SlideShare a Scribd company logo
Introduction, History and
Significance of Mainframe
Computer
2
Computer Basics
33
What is a computer?
• A computer is a digital device which can be programmed
to change (process) information from one form to another.
– Do exactly as they are told.
– Digital devices: Understand only two different states
(OFF and ON - 0 and 1)
44
Traditional Types of Computers
• General purpose computers
–Super computer
–Mainframe
–Personal Computer
5
What is a mainframe ?
• A mainframe is what businesses use to host their
commercial databases, transaction servers, and
applications that require a greater degree of security
and availability than is commonly found on smaller-scale
machines.
6
What is a mainframe? (Cont…)
Compatibility with operating systems, applications
and data
Centralized control of resources
HW and operating systems share disk access
A STYLE of operation
Thousands of simultaneous I/O operations
Clustering technologies
Additional data and resource sharing capabilities
What are Mainframe operating systems ?
• Mainframe = Computer that can support
thousands of applications and I/O devices to
simultaneously serve thousands of users
• Most mainframe computers are sold by IBM,
and the operating systems are also
provided by IBM
• z/OS, is IBM’s foremost mainframe
operating system
7
Why Mainframes ?
• The most important features the mainframe provides
include:
• Encrypt sensitive data as it crosses the network
• Protect encryption keys
• Provide well-known security configurations that achieve or
surpass the industry standard
8
History:
IBM 709 Mainframe Computer
This model was in use at Yale in 1963,
located in the Watson building on
Sachem St, now part of SOM
IBM’s last vacuum tube computer,
produced from 1957 until 1960
History:
• Mainframe history In 1950s , mainframe computers were
physically the largest computers; few businesses could
afford them
• In the 1960s , with standardized mainframe customers
could write business applications that didn’t need
specialized hardware or software
• In 1964 , the introduction of the IBM System/360 (or
S/360™) signalled the start of the 3G :
• first general purpose computers
10
CPU Module from IBM 709 – Dimensions: 8” x 10”
http://www.cacr.caltech.edu/~mark/IBM709.html
IBM 709 Central Processing Unit
http://www.columbia.edu/acis/history/ibm709.html Frank da Cruz / fdc@columbia.edu / Columbia University Computing History / Jan 2001
Typical IBM 709 Machine Room
IBM Card Punch of the type used for data entry
with the Library’s Machine Aided Technical
Processing System (MATPS), managed for many
years by Suzanna Lengyel
15
Traditional Types of Computers:
• First computers, introduced in 1950s
• Used by large businesses
• Typically supported thousands of users
• Very expensive
• Used for very large processing tasks
• IBM’s new Mainframe
– http://www.youtube.com/watch?v=LN4J4mClckA
• Mainframe
Computers
Evolving architecture
 More and faster processors
 More physical memory and greater virtual memory addressing
capability
 Dynamic capabilities for upgrading HW and SW
 Enhanced I/O devices and more and faster paths (channels)
 Sophisticated I/O attachments
 Increased ability to divide resources into multiple, logically
independent and isolated systems, each running its own operating
system.
 Enhanced clustering technologies (e.g. Parallel Sysplex)
Architecture describes the organizational structure of
a system
17
Typical mainframe workloads
Batch job
Application Program
Output Data
Application Program
Input
Data
Process data to
perform a
particular task
Online (real time) transaction
Query
Reply
Access shared
data on behalf of
online user
18
Significance objectives
• Be able to:
– Explain why business data resides on
mainframe
– List typical uses of mainframes
– Describe the benefits of mainframe
computing
– Outline the major types of workloads for
which mainframes are best suited
19
Mainframe facts
• Mainframes in our midst
– Hidden from the public eye
• Who uses mainframes?
– Most Fortune 1000 companies use a mainframe
environment
– 60% of all data available on the Internet is stored on
mainframe computers
• Why mainframes?
– Large-scale transaction processing
• Thousands of transactions per second
– Support thousands of users and application programs
– Simultaneously accessing resources
– Terabytes of information in databases
– Large-bandwidth communications
20
Factors contributing to mainframe use
Capacity
Scalability
Integrity and Security
Availability
Access to large amounts of data
Systems management
Autonomic capabilities
21
Typical batch use
Disk Storage
databases
Tape Storage
Sequential
data sets
Partners
and clients
exchange
information
Reports
Backups
Data
update
Reports
Statistics,
summaries,
exceptions
Residence
Main
office
Branch offices
Account balances
bills, etc
Processing
reports
Mainframe
Processing batch jobs
44
55
Reports
22
1010
11
88
66
33
CREDIT CARD
1234 5678 90121234 5678 9012
VALID FROM GOOD THRU
XX/XX/XX XX/XX/XX
PAUL FISCHER
XX/XX/XX XX/XX/XX
PAUL FISCHER
77
99
System
Operator
Production
Control
22
Typical online use
Disk
storage
controller
Stores
database
files
queries
and
updates
Account
activities
Office
automation
systems
Mainframe
Accesses
database
Requests
ATMs
Branch
offices
Business analysts Inventory control
Branch office
automation
systems
Network
(e.g. TCP/IP or SNA)
55
66
33
22
44
11
Central office
23
Summary
• The New Mainframe:
– Plays a central role in the daily operations of the world’s
largest organizations – and the daily lives of most
people.
– Is known for its reliability, security, and enormous
processing capabilities.
– Is designed for processing large scale workloads and
serving thousands of users and transactions
concurrently.
– Is managed by highly skilled technical support staff.
– Runs a variety of operating systems.
Key terms
– Architecture
– Batch Processing
– Compatibility
– Data integrity
– High Availability
– IBM System z
– Infrastructure
• Mainframe
• Online transaction
processing (OLTP)
• Punched card
• RAS
• Scalability
• Security

