SlideShare a Scribd company logo
1 of 38
Download to read offline
© 2014 IBM Corporation
The Business Value of Creating
a CICS Cloud - ACI-2416
Andrew Bates
CICS Transaction Server Product Manager
IBM Software Group
Please Note
IBM s statements regarding its plans, directions, and intent are subject to change
or withdrawal without notice at IBM s sole discretion.
Information regarding potential future products is intended to outline our general
product direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a
commitment, promise, or legal obligation to deliver any material, code or
functionality. Information about potential future products may not be incorporated
into any contract. The development, release, and timing of any future features or
functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM
benchmarks in a controlled environment. The actual throughput or performance
that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user s job stream,
the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results
similar to those stated here.
Business
Value
CICS
Cloud
The
of creating
a
*
What is a
CICS Cloud
NOT?
!   Marketing Hype
!   Public Cloud
!   ‘Our Own Thing’
!   Finished!
3
What IS a
CICS Cloud?
4
‘The cloud infrastructure is provisioned for excusive
use by a single organization comprising multiple
consumers (e.g., business units)’
NIST Special Publication 800-145, Sept 2011
!   Enabling creation of
private CICS clouds
‘Pre-defined application architectures, and required
platform services, that are deployed and managed by
the system according to a set of policies.’
IBM PureSystems - Product Family overview homepage, Apr 2014
!   CICS implementation
of cloud principles
CICS TS V5 delivers a pattern based, policy
managed, private CICS cloud environment,
improving the agility of CICS application deployments
whilst reducing the risk of implementation errors.
!   Bringing Cloud
benefits to CICS
The Essential Characteristics of Cloud Computing
!   On-demand self-service
!   Broad network access
!   Resource pooling
!   Rapid elasticity
!   Measured service
5
http://www.nist.gov/itl/cloud/ or search ‘NIST Cloud’
The Business Value CICS Cloud adoption
Rapid elasticity
Resource pooling
Measured service
Broad network access
On-demand self-service
Change Required HighLow
BusinessValue
High
Small changes to existing CICS applications and processes can
deliver large value from the CICS Cloud capabilities.
The Essential Characteristics of Cloud Computing
7
CICS$Explorer$and$the$
collec2on$of$por4olio$
tools$enable$a$greater$
degree$of$automa2on$
CICS$put$SOA$at$its$
core,$delivering$
greater$integra2on$
and$connec2vity$
across$the$enterprise$
CICS$is$a$firstAclass$
resource$manager$
built$to$efficiently$
manage$system$and$
applica2on$resources$
CICS$WLM,$combined$
with$z/OS,$enables$
CICS$to$rapidly$
respond$to$
fluctua2ng$workload$
demands$
CICS$has$extensive$
monitoring$and$
sta2s2cs$to$enable$
customers$to$
understand$the$cost$
of$their$applica2ons$
running$in$CICS$
System z and z/OS
On-demand Self
Service
Broad Network
Access
Resource
Pooling
Rapid Elasticity
Measured
Service
How can I deploy
applications in
CICS more
easily?
How can I better
manage my CICS
platform?
7
How can I access
more network
devices from
CICS?
How can I
improve CICS
multi-tenancy?
How can I better
measure and
control CICS
resource usage?
(Hint : Adding more CICS regions is probably not the best answer!)
Question : How can you apply the 5 essential cloud characteristics to CICS?
How CICS is implementing those characteristics
8
policy a
policy b
policy c
applications
platforms
policy x
policy y
policy z
applications
platforms
A CICS Cloud is made up of pre-defined application architectures and
required platform services, that are managed according to a set of policies.
CICS TS V5 introduced three completely new first-class artifacts :
Applications, Platforms & Policies.
CICS TS V5 : The New CICS Application Lifecycle
9
You can now package a CICS application into an application bundle to deploy,
manage, and monitor it throughout the application lifecycle - as a single entity.
‘applications’
before
Applications
after
TRAN A
TRAN C
FILE
DEF 1
PROG B
PROG A
URIMAP ADBCONN
DEF A
PROG C
PROG E
???
Name:$$$$$$$BestBank.Retail.Consumer.Loans$
Version:,,,1.2.1$
???
CICS TS V5 : On-demand self service
10
!   On-demand self-service
A consumer can unilaterally provision computing capabilities… as needed
automatically without requiring human interaction with each service provider.
Because CICS applications are self-contained and self-describing, they can be
moved through the lifecycle more quickly and reliably, with less human interaction.
CICS TS V5 : Multi-version applications
11
Multi version applications make it simple to enable and disable new
versions of a CICS application, enabling faster, more reliable, and lower
risk upgrades.
CICS TS
Version 1.0.0
Version 1.0.1
Version 1.2.0
Version 2.0.0
Install, enable,
make available
make
unavailable
Transition to newer (or older) version
CICS TS V5 : On-demand self service
12
!   On-demand self-service
A consumer can unilaterally provision computing capabilities… as needed
automatically without requiring human interaction with each service provider.
If you find a bug in a new version of an application, production fixes can now be
updated extremely rapidly.
After fixing the bug in the code,
repackage it with a new micro
version number
Once installed, switching to a new
version of the application is simply a
case of making it “available”
CICS takes care of moving clients
to the new version of the
application across all regions
within a platform
Step 1 Step 2 Step 3
Demo
CICS TS V5 : Defining and Measuring Applications
14
You can now package a CICS application into an application bundle to deploy,
manage, and monitor it as a single entity.
