GSE Nordic 2015 CICS Performance and Consolidation The CICS TS V5 releases introduce a number of runtime enhancements to reduce CPU usage, improve response times, reduce resource usage, while providing additional insight into transaction performance. Come along to this session as we explore some of the newer performance benefits found in CICS TS and how savings can translate to your environment. We will also look at a lab benchmark that consolidated CICS regions, maintaining throughput, saving significant MIPS, and reducing the management overhead.
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...nick_garrod
The document provides information on using CICS Performance Analyzer (CICS PA) to analyze CICS performance issues. It discusses how CICS PA allows users to create reports on SMF performance data without needing to know details of the SMF offsets and fields. It also provides examples of CICS PA reports that summarize task suspend time and dispatch time to help identify performance bottlenecks.
This document discusses new features in CICS Transaction Server V5.1 that drive operational efficiencies. It focuses on three areas: managed operations, greater capacity, and deeper insight. For managed operations, it highlights new policy-based controls over system resources and improved auditing. For greater capacity, it covers enhancements for horizontal and vertical scaling, 64-bit support, and high availability. For deeper insight, it details extended performance and identity monitoring.
The document introduces the new mainframe and its capabilities. It outlines that mainframes are used by large organizations to host commercial databases and applications requiring high security and availability. Mainframes can process large volumes of different workloads concurrently. Typical mainframe roles include system programmers, operators, developers and administrators. Common operating systems are z/OS, z/VM, VSE, and Linux for zSeries.
Meraki is a leader in cloud networking with over 18,000 customer networks in 145 countries. It focuses on technology innovation and was founded in 2006 at MIT. Meraki's cloud networking architecture provides centralized management of wireless, LAN, and security devices from any web browser. This allows for intuitive management, complete visibility, and robust security and reliability. Meraki equipment and cloud services can provide significant cost savings over traditional networking solutions.
This document provides a comparison of features available across different IBM DataPower gateway products and editions. It includes a table listing services, protocols, data formats, transforms, and optional modules supported by each gateway. The document also provides notes on licensing and deployment details for the various gateway editions.
Share 2014 Pittsburgh CICS and Workload Management (WLM)nick_garrod
CICSPlex SM provides workload management capabilities that allow for more dynamic routing of workloads across CICS systems based on performance goals. This helps improve availability, meet response time targets, and balance workloads. Key aspects of workload management include routing transactions dynamically using VTAM generic resources in the network, TCP/IP load balancing, and z/OS Workload Manager capabilities to allocate resources based on service policies and goals defined for different workloads in the sysplex. CICS Explorer provides a simplified way to define workload management using service classes to describe performance objectives for different parts of the workload.
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...nick_garrod
The document provides information on using CICS Performance Analyzer (CICS PA) to analyze CICS performance issues. It discusses how CICS PA allows users to create reports on SMF performance data without needing to know details of the SMF offsets and fields. It also provides examples of CICS PA reports that summarize task suspend time and dispatch time to help identify performance bottlenecks.
This document discusses new features in CICS Transaction Server V5.1 that drive operational efficiencies. It focuses on three areas: managed operations, greater capacity, and deeper insight. For managed operations, it highlights new policy-based controls over system resources and improved auditing. For greater capacity, it covers enhancements for horizontal and vertical scaling, 64-bit support, and high availability. For deeper insight, it details extended performance and identity monitoring.
The document introduces the new mainframe and its capabilities. It outlines that mainframes are used by large organizations to host commercial databases and applications requiring high security and availability. Mainframes can process large volumes of different workloads concurrently. Typical mainframe roles include system programmers, operators, developers and administrators. Common operating systems are z/OS, z/VM, VSE, and Linux for zSeries.
Meraki is a leader in cloud networking with over 18,000 customer networks in 145 countries. It focuses on technology innovation and was founded in 2006 at MIT. Meraki's cloud networking architecture provides centralized management of wireless, LAN, and security devices from any web browser. This allows for intuitive management, complete visibility, and robust security and reliability. Meraki equipment and cloud services can provide significant cost savings over traditional networking solutions.
This document provides a comparison of features available across different IBM DataPower gateway products and editions. It includes a table listing services, protocols, data formats, transforms, and optional modules supported by each gateway. The document also provides notes on licensing and deployment details for the various gateway editions.
Share 2014 Pittsburgh CICS and Workload Management (WLM)nick_garrod
CICSPlex SM provides workload management capabilities that allow for more dynamic routing of workloads across CICS systems based on performance goals. This helps improve availability, meet response time targets, and balance workloads. Key aspects of workload management include routing transactions dynamically using VTAM generic resources in the network, TCP/IP load balancing, and z/OS Workload Manager capabilities to allocate resources based on service policies and goals defined for different workloads in the sysplex. CICS Explorer provides a simplified way to define workload management using service classes to describe performance objectives for different parts of the workload.
IMS DC is a hierarchical database management system supplied by IBM that runs on mainframe computers. It has two main components: Data Base (DB) processing and Data Communication (DC) processing. DC handles information in the form of messages that flow between remote terminals and application programs. Major kinds of online programs that can be written for IMS DC include inquiry programs, data entry programs, maintenance programs, and menu programs.
packageFor certain workloads and environments: Consolidation on large virtualized servers raises utilization, reduces core requirements, and lowers cost per workload
IBM DataPower Gateway V7.1 is a consolidated, modular gateway platform that provides security, integration, control and optimization for mobile, API, web, SOA, and cloud workloads. It combines the functionality of previous IBM gateway products onto a single hardware and software platform. The new release features an improved hardware platform for increased performance, deployment flexibility through physical and virtual options, and additional modules for capabilities like B2B integration and access control through IBM Security Access Manager.
IBM MQ systems route billions of messages around the world each day. This presentation looks at the tools available in MQ for z/OS to allow you to understand where your messages are flowing, and things you can use if the messages aren't going where you expect.
Nutanix Enterprise Cloud makes virtualization invisible, leveraging Nutanix's built-in and license free hypervisor – AHV. This powerful introduction to AHV and Prism's integrated virtualization management explains the benefits of converging the virtualization layer with the infrastructure stack. A veteran Nutanix engineer will demonstrate how easy it is to provision new workloads on AHV, and manage the full virtualization environment via Prism. See all of the enterprise-grade capabilities that make AHV the perfect choice for your applications and IT budget.
This document contains icons representing various network elements used in access networks, optical networks, datacom networks, core networks, wireless networks, terminals, applications and software, storage and security, and general network diagrams. There are over 100 icons shown for different types of equipment such as DSLAMs, routers, switches, servers, antennas, and more. The icons are grouped into categories and accompanied by brief labels to indicate their network functions.
The document provides an overview of the Zabbix monitoring platform. It discusses why monitoring is needed, compares Zabbix to other monitoring tools like Nagios, Prometheus, and PRTG, and describes Zabbix's features including data gathering, alerting, graphing, templates, and architecture. The document also covers Zabbix agents, proxies, notifications, and common use cases for server and service monitoring.
