of IBM’s Mainframe Mobile App Throwdown 2014
#6482 Thu 11:00-11:50 What is the Mainframe Mobile App Throwdown and How Do I Register?
Register now at
ibm.biz/mmathrowdown
and submit your app by April 12th
Mobilize your mainframe in our fun app-building contest for
z Systems clients & business partners!
The Mainframe Mobile App Throwdown
is back for 2015!
Need expert help?
66
CICS Development Services, for worldwide services assistance
Bringing CICS development expertise directly to your doorstep
Email us CICSDTS@UK.IBM.COM
Get a deep dive into your systems
with a CICS health check
Want to know more about CICS and
Java? We offer tailored Java
education
Move forward with mobile with our
customized mobile workshop
Soar into the cloud with our
tailored cloud workshop
Need to optimize your systems?
Then ask about a performance
optimization engagement
Get the low down on performance
with a CICS performance workshops
Need to modernise your workload in
CICS? Ask about a integration and
connectivity engagement
Need some help upgrading to the
latest release? Then ask about our
upgrade workshop
Need to reduce cost by optimizing
your systems? Then a performance
optimization engagement may be for
you
Need something different? Then we
can build a customized workshop,
just for you!
Availability a concern? Then try our
High Availability workshop
Visit ibm.com/cics
then click ‘Services’
Summary
• CICS Policy Based Management
• Allow you to set thresholds on the resources that your
applications are allowed to consume
• Allow you the ability to notify, to react, or to ABEND rogue tasks
• Allow you to define the scope of your policy rules
• Give you capabilities to protect and control your CICS systems
67
Notices and Disclaimers
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or
transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been
reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM
shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY,
EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF
THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT
OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the
agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without
notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are
presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual
performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products,
programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not
necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither
intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal
counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s
business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or
represent or warrant that its services or products will ensure that the customer is in compliance with any law.
Notices and Disclaimers (con’t)
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products in connection with this
publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any
IBM patents, copyrights, trademarks or other intellectual property right.
• IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document
Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand,
ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™,
PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®,
pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®,
urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of
International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on
the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
Thank You
Your Feedback is
Important!
Session 2844
Access the InterConnect 2015
Conference CONNECT Attendee
Portal to complete your session
surveys from your smartphone,
laptop or conference kiosk.

More Related Content

What's hot

3 the cloud
3 the cloud 3 the cloud
3 the cloud Len Bass
 
6 microservice architecture
6 microservice architecture6 microservice architecture
6 microservice architectureLen Bass
 
Adaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAdaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAlgoSec
 
New Tech for Project Managers
New Tech for Project ManagersNew Tech for Project Managers
New Tech for Project ManagersPratip Mallik
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetPerforce
 
2 networking
2 networking2 networking
2 networkingLen Bass
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Studynicholas njoroge
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentNeil Busby
 
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to MinutesAcceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to MinutesFileCatalyst
 
Engage 2016 - IBM Verse
Engage 2016 - IBM VerseEngage 2016 - IBM Verse
Engage 2016 - IBM VerseRoland Driesen
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleMofizur Rahman
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoMarcoTechnologies
 
Private cloud with vmware
Private cloud with vmwarePrivate cloud with vmware
Private cloud with vmwareAnton An
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyAdi Gazit Blecher
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationPCCW GLOBAL
 
PayPal Customer Presentation
PayPal Customer PresentationPayPal Customer Presentation
PayPal Customer PresentationSplunk
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationNetCraftsmen
 

What's hot (20)

3 the cloud
3 the cloud 3 the cloud
3 the cloud
 
6 microservice architecture
6 microservice architecture6 microservice architecture
6 microservice architecture
 
Adaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAdaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven Approach
 
New Tech for Project Managers
New Tech for Project ManagersNew Tech for Project Managers
New Tech for Project Managers
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and Interset
 
2 networking
2 networking2 networking
2 networking
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda Content
 
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to MinutesAcceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to Minutes
 
Engage 2016 - IBM Verse
Engage 2016 - IBM VerseEngage 2016 - IBM Verse
Engage 2016 - IBM Verse
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - Cisco
 
Private cloud with vmware
Private cloud with vmwarePrivate cloud with vmware
Private cloud with vmware
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiency
 
Chapter09
Chapter09Chapter09
Chapter09
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 
PayPal Customer Presentation
PayPal Customer PresentationPayPal Customer Presentation
PayPal Customer Presentation
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network Virtualization
 

