The document provides an overview of enhancements in CICS Transaction Server V5.1 to improve scalability. Key points discussed include:
1) CICS V5.1 includes improvements to horizontal and vertical scalability through enhancements such as improved support for threadsafe programming, greater use of 64-bit storage, and increased maximum task limits.
2) Specific scalability enhancements discussed include open transaction environment improvements to reduce TCB switching; virtual storage constraint relief to reduce pressure on below-the-line storage; and increased maximum task limits.
3) Instrumentation and monitoring enhancements provide additional performance metrics and statistics to help understand system load and potential bottlenecks.
GSE Conference Nov 2015 CICS V5.* memory objects
This Session looks at the memory objects allocated in the CICS address space and provides a roadmap to easily understand where things are in the 16 Exabyte address space
Xen is one of most popular virtualization project, many companies and individuals participate in the development, testing and using of Xen. In this presentation, Xudong will give an introduction of Intel QA team's test coverage for Xen, demonstrate the pre check in for new features testing, and post check in for regression testing, as well as test methodology and test framework.
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Programinside-BigData.com
In this video from the DDN User Group at SC16, Sven Oehme Chief Research Strategist, IBM, presents "Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Program."
Watch the video presentation: http://wp.me/p3RLHQ-g52
Sign up for our insideHPC Newsletter: http://wp.me/p3RLHQ-g52
GSE Conference Nov 2015 CICS V5.* memory objects
This Session looks at the memory objects allocated in the CICS address space and provides a roadmap to easily understand where things are in the 16 Exabyte address space
Xen is one of most popular virtualization project, many companies and individuals participate in the development, testing and using of Xen. In this presentation, Xudong will give an introduction of Intel QA team's test coverage for Xen, demonstrate the pre check in for new features testing, and post check in for regression testing, as well as test methodology and test framework.
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Programinside-BigData.com
In this video from the DDN User Group at SC16, Sven Oehme Chief Research Strategist, IBM, presents "Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Program."
Watch the video presentation: http://wp.me/p3RLHQ-g52
Sign up for our insideHPC Newsletter: http://wp.me/p3RLHQ-g52
XPDDS17: Intel New QoS (RDT) Features Introduction - Yi Sun, IntelThe Linux Foundation
Accompanying with Cloud Services extension, more and more applications/VMs work on a single platform concurrently. This causes serious contention to shared resources (e.g. LLC, L2 Cache, Memory Bandwidth). Because of that, Intel introduces QoS (named as RDT, Resource Director Technology, now) features to monitor and control the usage of these shared resources. So far, Intel has enabled CMT/MBM for monitoring and L3 CAT/CDP for controlling on Xen. Based on successful applications of these features and new requirements from industry, Intel introduces new shared resource controlling features (e.g. L2 CAT and MBA) in its latest chips to provide ways to configure and control the usage of cache and memory bandwidth. To make more users get these features and enjoy the performance improvement, Intel is trying to push these features into Xen. The original codes of QoS only focus on implementing L3 CAT and CDP so that the extendability is not good. To make codes be more flexible, we refactor the codes to generate an extendable infrastructure so that it would be easy to add a new feature. This presentation will introduce above things in details to make the audience be clear about what QoS features are, how we design and implement them on Xen and the benefits users can get.
Learning from ZFS to Scale Storage on and under Containersinside-BigData.com
Evan Powell presented this deck at the MSST 2107 Mass Storage Conference.
"What is so new about the container environment that a new class of storage software is emerging to address these use cases? And can container orchestration systems themselves be part of the solution? As is often the case in storage, metadata matters here. We are implementing in the open source OpenEBS.io some approaches that are in some regards inspired by ZFS to enable much more efficient scale out block storage for containers that itself is containerized. The goal is to enable storage to be treated in many regards as just another application while, of course, also providing storage services to stateful applications in the environment."
Watch the video: http://wp.me/p3RLHQ-gPs
Learn more: blog.openebs.io
and
http://storageconference.us
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Computing Performance: On the Horizon (2021)Brendan Gregg
Talk by Brendan Gregg for USENIX LISA 2021. https://www.youtube.com/watch?v=5nN1wjA_S30 . "The future of computer performance involves clouds with hardware hypervisors and custom processors, servers running a new type of BPF software to allow high-speed applications and kernel customizations, observability of everything in production, new Linux kernel technologies, and more. This talk covers interesting developments in systems and computing performance, their challenges, and where things are headed."
Revisiting CephFS MDS and mClock QoS SchedulerYongseok Oh
This presents the CephFS performance scalability and evaluation results. Specifically, it addresses some technical issues such as multi core scalability, cache size, static pinning, recovery, and QoS.
Stacki DC Meetup (11/30/16)
Presenter: Justin Senseney- Senior Computer Scientist, NIST
Description:Stacki was used to upgrade a high performance computing (HPC) cluster at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD. A 1,200 node CentOS5 Maui/Torque cluster was upgraded to CentOS7 with a slurm queuing system. This presentation will show the application of Stacki to this HPC cluster and contrast previous methods used for provisioning. Stacki carts and pallets are used to provision role-based servers. Ideas are presented that would make it easier for multiple clusters to be managed. Any mention of commercial products, including Stacki, within this presentation is for information only; it does not imply recommendation or endorsement by NIST.
IBM SAN Volume Controller Performance Analysisbrettallison
Introduction
Storage Problems and Limitations with Native Storage
SVC Overview
SVC Physical and Logical Overview
Performance and Scalability Implications
Types of Problems
Performance Analysis Techniques
Performance Analysis Tools for SVC
Performance Analysis Metrics for SVC
Online Banking Example
Do you want to modernize your data center? NSX has introduced amazing new technology and is the perfect ally for network and security administrators. But what if you want more agility? Could you imagine drinking coffee and watching the network configuring itself? Consuming NSX through configuration frameworks like Ansible or scripting languages such as Python or PowerShell goes a step beyond the simple usage of the GUI and allow for introducing custom advanced logic and workflows. Automating your infrastructure allows you to increase productivity, reduce errors due to manual configuration mistakes and simplify processes.
More on http://cloudmaniac.net
Talk by Brendan Gregg for YOW! 2021. "The pursuit of faster performance in computing is the driving reason for many new technologies and updates. This talk discusses performance improvements now underway that you will likely be adopting soon, for processors (including 3D stacking and cloud vendor CPUs), memory (including DDR5 and high-bandwidth memory [HBM]), disks (including 3D Xpoint as a 3D NAND accelerator), networking (including QUIC and eXpress Data Path [XDP]), runtimes, hypervisors, and more. The future of performance is increasingly cloud-based, with hardware hypervisors and custom processors, meaningful observability of everything down to cycle stalls (even as cloud guests), and high-speed syscall-avoiding applications that use eBPF, FPGAs, and io_uring. The talk also discusses where future performance improvements might be expected, with predictions for new technologies."
When CICS Transaction Server introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the SOA story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. Additionally, there have been a great many enhancements to both these SOA styles in recent years. Come to this session to get up to speed on the evolution of these technologies. And most importantly, learn which is the right tool for the job.
