The document provides an overview of enhancements in CICS Transaction Server V5.2, including improvements to service agility, operational efficiency, and support for mobile and cloud technologies. Some key highlights include new capabilities for JSON processing, policy-based management of system resources, support for TLS 1.2 and FIPS standards, and integration of security features such as SAML and Kerberos. The agenda also reviews enhancements made in the previous CICS TS V5.1 release.
CICS TS V5 delivers technical innovation and significant business value, satisfying in excess of 150 customer and user group enhancement requests. The result is a powerful new release with a huge amount of value for all stakeholders - delivering a smarter transaction processing experience for CICS users and their customers in turn.
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...nick_garrod
InterConnect 2015 Session 6638 The One-Day CICS Transaction Server Upgrade: Migration Considerations. After months of writing letters of justification you‘re finally OK to order CICS TS. The software has arrived and is ready to install. What next? Do you have to buy lunch for the z/OS Sys Progs to get them to install the latest release of z/OS? What do you need from the database administrators? Is this the time to “byte” the bullet and use CICSPlex Systems Manager? Are your CICS Exits and User Replaceable Modules still valid? What will it take to get them working with this release of CICS? What will you have to tell the Application Programmers? Is your shop relying on any function that has been removed from this release of CICS? Come to this technical session to get the answers to the above questions and more.
CICS TS V4 and V5 recap, and the new V5.3 open betaMark Cocker
CICS TS V5.3 open beta provides new DevOps features to make it quicker and easier to deploy your applications, includes the latest Liberty profile and Java features including better interoperability with COBOL and other languages, runs web services faster than ever, has stronger security options, and custom perspectives in CICS Explorer.
1961 no rainclouds here! using cics platform and policies to keep your privat...Matthew Webster
CICS V5 introduces significant capability to help manage CICS as a private cloud. The Platform definition can monitor the health of shared services and maintain consistency across regions simplifying application deployment while threshold policies can protect production systems against rogue applications by enforcing coding standards throughout the development lifecycle. See how to use these new resources in conjunction with existing facilities including CICS Monitoring and tools like CICS PA to manage and measure the health of your CICS environment.
This session will cover recent enhancements to CICS including support for deploying and managing shared services such as TCP/IP connectivity, web services resources and Java runtimes as part of a Platform. Customers using workload management will discover how Application context information can now assist with dynamic routing. We will also describe the new threshold policies
Assure MIMIX, the leader in IBM i high availability and disaster recovery, keeps your mission-critical business applications running continuously and protects your data from loss. Precisely has recently delivered a new release of Assure MIMIX 10. This new release Assure includes even better support for IBM i customers operating in Cloud, Hosting and Managed Service Ecosystems.
Assure MIMIX 10 provides a new simplified pricing and licensing model built to support the needs of today’s IBM i systems whether they are on-premises or in the cloud. In addition, there are several new capabilities that are designed to make Assure MIMIX an even better solution for IBM i users needing a powerful HA solution.
Join us on this on-demand webinar to learn about the new Assure MIMIX 10 licensing changes as well as:
- Faster, more intelligent synchronization
- Automated configuration capabilities
- Enhanced recovery operations
CICS TS V5 delivers technical innovation and significant business value, satisfying in excess of 150 customer and user group enhancement requests. The result is a powerful new release with a huge amount of value for all stakeholders - delivering a smarter transaction processing experience for CICS users and their customers in turn.
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...nick_garrod
InterConnect 2015 Session 6638 The One-Day CICS Transaction Server Upgrade: Migration Considerations. After months of writing letters of justification you‘re finally OK to order CICS TS. The software has arrived and is ready to install. What next? Do you have to buy lunch for the z/OS Sys Progs to get them to install the latest release of z/OS? What do you need from the database administrators? Is this the time to “byte” the bullet and use CICSPlex Systems Manager? Are your CICS Exits and User Replaceable Modules still valid? What will it take to get them working with this release of CICS? What will you have to tell the Application Programmers? Is your shop relying on any function that has been removed from this release of CICS? Come to this technical session to get the answers to the above questions and more.
CICS TS V4 and V5 recap, and the new V5.3 open betaMark Cocker
CICS TS V5.3 open beta provides new DevOps features to make it quicker and easier to deploy your applications, includes the latest Liberty profile and Java features including better interoperability with COBOL and other languages, runs web services faster than ever, has stronger security options, and custom perspectives in CICS Explorer.
1961 no rainclouds here! using cics platform and policies to keep your privat...Matthew Webster
CICS V5 introduces significant capability to help manage CICS as a private cloud. The Platform definition can monitor the health of shared services and maintain consistency across regions simplifying application deployment while threshold policies can protect production systems against rogue applications by enforcing coding standards throughout the development lifecycle. See how to use these new resources in conjunction with existing facilities including CICS Monitoring and tools like CICS PA to manage and measure the health of your CICS environment.