More Related Content

What's hot

Generations of computer
Generations of computerGenerations of computer
Generations of computer
Jatin Jindal
 
Types of computer
Types of computer Types of computer
Types of computer
Sajib007
 
Types of computer
Types of computerTypes of computer
Types of computer
Roselyn Villanueva
 
Types of digital computers
Types of digital computersTypes of digital computers
Types of digital computers
Ansif Ek
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
Amit Chandra
 
Classfication of computer Lecture no 3
Classfication of computer Lecture no 3Classfication of computer Lecture no 3
Classfication of computer Lecture no 3
Ehtashamulhaq17
 
Types-of-computer-ppt
Types-of-computer-pptTypes-of-computer-ppt
Types-of-computer-ppthashgeneration
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
Ehtashamulhaq17
 
1 Computer Architecture
1 Computer Architecture1 Computer Architecture
1 Computer Architecture
fika sweety
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
Mohamed Loey
 
Types of computer
Types of computerTypes of computer
Types of computer
Frya Lora
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
vampugani
 
System Software vs.Application Software
System Software vs.Application SoftwareSystem Software vs.Application Software
System Software vs.Application Software
Aashima Wadhwa
 
Types of computer
Types of computerTypes of computer
Types of computer
Burhan Ahmed
 
Classification of computers with respect to size
Classification of computers with respect to sizeClassification of computers with respect to size
Classification of computers with respect to size
Samuel Igbanogu
 
Operating systems
Operating systemsOperating systems
Operating systems
11mooremichael
 
Classification of computer
Classification of computerClassification of computer
Classification of computerVicky Maliks
 
Hybrid computer
Hybrid computerHybrid computer
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1Abdul_jabbar_k
 
02. types of computer
02. types of computer02. types of computer
02. types of computer
TimesRide
 

What's hot (20)

Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Types of computer
Types of computer Types of computer
Types of computer
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Types of digital computers
Types of digital computersTypes of digital computers
Types of digital computers
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
 
Classfication of computer Lecture no 3
Classfication of computer Lecture no 3Classfication of computer Lecture no 3
Classfication of computer Lecture no 3
 