XPDDS17: Intel New QoS (RDT) Features Introduction - Yi Sun, IntelThe Linux Foundation
Accompanying with Cloud Services extension, more and more applications/VMs work on a single platform concurrently. This causes serious contention to shared resources (e.g. LLC, L2 Cache, Memory Bandwidth). Because of that, Intel introduces QoS (named as RDT, Resource Director Technology, now) features to monitor and control the usage of these shared resources. So far, Intel has enabled CMT/MBM for monitoring and L3 CAT/CDP for controlling on Xen. Based on successful applications of these features and new requirements from industry, Intel introduces new shared resource controlling features (e.g. L2 CAT and MBA) in its latest chips to provide ways to configure and control the usage of cache and memory bandwidth. To make more users get these features and enjoy the performance improvement, Intel is trying to push these features into Xen. The original codes of QoS only focus on implementing L3 CAT and CDP so that the extendability is not good. To make codes be more flexible, we refactor the codes to generate an extendable infrastructure so that it would be easy to add a new feature. This presentation will introduce above things in details to make the audience be clear about what QoS features are, how we design and implement them on Xen and the benefits users can get.
Learning from ZFS to Scale Storage on and under Containersinside-BigData.com
Evan Powell presented this deck at the MSST 2107 Mass Storage Conference.
"What is so new about the container environment that a new class of storage software is emerging to address these use cases? And can container orchestration systems themselves be part of the solution? As is often the case in storage, metadata matters here. We are implementing in the open source OpenEBS.io some approaches that are in some regards inspired by ZFS to enable much more efficient scale out block storage for containers that itself is containerized. The goal is to enable storage to be treated in many regards as just another application while, of course, also providing storage services to stateful applications in the environment."
Watch the video: http://wp.me/p3RLHQ-gPs
Learn more: blog.openebs.io
and
http://storageconference.us
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Computing Performance: On the Horizon (2021)Brendan Gregg
Talk by Brendan Gregg for USENIX LISA 2021. https://www.youtube.com/watch?v=5nN1wjA_S30 . "The future of computer performance involves clouds with hardware hypervisors and custom processors, servers running a new type of BPF software to allow high-speed applications and kernel customizations, observability of everything in production, new Linux kernel technologies, and more. This talk covers interesting developments in systems and computing performance, their challenges, and where things are headed."
Revisiting CephFS MDS and mClock QoS SchedulerYongseok Oh
This presents the CephFS performance scalability and evaluation results. Specifically, it addresses some technical issues such as multi core scalability, cache size, static pinning, recovery, and QoS.
Stacki DC Meetup (11/30/16)
Presenter: Justin Senseney- Senior Computer Scientist, NIST
Description:Stacki was used to upgrade a high performance computing (HPC) cluster at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD. A 1,200 node CentOS5 Maui/Torque cluster was upgraded to CentOS7 with a slurm queuing system. This presentation will show the application of Stacki to this HPC cluster and contrast previous methods used for provisioning. Stacki carts and pallets are used to provision role-based servers. Ideas are presented that would make it easier for multiple clusters to be managed. Any mention of commercial products, including Stacki, within this presentation is for information only; it does not imply recommendation or endorsement by NIST.
IBM SAN Volume Controller Performance Analysisbrettallison
Introduction
Storage Problems and Limitations with Native Storage
SVC Overview
SVC Physical and Logical Overview
Performance and Scalability Implications
Types of Problems
Performance Analysis Techniques
Performance Analysis Tools for SVC
Performance Analysis Metrics for SVC
Online Banking Example
Do you want to modernize your data center? NSX has introduced amazing new technology and is the perfect ally for network and security administrators. But what if you want more agility? Could you imagine drinking coffee and watching the network configuring itself? Consuming NSX through configuration frameworks like Ansible or scripting languages such as Python or PowerShell goes a step beyond the simple usage of the GUI and allow for introducing custom advanced logic and workflows. Automating your infrastructure allows you to increase productivity, reduce errors due to manual configuration mistakes and simplify processes.
More on http://cloudmaniac.net
Talk by Brendan Gregg for YOW! 2021. "The pursuit of faster performance in computing is the driving reason for many new technologies and updates. This talk discusses performance improvements now underway that you will likely be adopting soon, for processors (including 3D stacking and cloud vendor CPUs), memory (including DDR5 and high-bandwidth memory [HBM]), disks (including 3D Xpoint as a 3D NAND accelerator), networking (including QUIC and eXpress Data Path [XDP]), runtimes, hypervisors, and more. The future of performance is increasingly cloud-based, with hardware hypervisors and custom processors, meaningful observability of everything down to cycle stalls (even as cloud guests), and high-speed syscall-avoiding applications that use eBPF, FPGAs, and io_uring. The talk also discusses where future performance improvements might be expected, with predictions for new technologies."
When CICS Transaction Server introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the SOA story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. Additionally, there have been a great many enhancements to both these SOA styles in recent years. Come to this session to get up to speed on the evolution of these technologies. And most importantly, learn which is the right tool for the job.
“My systems work perfectly—it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be "an application issue" anymore. In CICS TS 5, new policy-based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rogue applications can be detected through various task threshold policies, such as excessive file or database access, repetitive program links, or abnormal storage requests. Once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely.
GSE Nordic 2015 Twist and cloud – How customers make CICS dance. Putting CICS into the cloud, is someone actually doing this? Since 2012 CICS TS Version 5 has been introducing and continuously enhancing its capabilities to support a Platform As A Service approach. Join speakers from CICS Technical Sales to hear about their experiences and how their customers gained value from cloud capabilities in CICS.
CICS TS V5 delivers technical innovation and significant business value, satisfying in excess of 150 customer and user group enhancement requests. The result is a powerful new release with a huge amount of value for all stakeholders - delivering a smarter transaction processing experience for CICS users and their customers in turn.
Ibm session tac 2104 - ctg presentation for impact 2013 finalElena Nanos
This presentation titled "Achieving highest availability and best performance with CICS TG on z/OS HA Architecture – User Experience" has been presented at IMPACT 2013.
Ibm session tac 2104 - ctg presentation for impact 2013 finalElena Nanos
This presentation titled "Achieving highest availability and best performance with CICS TG on z/OS HA Architecture – User Experience" was presented at IMPACT 2013.
Francisco Javier Ramirez Urea - Hopla - OSL19marketingsyone
Title: Building Modern Applications with Docker 3.0
Docker Enterprise provides an enterprise grade solution to allow your team to modernize your applications. In this talk we will see how Docker will help us to build, ship and run applications faster. Integrating Docker Enterprise Solutions in our development pipelines.
We will review all new features that came with release 3.0 to improve our application building workflow.
Tips to deploy a production grade Kubernetes cluster using SUSE CaaS Platfrom v3.
Created joinly with my colleague Martin Weiss to be used on SUSECON 2019
Assure MIMIX, the leader in IBM i high availability and disaster recovery, keeps your mission-critical business applications running continuously and protects your data from loss. Precisely has recently delivered a new release of Assure MIMIX 10. This new release Assure includes even better support for IBM i customers operating in Cloud, Hosting and Managed Service Ecosystems.
Assure MIMIX 10 provides a new simplified pricing and licensing model built to support the needs of today’s IBM i systems whether they are on-premises or in the cloud. In addition, there are several new capabilities that are designed to make Assure MIMIX an even better solution for IBM i users needing a powerful HA solution.
Join us on this on-demand webinar to learn about the new Assure MIMIX 10 licensing changes as well as:
- Faster, more intelligent synchronization
- Automated configuration capabilities
- Enhanced recovery operations
In this deck from the 2015 PBS Works User Group, Sarah Storms from Lockheed Martin presents: A New Multi-Level Security Initiative.