Viewers also liked

designing windows user experiences
 designing windows user experiences designing windows user experiences
designing windows user experiencesLaila Omran
 
Oumh1303 20130712 155801
Oumh1303 20130712 155801Oumh1303 20130712 155801
Oumh1303 20130712 155801kuok kuoklin
 
InterConnect session 2819 1_billion_smart Phones
InterConnect session 2819  1_billion_smart PhonesInterConnect session 2819  1_billion_smart Phones
InterConnect session 2819 1_billion_smart Phonesnick_garrod
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_centernick_garrod
 
2545 Debugging back to-basics
2545   Debugging back to-basics2545   Debugging back to-basics
2545 Debugging back to-basicsnick_garrod
 
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...nick_garrod
 
SHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile PricingSHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile Pricingnick_garrod
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devopsnick_garrod
 
4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dance4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dancenick_garrod
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloudnick_garrod
 
Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesnick_garrod
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)nick_garrod
 
20150522101718 歷代散文發展
20150522101718 歷代散文發展20150522101718 歷代散文發展
20150522101718 歷代散文發展kuok kuoklin
 
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networkingnick_garrod
 
Живописной науки мастер
Живописной науки  мастерЖивописной науки  мастер
Живописной науки мастерBiblioteka-22
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternitenick_garrod
 

Viewers also liked (18)

designing windows user experiences
 designing windows user experiences designing windows user experiences
designing windows user experiences
 
Oumh1303 20130712 155801
Oumh1303 20130712 155801Oumh1303 20130712 155801
Oumh1303 20130712 155801
 
InterConnect session 2819 1_billion_smart Phones
InterConnect session 2819  1_billion_smart PhonesInterConnect session 2819  1_billion_smart Phones
InterConnect session 2819 1_billion_smart Phones
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_center
 
2545 Debugging back to-basics
2545   Debugging back to-basics2545   Debugging back to-basics
2545 Debugging back to-basics
 
看图写话
看图写话看图写话
看图写话
 
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...Session 2546 -  Solving Performance Problems in CICS using CICS Performance A...
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
 
SHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile PricingSHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile Pricing
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devops
 
4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dance4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dance
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloud
 
Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilities
 
SOP Merakit PC
SOP Merakit PCSOP Merakit PC
SOP Merakit PC
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
 
20150522101718 歷代散文發展
20150522101718 歷代散文發展20150522101718 歷代散文發展
20150522101718 歷代散文發展
 
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
 
Живописной науки мастер
Живописной науки  мастерЖивописной науки  мастер
Живописной науки мастер
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternite
 

Similar to 2844 inter connect cics policy (2844)

1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...Matthew Webster
 
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesSHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesnick_garrod
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloudnick_garrod
 
SHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloudSHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloudnick_garrod
 
Share 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical OverviewShare 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical Overviewnick_garrod
 
Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services RightScale
 
IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview nick_garrod
 
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...nick_garrod
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz wordQuadrisk
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to AdvisorsJesse Stockall
 
Mainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataMainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataDevOps for Enterprise Systems
 
Cloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia DavisCloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia DavisVMware Tanzu
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIsCisco DevNet
 
Kubernetes on the Edge / 在邊緣的K8S
Kubernetes on the Edge / 在邊緣的K8SKubernetes on the Edge / 在邊緣的K8S
Kubernetes on the Edge / 在邊緣的K8SYi-Fu Ciou
 
The Need of Cloud-Native Application
The Need of Cloud-Native ApplicationThe Need of Cloud-Native Application
The Need of Cloud-Native ApplicationEmiliano Pecis
 
Cloud Readiness 101: Analyzing and Visualizing Your IT Infrastructure
Cloud Readiness 101: Analyzing and Visualizing Your IT InfrastructureCloud Readiness 101: Analyzing and Visualizing Your IT Infrastructure
Cloud Readiness 101: Analyzing and Visualizing Your IT Infrastructurepanagenda
 
16370 cics project opening and project update f
16370  cics project opening and project update f16370  cics project opening and project update f
16370 cics project opening and project update fnick_garrod
 
VMworld 2013: SDDC IT Operations Transformation: Multi-customer Lessons Learned
VMworld 2013: SDDC IT Operations Transformation:  Multi-customer Lessons LearnedVMworld 2013: SDDC IT Operations Transformation:  Multi-customer Lessons Learned
VMworld 2013: SDDC IT Operations Transformation: Multi-customer Lessons LearnedVMworld
 

Similar to 2844 inter connect cics policy (2844) (20)

1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...
 