This session will cover recent enhancements to CICS including support for deploying and managing shared services such as TCP/IP connectivity, web services resources and Java runtimes as part of a Platform. Customers using workload management will discover how Application context information can now assist with dynamic routing. We will also describe the new threshold policies
Assure MIMIX, the leader in IBM i high availability and disaster recovery, keeps your mission-critical business applications running continuously and protects your data from loss. Precisely has recently delivered a new release of Assure MIMIX 10. This new release Assure includes even better support for IBM i customers operating in Cloud, Hosting and Managed Service Ecosystems.
Assure MIMIX 10 provides a new simplified pricing and licensing model built to support the needs of today’s IBM i systems whether they are on-premises or in the cloud. In addition, there are several new capabilities that are designed to make Assure MIMIX an even better solution for IBM i users needing a powerful HA solution.
Join us on this on-demand webinar to learn about the new Assure MIMIX 10 licensing changes as well as:
- Faster, more intelligent synchronization
- Automated configuration capabilities
- Enhanced recovery operations
How to Balance System Speed and Risk for Multi-Platform InnovationClaudia Ring
Walking the line between speed to market and stability of mission-critical systems is something many enterprise organizations deal with on a consistent basis, especially when planning a major application release. Multi-speed IT is a term that connotes the difficulty of balancing speed and risk for these enterprises, but also one that inherently defines a solution; moving at different speeds depending on system requirements. While moving at various speeds based on whether you are releasing changes for Systems of Engagement (SOE) or Systems of Record (SOR) can seem negative, it can be used as a stepping stone towards complete enterprise agility and iterative improvements in release management across both types of systems. Join Rosalind Radcliffe, IBM Distinguished Engineer and Chief Architect for DevOps, as she discusses;
How to begin incorporating continuous testing into the release cycle for both SOE's and SOR's
How deployment automation can be incorporated into multi-platform deployments
How earlier, more frequent testing and automated deployments can help stabilize risk while increasing speed
Customer success with using these testing and deployment solutions to achieve agility across both SOE's and SOR's
Service-Level Objective for Serverless Applicationsalekn
Deploying commercial applications that meet their expected business needs is challenging due to the differences between how business goals are specified and how the system is evaluated. Furthermore, business goals are dynamic, requiring deployment to change constantly over time. Such difficulties make it costly to maintain application quality as the underlying infrastructure is not always fast enough to keep up with business changes. Nowadays, serverless opens a new approach to build application. By abstracting out the deployment details, serverless application can be implemented with minimum deployment efforts. Serverless also reduces maintenance cost with auto-scaling and pay-as-you-go. Such abilities make us believe that by adopting serverless, we can build application that can meet and quickly adapt to business goals.
However, simply writing applications with serverless is not sufficient. Due to best-effort invocation mechanisms and the lack of application structure awareness, serverless performance is highly variable and often fails to support applications with rigorous quality of service requirements. In this study, we aim to mitigate such limitations by coupling serverless deployment with business needs. In particular, we define an Serverless Service-Level Objective (SLO) interface that allows developers to describe their application structure and business goals in terms of software-level objectives. We implement an SLO enforcer, which uses this information in combination with the system performance metrics to decide a proper serverless deployment and resource allocation for meeting business goals. The Serverless SLO leverages blueprint model, which allow developers to describe applications' architecture and runtime characteristics needs, to map application description to serverless function deployment on the top of Knative. We deploy our proposed system on KinD, a tool to run Kubernetes cluster over our local Docker container, and evaluate it with different system configurations. Evaluation results showed that SLO definition and enforcement helps serverless application use resources in accordance with business goals.
Monitoring and Reporting for IBM i Compliance and SecurityPrecisely
Today’s world of complex regulatory requirements and evolving security threats requires you to find simple ways to monitor all IBM i system and database activity, identify security threats and compliance issues in real time, produce clear and concise reports, and maintain an audit trail to satisfy security officers and auditors.
IBM i log files and journals are rich sources of system and database activity. However, they are in their own proprietary format, and they are not easy to manually analyze for security events.
Join this webinar to learn more about:
- Key IBM i log files and static data sources that must be monitored
- Automating real-time analysis of log files to identify threats to system and data security
- Integrating IBM i security data into SIEM solutions for a clear view of security across multiple platforms
[WSO2Con EU 2017] Jump to the Next Curve with DevOpsWSO2
The primary objectives of adopting DevOps are to increase agility and to save more cycles so corporates can pay more attention toward innovation. Over time, WSO2 has gained an immense amount of DevOps experience by running their own cloud and helping customers become successful in their own cloud platforms. In this slide deck, Chamith talks about the advantages of adopting DevOps and what WSO2 has done in the DevOps space.