•  CICS provides support for monitoring and
measuring the resource usage of
applications.
•  You can scope the monitoring and
measuring at the application level or for
particular application operation.
•  You can monitor and measure application
resource usage across CICS regions and
multiple tasks.
•  You can utilize shared CICS resources (e.g.
a program) and attribute usage of that
shared resource to the calling application.
Application
$
Name$$
$A$BestBank.Retail.Consumer.Loans$
Version,
$A$1.2.1$
Resources,
$A$LIBRARY,$PROGRAM,$TRANSACTION,$
URIMAP$
$A$(EVENTBINDING,$OSGIBUNDLE,$…)$
Dependencies,
$A$DB2CONNECTION,$JVMSERVER,$$
$$$$TCPIPSERVICE,$…$
Entry,points,
$A$opera2on: $browse,$update,$…$
$A$resource: $PROGRAM$
$
CICS TS V5 : Measured Service
!   Measured service
Resource usage can be monitored, controlled, and reported, providing transparency
for both the provider and consumer of the utilized service.
15
x.y.Consumer.Account
Consumer
Resources
Account
Resources
x.y.Consumer.Loan
Consumer
Resources
Loan Resources
x.y.Business.Loan
Business
Resources
Loan Resources
Each application can monitor and measure it’s own usage of resources, even if
those resources are shared with other applications.
CICS TS V5 : Policing Costs and Service Levels
16
Target CPU range.
If CPU enters this range, then
issue message.
If CPU enters this range, then
emit event to dashboard.
Restricted. Abend task if
CPU enters this range.
Policy Types:
•  CPU time
•  Storage requests & bytes
•  SQL requests
•  LINK requests
•  FILE requests
•  Elapsed time
•  TDQ requests & bytes
•  TSQ requests & bytes
•  START requests
•  SYNCPOINT requests
You can now define a policy to trigger an action when an application
consumes more resources than it is entitled to, helping to manage
critical resources and better control application costs.
CICS TS V5 : Measured Service
17
You can now define a policy to trigger an event when an application
consumes too much total elapsed CPU time, warning of additional costs
!   Measured service
Cloud systems automatically control and optimize resource use by leveraging a
metering capability at some level of abstraction appropriate to the type of service
(e.g., storage, processing, bandwidth, and active user accounts)
Define the policy thresholds
and trigger action that CICS
should take
Associate the policy with the
appropriate platform or
application and deploy
When the threshold is breached,
CICS triggers an event, updating
an operations dashboard
Step 1 Step 2 Step 3
CICS TS V5 : Speaking the Language of Mobile
18
RESTful JSON services
SOAP web services
CICS
Resource
CICS
resources
You can now extend your SOA to include RESTful JSON services,
enabling CICS to communicate with Mobile servers in the language
those servers will use to communicate with Mobile devices.
CICS TS V5 : Broad Network Access
19
!   Broad Network Access
Capabilities are available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client platforms (e.g.,
mobile phones, tablets, laptops, and workstations).
DFHLS2JS to generate the
JSON artifacts for the target
CICS service.
Mobile developer uses
JSON schema to build a
Worklight adapter.
Frontend mobile developer calls
the Worklight adapter which calls
the service hosted in CICS.
Step 1 Step 2 Step 3
You can now use standard CICS SOA enablement tools and technologies
to provide Mobile ready interfaces for Mobile application consumption.
CICS TS V5 : Private Programs
20
Application packaging helps you consolidate onto fewer regions by
providing private program definitions
CICS Transaction Server V5
X
Y
Private programs
Customer App
Private programs
Payroll AppURIMAP
PROG1
LIBRARY
URIMAP
PROG1
LIBRARY
CICS TS V5 : Resource Pooling
21
Application packaging helps you consolidate onto fewer regions by
providing private program definitions
!   Resource Pooling
The provider’s computing resources are pooled to serve multiple consumers using a
multi-tenant model, with different physical and virtual resources dynamically
assigned and reassigned according to consumer demand.
BestBank.Retail.Loans$
V1.0.0
BestBank.Retail.Loans$
V1.1.0$
BestBank.Retail.Loans
V1.1.1
•  Production
Application
•  80% of users
•  Production
Upgrade Pilot
•  17% of users
•  Highly
Supported
Product Pilot
•  3% of users
Demo
Where could the future take
the CICS cloud?
Service 
Agility
Runtime support for
production ready web
applications.
Integration with mobile
applications.
Cloud
Enablement
Simplified system
management and rapid
application deployment.
On premise pattern
based cloud
deployment.
Operational
Efficiency
Increased system
capacity and capability
to achieve more with
less.
Automatic control of
critical resources using
policies.
IBM CICS Transaction Server V5
enabling great outcomes in three areas
24
Feature
Packs
NextV5.2V5.1
GA 2Q 2014
Next+
IBM CICS Transaction Server
timeline
25
Works together Works the same Works for me
Integration across IBM
Interoperability with third-
party technologies
Easy skills transfer
Common interactions for
similar capabilities
Focused on the user & her
story…
…across the experience
lifecycle (install, first use,
everyday use, maintain,
upgrade)
IBM Design Thinking
designing an IBM that
26
IBM Design Thinking
Hills | Playbacks | Sponsor Users
27
Please Note
!  Future Plans. IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal
without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our
general product direction and it should not be relied on in making a purchasing decision. The information
mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any
material, code or functionality. Information about potential future products may not be incorporated into any contract.
The development, release, and timing of any future features or functionality described for our products remains at
our sole discretion.