Communications Server provides TCP/IP and SNA connectivity and services on z/OS. It combines the prior VTAM and TCP/IP products and provides common networking functions. Applications can access networks using SNA APIs, sockets APIs, or standard TCP/IP applications. Communications Server supports both SNA and TCP/IP protocols and their integration.
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesCA Technologies
The document discusses how to implement Generic VTAM Resources and Parallel Sysplex Features in CA IDMS systems. Generic VTAM Resources allow multiple IDMS systems to share a common connection resource, improving availability. Parallel Sysplex Features enable data sharing across multiple update systems using a shared cache in a coupling facility, improving performance and high availability. Key steps include defining Generic VTAM resources, XCF groups, and shared cache structures, and configuring the IDMS systems to use these resources and participate in the data sharing group.
The document provides an overview of the history and technical details of the IBM AS/400 midrange computer system, later renamed IBM i. It discusses the origins of the system in IBM's Rochester, Minnesota facilities in the late 1980s. It also describes the key aspects of the IBM i operating system such as its object-based design, hardware integration, single-level storage, and support for multiple programming languages. The document concludes with a brief overview of navigating and exploring objects within an IBM i system.
WebSphere application server 8.5.5 - quick overviewChris Sparshott
IBM WebSphere Application Server (WAS) and Liberty Profile provide standards-based Java runtime environments for developing and running web applications. WAS includes multiple editions for different use cases, including Liberty Profile for simpler applications, full profile for complex enterprise applications, and Liberty Core for lightweight deployments. The document outlines the capabilities and benefits of each WAS edition.
The document provides an overview of utilities used in the IBM Z/OS mainframe operating system. It discusses the objectives and agenda of a training course on IBM utilities. The first session covers the introduction and types of utilities, including dataset utilities, system utilities, and access method services. Common dataset utilities like IEFBR14, IEBGENER, IEBCOPY, and SORT are introduced. The document provides examples of using IEFBR14 to create and delete datasets, and examples of using IEBCOPY and IEBGENER to copy datasets and work with partitioned dataset members.
Showdown: IBM DB2 versus Oracle Database for OLTPcomahony
The document compares the online transaction processing (OLTP) performance of DB2 and Oracle Database. It discusses how DB2 offers more efficient logging and memory usage, which enables higher transactional performance on benchmarks like TPC-C. It also describes how DB2 pureScale provides faster and more scalable data sharing between nodes through its use of remote direct memory access (RDMA), avoiding the overhead of processes in Oracle RAC. DB2 pureScale allows nearly all data to remain available during node failures through its centralized coordination and recovery capabilities.
Seller Presentation - Power Systems Power Virtual Server.PPTXEdilsonNeto8
IBM Power Systems Virtual Server provides a cloud-based virtual machine service for IBM Power workloads like AIX, IBM i, and Linux. It offers flexible consumption-based pricing and access to IBM Cloud services. Key benefits include maximizing availability and security for critical workloads, responding faster to business needs through efficient scaling, and providing a consistent hybrid cloud experience. The presentation reviews use cases for business continuity, datacenter strategy, modernization, and cost optimization. It also positions IBM Power Systems Virtual Server competitively by noting strengths like certification, security, and skills while addressing weaknesses of alternative options.
Overview - ESBs and IBM Integration BusJuarez Junior
This document provides an overview of enterprise service buses (ESBs) and IBM Integration Bus (IIB). It defines what an ESB is and its main purposes, such as acting as a message broker and performing transformations between services. It also describes IIB specifically, noting it is IBM's product for integration and that it includes components like the integration server, bus web interface, and toolkit. Finally, it mentions there will be a demonstration of the integration console, toolkit, web interface, basic commands, and debugging using the toolkit.
OpManager is integrated network management software that offers network monitoring, server monitoring, bandwidth analysis, configuration management, firewall log analysis, and IP & switch port management.
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesnick_garrod
This document discusses how CICS policies can be used to manage critical CICS resources. CICS policies allow administrators to define thresholds for resources like CPU usage, storage usage, and transaction rates that trigger actions like emitting messages or aborting tasks if exceeded. The latest versions of CICS introduce new platform resources that can be managed through policies like JVMSERVER, TCPIPSERVICE, and PIPELINE. Policies can be scoped to different levels including the platform, application, or operation. CICS Tools and CICS Performance Analyzer provide interfaces to define, view, and report on policies to help optimize resource usage.
IMS DC is a hierarchical database management system supplied by IBM that runs on mainframe computers. It has two main components: Data Base (DB) processing and Data Communication (DC) processing. DC handles information in the form of messages that flow between remote terminals and application programs. Major kinds of online programs that can be written for IMS DC include inquiry programs, data entry programs, maintenance programs, and menu programs.
packageFor certain workloads and environments: Consolidation on large virtualized servers raises utilization, reduces core requirements, and lowers cost per workload
IBM DataPower Gateway V7.1 is a consolidated, modular gateway platform that provides security, integration, control and optimization for mobile, API, web, SOA, and cloud workloads. It combines the functionality of previous IBM gateway products onto a single hardware and software platform. The new release features an improved hardware platform for increased performance, deployment flexibility through physical and virtual options, and additional modules for capabilities like B2B integration and access control through IBM Security Access Manager.
IBM MQ systems route billions of messages around the world each day. This presentation looks at the tools available in MQ for z/OS to allow you to understand where your messages are flowing, and things you can use if the messages aren't going where you expect.
Nutanix Enterprise Cloud makes virtualization invisible, leveraging Nutanix's built-in and license free hypervisor – AHV. This powerful introduction to AHV and Prism's integrated virtualization management explains the benefits of converging the virtualization layer with the infrastructure stack. A veteran Nutanix engineer will demonstrate how easy it is to provision new workloads on AHV, and manage the full virtualization environment via Prism. See all of the enterprise-grade capabilities that make AHV the perfect choice for your applications and IT budget.
This document contains icons representing various network elements used in access networks, optical networks, datacom networks, core networks, wireless networks, terminals, applications and software, storage and security, and general network diagrams. There are over 100 icons shown for different types of equipment such as DSLAMs, routers, switches, servers, antennas, and more. The icons are grouped into categories and accompanied by brief labels to indicate their network functions.
The document provides an overview of the Zabbix monitoring platform. It discusses why monitoring is needed, compares Zabbix to other monitoring tools like Nagios, Prometheus, and PRTG, and describes Zabbix's features including data gathering, alerting, graphing, templates, and architecture. The document also covers Zabbix agents, proxies, notifications, and common use cases for server and service monitoring.
Communications Server provides TCP/IP and SNA connectivity and services on z/OS. It combines the prior VTAM and TCP/IP products and provides common networking functions. Applications can access networks using SNA APIs, sockets APIs, or standard TCP/IP applications. Communications Server supports both SNA and TCP/IP protocols and their integration.