"Historically cyber security in HPC has been limited to detecting intrusions rather than designing security from the beginning in a holistic, layered approach to protect the system. SELinux has provided the needed framework to address cyber security issues for a decade, but the lack of an HPC and data analysis eco-system based on SELinux and the perception that the resulting configuration is “hard” to use has prevented SELinux configurations from being widely accepted. This presentation will discuss the eco-system that has been developed and certified, debunk the “hard” perception, and illustrate approaches for both government and commercial applications. The presentation includes discussions on SELinux architecture and features, Altair PBS Professional Queuing System, Scale-out Lustre Storage, Applications Performance on SELinux (Vectorization and Parallelization), Relational Databases, and Security Functions (Auditing and other Security Administration actions)."
Learn more: http://www.pbsworks.com/pbsug/2015/agenda.aspx
Watch the video presentation: https://www.youtube.com/watch?v=kBNKmGCg4ho
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Plan with confidence: Route to a successful Do178c multicore certificationMassimo Talia
The modern approach Multi-Processor in the civil and military Embedded equipments certification. The Processor assessment is conduct by Rockwell Collins Inc., the operating system selection is conducted by Windriver Inc.
Configuration Management Tools on NX-OSCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. On Cisco Nexus devices, configuration is performed using command-line interfaces (CLIs) that run only on the device. Configuration Management Tools allow you to automate the network devices configuration in the same way sysadmin have automated the server configuration. These tools include Puppet, Chef and Ansible. We will be introducing the concept of each of them, agent vs agent-less and demoing some use cases.
We will also describe some of the technology enablers like NX-API REST that allows you to enable configurations that would require issuing many CLI commands by combining configuration actions in relatively few HTTP/HTTPS operations."
Radisys' CTO, Andrew Alleman, was one of the featured speakers at the OCP Telco Engineering Workshop during the 2017 Big Communications Event. Andrew discussed carrier-grade open rack architecture (CG-OpenRack-19), the future of open hardware standards and commercial products in the OCP pipeline during his presentation.
Similar to SHARE 2014, Pittsburgh CICS scalability (20)
GSE Nordic 2015 CICS Connectivity in DevOps The business driver behind adopting a DevOps approach to developing software, is the need to deliver applications to the market faster, with lower costs and higher quality. With CICS Transaction Server providing the core services on which many of these applications rely, the importance of being able to connect to CICS and reuse these core services continues to increase. When CICS introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the CICS connectivity story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. In this session, we will explore the different CICS connectivity options, suggest use-cases in which they can be of most value, and most importantly, learn which is the right tool for the job.
GSE Nordic 2015 Liberty, Egality, Fraternity “Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), is the slogan of France, coined around the time of the French Revolution. It also seems a pretty appropriate slogan for the mini revolution that is happening right now with CICS and WebSphere. The Liberty profile is a highly composable and dynamic application server runtime environment that is shipped as a part of both WebSphere and CICS. This session will introduce Liberty in CICS, compare the capability with WebSphere (note the ‘equality’ word) and discuss how these new Liberty applications can interact with and support the established fraternity of existing CICS applications that run your core business.
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
GSE Nordic 2015 1 Billion Smartphones a year and counting – How is your CICS connected? According to IDC, in 2013 “the worldwide smartphone market reached yet another milestone, having shipped one billion units in a single year for the first time”. This was an increase of almost 40% over 2012. If much of your business runs on CICS, you have probably already exposed at least some your CICS applications to the mobile world. But are you exposing these services in the optimal way for your company? Come to this session to discover what the supported options are for mobile exploitation in CICS Transaction Server, CICS Transaction Gateway and z/OS Connect. This session will compare and contrast the options available, so you can understand what is right for you. It will also discuss how you can use IBM MobileFirst with CICS TS to optimize your mobile deployments. Make sure your phone is on silent – you won’t want to be disturbed in this session.
S107 5 compelling reasons for using cics in the cloudnick_garrod
GSE Nordic 2015 5 Compelling reasons for using CICS in the cloud. So what does creating a CICS ‘Cloud’ really mean? And what exactly are these new CICS Cloud capabilities? How do these new Applications and Platforms artifacts relate to existing CICS technologies such as programs, transactions and regions? Where do these new Policies fit in? And most importantly, why would you do any of this? What value can you expect to derive from creating a CICS Cloud architecture? If you have ever asked yourself any of those questions, this session will give you five compelling answers. If you ever wondered what the CICS Cloud means in the real world, this session if for you.
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
GSE Nordic 2015 Using IBM UrbanCode Deploy to deliver your apps to CICS. Deploying applications to CICS can be tricky, and you may be struggling to figure out how to handle the many new zFS artifacts such as cloud, bundles, Java, and web services. This could even be slowing down the adoption of new technologies that could deliver the solutions your business needs. This session will introduce IBM UrbanCode Deploy as a tool to automate many types of application deployments through your environments. It can provide rapid feedback and continuous delivery in agile development while providing the audit trails, versioning and approvals needed in production. See the new z/OS and CICS TS plug-ins for UrbanCode Deploy in action to deploy COBOL, web services, and Java applications to CICS in a single action.
GSE Nordic 2015 CICS Performance and Consolidation The CICS TS V5 releases introduce a number of runtime enhancements to reduce CPU usage, improve response times, reduce resource usage, while providing additional insight into transaction performance. Come along to this session as we explore some of the newer performance benefits found in CICS TS and how savings can translate to your environment. We will also look at a lab benchmark that consolidated CICS regions, maintaining throughput, saving significant MIPS, and reducing the management overhead.
GSE Nordic 2015 CICS Cloud and DevOps agility2 Creating a CICS cloud can provide a step change in agility. Add DevOps to the equation and it’s more like a quantum leap. Imagine if the latest CICS DevOps technology could fully automate the reliable and repeatable deployment of CICS applications through the entire lifecycle. Imagine a fully automated build environment for any style of CICS application. With common scripting languages and tools to create a continuous deployment model. Or imagine using a tool like IBM UrbanCode Deploy to provision any type of CICS application, in coordination with other application and database components in a single action. Better still, don’t try and imagine it. Attend this session and see it for yourself.
S102 cics the future is closer abridgednick_garrod
GSE Nordic 2015 - Future of CICS is closer than you think. There is a lot going on behind that mysterious curtain. Recently, the CICS development organization has adopted a new practice called ‘IBM Design Thinking’, which will forever change the way CICS products are developed. The core principle of this approach is to make sure we get as much feedback as possible on our future ideas. This is a quite unique opportunity to participate in a discussion regarding the future of IBM CICS technology. We will be sharing our views. And we will be hoping for lots for interactive feedback. Please don’t be shy!
GSE Nordic 2015 Conferece - CICS Opening. CICS TS V5.1 became available at the end of 2012, followed by CICS TS V5.2 in mid 2014. So what does that mean for you? Perhaps you can reduce operational complexity by hosting modern application interface logic inside the Liberty profile server within CICS? Perhaps you can use the new CICS Cloud capabilities to improve application reliability and accelerate deployments? Maybe you can improve your integration with Mobile devices? Or better control your costs though policies and consolidation? Nick and Ian open the CICS track to help you find out how CICS is reinventing mainframe application serving one again. Discover which sessions you should attend to get the most value from your attendance.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. Abstract
Increased operational efficiency is a fundamental component of CICS TS
V5.1. Significant improvements to the horizontal and vertical scalability of
CICS are delivered through a number of enhancements, ranging from
improved support for OTE (threadsafe), greater use of 64-bit storage,
optimized TCB usage, and changes to a region's MAXTASK - to name a
few. This session will provide a summary of the improvements in CICS
version 4, as well as a detailed look at the enhancements and benefits
available in CICS TS V5.1.