!  Confidential Material. Unless specifically advised otherwise, you should assume that all information presented in
the Inner Circle program and contained in these sessions is IBM Confidential and restrict access to this information
in accordance with the WebSphere Inner Circle Participation Agreement signed by your organization.
!  Performance. Performance is based on measurements and projections using standard IBM benchmarks in a
controlled environment. Actual throughput or performance that any user will experience will vary depending upon
many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O
configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an
individual user will achieve results similar to those stated here.
!  Warranty. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties
or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable
license agreement governing the use of IBM software.
!  Customer Examples. All customer examples are presented as illustrations of how those customers used IBM
products and the results they may have achieved. Actual costs and performance characteristics may vary by
customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that
any activities undertaken by you will result in any specific sales, revenue growth or other results.
A Java developer can use the WebSphere Developer Tools for
Eclipse to write a Web application using any of the Liberty V8.5.5
API features, and that Web application can be deployed into
CICS TS with no code changes.
A system programmer can demonstrate General Purpose CPU
savings in the HTTP service enablement layer of between 50 to
80%, out of the box.!
A CICS developer can use a tool such as UrbanCode Deploy to
reliably and repeatedly deploy a CICS application in under 20
minutes.!
1
2
3
Numerous Technical Foundation Items!
*
IBM CICS Transaction Server V5.Next
Service Agility | Operational Efficiency | Cloud Enablement
IMPORTANT: These statements (Hills and Sub Hills) are aspirational. They are documented here to form the basis
of a discussion to gather user feedback. They will change over time. They may never be delivered at all.
Do not rely on this information when making any decisions whatsoever. Refer to the full disclaimer for more details.
29
A Java developer can validate and test whether or not a Java
application will run in CICS, before they deploy it to a mainframe.
A Solution Architect can deliver a CICS service that relies on
external services, regardless of how disruptive or unpredictable
they are.!
A Systems Programmer can set application and platform resource
limits that automatically manage variable or unpredictable
workloads by elastically scaling capacity!
1
2
3
Numerous Technical Foundation Items!
*
IBM CICS Transaction Server V5.Next+
Service Agility | Operational Efficiency | Cloud Enablement
IMPORTANT: These statements (Hills and Sub Hills) are aspirational. They are documented here to form the basis
of a discussion to gather user feedback. They will change over time. They may never be delivered at all.
Do not rely on this information when making any decisions whatsoever. Refer to the full disclaimer for more details.
30
Questions?
z
Generation z
No sales pitches, no marketing, just drinks
with other Generation z’s
19:30 Wednesday April 30
Public House, The Venetian
Follow us:
Join us:
Meet us:
@ibmgenz
System z
Stack Exchange
Build a community of like-minded people
Get the lowdown on what’s going on
Win,a,CICS,Workshop!,
Collec2ng$CICS$session$s2ckers$
for$your$entry?$
$
Don’t$forget$to$$
pick$one$up$
before$you$go!$
Follow us on…
Followus:
CICSbuzzCICS Hursleyibmcics@ibm_cicsibmcics
We Value Your Feedback
!   Don t forget to submit your Impact session and speaker
feedback! Your feedback is very important to us – we use it to
continually improve the conference.
!   Use the Conference Mobile App or the online Agenda Builder to
quickly submit your survey
•  Navigate to Surveys to see a view of surveys for sessions
you ve attended
35
Thank You
Legal Disclaimer
•  © IBM Corporation 2014. All Rights Reserved.
•  The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in
this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM s current product plans and strategy, which are subject
to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing
contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
•  References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
capabilities referenced in this presentation may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you
will result in any specific sales, revenue growth or other results.
•  If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will
experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
•  If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs
and performance characteristics may vary by customer.
•  Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus®
Sametime® Unyte™). Subsequent references can drop IBM but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer
to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All
product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation.
IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines
Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
•  If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
•  If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
•  If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
•  If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:
Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and
other countries.
•  If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:
UNIX is a registered trademark of The Open Group in the United States and other countries.
•  If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
•  If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta
Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration
purposes only.