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesCA Technologies
The document discusses how to implement Generic VTAM Resources and Parallel Sysplex Features in CA IDMS systems. Generic VTAM Resources allow multiple IDMS systems to share a common connection resource, improving availability. Parallel Sysplex Features enable data sharing across multiple update systems using a shared cache in a coupling facility, improving performance and high availability. Key steps include defining Generic VTAM resources, XCF groups, and shared cache structures, and configuring the IDMS systems to use these resources and participate in the data sharing group.
The document provides an overview of the history and technical details of the IBM AS/400 midrange computer system, later renamed IBM i. It discusses the origins of the system in IBM's Rochester, Minnesota facilities in the late 1980s. It also describes the key aspects of the IBM i operating system such as its object-based design, hardware integration, single-level storage, and support for multiple programming languages. The document concludes with a brief overview of navigating and exploring objects within an IBM i system.
WebSphere application server 8.5.5 - quick overviewChris Sparshott
IBM WebSphere Application Server (WAS) and Liberty Profile provide standards-based Java runtime environments for developing and running web applications. WAS includes multiple editions for different use cases, including Liberty Profile for simpler applications, full profile for complex enterprise applications, and Liberty Core for lightweight deployments. The document outlines the capabilities and benefits of each WAS edition.
The document provides an overview of utilities used in the IBM Z/OS mainframe operating system. It discusses the objectives and agenda of a training course on IBM utilities. The first session covers the introduction and types of utilities, including dataset utilities, system utilities, and access method services. Common dataset utilities like IEFBR14, IEBGENER, IEBCOPY, and SORT are introduced. The document provides examples of using IEFBR14 to create and delete datasets, and examples of using IEBCOPY and IEBGENER to copy datasets and work with partitioned dataset members.
Showdown: IBM DB2 versus Oracle Database for OLTPcomahony
The document compares the online transaction processing (OLTP) performance of DB2 and Oracle Database. It discusses how DB2 offers more efficient logging and memory usage, which enables higher transactional performance on benchmarks like TPC-C. It also describes how DB2 pureScale provides faster and more scalable data sharing between nodes through its use of remote direct memory access (RDMA), avoiding the overhead of processes in Oracle RAC. DB2 pureScale allows nearly all data to remain available during node failures through its centralized coordination and recovery capabilities.
Seller Presentation - Power Systems Power Virtual Server.PPTXEdilsonNeto8
IBM Power Systems Virtual Server provides a cloud-based virtual machine service for IBM Power workloads like AIX, IBM i, and Linux. It offers flexible consumption-based pricing and access to IBM Cloud services. Key benefits include maximizing availability and security for critical workloads, responding faster to business needs through efficient scaling, and providing a consistent hybrid cloud experience. The presentation reviews use cases for business continuity, datacenter strategy, modernization, and cost optimization. It also positions IBM Power Systems Virtual Server competitively by noting strengths like certification, security, and skills while addressing weaknesses of alternative options.
Overview - ESBs and IBM Integration BusJuarez Junior
This document provides an overview of enterprise service buses (ESBs) and IBM Integration Bus (IIB). It defines what an ESB is and its main purposes, such as acting as a message broker and performing transformations between services. It also describes IIB specifically, noting it is IBM's product for integration and that it includes components like the integration server, bus web interface, and toolkit. Finally, it mentions there will be a demonstration of the integration console, toolkit, web interface, basic commands, and debugging using the toolkit.
OpManager is integrated network management software that offers network monitoring, server monitoring, bandwidth analysis, configuration management, firewall log analysis, and IP & switch port management.
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesnick_garrod
This document discusses how CICS policies can be used to manage critical CICS resources. CICS policies allow administrators to define thresholds for resources like CPU usage, storage usage, and transaction rates that trigger actions like emitting messages or aborting tasks if exceeded. The latest versions of CICS introduce new platform resources that can be managed through policies like JVMSERVER, TCPIPSERVICE, and PIPELINE. Policies can be scoped to different levels including the platform, application, or operation. CICS Tools and CICS Performance Analyzer provide interfaces to define, view, and report on policies to help optimize resource usage.
CICS policy-based management allows administrators to define thresholds on resource usage for applications. If an application exceeds a threshold, such as too many database requests, file accesses, or storage usage, CICS can automatically take action like emitting a notification, triggering an event, or aborting the task. Policies are defined through XML documents and can be applied at the region, platform, application, or operation level. This new capability gives administrators control and helps detect and address rogue or runaway applications causing outages or issues.
This session will describe how CICS TS v5.1 can quickly and simply support the creation of modern Mobile Ready interfaces to existing applications. The session will introduce the key technologies including the use of Liberty technology in CICS TS. We will work through a simple scenario to demonstrate the key points. The session will cover the core supporting technologies include in CICS TS v5.1 as well as the Dynamic Scripting Feature Pack and content included in the CICS TS v5.2 Open Beta.
16370 cics project opening and project update fnick_garrod
This document provides an overview and agenda for the CICS Project Opening and Project Update session. It includes:
- An introduction from Dave Jeffries, the CICS Director, and Andy Bates, the CICS TS Product Manager.
- A forecast of key topics to be covered at the SHARE conference related to CICS, including Cloud & DevOps, Java & Liberty, Mobile & APIs, Cost Optimization, and Generation z & Core Skills.
- An outline of upcoming releases, betas, and skills certifications for CICS Transaction Server.
CICSPlex SM provides workload management capabilities that help balance workloads across CICS systems based on goals defined in z/OS Workload Manager (WLM). WLM classifies transactions and monitors CICS performance to determine which systems are best able to meet response time and other goals. This allows work to be dynamically routed to systems that can process it most efficiently within the sysplex. Using WLM and CICSPlex SM together provides improved availability, ability to meet service level agreements, and more flexible routing of applications across the IT infrastructure.
IBM Impact session 1654-how to move an existing cics application to a smartphonenick_garrod
This document discusses moving an existing CICS application to a smartphone. It outlines a 5 step process: 1) Using Rational Team Concert and Rational Developer for System z to verify requirements and load code. 2) Using RDz to create, deploy, and install web services to CICS. 3) Using RDz to test and debug the web services and COBOL program. 4) Creating a Worklight client to run on iPhone. 5) Migrating from VSAM to DB2 storage.
F004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programaciónssmmille
Este documento presenta una guía de aprendizaje para la aplicación de los fundamentos de programación. La guía contiene 13 secciones que abordan conceptos como razonamiento lógico, lógica, problemas de lógica y situaciones de razonamiento. El objetivo es que los estudiantes aprendan a aplicar la lógica y el razonamiento para resolver problemas a través de ejercicios y casos prácticos. La guía tiene una duración de 8 horas y es parte de un programa de formación en análisis y desarrollo de sistemas
Estrategia de Comunicacion Lectora-mirna-aMirna Arauz
El documento repite el título "Curso: Estrategia de Comprensión Lectora" siete veces y lista a "Mirna A. Araúz" como la autora de dicho curso en cada repetición.