Types-of-computer-ppt
Types-of-computer-pptTypes-of-computer-ppt
Types-of-computer-ppt
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
1 Computer Architecture
1 Computer Architecture1 Computer Architecture
1 Computer Architecture
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
System Software vs.Application Software
System Software vs.Application SoftwareSystem Software vs.Application Software
System Software vs.Application Software
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Classification of computers with respect to size
Classification of computers with respect to sizeClassification of computers with respect to size
Classification of computers with respect to size
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
Hybrid computer
Hybrid computerHybrid computer
Hybrid computer
 
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1
 
02. types of computer
02. types of computer02. types of computer
02. types of computer
 

Viewers also liked

Mainframe
MainframeMainframe
Mainframe
shivas
 
Supercomputers
SupercomputersSupercomputers
SupercomputersMehmet Demir
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overviewabhi1112
 
Super computers by rachna
Super computers by  rachnaSuper computers by  rachna
Super computers by rachnaRachna Singh
 
supercomputer
supercomputersupercomputer
supercomputer
panjab university
 
New IBM Mainframe 2016 - Z13
New IBM Mainframe 2016 - Z13 New IBM Mainframe 2016 - Z13
New IBM Mainframe 2016 - Z13
Francisco GonzĂĄlez JimĂŠnez
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
Suaj
 
Cmp104 lec 4 types of computer
Cmp104 lec 4 types of computerCmp104 lec 4 types of computer
Cmp104 lec 4 types of computerkapil078
 
Building SuperComputers @ Home
Building SuperComputers @ HomeBuilding SuperComputers @ Home
Building SuperComputers @ Home
Abhishek Parolkar
 
A perspective on Entrepreneurship
A perspective on EntrepreneurshipA perspective on Entrepreneurship
A perspective on Entrepreneurship
Nerz Baldres
 
Hadoop 3.0 features
Hadoop 3.0 featuresHadoop 3.0 features
Hadoop 3.0 features
anand murari
 
microprocessor architecture
microprocessor architecture microprocessor architecture
microprocessor architecture
Nadeem Hilal Wani
 
1. entrepreneurial perspective
1. entrepreneurial perspective1. entrepreneurial perspective
1. entrepreneurial perspectivesonyvega
 
Resource Access Control Facility (RACF) in Mainframes
Resource Access Control Facility (RACF) in MainframesResource Access Control Facility (RACF) in Mainframes
Resource Access Control Facility (RACF) in Mainframes
Aayush Singh
 
What is different about the ibm mainframe
What is different about the ibm mainframeWhat is different about the ibm mainframe
What is different about the ibm mainframe
Jim Porell
 
Presentation on Logical Operators
Presentation on Logical OperatorsPresentation on Logical Operators
Presentation on Logical OperatorsSanjeev Budha
 
Grade 10 1st Term IT Notes
Grade 10 1st Term IT NotesGrade 10 1st Term IT Notes
Grade 10 1st Term IT NotesNavinda Dissanayake
 
1.0 introduction to personal computer
1.0  introduction to personal computer1.0  introduction to personal computer
1.0 introduction to personal computerGagandeep Singh
 

Viewers also liked (20)

Mainframe
MainframeMainframe
Mainframe
 
Supercomputers
SupercomputersSupercomputers
Supercomputers
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
 
Super computers by rachna
Super computers by  rachnaSuper computers by  rachna
Super computers by rachna
 
supercomputer
supercomputersupercomputer
supercomputer
 
New IBM Mainframe 2016 - Z13
New IBM Mainframe 2016 - Z13 New IBM Mainframe 2016 - Z13
New IBM Mainframe 2016 - Z13
 
Super computer
Super computerSuper computer
Super computer
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
Cmp104 lec 4 types of computer
Cmp104 lec 4 types of computerCmp104 lec 4 types of computer
Cmp104 lec 4 types of computer
 
Building SuperComputers @ Home
Building SuperComputers @ HomeBuilding SuperComputers @ Home
Building SuperComputers @ Home
 
A perspective on Entrepreneurship
A perspective on EntrepreneurshipA perspective on Entrepreneurship
A perspective on Entrepreneurship
 
Hadoop 3.0 features
Hadoop 3.0 featuresHadoop 3.0 features
Hadoop 3.0 features
 
Chapter 9 v.0
Chapter 9 v.0Chapter 9 v.0
Chapter 9 v.0
 
microprocessor architecture
microprocessor architecture microprocessor architecture
microprocessor architecture
 