More Related Content

What's hot

Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Andrew Hendry
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseMike K
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupJon Marshall
 
Hyper v private-cloud-datasheet-final
Hyper v private-cloud-datasheet-finalHyper v private-cloud-datasheet-final
Hyper v private-cloud-datasheet-finalnaveen chander
 
Building a High-Performance Reactive Microservices Architecture
Building a High-Performance Reactive Microservices ArchitectureBuilding a High-Performance Reactive Microservices Architecture
Building a High-Performance Reactive Microservices ArchitectureCognizant
 
How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?Michael Elder
 
DevOps for IBM Commerce
DevOps for IBM CommerceDevOps for IBM Commerce
DevOps for IBM CommerceMichael Elder
 
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...Michael Elder
 
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudDevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudMichael Elder
 
Bluemix IoT Cloud Foundry Meetup slides
Bluemix IoT Cloud Foundry Meetup slidesBluemix IoT Cloud Foundry Meetup slides
Bluemix IoT Cloud Foundry Meetup slidesValerie Lampkin
 
Developing for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixDeveloping for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixRoberto Pozzi
 
Cloud Foundry CEO Sam Ramji 2015 OSCON Keynote
Cloud Foundry CEO Sam Ramji 2015 OSCON KeynoteCloud Foundry CEO Sam Ramji 2015 OSCON Keynote
Cloud Foundry CEO Sam Ramji 2015 OSCON KeynoteCloud Foundry Foundation
 
Architecting for speed: how agile innovators accelerate growth through micros...
Architecting for speed: how agile innovators accelerate growth through micros...Architecting for speed: how agile innovators accelerate growth through micros...
Architecting for speed: how agile innovators accelerate growth through micros...3gamma
 
Tap into a Private Cloud as a Service to Accelerate Hybrid Success
Tap into a Private Cloud as a Service to Accelerate Hybrid SuccessTap into a Private Cloud as a Service to Accelerate Hybrid Success
Tap into a Private Cloud as a Service to Accelerate Hybrid SuccessDenny Muktar
 

What's hot (20)

Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell Groupwise
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User Group
 
Hyper v private-cloud-datasheet-final
Hyper v private-cloud-datasheet-finalHyper v private-cloud-datasheet-final
Hyper v private-cloud-datasheet-final
 
IBM Bluemix
IBM BluemixIBM Bluemix
IBM Bluemix
 
Building a High-Performance Reactive Microservices Architecture
Building a High-Performance Reactive Microservices ArchitectureBuilding a High-Performance Reactive Microservices Architecture
Building a High-Performance Reactive Microservices Architecture
 
Microsoft Hyper-v launce Virtual Interop
Microsoft Hyper-v launce Virtual InteropMicrosoft Hyper-v launce Virtual Interop
Microsoft Hyper-v launce Virtual Interop
 
How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?
 
DevOps for IBM Commerce
DevOps for IBM CommerceDevOps for IBM Commerce
DevOps for IBM Commerce
 
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
 
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudDevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
 
Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017
 
Bluemix IoT Cloud Foundry Meetup slides
Bluemix IoT Cloud Foundry Meetup slidesBluemix IoT Cloud Foundry Meetup slides
Bluemix IoT Cloud Foundry Meetup slides
 
Developing for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixDeveloping for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with Bluemix
 
Cloud Foundry CEO Sam Ramji 2015 OSCON Keynote
Cloud Foundry CEO Sam Ramji 2015 OSCON KeynoteCloud Foundry CEO Sam Ramji 2015 OSCON Keynote
Cloud Foundry CEO Sam Ramji 2015 OSCON Keynote
 
VMware Horizon - news
VMware Horizon - newsVMware Horizon - news
VMware Horizon - news
 
Architecting for speed: how agile innovators accelerate growth through micros...
Architecting for speed: how agile innovators accelerate growth through micros...Architecting for speed: how agile innovators accelerate growth through micros...
Architecting for speed: how agile innovators accelerate growth through micros...
 
Tap into a Private Cloud as a Service to Accelerate Hybrid Success
Tap into a Private Cloud as a Service to Accelerate Hybrid SuccessTap into a Private Cloud as a Service to Accelerate Hybrid Success
Tap into a Private Cloud as a Service to Accelerate Hybrid Success
 

Viewers also liked

2802 cics @ interconnect v2.0 CICS Opening
2802   cics @ interconnect v2.0 CICS Opening2802   cics @ interconnect v2.0 CICS Opening
2802 cics @ interconnect v2.0 CICS Openingnick_garrod
 
Características Físicas
Características FísicasCaracterísticas Físicas
Características FísicasBianca Costa
 
1476 managing mobile workload
1476   managing mobile workload1476   managing mobile workload
1476 managing mobile workloadnick_garrod
 
SHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applicationsSHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applicationsnick_garrod
 
IBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts wsIBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts wsnick_garrod
 
Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.Biblioteka-22
 
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesSHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesnick_garrod
 
SHARE 2014 Pittsburgh, Managing multi version applications in cics
SHARE 2014 Pittsburgh, Managing multi version applications in cicsSHARE 2014 Pittsburgh, Managing multi version applications in cics
SHARE 2014 Pittsburgh, Managing multi version applications in cicsnick_garrod
 