SHARE 2014, Pittsburgh CICS and Liberty applicationsnick_garrod
CICS TS V5.1 offers a fast and lightweight Java web container built on WebSphere Application Server Liberty technology. This web container provides developers with Java Servlet and JSP capabilities and fast local access to existing CICS applications and data. A wide range of Java development tools can be used to develop web applications for the Liberty container running in the CICS JVM server environment. The session discusses features of Liberty in CICS including integration with CICS resources.
SHARE 2014 Pittsburgh, Managing multi version applications in cicsnick_garrod
This document discusses managing multi-version applications in CICS. It describes how CICS application multi-versioning allows deploying new application versions, features, or bug fixes while minimizing impact to existing users. It provides scenarios for using multi-versioning for new features, bug fixes, phased rollouts, and application consolidation. The presentation demonstrates capabilities for routing requests to specific versions, making versions available/unavailable, and managing versions in CICS Cloud Explorer.
SHARE 2014 Pittsburgh, Modernizing cics for cloudnick_garrod
- CICS can be modernized for the cloud to provide operational efficiency, service agility, and enable DevOps practices. This involves exploiting capabilities like CICSPlex SM, CICS Explorer, CICS bundles, zFS, monitoring, and tools to apply cloud characteristics.
- The essential cloud characteristics of on-demand self service, broad network access, resource pooling, measured service, and rapid elasticity can be applied to CICS through automation, improved multi-tenancy, flexible resource usage measurement, and dynamic scaling of workloads.
- Achieving a CICS cloud involves defining applications and platforms using standard formats and policies to drive the application lifecycle and enable capabilities like versioning, automation, and
W wyniku różnorodnych metod implementacji przez poszczególne frameworki, w temacie klas w JavaScript zdiagnozowano rozszczepienie osobowości. Na szczęście odpowiednie lekarstwo powoli jest szykowane, o czym będę starał się opowiedzieć w tej prezentacji. Jednocześnie postaram się przypomnieć historie choroby, jej objawy i wytłumaczyć, dlaczego kuracja jest tak bardzo pożądana.
Impact 2014 Best practices for_cics_soa_conick_garrod
This document discusses best practices for integrating CICS applications into a service-oriented architecture (SOA). It outlines the key SOA connectivity options available in CICS, including web services, JCA, messaging, and sockets. It also covers considerations for choosing the best integration approach based on factors like application architecture and requirements. Recent enhancements in CICS TS 5.2 and CICS TG V9.1 that improve mobile and cloud support are also summarized.
IMS V12 includes several performance enhancements over previous versions, including improved internal instruction paths, logging enhancements like extended format OLDS and striping, reduced TCB switching in DBCTL, and new capabilities like secondary indexes for fast path databases and dynamic buffer pools. Benchmark results showed equal or better performance than IMS V11 across workloads. Specific enhancements saw improvements such as over 20% CPU savings for DBCTL TCB switching and up to 81% CPU reduction for synchronous OTMA queues.
Application Delivery Fabric for Next Gen EnterpriseKemp
The application delivery world has changed as enterprises leverage cloud platforms and operational approaches such as continuous delivery to achieve agility and cost efficiencies. This constantly changing, multi-platform environment requires a fresh approach to how applications are scaled, delivered and made resilient. The old big-box approach of the in-house data center can’t offer the flexibility and cost efficiency demanded by the application environment.What is required is an application delivery fabric that meets the current and emerging demands of applications running across multiple environments.
• Make Applications highly available
• Improve Scalability & performance
• Secure and optimize Application delivery
https://kemptechnologies.com/kemp360/application-network-optimization-performance-management/
GSE Nordic 2015 Conferece - CICS Opening. CICS TS V5.1 became available at the end of 2012, followed by CICS TS V5.2 in mid 2014. So what does that mean for you? Perhaps you can reduce operational complexity by hosting modern application interface logic inside the Liberty profile server within CICS? Perhaps you can use the new CICS Cloud capabilities to improve application reliability and accelerate deployments? Maybe you can improve your integration with Mobile devices? Or better control your costs though policies and consolidation? Nick and Ian open the CICS track to help you find out how CICS is reinventing mainframe application serving one again. Discover which sessions you should attend to get the most value from your attendance.
The document describes new features in IBM's OMEGAMON XE for CICS on z/OS v5.3.0 monitoring software. Key updates include simplified JCL requirements, increased zIIP enablement to improve performance, and enhancements to task history reporting including CICSplex-wide tracing and near-term historical views. The release also features embedded data integration and resource limiting controls for CICS storage.
VMworld 2013: US Air National Guard - DoD Private Cloud Initiative –How Virtu...VMworld
VMworld 2013
Mike Colson, Tec-Pros
Jason Scanga, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Optimizing Your z/OS Mainframe Through zIIP Offload and SQL AnalysisPrecisely
Many organizations that have purchased zIIP processors are not realizing their full benefit.
In this session we review how SORT, COPY, and compression workloads can be offloaded to zIIP engines to provide General Processor constraint relief, delaying capacity upgrades and containing MLC costs. View this webcast on-demand to learn more about
• How zIIP offload for SORT, COPY, and compression is saving organizations over 90% in General Processor resource utilization for those activities.
• How to optimize sorting operations and achieve both reduced CPU and Elapsed time to help meet the shrinking Batch window.
• How to optimize Db2 queries to get the maximum performance out of your Db2 systems.
Oracle Database Consolidation with FlexPod on Cisco UCSNetApp
Cisco and Oracle as technology front-runners provide YOU the tools you need to optimize your Oracle environments! John McAbel, Senior Product Manager - Oracle Solutions on UCS at Cisco Systems, explains how NetApp and Cisco are providing a flexible infrastructure that helps prepare organizations for today, and for future business growth and change.
Cisco introduced AutoQoS, which automates quality of service configurations to simplify, speed up, and reduce the costs of VoIP deployments. AutoQoS uses intelligence to automatically classify applications, generate QoS policies, and configure devices with a single command. This can reduce deployment time and costs by up to 3 times compared to manual QoS configuration.
This document discusses Cisco's data center strategy and commitment to the data center market. It provides an overview of Cisco's data center innovations over time, from 2008 to 2012, including product introductions. It also outlines how Cisco's unified computing solutions help customers eliminate bottlenecks, simplify operations and management, and enable cloud computing. The document shares examples of customers who saw cost reductions of 60% in power and 70% in cabling with Cisco solutions. It positions Cisco as the number 3 provider of x86 blade servers globally.