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesSHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud
 
SHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloudSHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloud
 
Share 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical OverviewShare 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical Overview
 
Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services
 
IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview
 
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz word
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to Advisors
 
Mainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataMainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live Data
 
Cloud-native Data
Cloud-native DataCloud-native Data
Cloud-native Data
 
Cloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia DavisCloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia Davis
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
 
Cloud Computing Basics
Cloud Computing BasicsCloud Computing Basics
Cloud Computing Basics
 
Kubernetes on the Edge / 在邊緣的K8S
Kubernetes on the Edge / 在邊緣的K8SKubernetes on the Edge / 在邊緣的K8S
Kubernetes on the Edge / 在邊緣的K8S
 
The Need of Cloud-Native Application
The Need of Cloud-Native ApplicationThe Need of Cloud-Native Application
The Need of Cloud-Native Application
 
Cloud Readiness 101: Analyzing and Visualizing Your IT Infrastructure
Cloud Readiness 101: Analyzing and Visualizing Your IT InfrastructureCloud Readiness 101: Analyzing and Visualizing Your IT Infrastructure
Cloud Readiness 101: Analyzing and Visualizing Your IT Infrastructure
 
16370 cics project opening and project update f
16370  cics project opening and project update f16370  cics project opening and project update f
16370 cics project opening and project update f
 
VMworld 2013: SDDC IT Operations Transformation: Multi-customer Lessons Learned
VMworld 2013: SDDC IT Operations Transformation:  Multi-customer Lessons LearnedVMworld 2013: SDDC IT Operations Transformation:  Multi-customer Lessons Learned
VMworld 2013: SDDC IT Operations Transformation: Multi-customer Lessons Learned
 

More from nick_garrod

Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)nick_garrod
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudnick_garrod
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
 
S105 performance
S105 performanceS105 performance
S105 performancenick_garrod
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilitynick_garrod
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridgednick_garrod
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you nick_garrod
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle libertynick_garrod
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSnick_garrod
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloudnick_garrod
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewnick_garrod
 
Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenariosnick_garrod
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 
Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4nick_garrod
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soanick_garrod
 
Session 4708 - Omegamon for CICS customer experience at Garanti Technology
Session 4708 - Omegamon for CICS customer experience at Garanti TechnologySession 4708 - Omegamon for CICS customer experience at Garanti Technology
Session 4708 - Omegamon for CICS customer experience at Garanti Technologynick_garrod
 

More from nick_garrod (20)

Api management customer
Api management customerApi management customer
Api management customer
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)
 
S109 cics-java
S109 cics-javaS109 cics-java
S109 cics-java
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloud
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cics
 
S105 performance
S105 performanceS105 performance
S105 performance
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agility
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle liberty
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloud
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overview
 
Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenarios
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4
 
2829 liberty
2829 liberty2829 liberty
2829 liberty
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soa
 
Session 4708 - Omegamon for CICS customer experience at Garanti Technology
Session 4708 - Omegamon for CICS customer experience at Garanti TechnologySession 4708 - Omegamon for CICS customer experience at Garanti Technology
Session 4708 - Omegamon for CICS customer experience at Garanti Technology
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

2844 inter connect cics policy (2844)