2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in town2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in townnick_garrod
 
تحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌هاتحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌هابازآران
 
SHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applicationsSHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applicationsnick_garrod
 
П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"Biblioteka-22
 
Estrategia de Comunicacion Lectora-mirna-a
Estrategia de Comunicacion Lectora-mirna-aEstrategia de Comunicacion Lectora-mirna-a
Estrategia de Comunicacion Lectora-mirna-aMirna Arauz
 

Viewers also liked (17)

2802 cics @ interconnect v2.0 CICS Opening
2802   cics @ interconnect v2.0 CICS Opening2802   cics @ interconnect v2.0 CICS Opening
2802 cics @ interconnect v2.0 CICS Opening
 
Características Físicas
Características FísicasCaracterísticas Físicas
Características Físicas
 
1476 managing mobile workload
1476   managing mobile workload1476   managing mobile workload
1476 managing mobile workload
 
SHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applicationsSHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applications
 
IBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts wsIBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts ws
 
Reactive Streams Condensed
Reactive Streams CondensedReactive Streams Condensed
Reactive Streams Condensed
 
Pantone colours
Pantone coloursPantone colours
Pantone colours
 
Tarea d4e ingles
Tarea d4e inglesTarea d4e ingles
Tarea d4e ingles
 
Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.
 
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesSHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
 
SHARE 2014 Pittsburgh, Managing multi version applications in cics
SHARE 2014 Pittsburgh, Managing multi version applications in cicsSHARE 2014 Pittsburgh, Managing multi version applications in cics
SHARE 2014 Pittsburgh, Managing multi version applications in cics
 
2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in town2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in town
 
تحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌هاتحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌ها
 
S109 cics-java
S109 cics-javaS109 cics-java
S109 cics-java
 
SHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applicationsSHARE 2014, Pittsburgh CICS and Liberty applications
SHARE 2014, Pittsburgh CICS and Liberty applications
 
П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"
 
Estrategia de Comunicacion Lectora-mirna-a
Estrategia de Comunicacion Lectora-mirna-aEstrategia de Comunicacion Lectora-mirna-a
Estrategia de Comunicacion Lectora-mirna-a
 

Similar to IBM Impact session 2416-CICS cloud-business-value

2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloudnick_garrod
 
Enable rapid service provisioning with cics, microservices and the z/OS Provi...
Enable rapid service provisioning with cics, microservices and the z/OS Provi...Enable rapid service provisioning with cics, microservices and the z/OS Provi...
Enable rapid service provisioning with cics, microservices and the z/OS Provi...Matthew Webster
 
Cloudy with SaaS Shine
Cloudy with SaaS ShineCloudy with SaaS Shine
Cloudy with SaaS ShineSimon Baker
 
Powering the digital economy with CICS and z/OS connect - at the "z Systems...
Powering the digital economy with CICS and z/OS connect  -  at the "z Systems...Powering the digital economy with CICS and z/OS connect  -  at the "z Systems...
Powering the digital economy with CICS and z/OS connect - at the "z Systems...DevOps for Enterprise Systems
 
3298 microservices and how they relate to esb api and messaging - inter con...
3298   microservices and how they relate to esb api and messaging - inter con...3298   microservices and how they relate to esb api and messaging - inter con...
3298 microservices and how they relate to esb api and messaging - inter con...Kim Clark
 
Cloud Native Patterns with Bluemix Developer Console
Cloud Native Patterns with Bluemix Developer ConsoleCloud Native Patterns with Bluemix Developer Console
Cloud Native Patterns with Bluemix Developer ConsoleMatthew Perrins
 
1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...Matthew Webster
 
The Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineThe Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineDevOps.com
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloudnick_garrod
 
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareTrends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareKai Wähner
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experienceEric Cattoir
 
Impact 2014 Best practices for_cics_soa_co
Impact 2014 Best practices for_cics_soa_coImpact 2014 Best practices for_cics_soa_co
Impact 2014 Best practices for_cics_soa_conick_garrod
 
CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003Paul Johnson
 
[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for EnterprisesWSO2
 
CICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open betaCICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open betaMark Cocker
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)nick_garrod
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Kai Wähner
 
Automating Applications with Habitat - Sydney Cloud Native Meetup
Automating Applications with Habitat - Sydney Cloud Native MeetupAutomating Applications with Habitat - Sydney Cloud Native Meetup
Automating Applications with Habitat - Sydney Cloud Native MeetupMatt Ray
 

Similar to IBM Impact session 2416-CICS cloud-business-value (20)

2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud
 
Enable rapid service provisioning with cics, microservices and the z/OS Provi...
Enable rapid service provisioning with cics, microservices and the z/OS Provi...Enable rapid service provisioning with cics, microservices and the z/OS Provi...
Enable rapid service provisioning with cics, microservices and the z/OS Provi...
 
Cloudy with SaaS Shine
Cloudy with SaaS ShineCloudy with SaaS Shine
Cloudy with SaaS Shine
 
Powering the digital economy with CICS and z/OS connect - at the "z Systems...
Powering the digital economy with CICS and z/OS connect  -  at the "z Systems...Powering the digital economy with CICS and z/OS connect  -  at the "z Systems...
Powering the digital economy with CICS and z/OS connect - at the "z Systems...
 