This document discusses tools for analyzing IMS performance, including information available in the IMS log. It provides examples of IMS log reports showing transaction statistics, database activity, and syncpoint timing. The presentation encourages using this data to identify high-volume transactions that are slow to process or miss service level targets in order to optimize performance.
The document discusses how Cisco UCS can improve datacenter economics and lower total cost of ownership (TCO). It provides statistics showing the high costs of servers, power, and management in datacenters. Cisco UCS aims to reduce TCO by simplifying infrastructure, improving server and resource utilization through virtualization, and reducing ongoing administrative costs through unified management. Real-world customer examples demonstrate reduced costs, improved performance, and payback periods of less than one year through Cisco UCS solutions.
VersaStack CVD with IBM flashsystem V9000!Michael Martin
The document discusses the VersaStack solution from Cisco and IBM, which is an integrated infrastructure combining Cisco UCS servers and networking with IBM storage systems. Some key benefits highlighted include increased efficiency and automation through unified management, improved performance through flash-optimized storage and workload analysis, and lower costs through optimizations that reduce hardware needs by up to 50% while maintaining or improving performance. The solution aims to simplify deployment and management of infrastructure while accelerating applications.
The document discusses the experiences of The Harford Financial Services Group in implementing workload management goals using IBM's Workload Manager (WLM) to manage transaction response times for their CICS and IMS environments. They analyzed transaction profiles, defined service classes and goals, monitored performance, and made adjustments to improve response times and ensure goals were being met during high-volume periods such as month-end processing. For stored procedures, they classified enclaves based on origination point and made changes to improve IMS transaction response times that were being impacted.
1961 no rainclouds here! using cics platform and policies to keep your privat...Matthew Webster
CICS V5 introduces significant capability to help manage CICS as a private cloud. The Platform definition can monitor the health of shared services and maintain consistency across regions simplifying application deployment while threshold policies can protect production systems against rogue applications by enforcing coding standards throughout the development lifecycle. See how to use these new resources in conjunction with existing facilities including CICS Monitoring and tools like CICS PA to manage and measure the health of your CICS environment.
This session will cover recent enhancements to CICS including support for deploying and managing shared services such as TCP/IP connectivity, web services resources and Java runtimes as part of a Platform. Customers using workload management will discover how Application context information can now assist with dynamic routing. We will also describe the new threshold policies
S102 cics the future is closer abridgednick_garrod
GSE Nordic 2015 - Future of CICS is closer than you think. There is a lot going on behind that mysterious curtain. Recently, the CICS development organization has adopted a new practice called ‘IBM Design Thinking’, which will forever change the way CICS products are developed. The core principle of this approach is to make sure we get as much feedback as possible on our future ideas. This is a quite unique opportunity to participate in a discussion regarding the future of IBM CICS technology. We will be sharing our views. And we will be hoping for lots for interactive feedback. Please don’t be shy!
Virtualization to Cloud with SDDC Operations Management and Service ProvisioningVMware
IT as a Service (ITaaS) is a journey, not a one-time implementation. This presentation shows how, over time and with expanded adoption, VMware's customers are becoming more virtualized and decreasing costs with greater ROI.
Is your organization considering ServiceNow? Do you own Microsoft System Center? Join us for a candid discussion of the technical and business aspects of this very important decision in a way you've never seen before, with an insightful head-to-head comparison of key feature areas, including:
-Service and Asset Management
-Self-Service and Automation
-Dashboarding and Data Visualization
-Hosting Options and Cloud Futures
-Real-world TCO Comparison: Do the dollars make sense?
“My systems work perfectly—it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be "an application issue" anymore. In CICS TS 5, new policy-based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rogue applications can be detected through various task threshold policies, such as excessive file or database access, repetitive program links, or abnormal storage requests. Once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely.
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)nick_garrod
CICS TS V5.3 open beta is available and includes enhancements to support for Java and the WebSphere Liberty Profile, performance optimizations, enhanced metrics, and additional security features. It also includes new cloud and DevOps support to automate CICS deployments. Prior versions of CICS TS included features for service agility, operational efficiency, and cloud enablement. Statements by IBM regarding future products and plans are subject to change without notice.
Enhanced cics cloud enablement and dev ops capabilitiesnick_garrod
The document discusses enhancements to CICS cloud enablement and DevOps capabilities. It introduces the CICS Build Toolkit, a multi-platform tool for building CICS applications and bundles. It also introduces DFHDPLOY, a JCL utility for deploying and undeploying CICS components in a single step. Finally, it discusses the CICS plug-in for UrbanCode Deploy, which allows deploying CICS applications along with other components in a coordinated fashion.
API management platforms allow organizations to securely expose internal services and data through APIs to external developers. They provide tools to create, publish, manage, and analyze API usage. IBM API Management provides a complete solution that helps organizations rapidly develop and publish APIs, while maintaining security and control over access to internal services and data.
The document provides information about IBM's CICS TS v5 technical update with dates for various locations in July. It discusses how systems like z Systems can act as private clouds, public clouds, or providers of services. It promotes the benefits of z13 such as improved performance, capacity, security, and analytics acceleration. It also discusses topics like mobile workload pricing, APIs, and enterprise modernization through delivering applications at the speed of mobile.
GSE Nordic 2015 CICS Connectivity in DevOps The business driver behind adopting a DevOps approach to developing software, is the need to deliver applications to the market faster, with lower costs and higher quality. With CICS Transaction Server providing the core services on which many of these applications rely, the importance of being able to connect to CICS and reuse these core services continues to increase. When CICS introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the CICS connectivity story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. In this session, we will explore the different CICS connectivity options, suggest use-cases in which they can be of most value, and most importantly, learn which is the right tool for the job.
GSE Nordic 2015 Liberty, Egality, Fraternity “Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), is the slogan of France, coined around the time of the French Revolution. It also seems a pretty appropriate slogan for the mini revolution that is happening right now with CICS and WebSphere. The Liberty profile is a highly composable and dynamic application server runtime environment that is shipped as a part of both WebSphere and CICS. This session will introduce Liberty in CICS, compare the capability with WebSphere (note the ‘equality’ word) and discuss how these new Liberty applications can interact with and support the established fraternity of existing CICS applications that run your core business.
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
GSE Nordic 2015 1 Billion Smartphones a year and counting – How is your CICS connected? According to IDC, in 2013 “the worldwide smartphone market reached yet another milestone, having shipped one billion units in a single year for the first time”. This was an increase of almost 40% over 2012. If much of your business runs on CICS, you have probably already exposed at least some your CICS applications to the mobile world. But are you exposing these services in the optimal way for your company? Come to this session to discover what the supported options are for mobile exploitation in CICS Transaction Server, CICS Transaction Gateway and z/OS Connect. This session will compare and contrast the options available, so you can understand what is right for you. It will also discuss how you can use IBM MobileFirst with CICS TS to optimize your mobile deployments. Make sure your phone is on silent – you won’t want to be disturbed in this session.