1. entrepreneurial perspective
1. entrepreneurial perspective1. entrepreneurial perspective
1. entrepreneurial perspective
 
Resource Access Control Facility (RACF) in Mainframes
Resource Access Control Facility (RACF) in MainframesResource Access Control Facility (RACF) in Mainframes
Resource Access Control Facility (RACF) in Mainframes
 
What is different about the ibm mainframe
What is different about the ibm mainframeWhat is different about the ibm mainframe
What is different about the ibm mainframe
 
Presentation on Logical Operators
Presentation on Logical OperatorsPresentation on Logical Operators
Presentation on Logical Operators
 
Grade 10 1st Term IT Notes
Grade 10 1st Term IT NotesGrade 10 1st Term IT Notes
Grade 10 1st Term IT Notes
 
1.0 introduction to personal computer
1.0  introduction to personal computer1.0  introduction to personal computer
1.0 introduction to personal computer
 

Similar to Introduction History Significance of mainframe computer

Chapter 5(2).pdf
Chapter 5(2).pdfChapter 5(2).pdf
Chapter 5(2).pdf
MehariKiros3
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
ARif Khan
 
INTRODUCTION TO COMPUTING
INTRODUCTION TO COMPUTINGINTRODUCTION TO COMPUTING
INTRODUCTION TO COMPUTING
Engr. Inam ullah
 
Book on nptel microcontroller
Book on nptel microcontrollerBook on nptel microcontroller
Book on nptel microcontroller
Souvik Dutta
 
Unit i
Unit  iUnit  i
computer application in hospitality Industry, periyar university unit 1
computer application in hospitality Industry, periyar university  unit 1computer application in hospitality Industry, periyar university  unit 1
computer application in hospitality Industry, periyar university unit 1
admin information
 
Unit i
Unit  iUnit  i
computer applicationin hospitality Industry1 periyar university unit1
computer applicationin hospitality Industry1 periyar university  unit1computer applicationin hospitality Industry1 periyar university  unit1
computer applicationin hospitality Industry1 periyar university unit1
admin information
 
Unit I
Unit  IUnit  I
Fundamentals of Computer Part 2
Fundamentals of Computer Part 2Fundamentals of Computer Part 2
Fundamentals of Computer Part 2
SURBHI SAROHA
 
Computer_Presentation.pptx
Computer_Presentation.pptxComputer_Presentation.pptx
Computer_Presentation.pptx
AdeelKhan446284
 
Lec 2 introduction_generation
Lec 2 introduction_generationLec 2 introduction_generation
Lec 2 introduction_generation
Protik Roy
 
clasification of digital computer and application of computers
clasification of digital computer and application of computersclasification of digital computer and application of computers
clasification of digital computer and application of computersJelz JZ
 
Lecture1.pdf
Lecture1.pdfLecture1.pdf
Lecture1.pdf
JoyPalit
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
Tirth Rami
 
types of computer
types of computertypes of computer
types of computer
madhavibarge
 
Lecture 2.pptx Introduction to computer.
Lecture 2.pptx Introduction to computer.Lecture 2.pptx Introduction to computer.
Lecture 2.pptx Introduction to computer.
samgamingofficial01
 
Fundamental of computer Types of Computers.pptx
Fundamental of computer Types of Computers.pptxFundamental of computer Types of Computers.pptx
Fundamental of computer Types of Computers.pptx
MuhammadHasnain88451
 
353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...
353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...
353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...
VigshakVlogs1
 

Similar to Introduction History Significance of mainframe computer (20)

Chapter 5(2).pdf
Chapter 5(2).pdfChapter 5(2).pdf
Chapter 5(2).pdf
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
INTRODUCTION TO COMPUTING
INTRODUCTION TO COMPUTINGINTRODUCTION TO COMPUTING
INTRODUCTION TO COMPUTING
 
Chap003
Chap003Chap003
Chap003
 
Book on nptel microcontroller
Book on nptel microcontrollerBook on nptel microcontroller
Book on nptel microcontroller
 