3298 microservices and how they relate to esb api and messaging - inter con...
3298   microservices and how they relate to esb api and messaging - inter con...3298   microservices and how they relate to esb api and messaging - inter con...
3298 microservices and how they relate to esb api and messaging - inter con...
 
Cloud Native Patterns with Bluemix Developer Console
Cloud Native Patterns with Bluemix Developer ConsoleCloud Native Patterns with Bluemix Developer Console
Cloud Native Patterns with Bluemix Developer Console
 
1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...
 
The Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineThe Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD Pipeline
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloud
 
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareTrends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experience
 
Impact 2014 Best practices for_cics_soa_co
Impact 2014 Best practices for_cics_soa_coImpact 2014 Best practices for_cics_soa_co
Impact 2014 Best practices for_cics_soa_co
 
Connecting a World of Clouds
Connecting a World of CloudsConnecting a World of Clouds
Connecting a World of Clouds
 
Bluemix
BluemixBluemix
Bluemix
 
CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003
 
[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises
 
CICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open betaCICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open beta
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
 
Automating Applications with Habitat - Sydney Cloud Native Meetup
Automating Applications with Habitat - Sydney Cloud Native MeetupAutomating Applications with Habitat - Sydney Cloud Native Meetup
Automating Applications with Habitat - Sydney Cloud Native Meetup
 

More from nick_garrod

2844 inter connect cics policy (2844)
2844  inter connect cics policy (2844)2844  inter connect cics policy (2844)
2844 inter connect cics policy (2844)nick_garrod
 
Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesnick_garrod
 
Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)nick_garrod
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devopsnick_garrod
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternitenick_garrod
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudnick_garrod
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
 
S105 performance
S105 performanceS105 performance
S105 performancenick_garrod
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloudnick_garrod
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilitynick_garrod
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridgednick_garrod
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you nick_garrod
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle libertynick_garrod
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_centernick_garrod
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSnick_garrod
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewnick_garrod
 
Share cics policy (2844)
Share cics policy (2844)Share cics policy (2844)
Share cics policy (2844)nick_garrod
 
Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenariosnick_garrod
 

More from nick_garrod (20)

2844 inter connect cics policy (2844)
2844  inter connect cics policy (2844)2844  inter connect cics policy (2844)
2844 inter connect cics policy (2844)
 
Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilities
 
Api management customer
Api management customerApi management customer
Api management customer
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devops
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternite
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloud
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cics
 
S105 performance
S105 performanceS105 performance
S105 performance
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloud
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agility
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle liberty
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_center
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overview
 
Share cics policy (2844)
Share cics policy (2844)Share cics policy (2844)
Share cics policy (2844)
 
Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenarios
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