2
3. Agenda
CICS Transaction Server V5.1
Core Foundations
• SPI audit
• Security
• Communications
• Installation and Startup
• Monitoring and Statistics
Scalability
• Open Transaction Environment
• Virtual Storage Constraint Relief
• Greater Use of 64-bit Storage
• Increased max task limit
Summary
24x724x7
11011010
Core Foundations and Scalability
items addressing:
– Greater Capacity
– Increased availability
– Deeper Insight
– Foundation enhancements
4. SPI Command Auditing
SPI commands (SET, PERFORM, ENABLE, DISABLE, and RESYNC)
now audited for better accountability of configuration changes
DFHAP1900 date time applid netname userid transid command RESP(response) RESP2(n)
• Issued after command completes, for example…
– DFHAP1900 09/17/2012 09:47:53 IYK2Z2G1 IYCWT195 CICSUSER
CEMT SET FILE(FILEA) NOWAIT OPENSTATUS(CLOSED)
RESP(NORMAL) RESP2(0).
– DFHAP1900 09/17/2012 09:48:03 IYK2Z2G1 NONE CICSUSER CONL
SET FILE(FILEA) BUSY(NOWAIT) ENABLESTATUS(ENABLED)
OPENSTATUS(OPEN) RESP(NORMAL) RESP2(0).
Commands audited …
• SET, PERFORM, ENABLE, DISABLE, RESYNC
• Except for PERFORM SHUTDOWN that already have audited messages
DFHTM1715 / DFHTM1703
Sent to new TD queue CADS (indirect to CSSL by default)
• Can turn off function by redirecting CADS to a dummy destination
Changes to some resources (e.g. TERMINAL, NETNAME) not audited
11011010
5. Core Foundations – Security …
Logging on with VERIFY command can now use full
RACF verification at least once a day
Ensures user IDs are always ready for audit, recorded as
being used, and retained in your system
SIT parm SECVFYFREQ=USRDELAY
Applies to HTTP basic authentication for web support,
Webservices & IPIC authentication & use of VERIFY API
commands
Distributed identities are now propagated for START
command
Auditors can use the distributed identity associated with
started tasks to find the identity of the user
11011010
6. Core Foundations – Security …
SSL certificates and environment can be refreshed
online for improve 24x7 operation
New PERFORM SSL REBUILD command
• After updating key ring with new certificate
• After LDAP server is restarted
SSL ciphers used are now recorded in SMF 110 CMF
performance class records for better performance
analysis
11011010
24x724x7
7. Core Foundations – Event Processing …
Application events now support EXEC CICS WRITE
OPERATOR commands
System events support message capture point
encompass the majority of CICS messages
Events can include predefined information specified in the
capture specification.
Multiple Event Processing Adaptors
You can emit an event to several event consumers using the new
event processing adapter sets.
8. Core Foundations – Communications …
CICS-WebSphere MQ DPL Bridge
Supports a Channel/Container based interface
• Flexible, not restricted to 32 KB
Transaction CKBC, defined in group DFHMQ
Place request WMQ message into DFHREQUEST container
Link with channel DFHMQBR_CHANNEL
Target can return a response in DFHRESPONSE container
9. Core Foundations – Communications …
●
Full support of execution diagnostic facility (CEDF and CEDX) with IPIC connections
– Function Shipping, DPL, Transaction Routing
●
New sample programs for autoinstall of IPIC connection resources for easier
configuration
●
IPIC heartbeat messages to systems that can respond to them.
– This ability to respond allows the integrity of the connection to be assessed and
maintained by CICS regions through periods of inactivity.
●
●
EXCI Batch programs can now call CICS regions in different XCFGROUPs dynamically
– EXCI URM DFHXCURM can change the value of XCFGROUP to be used
– Enables moving CICS regions to their own XCFGROUP without re-coding batch
programs
24x724x7
10. Core Foundations – Installation and Startup …
CICS TS V5.1 introduces a number of enhancements to make
operations easier and more transparent
For example …
the default values for several CICS startup parameters are changed
to adopt best practice
or are removed altogether where CICS is now able to automatically
make adjustments at run time
24x724x7
11. Core Foundations – System Parameter Simplification
System Initialization Parameter Simplification
MAXOPENTCBS
• Parameter obsolete
• Set internally to a value of ((MXT * 2) + 32)
MAXXPTCBS
• Parameter obsolete
• Set internally to a value of MXT
MAXJVMTCBS
• Parameter obsolete, support for pooled JVMs has been
removed
CEMT and EXEC CICS INQ/SET DISPATCHER
• MAXOPENTCBS and MAXXPTCBS settings
– Available on INQUIRE DISPATCHER only
– SPI SET will return RESP(0) but do nothing
24x724x7
12. Core foundations – System Parameter Simplification
ICVTSD – Terminal Scan Delay
Default changed from 500ms to 0ms
Priority Aging – PRTYAGE
Default changed from 32768ms to 1000ms
AKPFREQ – Activity Keypoint Frequency
Minimum lowered from 200 to 50
DSALIM
Default value unchanged at 5MB
EDSALIM
Default value changed from 48MB to 800MB (megabytes)
MEMLIMIT (specified in JCL)
Minimum required is now 6 GB
24x724x7
13. Core Foundations – Simplification
STATINT – Statistics Collection Interval
Default changed from 030000 to 010000 (hhmmss)
TCTUALOC – Terminal User Area Location
TCT User Area Location
Default changed from TCTUALOC=BELOW to
TCTUALOC=ANY
TRTRANSZ – Transaction Dump Trace Table Size
Default increased from 16K to 1024K (1MB)
Trace table is in 64-bit storage
Giving much better chance of tracing the error before a dump
24x724x7
14. Core Foundations – Installation and Startup …
DFHCSVCU utility updates or adds a single entry in the SVC table
First issue SETPROG LPA,ADD,MODNAME=module,DSNAME=dataset
No need to IPL z/OS therefore more flexible and faster to install CICS
New regular status messages are issued during startup if VSAM RLS data
sets require lost locks recovery processing
DFHFC0557 APPLID CICS IS IN THE PROCESS OF RECOVERING
DATA SETS THAT REQUIRE LOST LOCKS PROCESSING, nnnn OF
nnnn COMPLETED
Local and Global catalogs version verification is now performed during
startup
Allows for better diagnostics if CICS brought up with an old dataset
24x724x7
15. Core Foundations – Application Enablement …
PUT CONTAINER command has new APPEND option
Enables containers to “grow” without having to delete/recreate
GET CONTAINER command has new BYTEOFFSET option
Retrieve a section of container data beginning at offset
Enhancements to XML data mappings
CICS XML and web services assistants now support mapping
overrides to improve the readability of generated COBOL language
structures.
• New option to specify that any underscore in the XML is
converted to a hyphen in the generated COBOL language
structures.
16. Scalability – Instrumentation
CICS statistics and monitoring provide vital information about
the health of the system and the workloads.
CICS TS V5.1 statistics now include more data about the load,
capacity, and performance of the system.