Unit i
Unit  iUnit  i
Unit i
 
computer application in hospitality Industry, periyar university unit 1
computer application in hospitality Industry, periyar university  unit 1computer application in hospitality Industry, periyar university  unit 1
computer application in hospitality Industry, periyar university unit 1
 
Unit i
Unit  iUnit  i
Unit i
 
computer applicationin hospitality Industry1 periyar university unit1
computer applicationin hospitality Industry1 periyar university  unit1computer applicationin hospitality Industry1 periyar university  unit1
computer applicationin hospitality Industry1 periyar university unit1
 
Unit I
Unit  IUnit  I
Unit I
 
Fundamentals of Computer Part 2
Fundamentals of Computer Part 2Fundamentals of Computer Part 2
Fundamentals of Computer Part 2
 
Computer_Presentation.pptx
Computer_Presentation.pptxComputer_Presentation.pptx
Computer_Presentation.pptx
 
Lec 2 introduction_generation
Lec 2 introduction_generationLec 2 introduction_generation
Lec 2 introduction_generation
 
clasification of digital computer and application of computers
clasification of digital computer and application of computersclasification of digital computer and application of computers
clasification of digital computer and application of computers
 
Lecture1.pdf
Lecture1.pdfLecture1.pdf
Lecture1.pdf
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
 
types of computer
types of computertypes of computer
types of computer
 
Lecture 2.pptx Introduction to computer.
Lecture 2.pptx Introduction to computer.Lecture 2.pptx Introduction to computer.
Lecture 2.pptx Introduction to computer.
 
Fundamental of computer Types of Computers.pptx
Fundamental of computer Types of Computers.pptxFundamental of computer Types of Computers.pptx
Fundamental of computer Types of Computers.pptx
 
353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...
353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...
353584459-Chapter-1.pdfPhase Margin Determination Using LTSpice: A Comprehens...
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Introduction History Significance of mainframe computer