[WSO2Con EU 2017] How a Large Organization Weighted on a WSO2 Integration Pla...WSO2
This slide deck explores in-depth how enioka Haute Couture designed and built an integration platform around WSO2 ESB to expose internal services to external applications (SaaS, external partners); and how this became a central component of the collaboration between every actor of integration projects.
Edge 2016 SCL-2484: a software defined scalable and flexible container manage...Yong Feng
The material for IBM Edge 2016 session for Spectrum Container Management Solution.
https://www-01.ibm.com/events/global/edge/sessions/.
Please refer to http://ibm.biz/ConductorForContainers for more details about Spectrum Conductor for Containers.
Please refer to https://www.youtube.com/watch?v=7YMjP6EypqA and https://www.youtube.com/watch?v=d9oVPU3rwhE for the demo of Spectrum Conductor for Containers.
Planning very large scale document repositories with high availability in sha...Noor Basha
Performance and capacity planning for large-scale document management solutions is one of the key pressure points in SharePoint. The focus of this webinar is on the performance characteristics of very large document libraries with item level permissions, as there is an increase in size and throughput of high volume operation – such as policy update and retention. The session will also discuss high availability (HA) and Disaster Recovery (DR) strategies.
Topics to be covered:
- Estimate performance and capacity requirements for large scale document repositories
- Planning end user security for large document libraries with item level permissions
- Lab test report for very large scale document repositories
- Disaster Recovery strategies
- High availability (HA) recommendations with StorSimple RBS (Remote Blog Storage)
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...Yong Feng
The material for IBM Edge 2016 session for a client use case of Spectrum Conductor for Containers
https://www-01.ibm.com/events/global/edge/sessions/.
Please refer to http://ibm.biz/ConductorForContainers for more details about Spectrum Conductor for Containers.
Please refer to https://www.youtube.com/watch?v=7YMjP6EypqA and https://www.youtube.com/watch?v=d9oVPU3rwhE for the demo of Spectrum Conductor for Containers.
SUSE juega un rol importante como proveedor de soluciones de infraestructura basada en software para el mundo de BigData. Dichas soluciones son los cimientos que permiten despliegues de BigData escalables y sencillos de manejar aprovechando los últimos avances en computación, contenedores, almacenamiento y gestión de entornos.
Los acuerdos de SUSE con los principales fabricantes, tanto de soluciones de software como hardware, permiten una aproximación con garantías al complejo ecosistema de la gestión de datos a nivel empresarial.
CICS Transaction Gateway V9.1 OverviewRobert Jones
CICS TG V9.1 enables simple and rapid mobile integration of your enterprise CICS Transaction Server (CICS TS) family or TXSeries™ environment. You can build on your existing, proven architecture to quickly provide mobile connectivity to back-end systems by using JavaScript™ Object Notation (JSON) web services.
A complete overview of the IBM CICS Transaction Gateway V9.1 products:
CICS Transaction Gateway for z/OS V9.1
CICS Transaction Gateway for Multiplatforms V9.1
CICS Transaction Gateway Desktop Edition V9.1
Product datasheet: https://ibm.biz/cicstg91datasheet
How to Balance System Speed and Risk for Multi-Platform InnovationClaudia Ring
Walking the line between speed to market and stability of mission-critical systems is something many enterprise organizations deal with on a consistent basis, especially when planning a major application release. Multi-speed IT is a term that connotes the difficulty of balancing speed and risk for these enterprises, but also one that inherently defines a solution; moving at different speeds depending on system requirements. While moving at various speeds based on whether you are releasing changes for Systems of Engagement (SOE) or Systems of Record (SOR) can seem negative, it can be used as a stepping stone towards complete enterprise agility and iterative improvements in release management across both types of systems. Join Rosalind Radcliffe, IBM Distinguished Engineer and Chief Architect for DevOps, as she discusses;
How to begin incorporating continuous testing into the release cycle for both SOE's and SOR's
How deployment automation can be incorporated into multi-platform deployments
How earlier, more frequent testing and automated deployments can help stabilize risk while increasing speed
Customer success with using these testing and deployment solutions to achieve agility across both SOE's and SOR's
Service-Level Objective for Serverless Applicationsalekn
Deploying commercial applications that meet their expected business needs is challenging due to the differences between how business goals are specified and how the system is evaluated. Furthermore, business goals are dynamic, requiring deployment to change constantly over time. Such difficulties make it costly to maintain application quality as the underlying infrastructure is not always fast enough to keep up with business changes. Nowadays, serverless opens a new approach to build application. By abstracting out the deployment details, serverless application can be implemented with minimum deployment efforts. Serverless also reduces maintenance cost with auto-scaling and pay-as-you-go. Such abilities make us believe that by adopting serverless, we can build application that can meet and quickly adapt to business goals.