The data provided by monitoring can help you to assess
performance more accurately, including potential bottlenecks.
Together these enhancements enable you to make more
informed decisions about hardware and software upgrades, and
application deployments.
11011010
17. Instrumentation Enhancements – Monitoring
Physical hardware environment
CEC Machine Type and Model ID
• e.g. 2097-740
Transaction performance related to CICS region load
Current active task count and maxtask setting
Improved transaction wait (suspend) analysis
MRO/ISC Allocate Waits
IPIC Allocate Waits
RO TCB and SO TCB Mode Delays
Intrapartition and Extrapartition TD Lock Waits
File Control Exclusive Control Waits
VSAM File String Waits
11011010
18. Instrumentation Enhancements – Monitoring
zAAP/zIIP Specialty Processor Transaction CPU time
Existing CMF Performance Class Field …
• a) “USRCPUT” Total CPU time used on a standard CP, System z
Application Assist Processor (zAAP), or System z Integrated Information
Processor (zIIP) Total CPU time including zAAP/zIIP
New CMF Performance Class Fields …
• b) “CPUTONCP” Total CPU time on standard CP
• c) “OFFLCPUT” Total Offload CPU time on standard CP (Offload
eligible but ran on standard CP)
From the new metrics the following can also be derived …
• d) Total CPU time on zAAP/zIIP = (USRCPUT – CPUTONCP)
• e) Total CPU time on CP that was not offload = (CPUTONCP –
OFFLCPUT)
• f) Total CPU time offload eligible = (OFFLCPUT + d)
Requires …
• z/OS R13 APAR OA38409 and IBM System z9 or later
11011010
19. Instrumentation Enhancements – Monitoring …
SSL CIPHER code
SSL ciphers used are now recorded in SMF 110 CMF performance
class records for better performance analysis
Application Context
Application name
Platform name
Operation name
Major, Minor, and Micro version numbers
Policy
Policy threshold exceeded count
Monitoring RMI Data Collection Option
Additional performance metrics on CICS Resource Manager usage
Default changed from RMI=NO to RMI=YES
11011010
20. Instrumentation Enhancements – Monitoring …
Resource Class data enhancements
File entry
• File Exclusive control conflict wait time
• VSAM string wait time
Exception Class data enhancements
Storage Waits in GCDSA, GUDSA, and GSDSA
11011010
21. Instrumentation Enhancements – Statistics …
Storage Manager Statistics
New GxDSAs for 64-bit storage
• DSA statistics
• Domain Subpool statistics
• Task Subpool statistics
Loader Global Statistics
New statistics on RO TCB program load requests and load time
Dispatcher Global Statistics
TCB Pools and TCB Modes
• JVM TCB Pool and J8/J9 TCB Modes Obsolete
URIMAP Resource Statistics
Usage JVMSERVER
Statistics Data Interval Collection Option
Default changed from STATINT=030000 to 010000 (hhmmss)
• Statistics Recording option STATRCD=NO|YES – default unchanged
More timely statistics data collection – peak hour analysis
11011010
22. Driving operational efficiencies - Greater capacity
Vertical Scaling
Relieve region storage constraints
Further virtual storage constraint relief
Maximum task limit has been doubled
Further threadsafe support to reduce
TCB switching and increase workload capacity
Horizontal Scaling
Instrumentation enhancements – understand how the platform is
scaling
Standardization and simplification
V
E
R
T
I
C
L
S
C
A
L
I
N
G
H O R I Z O N T A L S C A L I N G
Grow
Contract
Run more, more easily
‘right-size’ and simplify CICS topologies
23. Open Transaction Environment – Threadsafe
Threadsafe Transient Data Commands
Commands that access Transient Data (TD) are now threadsafe
EXEC CICS READQ TD, WRITEQ TD, and DELETEQ TD
TD Global User Exits must be threadsafe
XTDEREQ, XTDEREQC
XTDIN, XTDOUT, and XTDREQ
TD function Shipping over IPIC will use an Open TCB
Also drive mirror on open TCB
System initialization parameter TDSUBTASK obsolete
If on QR TCB TD will switch to FO TCB, If on an open TCB it uses the open TCB
Existing SPI commands commonly used in some applications now threadsafe
EXEC CICS SET TASK
INQUIRE and SET TRACEDEST / TRACEFLAG / TRACETYPE
24. Transient data mixed with DB2
0
100
200
300
400
500
0 100 200 300 400 500 600 700
Transactions per second
Percentageof1CP
CICS V4.1
CICS V4.2
CICS V5.1
25. Open Transaction Environment – Threadsafe
CICS program LOADs when running on an Open TCB
When running on an open TCB and a CICS program load is requested
there is no longer a TCB switch to the RO TCB
• EXEC CICS LINK, LOAD, XCTL, …
Updated Loader global statistics
• New statistics on RO TCB program load requests and load time
Global User Exits must be threadsafe
• XLDLOAD, XLDELETE, and XRSINDI
CICS RO TCB will still be used for …
• CICS program LOADs when NOT running on an Open TCB
• DFHRPL and LIBRARY Dataset Management
Benefits …
• Reduced contention for the single CICS RO TCB
• Reduced pathlength – RO TCB switch eliminated
• Significantly increased potential CICS program LOAD capacity
27. Open Transaction Environment – Threadsafe
Removed TCB switch for Java applications accessing DB2
Java applications that use JDBC or SQLJ will not require a TCB switch to L8
Java programs will perform better due to reduced TCB switching
Reduction in TCB switching requirements
The problem – T8/X8 applications switch TCBs to access DB2
• T8 – Java applications in a JVM Server using JDBC or SQLJ
• X8 – CICS-key XPLink programs (C/C++)
TCB switch to L8 no longer needed to access DB2
Supports inter-language program LINKs
End of task syncpoint will still use an L8
Required PTFs for DB2 V9 (UK78500) and V10 (UK78499)
28. Virtual Storage Constraint Relief (VSCR)
24-bit Virtual Storage Constraint Relief
Reduce pressure on below the line storage
Reduce below the line Short-on-storage conditions
Provide for greater capacity for workload growth
24-bit Virtual Storage Constraint Relief …
Control blocks, Modules, and stack storage moved above the line
• Syncpoint, Transient Data, Journal Control, …
Transient Data access method buffers – Extrapartition transient data
• Moved from 24-bit to 31-bit
Reduce below-the-line storage used by CICS supplied transactions
• Redefined with TASKDATALOC(ANY)
• For example …
– CEMT, CEOT, CESN, CESF, CETR, CMSG, CRTE, …
– CWTO, CIEP, CSNC, and the Mirror transactions …
– CEDF and CECI processing
29. Virtual Storage Constraint Relief (VSCR)
24-bit Virtual Storage Constraint Relief …
Mirror transactions …
• Supplied mirror transaction defined with TASKDATALOC(ANY)
• Will use 31-bit task storage
• AEZA or AZEC abend will occur if you DPL to an AMODE(24) program!