IBM Impact session 2416-CICS cloud-business-value

  • 1. © 2014 IBM Corporation The Business Value of Creating a CICS Cloud - ACI-2416 Andrew Bates CICS Transaction Server Product Manager IBM Software Group
  • 2. Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
  • 4. What is a CICS Cloud NOT? !   Marketing Hype !   Public Cloud !   ‘Our Own Thing’ !   Finished! 3
  • 5. What IS a CICS Cloud? 4 ‘The cloud infrastructure is provisioned for excusive use by a single organization comprising multiple consumers (e.g., business units)’ NIST Special Publication 800-145, Sept 2011 !   Enabling creation of private CICS clouds ‘Pre-defined application architectures, and required platform services, that are deployed and managed by the system according to a set of policies.’ IBM PureSystems - Product Family overview homepage, Apr 2014 !   CICS implementation of cloud principles CICS TS V5 delivers a pattern based, policy managed, private CICS cloud environment, improving the agility of CICS application deployments whilst reducing the risk of implementation errors. !   Bringing Cloud benefits to CICS
  • 6. The Essential Characteristics of Cloud Computing !   On-demand self-service !   Broad network access !   Resource pooling !   Rapid elasticity !   Measured service 5 http://www.nist.gov/itl/cloud/ or search ‘NIST Cloud’
  • 7. The Business Value CICS Cloud adoption Rapid elasticity Resource pooling Measured service Broad network access On-demand self-service Change Required HighLow BusinessValue High Small changes to existing CICS applications and processes can deliver large value from the CICS Cloud capabilities.
  • 8. The Essential Characteristics of Cloud Computing 7 CICS$Explorer$and$the$ collec2on$of$por4olio$ tools$enable$a$greater$ degree$of$automa2on$ CICS$put$SOA$at$its$ core,$delivering$ greater$integra2on$ and$connec2vity$ across$the$enterprise$ CICS$is$a$firstAclass$ resource$manager$ built$to$efficiently$ manage$system$and$ applica2on$resources$ CICS$WLM,$combined$ with$z/OS,$enables$ CICS$to$rapidly$ respond$to$ fluctua2ng$workload$ demands$ CICS$has$extensive$ monitoring$and$ sta2s2cs$to$enable$ customers$to$ understand$the$cost$ of$their$applica2ons$ running$in$CICS$ System z and z/OS On-demand Self Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service How can I deploy applications in CICS more easily? How can I better manage my CICS platform? 7 How can I access more network devices from CICS? How can I improve CICS multi-tenancy? How can I better measure and control CICS resource usage? (Hint : Adding more CICS regions is probably not the best answer!) Question : How can you apply the 5 essential cloud characteristics to CICS?
  • 9. How CICS is implementing those characteristics 8 policy a policy b policy c applications platforms policy x policy y policy z applications platforms A CICS Cloud is made up of pre-defined application architectures and required platform services, that are managed according to a set of policies. CICS TS V5 introduced three completely new first-class artifacts : Applications, Platforms & Policies.
  • 10. CICS TS V5 : The New CICS Application Lifecycle 9 You can now package a CICS application into an application bundle to deploy, manage, and monitor it throughout the application lifecycle - as a single entity. ‘applications’ before Applications after TRAN A TRAN C FILE DEF 1 PROG B PROG A URIMAP ADBCONN DEF A PROG C PROG E ??? Name:$$$$$$$BestBank.Retail.Consumer.Loans$ Version:,,,1.2.1$ ???
  • 11. CICS TS V5 : On-demand self service 10 !   On-demand self-service A consumer can unilaterally provision computing capabilities… as needed automatically without requiring human interaction with each service provider. Because CICS applications are self-contained and self-describing, they can be moved through the lifecycle more quickly and reliably, with less human interaction.
  • 12. CICS TS V5 : Multi-version applications 11 Multi version applications make it simple to enable and disable new versions of a CICS application, enabling faster, more reliable, and lower risk upgrades. CICS TS Version 1.0.0 Version 1.0.1 Version 1.2.0 Version 2.0.0 Install, enable, make available make unavailable Transition to newer (or older) version
  • 13. CICS TS V5 : On-demand self service 12 !   On-demand self-service A consumer can unilaterally provision computing capabilities… as needed automatically without requiring human interaction with each service provider. If you find a bug in a new version of an application, production fixes can now be updated extremely rapidly. After fixing the bug in the code, repackage it with a new micro version number Once installed, switching to a new version of the application is simply a case of making it “available” CICS takes care of moving clients to the new version of the application across all regions within a platform Step 1 Step 2 Step 3
  • 14. Demo
  • 15. CICS TS V5 : Defining and Measuring Applications 14 You can now package a CICS application into an application bundle to deploy, manage, and monitor it as a single entity. •  CICS provides support for monitoring and measuring the resource usage of applications. •  You can scope the monitoring and measuring at the application level or for particular application operation. •  You can monitor and measure application resource usage across CICS regions and multiple tasks. •  You can utilize shared CICS resources (e.g. a program) and attribute usage of that shared resource to the calling application. Application $ Name$$ $A$BestBank.Retail.Consumer.Loans$ Version, $A$1.2.1$ Resources, $A$LIBRARY,$PROGRAM,$TRANSACTION,$ URIMAP$ $A$(EVENTBINDING,$OSGIBUNDLE,$…)$ Dependencies, $A$DB2CONNECTION,$JVMSERVER,$$ $$$$TCPIPSERVICE,$…$ Entry,points, $A$opera2on: $browse,$update,$…$ $A$resource: $PROGRAM$ $
  • 16. CICS TS V5 : Measured Service !   Measured service Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. 15 x.y.Consumer.Account Consumer Resources Account Resources x.y.Consumer.Loan Consumer Resources Loan Resources x.y.Business.Loan Business Resources Loan Resources Each application can monitor and measure it’s own usage of resources, even if those resources are shared with other applications.
  • 17. CICS TS V5 : Policing Costs and Service Levels 16 Target CPU range. If CPU enters this range, then issue message. If CPU enters this range, then emit event to dashboard. Restricted. Abend task if CPU enters this range. Policy Types: •  CPU time •  Storage requests & bytes •  SQL requests •  LINK requests •  FILE requests •  Elapsed time •  TDQ requests & bytes •  TSQ requests & bytes •  START requests •  SYNCPOINT requests You can now define a policy to trigger an action when an application consumes more resources than it is entitled to, helping to manage critical resources and better control application costs.
  • 18. CICS TS V5 : Measured Service 17 You can now define a policy to trigger an event when an application consumes too much total elapsed CPU time, warning of additional costs !   Measured service Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts) Define the policy thresholds and trigger action that CICS should take Associate the policy with the appropriate platform or application and deploy When the threshold is breached, CICS triggers an event, updating an operations dashboard Step 1 Step 2 Step 3