However, simply writing applications with serverless is not sufficient. Due to best-effort invocation mechanisms and the lack of application structure awareness, serverless performance is highly variable and often fails to support applications with rigorous quality of service requirements. In this study, we aim to mitigate such limitations by coupling serverless deployment with business needs. In particular, we define an Serverless Service-Level Objective (SLO) interface that allows developers to describe their application structure and business goals in terms of software-level objectives. We implement an SLO enforcer, which uses this information in combination with the system performance metrics to decide a proper serverless deployment and resource allocation for meeting business goals. The Serverless SLO leverages blueprint model, which allow developers to describe applications' architecture and runtime characteristics needs, to map application description to serverless function deployment on the top of Knative. We deploy our proposed system on KinD, a tool to run Kubernetes cluster over our local Docker container, and evaluate it with different system configurations. Evaluation results showed that SLO definition and enforcement helps serverless application use resources in accordance with business goals.
Monitoring and Reporting for IBM i Compliance and SecurityPrecisely
Today’s world of complex regulatory requirements and evolving security threats requires you to find simple ways to monitor all IBM i system and database activity, identify security threats and compliance issues in real time, produce clear and concise reports, and maintain an audit trail to satisfy security officers and auditors.
IBM i log files and journals are rich sources of system and database activity. However, they are in their own proprietary format, and they are not easy to manually analyze for security events.
Join this webinar to learn more about:
- Key IBM i log files and static data sources that must be monitored
- Automating real-time analysis of log files to identify threats to system and data security
- Integrating IBM i security data into SIEM solutions for a clear view of security across multiple platforms
[WSO2Con EU 2017] Jump to the Next Curve with DevOpsWSO2
The primary objectives of adopting DevOps are to increase agility and to save more cycles so corporates can pay more attention toward innovation. Over time, WSO2 has gained an immense amount of DevOps experience by running their own cloud and helping customers become successful in their own cloud platforms. In this slide deck, Chamith talks about the advantages of adopting DevOps and what WSO2 has done in the DevOps space.
[WSO2Con EU 2017] How a Large Organization Weighted on a WSO2 Integration Pla...WSO2
This slide deck explores in-depth how enioka Haute Couture designed and built an integration platform around WSO2 ESB to expose internal services to external applications (SaaS, external partners); and how this became a central component of the collaboration between every actor of integration projects.
Edge 2016 SCL-2484: a software defined scalable and flexible container manage...Yong Feng
The material for IBM Edge 2016 session for Spectrum Container Management Solution.
https://www-01.ibm.com/events/global/edge/sessions/.
Please refer to http://ibm.biz/ConductorForContainers for more details about Spectrum Conductor for Containers.
Please refer to https://www.youtube.com/watch?v=7YMjP6EypqA and https://www.youtube.com/watch?v=d9oVPU3rwhE for the demo of Spectrum Conductor for Containers.
Planning very large scale document repositories with high availability in sha...Noor Basha
Performance and capacity planning for large-scale document management solutions is one of the key pressure points in SharePoint. The focus of this webinar is on the performance characteristics of very large document libraries with item level permissions, as there is an increase in size and throughput of high volume operation – such as policy update and retention. The session will also discuss high availability (HA) and Disaster Recovery (DR) strategies.
Topics to be covered:
- Estimate performance and capacity requirements for large scale document repositories
- Planning end user security for large document libraries with item level permissions
- Lab test report for very large scale document repositories
- Disaster Recovery strategies
- High availability (HA) recommendations with StorSimple RBS (Remote Blog Storage)
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...Yong Feng
The material for IBM Edge 2016 session for a client use case of Spectrum Conductor for Containers
https://www-01.ibm.com/events/global/edge/sessions/.
Please refer to http://ibm.biz/ConductorForContainers for more details about Spectrum Conductor for Containers.
Please refer to https://www.youtube.com/watch?v=7YMjP6EypqA and https://www.youtube.com/watch?v=d9oVPU3rwhE for the demo of Spectrum Conductor for Containers.
SUSE juega un rol importante como proveedor de soluciones de infraestructura basada en software para el mundo de BigData. Dichas soluciones son los cimientos que permiten despliegues de BigData escalables y sencillos de manejar aprovechando los últimos avances en computación, contenedores, almacenamiento y gestión de entornos.
Los acuerdos de SUSE con los principales fabricantes, tanto de soluciones de software como hardware, permiten una aproximación con garantías al complejo ecosistema de la gestión de datos a nivel empresarial.
CICS Transaction Gateway V9.1 OverviewRobert Jones
CICS TG V9.1 enables simple and rapid mobile integration of your enterprise CICS Transaction Server (CICS TS) family or TXSeries™ environment. You can build on your existing, proven architecture to quickly provide mobile connectivity to back-end systems by using JavaScript™ Object Notation (JSON) web services.