– Define your own mirror transaction with TASKDATALOC(BELOW)
– Change the application to be AMODE(31)
Change to the COMMAREA location on EXEC CICS XCTL PROGRAM()
• Prior to CICS TS V5.1 …
– COMMAREA on XCTL always copied to 24-bit
• CICS TS V5.1 …
– COMMAREA on XCTL remains in 31-bit
» Copied to 24-bit or 31-bit storage depending on target program
• Same behaviour as EXEC CICS LINK PROGRAM()
30. Virtual Storage Constraint Relief (VSCR) …
24-bit Virtual Storage Constraint Relief …
User Exit Global Work Area
• New GALOCATION parameter on the ENABLE PROGRAM
command
– Specifies the location of the storage that CICS provides as a
global work area for this exit program. You must also specify
the GALENGTH option to create the global work area.
– LOC24 The global work area is in 24-bit storage.
» This is the default location.
– LOC31 The global work area is in 31-bit storage.
IPCS VERBX DFHPD680 now runs RMODE(ANY)
31. Scalability – Greater Use of 64-bit Storage
31-bit Virtual Storage Constraint Relief …
Reduce pressure on above the line storage
Reduce above the line Short-on-storage situations
Provide for greater capacity for workload growth
Greater Use of 64-bit Storage …
CICS Domain control blocks moved from 31-bit to 64-bit …
• Console Queue Domain – Selected storage subpools
• Loader Domain – Selected storage subpools
• Storage Manager Domain – Additional control blocks moved into
64-bit
New components exploiting 64-bit storage …
• e.g. Managed Platform, Application Context
64-bit CICS Assembler Application Support
• Non-Language Environment Assembler Only!
32. Greater capacity - 64-bit CICS Application
Support for big data
64-bit CICS Assembler Application Support – AMODE(64)
AMODE(64) Non-Language Environment Assembler Only!
Provides application support to access large data objects
Application can cache large amounts of data above the bar
Application must copy data into 31 bit storage if used on CICS api
• For example as FROM data when writing to a file
Application can use containers to pass data
• CICS keeps the container data in 64 bit storage
• CICS passes the data to applications in 31 bit/64 bit storage as
appropriate
33. 64-bit CICS Application Support …
64-bit CICS Assembler Application Support – AMODE(64)
Only the CICS Command Level Programming Interface is supported!
• No support for CICS Resource Manager APIs …
– e.g. DB2, WebSphere MQ, IMS DBCTL, etc, …
64 bit CICS api
• CICS Managed 64-bit Storage – CICS, USER, SHARED …
– EXEC CICS GETMAIN64 and FREEMAIN64 for 64-bit storage
• Task and Shared Storage
• Channels and Containers …
– EXEC CICS GET64 CONTAINER
• retrieves data from a named container into 64-bit storage
– EXEC CICS PUT64 CONTAINER
• places data from 64-bit storage in a named container
31 bit CICS API and SPI
• CICS switches to amode(31) for existing CICS API & SPI
34. 64-bit CICS Application Support …
AMODE(64) CICS Application Program Support
Use of existing CICS API switches to amode(31)
EXEC CICS LINK, LOAD, XCTL, RETURN to/from any AMODE
Changes to existing EXEC CICS API commands …
• EXEC CICS LOAD PROGRAM() ENTRYPOINT()
• EXEC CICS ASSIGN ASRAREGS64() and ASRAPSW16()
• EXEC CICS INQUIRE PROGRAM() ENTRYPOINT()
“There is no performance advantage to be gained with
AMODE(64) unless you are going to update the application to
exploit 64-bit virtual storage”
35. 64-bit CICS Application Support …
AMODE(64) CICS Application Program Support
Recommend using Relative Addressing – default for AMODE(64)
• But this is not mandatory
EXEC CICS API Commands that are Not Supported …
– EXEC CICS HANDLE/IGNORE CONDITION
» Use RESP/RESP2
– EXEC CICS HANDLE ABEND LABEL
» EXEC CICS HANDLE ABEND PROGRAM() is
supported
AMODE(64) Assembler Programs are NOT supported as …
• Global or Task User Exit Programs (GLUEs and TRUEs)
• User Replaceable Programs (URMs)
Make sure you use the correct EXEC API Stub – DFHEAG
36. Scalability – System Parameter Simplification
MAXTASK
Maximum tasks limit increased from 999 to 2000
Default value changed from 5 to 500
Minimum increased from 1 to 10
Single region capacity being constrained by CICS maxtask limit
Primarily for Terminal and File Owning Regions (TORs and FORs)
• Single TOR routing to multiple Application Owning Regions
(AORs)
• Single FOR servicing multiple Application Owning Regions
(AORs)
Value now used to set some of the MAXxxxTCBS parameters
• MAXOPENTCBS and MAXXPTCBS
– MAXOPENTCBS – Now calculated as (2 * MXT Value) + 32
– MAXXPTCBS – Now calculated as (MXT Value)
• MAXOPENTCBS, MAXXPTCBS, MAXJVMTCBS …
– System Initialization Parameters are obsolete!
37. Scalability – z/OS
z/OS R13
Minimum z/OS release requirement
SDUMP Performance
Provided in z/OS R12 & above
z/OS JCL DD statement – SPIN parameter
SPIN= on DD card
Use the SPIN parameter to specify that the output for the SYSOUT
data set is to be made available for processing
CICS 24x7 …
• Can be used to make the Transient Data Message logs available
for processing without the need to shutdown and/or
close/deallocate the transient data queue datasets
Language Environment APAR PM57053
Reduces LE’s use of 24 bit storage (SDSA)
38. Performance improvements from Java 7 supportPerformance improvements from Java 7 support
• zEnterprise EC12 offers a ~45%
improvement over z196 running the
Java Multi-Threaded Benchmark
• EC12 has additional instructions
specifically for Java
• zEnterprise EC12 offers a ~45%
improvement over z196 running the
Java Multi-Threaded Benchmark
• EC12 has additional instructions
specifically for Java
The latest JVM delivers a performance boost…The latest JVM delivers a performance boost…
z196 SDK 7 SR1 J9 2.6 LP CR
20
40
60
80
100
120
zEnterprise SDK 7 SR1 J9 2.6 LP CR
NormalisedThroughput
Threads
39. Summary: CICS TS 5.1 - Driving Operational EfficiencySummary: CICS TS 5.1 - Driving Operational Efficiency
• Auditing of SPI commands that alter the system
• Improved auditing of user IDs that make
requests over IP
• Extended identity propagation to include started
tasks
• Cipher suites used for SSL connections to be
stored in the performance records
• Calculate the actual and potential use
of specialty processors
• Regular status updates provided while lost locks
recovery is taking place
• Auditing of SPI commands that alter the system
• Improved auditing of user IDs that make
requests over IP
• Extended identity propagation to include started
tasks
• Cipher suites used for SSL connections to be
stored in the performance records
• Calculate the actual and potential use
of specialty processors
• Regular status updates provided while lost locks
recovery is taking place
• Upgrade CICS versions and releases without
requiring a z/OS restart
• Refresh Secure Sockets Layer (SSL) certificates
• Keep IPIC connections up and running
• Support more IBM GDPS/AA solutions
• Dynamically specify cross-system coupling
facility groups
• Better reflect current best practices with updated
and simplified defaults
• Upgrade CICS versions and releases without
requiring a z/OS restart
• Refresh Secure Sockets Layer (SSL) certificates
• Keep IPIC connections up and running
• Support more IBM GDPS/AA solutions
• Dynamically specify cross-system coupling
facility groups
• Better reflect current best practices with updated
and simplified defaults
• Automated control over critical system
resources
• Set data access thresholds on SQL or file
access
• Set program loop thresholds on EXEC LINK
• Set storage request thresholds
• Set CPU time thresholds
• Policies can issue messages, abending tasks,
or create events
• Automated control over critical system