S107 5 compelling reasons for using cics in the cloudnick_garrod
GSE Nordic 2015 5 Compelling reasons for using CICS in the cloud. So what does creating a CICS ‘Cloud’ really mean? And what exactly are these new CICS Cloud capabilities? How do these new Applications and Platforms artifacts relate to existing CICS technologies such as programs, transactions and regions? Where do these new Policies fit in? And most importantly, why would you do any of this? What value can you expect to derive from creating a CICS Cloud architecture? If you have ever asked yourself any of those questions, this session will give you five compelling answers. If you ever wondered what the CICS Cloud means in the real world, this session if for you.
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
GSE Nordic 2015 Using IBM UrbanCode Deploy to deliver your apps to CICS. Deploying applications to CICS can be tricky, and you may be struggling to figure out how to handle the many new zFS artifacts such as cloud, bundles, Java, and web services. This could even be slowing down the adoption of new technologies that could deliver the solutions your business needs. This session will introduce IBM UrbanCode Deploy as a tool to automate many types of application deployments through your environments. It can provide rapid feedback and continuous delivery in agile development while providing the audit trails, versioning and approvals needed in production. See the new z/OS and CICS TS plug-ins for UrbanCode Deploy in action to deploy COBOL, web services, and Java applications to CICS in a single action.
GSE Nordic 2015 Twist and cloud – How customers make CICS dance. Putting CICS into the cloud, is someone actually doing this? Since 2012 CICS TS Version 5 has been introducing and continuously enhancing its capabilities to support a Platform As A Service approach. Join speakers from CICS Technical Sales to hear about their experiences and how their customers gained value from cloud capabilities in CICS.
GSE Nordic 2015 CICS Cloud and DevOps agility2 Creating a CICS cloud can provide a step change in agility. Add DevOps to the equation and it’s more like a quantum leap. Imagine if the latest CICS DevOps technology could fully automate the reliable and repeatable deployment of CICS applications through the entire lifecycle. Imagine a fully automated build environment for any style of CICS application. With common scripting languages and tools to create a continuous deployment model. Or imagine using a tool like IBM UrbanCode Deploy to provision any type of CICS application, in coordination with other application and database components in a single action. Better still, don’t try and imagine it. Attend this session and see it for yourself.
The document introduces the Liberty profile runtime environment that is part of both WebSphere and CICS. Liberty provides a lightweight and composable application server environment. It compares the capabilities of Liberty and WebSphere, noting their "equality". The document will discuss how new Liberty applications can interact with and support existing CICS applications. It will cover Liberty concepts, features, deployment models, and demo how to setup a Liberty runtime in 4 simple steps.
This document discusses using the Java Health Center to monitor Java applications running in CICS. It provides an overview of the Health Center, how to install it in CICS Explorer, and how to monitor various aspects of a JVM server like memory usage, garbage collection, threads, locks, and methods. It also discusses tuning JVM settings and collecting additional diagnostic information from the monitored JVM.
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSnick_garrod
This document discusses best practices for using zFS with CICS. It describes where different types of CICS files should be stored on zFS based on their purpose and criticality. Install files should go in /usr/lpp/cicsts, critical files like programs and configuration files in /var/cicsts, and temporary files in separate directories for each CICS region under /cicstslogs. It also covers setting up permissions and directories for Java resources, pipelines, bundles and other CICS artifacts on zFS. Secure access controls are recommended using UNIX permissions and groups to allow appropriate access for CICS regions and administrators.
The document discusses new features in CICS TS V5.3 open beta that enable automation of CICS deployments through DevOps practices. It introduces the CICS Build Toolkit for automating builds, DFHDPLOY for scripted deployments of bundles and applications, and UrbanCode Deploy support for coordinating deployment steps. These new capabilities allow build and release engineers to fully automate deployment of any CICS application through the entire lifecycle.
The document provides an overview of CICS Transaction Server V5.2, focusing on enhancements in the areas of service agility and operational efficiency. Key highlights include expanded support for JSON, mobile applications, and RESTful web services; policy-based management of system resources; TLS 1.2 compliance and SAML support for identity federation; and performance improvements through increased capacity limits and use of specialty processors.
This document discusses five scenarios for using application multi-versioning in CICS to reduce the risk of changes: 1) deploying new web features while minimizing performance impacts, 2) applying bug fixes without disrupting existing users, 3) phasing in new application versions for a subset of users, 4) consolidating applications that previously used different regions, and 5) modernizing applications while preventing bypassing of new validation logic. It provides examples of how multi-versioning allows hosting multiple application versions on the same region and routing requests between versions.
This document discusses exposing mainframe applications and services to mobile through APIs. It provides an overview of IBM's API Management and z/OS Connect solutions. z/OS Connect allows exposing mainframe services running on CICS, IMS and other systems as RESTful APIs that can be accessed by mobile and cloud applications. It provides discovery of mainframe services, handles data transformation between JSON and mainframe data formats, and includes interceptors for security and auditing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GSE Nordic Region Conference 2015
2nd June 2015
Ian Burnett
IBM CICS TS for z/OS Performance Test Lead
ian.burnett@uk.ibm.com
@IanBurnett
This section covers some of the workloads which are executed during the development phase to ensure that upgrading to a release does not incur a performance overhead.
The tables show RMF data extracted from 5 different transactions rates for both CICS TS V5.1 and CICS TS V5.2.
The tables show RMF data extracted from 5 different transactions rates for both CICS TS V5.1 and CICS TS V5.2.
Overview of the JDBC+JCICS servlet
The VSAM file contains a copy data held in the DB2 sample database used by the JDBC servlet.
Representation of CICS/Liberty configuration.
Liberty runs within a JVM server within a CICS region.
Simulated browser requests are made to Liberty listener port specified in the JVM profile parameter -Dcom.ibm.cics.jvmserver.wlp.server.http.port=nnnnn
The servlet runs on a T8 TCB within CICS and is capable of JCICS and SQL calls.
Both using DB2 V10
Single JVMserver with maximum 100 threads
Java environments:
Both use Java7-64bit SR7
Both used fixed generational heaps
-Xgcpolicy:gencon
–Xnompressedheap
-XXnosuballoc32bitmem
–Xmx200M –Xms200M –Xmnx60M –Xmns60M -Xmox140M -Xmos140M
Data collected from RMF report
Workload driven by WSIM.
20 minutes warmup period
Injection rate increased every 10 minutes.
Mean CPU usage per request reported for last 5 minutes of 10 minute interval.
Internal performance improvements are made in many areas of the CICS TS V5.3 open beta offering to help reduce CPU overhead. These include the exploitation of a number of the new hardware instructions introduced with the IBM z9, cache alignment of some key CICS control blocks, the use of prefetch, reduced lock contention within monitoring algorithms, improvements to the MRO session management algorithms, and further tuning of internal procedures.