  • 3. 33 What is a computer? • A computer is a digital device which can be programmed to change (process) information from one form to another. – Do exactly as they are told. – Digital devices: Understand only two different states (OFF and ON - 0 and 1)
  • 4. 44 Traditional Types of Computers • General purpose computers –Super computer –Mainframe –Personal Computer
  • 5. 5 What is a mainframe ? • A mainframe is what businesses use to host their commercial databases, transaction servers, and applications that require a greater degree of security and availability than is commonly found on smaller-scale machines.
  • 6. 6 What is a mainframe? (Cont…) Compatibility with operating systems, applications and data Centralized control of resources HW and operating systems share disk access A STYLE of operation Thousands of simultaneous I/O operations Clustering technologies Additional data and resource sharing capabilities
  • 7. What are Mainframe operating systems ? • Mainframe = Computer that can support thousands of applications and I/O devices to simultaneously serve thousands of users • Most mainframe computers are sold by IBM, and the operating systems are also provided by IBM • z/OS, is IBM’s foremost mainframe operating system 7
  • 8. Why Mainframes ? • The most important features the mainframe provides include: • Encrypt sensitive data as it crosses the network • Protect encryption keys • Provide well-known security configurations that achieve or surpass the industry standard 8
  • 9. History: IBM 709 Mainframe Computer This model was in use at Yale in 1963, located in the Watson building on Sachem St, now part of SOM IBM’s last vacuum tube computer, produced from 1957 until 1960
  • 10. History: • Mainframe history In 1950s , mainframe computers were physically the largest computers; few businesses could afford them • In the 1960s , with standardized mainframe customers could write business applications that didn’t need specialized hardware or software • In 1964 , the introduction of the IBM System/360 (or S/360™) signalled the start of the 3G : • first general purpose computers 10
  • 11. CPU Module from IBM 709 – Dimensions: 8” x 10”
  • 13. http://www.columbia.edu/acis/history/ibm709.html Frank da Cruz / fdc@columbia.edu / Columbia University Computing History / Jan 2001 Typical IBM 709 Machine Room
  • 14. IBM Card Punch of the type used for data entry with the Library’s Machine Aided Technical Processing System (MATPS), managed for many years by Suzanna Lengyel
  • 15. 15 Traditional Types of Computers: • First computers, introduced in 1950s • Used by large businesses • Typically supported thousands of users • Very expensive • Used for very large processing tasks • IBM’s new Mainframe – http://www.youtube.com/watch?v=LN4J4mClckA • Mainframe Computers
  • 16. Evolving architecture  More and faster processors  More physical memory and greater virtual memory addressing capability  Dynamic capabilities for upgrading HW and SW  Enhanced I/O devices and more and faster paths (channels)  Sophisticated I/O attachments  Increased ability to divide resources into multiple, logically independent and isolated systems, each running its own operating system.  Enhanced clustering technologies (e.g. Parallel Sysplex) Architecture describes the organizational structure of a system
  • 17. 17 Typical mainframe workloads Batch job Application Program Output Data Application Program Input Data Process data to perform a particular task Online (real time) transaction Query Reply Access shared data on behalf of online user
  • 18. 18 Significance objectives • Be able to: – Explain why business data resides on mainframe – List typical uses of mainframes – Describe the benefits of mainframe computing – Outline the major types of workloads for which mainframes are best suited
  • 19. 19 Mainframe facts • Mainframes in our midst – Hidden from the public eye • Who uses mainframes? – Most Fortune 1000 companies use a mainframe environment – 60% of all data available on the Internet is stored on mainframe computers • Why mainframes? – Large-scale transaction processing • Thousands of transactions per second – Support thousands of users and application programs – Simultaneously accessing resources – Terabytes of information in databases – Large-bandwidth communications
  • 20. 20 Factors contributing to mainframe use Capacity Scalability Integrity and Security Availability Access to large amounts of data Systems management Autonomic capabilities
  • 21. 21 Typical batch use Disk Storage databases Tape Storage Sequential data sets Partners and clients exchange information Reports Backups Data update Reports Statistics, summaries, exceptions Residence Main office Branch offices Account balances bills, etc Processing reports Mainframe Processing batch jobs 44 55 Reports 22 1010 11 88 66 33 CREDIT CARD 1234 5678 90121234 5678 9012 VALID FROM GOOD THRU XX/XX/XX XX/XX/XX PAUL FISCHER XX/XX/XX XX/XX/XX PAUL FISCHER 77 99 System Operator Production Control
  • 23. 23 Summary • The New Mainframe: – Plays a central role in the daily operations of the world’s largest organizations – and the daily lives of most people. – Is known for its reliability, security, and enormous processing capabilities. – Is designed for processing large scale workloads and serving thousands of users and transactions concurrently. – Is managed by highly skilled technical support staff. – Runs a variety of operating systems.
  • 24. Key terms – Architecture – Batch Processing – Compatibility – Data integrity – High Availability – IBM System z – Infrastructure • Mainframe • Online transaction processing (OLTP) • Punched card • RAS • Scalability • Security