A complete overview of the IBM CICS Transaction Gateway V9.1 products:
CICS Transaction Gateway for z/OS V9.1
CICS Transaction Gateway for Multiplatforms V9.1
CICS Transaction Gateway Desktop Edition V9.1
Product datasheet: https://ibm.biz/cicstg91datasheet
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big TummySensual Occasions
A common goal for women is to have a flat stomach, so often we do things like diet and exercise. However, do you know what else can affect the how big or how small our stomachs can look?
The answer to that question is the clothes we wear, and that means all of the clothes. This means that even the choice of women’s knickers or lingerie can also be a big factor to slimming down our tummies.
Please visit http://www.sensualoccasions.co.uk/ for more information.
KSUG
ScalaJS: Yet another what… ?
It’s tempting to write your whole web application in one and only programming language, especially when this is yours language-of-choice. That’s the reason why Node.js got so much traction in the last years - JavaScript is the part of the web stack which will stay there, whether we like it or not. In the world of languages compiled/transpiled to it, there is ScalaJS that is trying to keep its head above water and gain some popularity. Let’s take a look and try to evaluate if it’s worth our time to try it.
IBM Impact session Ed addison nuts and bolts wsnick_garrod
Are you interested in troubleshooting issues in your environment? This session will focus on problems seen coming into the CICS Level 2 Support Center. We will go over debugging techniques and solutions to the problems. We will also cover the tools you can utilize to make debugging easier. The focus for this session will be on CICS WebServices and how they could relate to the Mobile environment.
Kim Franca is a professional vocal coach based in Franklin, Tennessee (Greater Nashville Area) offering global vocal coaching, singing lessons, vocal training. Improve your vocal with Kim Franca vocal coach. She is also a Nashville-based singer/songwriter.
2809 Five compelling reasons for creating a CICS Cloudnick_garrod
InterConnect 2015 session 2809 Five compelling reasons for creating a CICS Cloud. So what does creating a CICS ‘Cloud’ really mean? And what exactly are these new CICS Cloud capabilities? How do these new Applications and Platforms artifacts relate to existing CICS technologies such as programs, transactions and regions? Where do these new Policies fit in? And most importantly, why would you do any of this? What value can you expect to derive from creating a CICS Cloud architecture? If you have ever asked yourself any of those questions, this session will give you five compelling answers. If you ever wondered what the CICS Cloud means in the real world, this session if for you.
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Prolifics
In this presentation will talk about how one of the world's leading Financial Institutions, leveraged WebSphere DataPower to provide a set of centralized consumer profile management services. This central service would be leveraged by internal and external applications, and would align with enterprise marketing capabilities. The solution included a complex security model which included the following products: Tivoli Directory Server, Tivoli Access Manager and Tivoli Federated Identity Manager. We will describe how to build complex orchestrations in WebSphere DataPower, and also go through some of the performance tuning options we implemented to achieve a high degree of efficiency.
Presentation in IBM Cloud Meet-up of Toronto
https://www.meetup.com/IBM-Cloud-Toronto/events/253903913/?_xtd=gatlbWFpbF9jbGlja9oAJGU3NmM3ZjdmLWE2NzgtNGVlNC1iNGZiLTBlZGE5ZWM0NDZjOQ
The Cisco Open SDN Controller is a commercial distribution of OpenDaylight that delivers business agility through automation of standards-based network infrastructure.
Built as a highly scalable software-defined networking (SDN) platform, the Open SDN Controller abstracts away the complexity of managing heterogeneous networks to improve service delivery and reduce operating costs.
The controller exposes REST APIs to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure, and JAVA APIs to allow for the creation of new network services.
This session will present the basic constructs of the controller and the capabilities of the REST and JAVA APIs to demonstrate how the Open SDN Controller abstracts away the complexity of managing heterogeneous networks to improve service delivery and reduce operating costs.
Containers as Infrastructure for New Gen AppsKhalid Ahmed
Khalid will share on emerging container technologies and their role in supporting an agile cloud-native application development model. He will discuss the basics of containers compared to traditional virtualization, review use cases, and explore the open-source container management ecosystem.
vCloud Automation Center and Pivotal Cloud Foundry – Better PaaS Solution (VM...VMware Tanzu
David Benedict - Member of Technical Staff, VMware
Cornelia Davis - Platform Engineer, Cloud Foundry, Pivotal
Vipul Shah - Director of Product Management, VMware
vCloud Automation Center provides powerful capabilities for policy-based orchestration of complex infrastructure and application deployments. A Platform as a Service (PaaS) such as Pivotal CF, built on the open-source Cloud Foundry, presents a set of abstractions and capabilities that focus on the application implementation and the run-time services it will leverage.
The value of a PaaS installation is equally driven by the set of application-centric capabilities provided, such as performance monitoring or logging, and by the set of services that can easily be integrated into an application; exposing the offerings in the vCloud Automation Center services catalog for leverage by apps deployed into Pivotal CF allows an enterprise faster time to value. And a vCloud Automation Center user can model system deployments, automating infrastructure provisioning and software deployments; this modeling is equally valuable even when the targets of the orchestrations are the PaaS abstractions of applications and services.