Improvements in efficiency have noticeable improvements in the CICS trace facility, the CICS monitoring facility, and for MRO connections with high session counts.
Stack storage for Syncpoint, Transient Data and Journal Control moved to 31-bit from 24-bit
Modules for Journal Control and Transient data move to 31-bit from 24-bit
Extrapartition Transient data buffers and control blocks moves to 31-bit from 24-bit
All CICS transactions now have TASKDATALOC(ANY) as default
Console queue processing
CICS now uses 64-bit storage for the console queue processing trace table and the console queue transaction entry table. These tables were previously in 31-bit storage taken from the ECDSA.
Storage allocation control blocks
CICS now uses 64-bit storage for the storage element descriptor (SCE) and free storage descriptor (SCF) control blocks, which control storage allocation. Use of 24-bit and 31-bit storage is reduced, especially in systems with a lot of storage allocation activity, for example, systems with subpools that keep an element chain and that have many small records.
Loader control blocks
CICS now uses 64-bit storage for the Active Program Element (APE), Current Program Element (CPE), and CSECT descriptor control blocks in the loader domain. These control blocks were previously in 31-bit storage, and could occupy a significant amount of storage.
To provide access to the 64-bit storage, the size of the tokens used on the PROGRAM_TOKEN and NEW_PROGRAM_TOKEN options on the XPI calls ACQUIRE_PROGRAM, DEFINE_PROGRAM, and RELEASE_PROGRAM has increased from 4 bytes to 8 bytes. You must change and recompile global user exit programs that use these options. Exit programs that do not use the PROGRAM_TOKEN or NEW_PROGRAM_TOKEN option are not affected.
Chart shows an application which alternately executes DB2 SQL calls and then WRITEQ TD commands.
Chart shows a extracts from CICS Performance Analyzer reports for each of the various CICS TS levels.
V4.1 shows a significant number of TCB switches, with a large fraction of CPU consumed on the QR TCB.
V4.2 introduced CONCURRENCY(REQUIRED), which does not reduce the TCB switches, but reduces significantly the amount of CPU time the application spends executing on the QR TCB.
V5.1 introduces threadsafe transient data, which removes the need to switch the the QR TCB for the WRITEQ TD command.
Note that the V4.1 line hits a limit around the 210 transactions per second mark. This is because (as shown on the previous slide), each transaction costs around 4.60ms of CPU time on the QR TCB. Therefore, the maximum throughput for this transaction will be 1000 ms / 4.60 ms/tran = 217 transactions per second.
The V4.2 and V5.1 lines do not see this limit as there is significantly less CPU time spent on the QR TCB.
The V5.1 line is slightly lower than the V4.2 line due to the reduction in CPU cost of the incurred TCB switches.
With CICS TS V4.2, the RO TCB quickly reaches capacity, while V5.1 shows loading on an open TCB, which scales significantly better.
Benchmark used a modified version of the CICS-supplied JDBC sample application CICSDB2DynamicSQLExample.
Application reads 43 rows from DB2 table and writes results to CICS terminal to give a mix of JDBC and JCICS calls.
Both measurements use DB2 V10.
Both configurations scale well, while CICS V5.1 gets a small benefit from reduced TCB switching.
Modified CICSDB2DynamicSQLExample to write results to CICS terminal rather than HFS file.
Small amount of L8 time used for SYNCPOINT at transaction completion.
CICS V5.1 GA included Liberty 8.5.0.0.
Tests were run at V5.2 GA time. Several APARs to update the level of Liberty on both V5.1 and V5.2 since these measurements were run.
z196 configuration: an LPAR on a 2817-779 machine with 4 dedicated CPs - considered to be equivalent to a 2817-704. Running z/OS V1R13
zEC12 configuration: an LPAR on a 2827-778 machine with 4 dedicated CPs - considered to be equivalent to a 2827-704. Running z/OS V1R13
CICS V5.1 used Java 7 SR3
CICS V4.2 used Java 6.0.1 SR3
Data collected from RMF report
zEC12 expoitation enabled with:
–Xaggressive and -Xjit:noResumableTrapHandler
Simple Java workload shows 24% improvement on zEC12 and 25% with
–Xaggressive option, in line with LSPR expectations
https://www.ibm.com/servers/resourcelink/lib03060.nsf/pages/lsprITRzOSv1r13
Using complex Java workload – Axis2 webservice
Equivalent throughput using CICS V5.1 on z196 compared to CICS V4.2
30% improvement in throughput using CICS V5.1 on zEC12 compared to CICS V4.2 on z196
39% improvement in throughput using CICS V5.1 with Java 7 zEC12 exploitation compared to CICS V4.2 on z196
A thorough review of the trace points took place and many were changed to only be emitted with L2 trace enabled.
The result is that enabling trace in a region running Java costs approximately the same as would enabling trace for an equivalent application in a non-Java environment.
Chart shows that enabling default trace in V5.1 adds a large overhead to the region.
Enabling the same level of trace in V5.2 significantly reduces this overhead.
Application performs 120 JCICS FILE READ operations.
Chart shows that enabling default trace in V5.1 adds a large overhead to the region.
Enabling the same level of trace in V5.2 significantly reduces this overhead.
IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.
The new CPUTONCP and OFFLCPUT fields in the DFHTASK performance class group for a transaction can be used to calculate the processor time that a task spends on a zIIP or zAAP specialty processor, and also show you the processor time that the task could have spent on a specialty processor.
Field 436, CPUTONCP, shows the total task processor time spent on a standard processor. To calculate the task processor time spent on a specialty processor, subtract the time recorded in this field from the time recorded in field 008, USRCPUT.
Field 437, OFFLCPUT, shows the total task processor time that was eligible for offload to a specialty processor, but actually ran on a standard processor. To calculate the total task processor time that was not eligible for offload, subtract the time recorded in this field from the time recorded in field 436, CPUTONCP.
To calculate the total task processor time that was either actually spent on a specialty processor, or eligible to be spent on a specialty processor, use the following equation: (OFFLCPUT + (USRCPUT - CPUTONCP))
Note: The times shown in the CPUTONCP and OFFLCPUT fields are only available when running on a system that supports the Extract CPU Time instruction service that is available on IBM System z9® or later hardware. For z/OS, Version 1 Release 13, the PTF for APAR OA38409 must also be applied.
CICS IA V5.2 can scan load modules to identify CICS commands which are non-threadsafe.
Collector can also understand EXEC CPSM commands, along with being able to differentiate between MRO and IPIC connections.
Following charts cover the optimise the collector item.
Left column shows the cost of the workload with IA completely disabled.
Every other column shows where the collection frequency has been set to every 1 in n tasks. Increasing the frequency of the collection (i.e. towards the right of the chart), increases the associated overhead.
"% Saving in CPU" is calculated when comparing with CICS IA collecting data for every task (i.e. second row).