Editor's Notes

  1. Despite the predominance of mainframes in the business world, these machines are largely invisible to the general public, the academic community, and indeed many experienced IT professionals. Instead, other forms of computing attract more attention, at least in terms of visibility and public awareness. That this is so is perhaps not surprising. After all, who among us needs direct access to a mainframe? And, if we did, where would we find one to access? In truth, we are all mainframe users, whether we realize it or not.
  2. Today, computer manufacturers don’t always use the term mainframe to refer to mainframes. Instead, most have taken to calling any commercial-use computer—large or small—a server, with the mainframe simply being the largest type of server in use today. IBM, for example, now refers to its mainframes as zSeries servers. We use the term mainframe in this textbook to refer to computers that can support dozens of applications and input/output devices to simultaneously serve thousands of users. The presence of a mainframe often implies a centralized form of computing, rather than a distributed form of computing. Having data centralized in a single mainframe repository saves customers from having to manage updates to more than one copy of their business data, and increases the likelihood that the data is current.
  3. The first computer that Fred used, programming in Fortran
  4. Today, computer manufacturers don’t always use the term mainframe to refer to mainframes. Instead, most have taken to calling any commercial-use computer—large or small—a server, with the mainframe simply being the largest type of server in use today. IBM, for example, now refers to its mainframes as zSeries servers. We use the term mainframe in this textbook to refer to computers that can support dozens of applications and input/output devices to simultaneously serve thousands of users. The presence of a mainframe often implies a centralized form of computing, rather than a distributed form of computing. Having data centralized in a single mainframe repository saves customers from having to manage updates to more than one copy of their business data, and increases the likelihood that the data is current.
  5. A batch job is submitted on the computer, reads and processes data in bulk, and produces output. A batch job can last for hours. While batch processing is possible on distributed systems, it is not as commonplace as on mainframes because distributed systems often lack: Sufficient data storage Available processor capacity or cycles Sysplex-wide management of system resources and job scheduling. Mainframes serve a vast number of online transaction processing (OLTP) systems. These are often mission-critical applications that businesses depend on for their core functions. Some industry uses of online systems: Banks – ATMs, teller systems for customer service Insurance – Agent systems for policy management and claims processing Travel and transport – Airline reservation systems Manufacturing – Inventory control, production scheduling Government – Tax processing, license issuance and management.
  6. Reliability Involves the use of high-quality hardware and software components, and extensive self-checking and self-recovery by hardware components. Availability The ability of hardware to detect and automatically replace failing hardware elements, and for system software to detect, isolate, and recover failing software components. Serviceability Through well-defined units of replacement, the hardware and software can often be non-disruptively serviced or upgraded, with little or no impact to the operational system. A secure computer system prevents users from accessing or changing any objects on the system, including user data, except through system-provided interfaces that enforce authority rules. Mainframe computers can provide a very secure system for processing large numbers of heterogeneous applications that access critical data. By scalability we mean the ability of the hardware, software, or a distributed system to continue to function well as it is changed in size or volume; for example, the ability to retain performance levels when adding processors, memory, and storage. The need to support applications of varying ages imposes a strict compatibility demand on mainframe hardware and software, which have been upgraded many times since the first System/360 mainframe computer was shipped in 1964. Applications must continue to work properly. Thus, much of the design work for new hardware and system software revolves around this compatibility requirement. Each new generation of mainframes has added improvements in one or more of the following areas: More and faster processors More physical memory and greater memory addressing capability Dynamic capabilities for upgrading both hardware and software More sophisticated automated hardware error checking and recovery Enhanced devices for input/output (I/O) and more and faster paths (channels) between I/O devices and processors Sophisticated I/O attachments, such as LAN adapters with extensive inboard processing Increased ability to divide the resources of one machine into multiple, logically independent and isolated systems, each running its own operating system Enhanced clustering technologies, such as Parallel Sysplex, and the ability to share data among multiple systems.
  7. Consider the following elements at work in the scheduled batch process: 1. At night, many batch jobs executing programs and utilities are processed. These jobs consolidate the results of the online transactions executed during the day. 2. The batch jobs generate reports of business statistics. 3. Backups of critical files and databases are made before and after the batch window. 4. Reports with business statistics are sent to a specific area for analysis during the following day. 5. Reports with exceptions are sent to the branch offices. 6. Monthly account balance reports are generated and sent to all bank customers. 7. Reports with processing summary are sent to the partner credit card company. 8. A credit card transaction report is received from the partner company. 9. In the production control department, the operations area is monitoring the messages on the system console and the execution of the jobs. 10. Jobs and transactions are reading or updating the database (the same database used by online transactions) and many files are written to tape.
  8. Common online transactions using a mainframe: 1. A customer uses an ATM, which presents a user-friendly interface for various functions: Withdrawal, query account balance, deposit, transfer, or cash advance from a credit card account. 2. Elsewhere in the same private network, a bank employee in a branch office performs operations such as consulting, fund applications, and money ordering. 3. At the bank’s central office, business analysts tune transactions for improved performance. Other staff use specialized online systems for office automation to perform customer relationship management, budget planning, and stock control. 4. All requests directed to the mainframe computer for processing. 5. Programs running on the mainframe computer perform updates and inquires to the database management system (for example, DB2). 6. Specialized disk storage systems store the database files.