These products are very complementary and we’ll show you how. Understand how the combined vCloud Automation Center / Pivotal CF solutions provide the basis for a comprehensive PaaS solution. See a demo of and roadmap for the integrated solution. Learn how to use vCloud Automation Center to model applications for deployment into Pivotal CF and how to draw vCloud Automation Center services into Pivotal CF.
After a brief overview of both products, we will describe the capabilities and derived value of the joint solution that will have early access availability at the time of the conference.
2844 CICS Policy Based Management – There’s a new sheriff in townnick_garrod
InterConnect 2015 Session 2844 CICS Policy Based Management – There’s a new sheriff in town. “My systems work perfectly, it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be ‘an application issue’ anymore. In CICS TS V5, new policy based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rouge applications can be detected through various task threshold policies such as excessive file or database access, repetitive program links, or abnormal storage requests. And once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely.
“My systems work perfectly—it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be "an application issue" anymore. In CICS TS 5, new policy-based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rogue applications can be detected through various task threshold policies, such as excessive file or database access, repetitive program links, or abnormal storage requests. Once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely.
This is a must-read for all engineers interested in developing a Micro services architecture. Turn your monolithic server into a prolific and multiple instance solution! Includes well-known example such as Netflix. Please contact me for more details.
In this session we will talk about the history of NGINX and NGINX Plus and the role it has played in the development of the internet.
We will discuss some of the most recent changes and additions to the popular software project and touch base on some planned feature enhancements coming in the next months
Similar to Share 2014 Pittsburgh CICS Technical Overview (20)
GSE Nordic 2015 CICS Connectivity in DevOps The business driver behind adopting a DevOps approach to developing software, is the need to deliver applications to the market faster, with lower costs and higher quality. With CICS Transaction Server providing the core services on which many of these applications rely, the importance of being able to connect to CICS and reuse these core services continues to increase. When CICS introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the CICS connectivity story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. In this session, we will explore the different CICS connectivity options, suggest use-cases in which they can be of most value, and most importantly, learn which is the right tool for the job.
GSE Nordic 2015 Liberty, Egality, Fraternity “Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), is the slogan of France, coined around the time of the French Revolution. It also seems a pretty appropriate slogan for the mini revolution that is happening right now with CICS and WebSphere. The Liberty profile is a highly composable and dynamic application server runtime environment that is shipped as a part of both WebSphere and CICS. This session will introduce Liberty in CICS, compare the capability with WebSphere (note the ‘equality’ word) and discuss how these new Liberty applications can interact with and support the established fraternity of existing CICS applications that run your core business.
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
GSE Nordic 2015 1 Billion Smartphones a year and counting – How is your CICS connected? According to IDC, in 2013 “the worldwide smartphone market reached yet another milestone, having shipped one billion units in a single year for the first time”. This was an increase of almost 40% over 2012. If much of your business runs on CICS, you have probably already exposed at least some your CICS applications to the mobile world. But are you exposing these services in the optimal way for your company? Come to this session to discover what the supported options are for mobile exploitation in CICS Transaction Server, CICS Transaction Gateway and z/OS Connect. This session will compare and contrast the options available, so you can understand what is right for you. It will also discuss how you can use IBM MobileFirst with CICS TS to optimize your mobile deployments. Make sure your phone is on silent – you won’t want to be disturbed in this session.
S107 5 compelling reasons for using cics in the cloudnick_garrod
GSE Nordic 2015 5 Compelling reasons for using CICS in the cloud. So what does creating a CICS ‘Cloud’ really mean? And what exactly are these new CICS Cloud capabilities? How do these new Applications and Platforms artifacts relate to existing CICS technologies such as programs, transactions and regions? Where do these new Policies fit in? And most importantly, why would you do any of this? What value can you expect to derive from creating a CICS Cloud architecture? If you have ever asked yourself any of those questions, this session will give you five compelling answers. If you ever wondered what the CICS Cloud means in the real world, this session if for you.
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
GSE Nordic 2015 Using IBM UrbanCode Deploy to deliver your apps to CICS. Deploying applications to CICS can be tricky, and you may be struggling to figure out how to handle the many new zFS artifacts such as cloud, bundles, Java, and web services. This could even be slowing down the adoption of new technologies that could deliver the solutions your business needs. This session will introduce IBM UrbanCode Deploy as a tool to automate many types of application deployments through your environments. It can provide rapid feedback and continuous delivery in agile development while providing the audit trails, versioning and approvals needed in production. See the new z/OS and CICS TS plug-ins for UrbanCode Deploy in action to deploy COBOL, web services, and Java applications to CICS in a single action.