  • 19. CICS TS V5 : Speaking the Language of Mobile 18 RESTful JSON services SOAP web services CICS Resource CICS resources You can now extend your SOA to include RESTful JSON services, enabling CICS to communicate with Mobile servers in the language those servers will use to communicate with Mobile devices.
  • 20. CICS TS V5 : Broad Network Access 19 !   Broad Network Access Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). DFHLS2JS to generate the JSON artifacts for the target CICS service. Mobile developer uses JSON schema to build a Worklight adapter. Frontend mobile developer calls the Worklight adapter which calls the service hosted in CICS. Step 1 Step 2 Step 3 You can now use standard CICS SOA enablement tools and technologies to provide Mobile ready interfaces for Mobile application consumption.
  • 21. CICS TS V5 : Private Programs 20 Application packaging helps you consolidate onto fewer regions by providing private program definitions CICS Transaction Server V5 X Y Private programs Customer App Private programs Payroll AppURIMAP PROG1 LIBRARY URIMAP PROG1 LIBRARY
  • 22. CICS TS V5 : Resource Pooling 21 Application packaging helps you consolidate onto fewer regions by providing private program definitions !   Resource Pooling The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. BestBank.Retail.Loans$ V1.0.0 BestBank.Retail.Loans$ V1.1.0$ BestBank.Retail.Loans V1.1.1 •  Production Application •  80% of users •  Production Upgrade Pilot •  17% of users •  Highly Supported Product Pilot •  3% of users
  • 23. Demo
  • 24. Where could the future take the CICS cloud?
  • 25. Service Agility Runtime support for production ready web applications. Integration with mobile applications. Cloud Enablement Simplified system management and rapid application deployment. On premise pattern based cloud deployment. Operational Efficiency Increased system capacity and capability to achieve more with less. Automatic control of critical resources using policies. IBM CICS Transaction Server V5 enabling great outcomes in three areas 24
  • 26. Feature Packs NextV5.2V5.1 GA 2Q 2014 Next+ IBM CICS Transaction Server timeline 25
  • 27. Works together Works the same Works for me Integration across IBM Interoperability with third- party technologies Easy skills transfer Common interactions for similar capabilities Focused on the user & her story… …across the experience lifecycle (install, first use, everyday use, maintain, upgrade) IBM Design Thinking designing an IBM that 26
  • 28. IBM Design Thinking Hills | Playbacks | Sponsor Users 27
  • 29. Please Note !  Future Plans. IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. !  Confidential Material. Unless specifically advised otherwise, you should assume that all information presented in the Inner Circle program and contained in these sessions is IBM Confidential and restrict access to this information in accordance with the WebSphere Inner Circle Participation Agreement signed by your organization. !  Performance. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. Actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. !  Warranty. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. !  Customer Examples. All customer examples are presented as illustrations of how those customers used IBM products and the results they may have achieved. Actual costs and performance characteristics may vary by customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.
  • 30. A Java developer can use the WebSphere Developer Tools for Eclipse to write a Web application using any of the Liberty V8.5.5 API features, and that Web application can be deployed into CICS TS with no code changes. A system programmer can demonstrate General Purpose CPU savings in the HTTP service enablement layer of between 50 to 80%, out of the box.! A CICS developer can use a tool such as UrbanCode Deploy to reliably and repeatedly deploy a CICS application in under 20 minutes.! 1 2 3 Numerous Technical Foundation Items! * IBM CICS Transaction Server V5.Next Service Agility | Operational Efficiency | Cloud Enablement IMPORTANT: These statements (Hills and Sub Hills) are aspirational. They are documented here to form the basis of a discussion to gather user feedback. They will change over time. They may never be delivered at all. Do not rely on this information when making any decisions whatsoever. Refer to the full disclaimer for more details. 29
  • 31. A Java developer can validate and test whether or not a Java application will run in CICS, before they deploy it to a mainframe. A Solution Architect can deliver a CICS service that relies on external services, regardless of how disruptive or unpredictable they are.! A Systems Programmer can set application and platform resource limits that automatically manage variable or unpredictable workloads by elastically scaling capacity! 1 2 3 Numerous Technical Foundation Items! * IBM CICS Transaction Server V5.Next+ Service Agility | Operational Efficiency | Cloud Enablement IMPORTANT: These statements (Hills and Sub Hills) are aspirational. They are documented here to form the basis of a discussion to gather user feedback. They will change over time. They may never be delivered at all. Do not rely on this information when making any decisions whatsoever. Refer to the full disclaimer for more details. 30
  • 33. z Generation z No sales pitches, no marketing, just drinks with other Generation z’s 19:30 Wednesday April 30 Public House, The Venetian Follow us: Join us: Meet us: @ibmgenz System z Stack Exchange Build a community of like-minded people Get the lowdown on what’s going on
  • 35. Follow us on… Followus: CICSbuzzCICS Hursleyibmcics@ibm_cicsibmcics
  • 36. We Value Your Feedback !   Don t forget to submit your Impact session and speaker feedback! Your feedback is very important to us – we use it to continually improve the conference. !   Use the Conference Mobile App or the online Agenda Builder to quickly submit your survey •  Navigate to Surveys to see a view of surveys for sessions you ve attended 35
  • 38. Legal Disclaimer •  © IBM Corporation 2014. All Rights Reserved. •  The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. •  References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. •  If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. •  If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. •  Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop IBM but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. •  If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. •  If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. •  If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. •  If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. •  If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. •  If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. •  If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only.