  • 1. © 2015 IBM Corporation There’s a new Sheriff in Town CICS Policy Based Management Session 2844 Steve Zemblowski zem@us.ibm.com
  • 2. Session Abstract My systems work perfectly—it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be "an application issue" anymore. In CICS TS 5, new policy-based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rogue applications can be detected through various task threshold policies, such as excessive file or database access, repetitive program links, or abnormal storage requests. Once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely. 1
  • 3. Session Agenda • CICS Policy Based Management • Resources • Actions • Policy Scope • Summary 2
  • 4. CICS Policies • Can control the behavior of Applications and Platforms • Define threshold conditions to manage user tasks • Monitor the resource usage of a task • Automatically take action when threshold is exceeded • Detection of looping or runaway tasks • A condition and action pair make up a policy rule • Multiple rules can be defined in a policy • Policies are defined in a CICS bundle • Multiple policies can be in a single bundle 4
  • 5. 6 CICS Policies… • Available Actions • Issue a message » DFHMP3001 • Emit an Event • Abort the task » Abend code AMPB or user specified
  • 6. 8 CICS Policies… • Policy Based Management • Condition and action • Action can be: – Emit a message – Emit a system event – Abend the task Define a Policy Threshold breach CICS Triggers an action Abend EventMessage Trigger an action SQL Files Storage CPU An XML Policy document defines the threshold and action
  • 7. Policy Rule Types • Database request • File request • Program request • Start request • Storage request • Syncpoint request • Transient Data request • Temporary Storage request 10
  • 8. Database • Define a threshold for the number of SQL requests • Includes requests issued in exits – e.g. CICS VSAM Transparency 12
  • 9. File • Define a threshold for the number of FILE requests • Applies to a specific file command • Not a cumulative count • Counted whether the command is successful of not • Counted for the user task in the AOR whether the file is local or remote 14
  • 10. Program • Define a threshold for the number of LINK requests • Includes a count of the INVOKE APPLICATION requests 16
  • 11. Start • Define a threshold for the number of START requests • Request counted whether successful or not – e.g. XICREQ returns an IGNORE response – e.g. XICERES returns a resource not available response 18
  • 12. Storage • Define a threshold for the amount of STORAGE allocated to the user task • Count includes all GETMAIN requests for a task – Explicit and Implicit • Count is decremented when an explicit or implicit FREEMAIN is issued – Not for SHARED storage 20
  • 13. Storage Requests • Define a threshold for the number of STORAGE requests for the user task • Count includes all requests for a task – Explicit and Implicit • e.g. EXEC CICS READ FILE SET 22
  • 14. Syncpoint • Define a threshold for the number of SYNCPOINT requests for the user task • ROLLBACK is included in the count 24
  • 15. Time • Define a threshold for the amount of TIME consumed by a user task • CPU Time – Check is made when a task gives up control – Use RUNAWAY controls to detect a tight loop • ELAPSED Time – Check is made when a task issues an EXEC CICS command or invokes a TRUE • ABEND action will be taken after the command completes 26
  • 16. Transient Data • Define a threshold for the number of TRANSIENT DATA requests for the user task • Be aware other products write to Transient Data – Language Environment for diagnostic information – TCP/IP Socket Interface for CICS 28
  • 17. Temporary Storage Bytes • Define a threshold for the amount of data written to TEMPORARY STORAGE by a user task • Both WRITEQ TS and REWRITE TS are counted • REWRITE TS count is the total size of the rewrite, not the delta 30
  • 18. Temporary Storage • Define a threshold for the number of TEMPORARY STORAGE requests by a user task • REWRITE TS is counted as a WRITEQ • Request are counted whether successful or not • Synchronous events to temporary storage are counted 32
  • 19. Policy Exceptions • Policies do not apply to: • CICS system tasks – Includes CPLT at systems initialization • All terminal initiated CICS supplied transactions – Except CECI • All user tasks started by event processing • All non-terminal CICS supplied transactions – Except: • All web interface tasks • All CICS MQ bridge tasks • All CICS mirror transactions • All Liberty initiated transactions • All CICS pipeline tasks 34
  • 20. Policy Scope • Policies are deployed to a specific scope • Application scope • Operation within an application scope • Platform scope • No scope (e.g. Region scope) • Policies are defined in CICS bundles • Scope is determined by where the bundle is deployed – Platform: packaged as part of the platform and deployed during platform installation – Application: packaged as part of the application and deployed when the application is installed – Operation: policy associated with the entry point (operation) – Region: defined in the CSD and installed in any CICS region 36
  • 21. Policy Scope… • Associating a policy with an operation • A PROGRAM or URIMAP can be an entry point and thus provide an operation to which policy can be applied 38