GSE Nordic 2015 CICS Performance and Consolidation The CICS TS V5 releases introduce a number of runtime enhancements to reduce CPU usage, improve response times, reduce resource usage, while providing additional insight into transaction performance. Come along to this session as we explore some of the newer performance benefits found in CICS TS and how savings can translate to your environment. We will also look at a lab benchmark that consolidated CICS regions, maintaining throughput, saving significant MIPS, and reducing the management overhead.
GSE Nordic 2015 Twist and cloud – How customers make CICS dance. Putting CICS into the cloud, is someone actually doing this? Since 2012 CICS TS Version 5 has been introducing and continuously enhancing its capabilities to support a Platform As A Service approach. Join speakers from CICS Technical Sales to hear about their experiences and how their customers gained value from cloud capabilities in CICS.
GSE Nordic 2015 CICS Cloud and DevOps agility2 Creating a CICS cloud can provide a step change in agility. Add DevOps to the equation and it’s more like a quantum leap. Imagine if the latest CICS DevOps technology could fully automate the reliable and repeatable deployment of CICS applications through the entire lifecycle. Imagine a fully automated build environment for any style of CICS application. With common scripting languages and tools to create a continuous deployment model. Or imagine using a tool like IBM UrbanCode Deploy to provision any type of CICS application, in coordination with other application and database components in a single action. Better still, don’t try and imagine it. Attend this session and see it for yourself.
S102 cics the future is closer abridgednick_garrod
GSE Nordic 2015 - Future of CICS is closer than you think. There is a lot going on behind that mysterious curtain. Recently, the CICS development organization has adopted a new practice called ‘IBM Design Thinking’, which will forever change the way CICS products are developed. The core principle of this approach is to make sure we get as much feedback as possible on our future ideas. This is a quite unique opportunity to participate in a discussion regarding the future of IBM CICS technology. We will be sharing our views. And we will be hoping for lots for interactive feedback. Please don’t be shy!
GSE Nordic 2015 Conferece - CICS Opening. CICS TS V5.1 became available at the end of 2012, followed by CICS TS V5.2 in mid 2014. So what does that mean for you? Perhaps you can reduce operational complexity by hosting modern application interface logic inside the Liberty profile server within CICS? Perhaps you can use the new CICS Cloud capabilities to improve application reliability and accelerate deployments? Maybe you can improve your integration with Mobile devices? Or better control your costs though policies and consolidation? Nick and Ian open the CICS track to help you find out how CICS is reinventing mainframe application serving one again. Discover which sessions you should attend to get the most value from your attendance.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. 3
Please Note
IBM’s statements regarding its plans, directions, and intent are subject to change or
withdrawal without notice at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general product
direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a commitment, promise,
or legal obligation to deliver any material, code or functionality. Information about potential
future products may not be incorporated into any contract. The development, release, and
timing of any future features or functionality described for our products remains at our sole
discretion.
Performance is based on measurements and projections using standard IBM benchmarks in
a controlled environment. The actual throughput or performance that any user will
experience will vary depending upon many factors, including considerations such as the
amount of multiprogramming in the user’s job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an
individual user will achieve results similar to those stated here.
3. 4
Session Agenda
• CICS TS 51 Review
• CICS TS 52 Overview
– Service Agility
– Operational Efficiency
– Cloud
– Explorer
• Statements of Direction
• Summary
4. 5
CICS TS V5 Vision
Runtime support for
production ready
web applications.
Integration with
mobile applications.
Service
Agility
Increased system capacity
and capability to achieve
more with less.
Automatic control of critical
resources using policies.
Operational
Efficiency
Simplified system
management and rapid
application deployment.
On premise pattern based
cloud deployment.
Cloud
Enablement
5. 7
CICS TS 51 Review
Operational Efficiency
• Greater capacity - achieve cost savings through consolidation
• Managed operations - control critical resource thresholds with policies
• Increased availability - reduce the need for planned downtime
• Deeper insight - extend performance and compliance information
Service Agility
• First-class applications - create agile services from existing assets
• First-class platforms - create agile service delivery platforms
• Modern interfaces - build rich web experiences for critical applications
• Foundational enhancements - extend core capabilities
125+
requirements
satisfied!
6. 8
CICS TS 51 Review
• CICS supports "one-to-many" event emission
• Greater-than-32KB across MQ (DPL) bridge
• Enhancements to IPIC add IMS support
• Reduced application storage needs with GET
and PUT container
• Backup and restore entire CICSPlex System
Manager (CICSPlex SM) systems
• Automatic adjustment of the CICS clock for
daylight saving time changes
• CICS supports "one-to-many" event emission
• Greater-than-32KB across MQ (DPL) bridge
• Enhancements to IPIC add IMS support
• Reduced application storage needs with GET
and PUT container
• Backup and restore entire CICSPlex System
Manager (CICSPlex SM) systems
• Automatic adjustment of the CICS clock for
daylight saving time changes
• A production-ready web container
• Deploy lightweight Java servlets and JSPs
• Local access to CICS applications and data
• Roll-out of interface updates through OSGi
• Integration with applications & platforms
• Built on WebSphere Application Server
Liberty profile for compatibilit
• CICS TS Feature Pack for Mobile
• A production-ready web container
• Deploy lightweight Java servlets and JSPs
• Local access to CICS applications and data
• Roll-out of interface updates through OSGi
• Integration with applications & platforms
• Built on WebSphere Application Server
Liberty profile for compatibilit
• CICS TS Feature Pack for Mobile
• Group new and existing regions as platforms
• Decoupling applications from the region
topology.