resources
• Set data access thresholds on SQL or file
access
• Set program loop thresholds on EXEC LINK
• Set storage request thresholds
• Set CPU time thresholds
• Policies can issue messages, abending tasks,
or create events
• Doubling the MAXTASK limit to 2,000
• Increased 64-bit and reduced 24-bit storage
usage
• Greater parallelism from threadsafe API and SPI
• Greater system parallelism through optimized
TCB usage
• Performance improvements from 64-bit Java 7
• Greater access to 64-bit storage from Assembler
programs
• Doubling the MAXTASK limit to 2,000
• Increased 64-bit and reduced 24-bit storage
usage
• Greater parallelism from threadsafe API and SPI
• Greater system parallelism through optimized
TCB usage
• Performance improvements from 64-bit Java 7
• Greater access to 64-bit storage from Assembler
programs
Greater CapacityGreater Capacity
Increased AvailabilityIncreased Availability
24x7
Deeper InsightDeeper Insight
10011010
Managed OperationsManaged Operations
24x724x7 11011010
40. Summary : CICS TS 5.1 - Increasing Service AgilitySummary : CICS TS 5.1 - Increasing Service Agility
• CICS supports "one-to-many" event emission
• Greater-than-32KB across MQ (DPL) bridge
• Enhancements to IPIC add IMS support
• Reduced application storage needs with GET
and PUT container
• Backup and restore entire CICSPlex System
Manager (CICSPlex SM) systems
• Automatic adjustment of the CICS clock for
daylight saving time changes
• CICS supports "one-to-many" event emission
• Greater-than-32KB across MQ (DPL) bridge
• Enhancements to IPIC add IMS support
• Reduced application storage needs with GET
and PUT container
• Backup and restore entire CICSPlex System
Manager (CICSPlex SM) systems
• Automatic adjustment of the CICS clock for
daylight saving time changes
• A production-ready web container
• Deploy lightweight Java servlets and JSPs
• Local access to CICS applications and data
• Roll-out of interface updates through OSGi
• Integration with applications and platforms
• Built on WebSphere Application Server Liberty
profile for compatibility
• A production-ready web container
• Deploy lightweight Java servlets and JSPs
• Local access to CICS applications and data
• Roll-out of interface updates through OSGi
• Integration with applications and platforms
• Built on WebSphere Application Server Liberty
profile for compatibility
• Group new and existing regions as platforms
• Decoupling applications from the region
topology.
• automatic resource deployment and validation
• De-provision resources when requested
• Deploy applications to regions within a platform
• Dynamically manage platforms with policies
• Group new and existing regions as platforms
• Decoupling applications from the region
topology.
• automatic resource deployment and validation
• De-provision resources when requested
• Deploy applications to regions within a platform
• Dynamically manage platforms with policies
Modern InterfacesModern Interfaces Foundational EnhancementsFoundational Enhancements
First-class PlatformsFirst-class Platforms
• Manage disparate resources as a single entity
• Rapidly move through the application lifecycle
• Automate dependency management
• Ensure rigorous yet flexible provisioning
• Measure entire application resource usage
• Dynamically manage applications with policies
• Manage disparate resources as a single entity
• Rapidly move through the application lifecycle
• Automate dependency management
• Ensure rigorous yet flexible provisioning
• Measure entire application resource usage
• Dynamically manage applications with policies
First-class ApplicationsFirst-class Applications
42. Temporary Storage enhancement
Implement TS queue cleanup at intervals less than 1 hour
● Allow granularity of minutes (with a 10 min minimum) rather than hours for TS queue
expiry.
● Extended support to shared TS queues.
● New EXPIRYINTMIN keyword on TSMODEL. EXPIRYINT deprocated
● CPSM and Explorer updated. Backlevel systems use existing values
• RFE 57917 Resource TSMODEL, attribute EXPRYINT with values less 1h (intervals in
minutes or seconds).
• RFE 61463 inactive TSQ deletion interval less than one hour
• RFE 65032 remove shared TSQ in CF automatically
• RFE 69587 Extend the EXPIRYINT attribute for TSQ servers
43. EXEC API enhancements
ASSIGN command enhancements
● Provide access the message returned in the TACB from a remote system.
● Provide application with knowledge of how many link levels down it is.
● RFE 52656: Access TACB Fields
●
RFE 57206: Extend EXEC CICS API to provide 'Link Level' number
Integrated translator support for EXCI for Cobol and C
● Remove warning message that EXCI is not supported for integrated translator.
The one RFE mentioned is just one request. There were eight separate FITS
requirements for this. They were closed and replaced by the one RFE
● RFE 52737: Integrated compilation support for EXCI batch program
44. EXEC API enhancements (more!)
Changes to time and delays in CICS
● Changed EXEC CICS DELAY to allow specification of milliseconds.
The minimum the dispatcher scan will allow today is 250ms, so for
example specifying a delay of 10 milliseconds will result in a delay of
somewhere between 10 and 260 milliseconds depending upon at what
point during dispatchers scan delay the command is issued.
● RFE 55274 EXEC CICS DELAY to be able to have delays smaller than
1 second.
● Enhanced the EXEC CICS FORMATTIME command to specify
whether local or UTC should be used when returning the
DATESTRING returned
● RFE 67891 requests EXEC CICS FORMATTIME to be able to return
timestamps in RFC1123 or RFC3339 format in local time or UTC.
45. EXEC INQUIRE enhancements
INQUIRE SYSTEM command enhancements
● Provides ISV a method of determining msgcase without looking at
SIT control block. Provides access to MVS information without
walking MVS blocks
● RFE 55926: Method for determining the state of the SIT MSGCASE
parameter
● RFE 55941: Provide INQUIRE SYSTEM SMFID and INQUIRE
SYSTEM MVSSYSID (GSE Requirement GGCIC07014)
Add RESIDENCY to INQUIRE PROGRAM
● Returns whether a program is defined as resident or not.
● RFE 54087: Allow CEMT, CECI & EXEC CICS INQUIRE display
residency status of programs
46. Threadsafe enhancements
MONITOR and STATISTICS SPI Commands made threadsafe:
● EXTRACT STATISTICS
● INQUIRE STATISTICS
● SET STATISTICS
● INQUIRE MONITOR and
● SET MONITOR
EXTRACT command enhanced to support the following keywords
copied over from COLLECT STATISTICS:
● DB2CONN, DB2ENTRY, DISPATCHER, ENQUEUE, FILE, JOURNALNAME, JVMPROGRAM,
LSRPOOL, MONITOR, MVSTCB, PROGAUTO, PROGRAM, RECOVERY, STORAGE,
SUBPOOL, STATS, STREAMNAME, SYSDUMPCODE, TDQUEUE, TRANDUMPCODE,
TRANCLASS, TRANSACTION,TSQUEUE, TASKSUBPOOL, TCPIP and TCPIPSERVICE
● CPSM changed to use EXTRACT rather than COLLECT for these resources when running on
CICS TS 5.2 and higher
47. Threadsafe enhancements (more!)
Other SPI commands made threadsafe:
●
INQUIRE PROGRAM,
●
SET PROGRAM,
● DISCARD PROGRAM,
● INQUIRE TRANSACTION,
● SET TRANSACTION,
●
DISCARD TRANSACTION,
●
INQUIRE SYSTEM,
● SET SYSTEM,
● INQUIRE DISPTACHER,
●
SET DISPATCHER,
●
INQUIRE MVSTCB
RFE 53772: Make SPI INQUIRE SYSTEM, PROGRAM, TRANSACTION THREADSAFE
(SHARE REQUIREMENT SSCICS07004)
48. Diagnostic enhancements
●
RFE 62267: allow DUMPCODE on CEMT PERFORM DUMP
●
RFE 52963: Produce in any case a systemdump for U0999 abends without the need for the user to add the code into the SRT
●
RFE 54976: Issue a warning message when total number of DB2 threads is greater than the TCBLIMIT on the DB2CONN definition.