  • 22. Policy Scope… • Configuration example 4040 Application A Platform P Operation Application B Operation Operation Binding A2P Binding B2P Operation
  • 23. Policy Scope… • No scope (Region scope) Region Task Task Task Task Policy
  • 24. Policy Scope… • Platform scope 44 Application A Platform P Operation Application B Operation Operation Binding A2P Binding B2P Operation Policy
  • 25. Policy Scope… • Application scope 46 Application A Platform P Operation Application B Operation Operation Binding A2P Policy Binding B2P Operation
  • 26. Policy Scope… • Operation scope 48 Application A Platform P Operation Application B Operation Operation Binding A2P Binding B2P Operation Policy
  • 27. Policy Scope… • Application scope – Multi-versioning 50 Application A 1.0.0 Platform P Operation Application A 1.0.1 Operation Operation Binding A2P 1.0.0 Policy P Binding A2P 1.0.1 Operation Policy P’Policy Q Policy Q
  • 28. Policy Scope… • An example of a multiple policies being applied
  • 29. Monitoring • Performance class group, DFHCICS • MPPRTXCD » Number of policy rule thresholds that this task has exceeded • Performance Analyzer 52 • Sample forms provided for current policies
  • 30. System Events  Capture events when: – DB2 connection status changes – FILE enable status changes – FILE open status changes – CICS message is issued – Unhandled transaction abends – Current active tasks for a TRANCLASS goes above or below a certain percentage of MAXACTIVE – Current active task in a region goes above or below a certain percentage of MAXTASKs 56
  • 31. Differences between Policies and Events • Events • Emitted when something of interest happens – e.g. Transaction abend • Convey information about what happened • Cannot control or constrain processing • Policies • Define a contract on how the system/application is to behave – Define a boundary within the task can execute • Apply to instances of user tasks • Can enforce the rules with in a policy – Tasks that break the rules are subject to the specified action 58
  • 33. CICS Transaction Server V5,3 open beta • New Policy Rules • Name Counter Server – GET COUNTER|DCOUNTER • Temporary Storage – Support for Shared TS • WebSphere MQ – Number of MQ requests • IMS – Number of DBCTL calls • New Entry Point • Transaction – Allows association of a policy with a TRANID 62
  • 34. What’s next… More of my sessions #2809 Five compelling reasons for creating a CICS Cloud #2844 There’s a new Sheriff in Town – CICS Policy Based Management #6638 Upgrading to CICS 52 More Cloud sessions #4156 Twist and Cloud - How customers make CICS dance #3034 Build a WebSphere Linux Cloud on System z: from roll your own to pre-integrated #3239 Using cloud techniques and technologies to make your mainframe more efficient Collect a z Passport sticker here, and at… @IBM_CICS slideshare.net/IBM_CICSfacebook.com/IBMCICS ibm.com/cics WIN!
  • 35. Get a lightning start: Key InterConnect 2015 sessions #2829 Mon 2:00-3:00 Liberté, Égalité, Fraternité—Viva the CICS and WebSphere Mini Revolution #1670 Tue 3:30-4:30 IBM WebSphere Liberty z/OS Connect: A Technical Introduction #4032 Wed 9:30-10:30 Meet the Winners of IBM’s Mainframe Mobile App Throwdown 2014 #6482 Thu 11:00-11:50 What is the Mainframe Mobile App Throwdown and How Do I Register? Register now at ibm.biz/mmathrowdown and submit your app by April 12th Mobilize your mainframe in our fun app-building contest for z Systems clients & business partners! The Mainframe Mobile App Throwdown is back for 2015!
  • 36. Need expert help? 66 CICS Development Services, for worldwide services assistance Bringing CICS development expertise directly to your doorstep Email us CICSDTS@UK.IBM.COM Get a deep dive into your systems with a CICS health check Want to know more about CICS and Java? We offer tailored Java education Move forward with mobile with our customized mobile workshop Soar into the cloud with our tailored cloud workshop Need to optimize your systems? Then ask about a performance optimization engagement Get the low down on performance with a CICS performance workshops Need to modernise your workload in CICS? Ask about a integration and connectivity engagement Need some help upgrading to the latest release? Then ask about our upgrade workshop Need to reduce cost by optimizing your systems? Then a performance optimization engagement may be for you Need something different? Then we can build a customized workshop, just for you! Availability a concern? Then try our High Availability workshop Visit ibm.com/cics then click ‘Services’
  • 37. Summary • CICS Policy Based Management • Allow you to set thresholds on the resources that your applications are allowed to consume • Allow you the ability to notify, to react, or to ABEND rogue tasks • Allow you to define the scope of your policy rules • Give you capabilities to protect and control your CICS systems 67
  • 38. Notices and Disclaimers Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
  • 39. Notices and Disclaimers (con’t) Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. • IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
  • 40. Thank You Your Feedback is Important! Session 2844 Access the InterConnect 2015 Conference CONNECT Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.