The EXEC CICS LINK between the CICS DPL bridge task and the receiving application passes a COMMAREA, which is limited to 32kB.
To use this functionality, change the CKBP transaction to the new CKBC transaction and code your applications to accept data on the DFHMQBR_CHANNEL channel, using the DFHREQUEST and DFHRESPONSE containers.
Transactions
CKBR
CICS Bridge Monitor transaction – long running task
CKBP (for Commareas) or CKBC (for Containers)
CICS DPL Bridge task
MQ calls issued
CKBR – MQGET BROWSE WAIT
CKBP/CKBC – MQOPEN and MQGETs
1 MQGET per inbound message within the UOW
CKBP/CKBC – MQOPEN and MQPUTs (when reply-to-queue specified)
1 MQPUT per outbound message sent within the UOW
MQPUT1 used when only 1 outbound message per UOW
Chart shows CPU costs for the CICS region only.
Chart shows total CPU cost for all relevant address spaces on the LPAR.
During testing, we found that using a TRANCLASS to throttle work through the JVM was more efficient than the JVMSERVER THREADLIMIT attribute.
A sample of the JCL used to produce the *.wsbind files for the JSON pipeline parsing application.
JSON formatting has been added for clarity. The on-the-wire format removed all unnecessary whitespace as would be found in a typical production environment.
JSON formatting has been added for clarity.
Data is calculated from RMF data which encapsulates the whole of the CICS address space.
The IEAOPTxx parmlib member option PROJECTCPU and and IEASYSxx parmlib member option ZAAPZIIP were both configured to YES to enable recording of offload-eligible CPU time, and zAAP-on-zIIP execution respectively.
zIIP figures represent the IIPCP field in the RMF report, while GCP figures represent the CP fields minus the IIPCP field.
Note that the amount of non-zIIP eligible CPU cost remains approximately constant, regardless of the response size. The serialisation of the JSON response occurs in the CICS Java implementation, which is where the variation in CPU cost originates.
Data is calculated from RMF data which encapsulates the whole of the CICS address space.
The IEAOPTxx parmlib member option PROJECTCPU and and IEASYSxx parmlib member option ZAAPZIIP were both configured to YES to enable recording of offload-eligible CPU time, and zAAP-on-zIIP execution respectively.
zIIP figures represent the IIPCP field in the RMF report, while GCP figures represent the CP fields minus the IIPCP field.
Note that the amount of non-zIIP eligible CPU cost remains approximately constant, regardless of the response size. The serialisation of the JSON response occurs in the CICS Java implementation, which is where the variation in CPU cost originates.
Data is calculated from RMF data which encapsulates the whole of the CICS address space.
The IEAOPTxx parmlib member option PROJECTCPU and and IEASYSxx parmlib member option ZAAPZIIP were both configured to YES to enable recording of offload-eligible CPU time, and zAAP-on-zIIP execution respectively.
zIIP figures represent the IIPCP field in the RMF report, while GCP figures represent the CP fields minus the IIPCP field.
Note that the amount of non-zIIP eligible CPU cost remains approximately constant, regardless of the response size. The serialisation of the JSON response occurs in the CICS Java implementation, which is where the variation in CPU cost originates.
Data is calculated from RMF data which encapsulates the whole of the CICS address space.
The IEAOPTxx parmlib member option PROJECTCPU and and IEASYSxx parmlib member option ZAAPZIIP were both configured to YES to enable recording of offload-eligible CPU time, and zAAP-on-zIIP execution respectively.
zIIP figures represent the IIPCP field in the RMF report, while GCP figures represent the CP fields minus the IIPCP field.
Note that the amount of non-zIIP eligible CPU cost remains approximately constant, regardless of the response size. The serialisation of the JSON response occurs in the CICS Java implementation, which is where the variation in CPU cost originates.
Data is calculated from RMF data which encapsulates the whole of the CICS address space.
The IEAOPTxx parmlib member option PROJECTCPU and and IEASYSxx parmlib member option ZAAPZIIP were both configured to YES to enable recording of offload-eligible CPU time, and zAAP-on-zIIP execution respectively.
zIIP figures represent the IIPCP field in the RMF report, while GCP figures represent the CP fields minus the IIPCP field.
Note that the amount of non-zIIP eligible CPU cost remains approximately constant, regardless of the response size. The serialisation of the JSON response occurs in the CICS Java implementation, which is where the variation in CPU cost originates.
Note that overall storage usage has been reduced.
Reduction has been achieved from the 31-bit storage areas.
For each HTTP request into CICS, whether as a web, a web service, or a JSON request, there are two tasks associated with the request. This results in two SMF records being emitted from CICS if MN=ON and MNPER=ON.
With the removal of the CWXN transaction, less CPU and storage is required to process the request, and there will only be one resultant SMF record emitted from the CICS region.
Application-Transparent Transport Layer Security (AT-TLS) is a feature of IBM Communications Server, where TLS encryption is handled by the TCPIP address space, rather than the receiving address space.
CICS TS V5.3 open beta permits TCPIPSERVICE resources to be configured as AT-TLS aware, enabling CICS to obtain security information from the network stack.
With CICS TS V5.1, the MXT value can now be set to 2000, rather than 999.
Real storage usage covers all CICS regions in the consolidation configuration.
CPU savings can be achieved by consolidating CICS regions.
For both workloads, the same transaction rate was achieved using fewer Application Owning Regions (AORs).
Hardware Instrumentation Services data was collected for the final measurement interval.
ETR is External Throughput Rate (transaction rate).
CICS % refers to the CP field on an RMF report class report.
LPAR % refers to the RMF workload activity report.
CPU savings are achieved because there are significantly fewer CPU cycles spent waiting for data-cache and TLB misses.
Hardware Instrumentation Services data was collected for the final measurement interval.
ETR is External Throughput Rate (transaction rate).
CICS % refers to the CP field on an RMF report class report.
LPAR % refers to the RMF workload activity report.
CPU savings are achieved because there are significantly fewer CPU cycles spent waiting for data-cache and TLB misses.
https://ibm.biz/BdFHFr
See Hardware Instrumentation Services documentation for the production of SMF 113 records.
The use of SMF 113 records is now recommended by IBM when considering hardware upgrades.
Table is an extract of the LSPR found here:
https://www.ibm.com/servers/resourcelink/lib03060.nsf/pages/lsprITRzOSv1r13?OpenDocument
Response time and CPU utilization improvements
Workload - Each transaction
Makes 5 DPL (Distributed Program Link) requests over an IPIC connection
Sends 32K container on each request
Server program Receives the data and Send back 32K
Receives back a 32K container for each request
Response time and CPU utilization improvements
Workload - Each transaction
Makes 5 DPL (Distributed Program Link) requests over an IPIC connection
Sends 32K container on each request
Server program Receives the data and Send back 32K
Receives back a 32K container for each request