●
RFE 57724: CICS DFHEIENT: Disallow R13 as CODEREG
●
RFE 62384: Improve AD2S documentation
●
RFE 54847: Additional Short On Storage message needed
●
RFE 58816: Enhance DFH0STAT for TSPOOL reporting
●
RFE 54848 NQEA Freechain storage is not freed until CICS is recycled
●
RFE 57758 CPSM WUI Server should fail to initialise if WUIPARM DEFAULTWARNCNT is zero
●
RFE 57789 Allow a WUI server to start without CICS auxiliary trace on
●
RFE 67426 CSFE status reporting
●
RFE 52741 The sysplex_enqueue_waiter value needs to be adjustable
●
RFE 67886 CICS ENQ - adjustable delay time for re-checking resource available
●
RFE 45835 Update IBM provided RDO PPT for DFHPGADX to specify "threadsafe"
●
RFE 48088 Include TCB CPU/Disp Ratio for QR TCB in DFHPDxxx 'DS' output
●
RFE 51992 DFHDH0300 & DFHPA1909 could be more user friendly
●
RFE 64155 Display CPSM Message EYUWM0423I on z/OS Console
●
RFE 65363 CICS TS retries zFS errors that are temporary
●
RFE 66031 Change DFHDBFK to use LSR rather than NSR
49. Diagnostic enhancements
● RFE 57758 CPSM WUI Server should fail to initialise if WUIPARM DEFAULTWARNCNT is zero
● RFE 57789 Allow a WUI server to start without CICS auxiliary trace on
● RFE 67426 CSFE status reporting
● RFE 52741 The sysplex_enqueue_waiter value needs to be adjustable
● RFE 67886 CICS ENQ - adjustable delay time for re-checking resource available
● RFE 45835 Update IBM provided RDO PPT for DFHPGADX to specify "threadsafe"
● RFE 48088 Include TCB CPU/Disp Ratio for QR TCB in DFHPDxxx 'DS' output
● RFE 51992 DFHDH0300 & DFHPA1909 could be more user friendly.
This chart compares the throughput achieved for each release The CICS TS V4.1 becomes constrained by the QR TCB at about 200 transactions per second with this application..
Using the ‘REQUIRED’ option with CICS TS V4.2, the constraint on the QR TCB is eliminated and the throughput increases to about 570 transactions a second with the constraint now being the total CPU available on the LPAR.
The elimination of the TCB switching in CICS TS V5.1, reduces CPU per transaction and in this case enables higher throughput to be achieved before being limited by the available CPU on the LPAR.
The chart shows the throughput and response times for threadsafe applications using EXEC CICS LOAD in both CICS TS V4.2 and CICS TS V5.1.
With CICS TS V4.2,altough the application is running on an Open TCB, when the application issues a LOAD, CICS must switch to the RO TCB to complete the physical load.
In this case a load is taking on average 5 milliseconds of elapse time to complete. Although it will not use 5 milliseconds of CPU time during this period, it does mean that the RO TCB is dispatched for a total of 5 milliseconds and so the LOADs are effectively run serially and at about 200 per second, the RO TCB has reached its limit in terms of dispatch time.
When the same application is run in CICS TS V5.1, the LOADs are run on concurrent Open TCBs and can be run in parallel. The chart shows that the throughput capability increased about 10 fold. The limiting factor for this application has become the I/O subsystem in CICS TS V5.1 instead of the RO TCB.
Reducing the impact of program load on the RO TCB will also assist any contention on the RO caused by competing security calls which also share the RO TCB.
Note: This is a performance statement about the EC12 running Java 7 compared to a z196 running Java 7
Driving operational efficiencies
Greater capacity
Greater capacity is delivered through significant vertical and horizontal scalability enhancements. Fewer regions can now run the same workload. They provide the opportunity for cost savings through consolidation. Reducing the number of regions can deliver savings in both CPU consumption and administration overheads.
Managed operations
Managed operations are provided through the introduction of policies, which deliver automated control over critical system resources. Task thresholds can now be set for data access requests, storage usage, program loops, and processor time used. Policy breaches can be managed by issuing messages, abending tasks, or emitting events that can trigger further actions. Policies can be applied dynamically during runtime operations.
Increased availability
Increased availability enhancements reduce the need for planned outages. CICS TS V5.1 can be upgraded without requiring z/OS to be restarted. SSL certificates can be refreshed dynamically, without restarting the CICS regions. A heartbeat capability keeps IPIC connections established and ready for use. Additionally, CICS TS V5.1 now provides greater support for IBM Geographically Dispersed Parallel Sysplex/Active-Active (GDPS/AA) availability solutions.
Deeper insight
Deeper insight into performance and compliance information can help to tune and audit system usage. SPI commands that alter system configurations are now logged. Identity propagation is extended and there is improved auditing of user IDs that make requests over IP. Information on the SSL cipher suites used, along with information on the actual and potential usage of specialty processors, can help tune system performance.
Increasing service agility
First-class applications
First-class applications enable the creation of agile services from existing assets. Disparate application resources can be combined and managed as a single entity that can be versioned and rapidly moved through the development, test, and production lifecycle. Dependency management is also handled. Entire applications can be measured for resource usage and internal billings. Applications can be managed dynamically by applying policies during runtime.
First-class platforms
First-class platforms enable the creation of agile service delivery runtimes. CICS regions can be grouped as platforms for rapid application deployments. Decoupling applications from the underlying topology increases flexibility. When regions within a platform are started applications are deployed to them, without any further interaction from a system administrator. Reliability is increased through automatic resource validation, provisioning and de-provisioning. Platforms can be managed dynamically by applying policies during runtime.
Modern interfaces
Modern interfaces enable customers to build rich web experiences for critical applications. CICS TS V5.1 delivers a production-ready web container for the deployment of lightweight Java servlets and Java Server Pages (JSPs). End-to-end application performance is optimized through fast, local access to CICS applications and data. Updates to interfaces can be rolled out rapidly through OSGi packaged deployments that can fully integrate with first-class applications and platforms. This capability is built on the IBM WebSphere Application Server Liberty profile for compatibility.
Foundational enhancements
Foundational enhancements extend the core CICS capabilities in a number of areas. CICS events can be captured on operator writes and system messages, and events can be emitted on a one-to-many basis. The CICS-WebSphere MQ Dynamic Program Link (DPL) bridge now supports greater-than-32KB messages. Enhancements to IPIC add support for IBM IMS communications, and improve integration and error recovery. Application storage needs can be reduced through GET and PUT container enhancements. Entire CICSPlex System Manager (CICSPlex SM) systems can be backed-up and restored without manual overrides. The CICS clock can be adjusted for daylight saving time changes, without any further interaction with a system administrator.