• automatic resource deployment and validation
• De-provision resources when requested
• Deploy applications to regions within a
platform
• Dynamically manage platforms with policies
• Group new and existing regions as platforms
• Decoupling applications from the region
topology.
• automatic resource deployment and validation
• De-provision resources when requested
• Deploy applications to regions within a
platform
• Dynamically manage platforms with policies
Modern InterfacesModern Interfaces Foundational EnhancementsFoundational Enhancements
First-class PlatformsFirst-class Platforms
• Manage disparate resources as a single
entity
• Rapidly move through the application
lifecycle
• Automate dependency management
• Ensure rigorous yet flexible provisioning
• Measure entire application resource usage
• Dynamically manage applications with
policies
• Manage disparate resources as a single
entity
• Rapidly move through the application
lifecycle
• Automate dependency management
• Ensure rigorous yet flexible provisioning
• Measure entire application resource usage
• Dynamically manage applications with
policies
First-class ApplicationsFirst-class Applications
7. 9
CICS TS 51 Review…
• Auditing of SPI commands that alter the
system
• Improved auditing of user IDs that make
requests over IP
• Extended identity propagation to include
started tasks
• Cipher suites used for SSL connections to be
stored in the performance records
• Calculate the actual and potential use
of specialty processors
• Regular status updates provided while lost
locks recovery is taking place
• Auditing of SPI commands that alter the
system
• Improved auditing of user IDs that make
requests over IP
• Extended identity propagation to include
started tasks
• Cipher suites used for SSL connections to be
stored in the performance records
• Calculate the actual and potential use
of specialty processors
• Regular status updates provided while lost
locks recovery is taking place
• Upgrade CICS versions and releases without
requiring a z/OS restart
• Modern batch feature pack
• Refresh Secure Sockets Layer (SSL) certificates
• Keep IPIC connections up and running
• Support more IBM GDPS/AA solutions
• Dynamically specify cross-system coupling
facility groups
• Better reflect current best practices with
updated and simplified defaults
• Upgrade CICS versions and releases without
requiring a z/OS restart
• Modern batch feature pack
• Refresh Secure Sockets Layer (SSL) certificates
• Keep IPIC connections up and running
• Support more IBM GDPS/AA solutions
• Dynamically specify cross-system coupling
facility groups
• Better reflect current best practices with
updated and simplified defaults
• Automated control over critical system
resources
• Set data access thresholds on SQL or file
access
• Set program loop thresholds on EXEC LINK
• Set storage request thresholds
• Set CPU time thresholds
• Policies can issue messages, abending
tasks, or create events
• Automated control over critical system
resources
• Set data access thresholds on SQL or file
access
• Set program loop thresholds on EXEC LINK
• Set storage request thresholds
• Set CPU time thresholds
• Policies can issue messages, abending
tasks, or create events
• Doubling the MAXTASK limit to 2,000
• Increased 64-bit and reduced 24-bit storage
usage
• Greater parallelism from threadsafe API and
SPI
• Greater system parallelism through optimized
TCB usage
• Performance improvements from 64-bit Java 7
• Greater access to 64-bit storage from
Assembler programs
• Doubling the MAXTASK limit to 2,000
• Increased 64-bit and reduced 24-bit storage
usage
• Greater parallelism from threadsafe API and
SPI
• Greater system parallelism through optimized
TCB usage
• Performance improvements from 64-bit Java 7
• Greater access to 64-bit storage from
Assembler programs
Greater CapacityGreater Capacity
Increased AvailabilityIncreased Availability
24x7
Deeper InsightDeeper Insight
10011010
Managed OperationsManaged Operations
24x
7
24x
7
11011010
8. 11
The Evolution Continues…
• CICS Transaction Server V5.2
• CICS Transaction Server V5.2 Value Unit Edition
• CICS Transaction Server V5.2 Developer Trial
• CICS Tools V5.2
• CICS Transaction Gateway V9.1
10. 15
CICS TS 52 Service Agility
• CICS and Mobile
– Provides support for RESTful web service requests
• JSON in the http body
– New JSON assistant programs
• Generate a JSON schema and WSBIND file from a
copy book
– COBOL, PLI, C and C++
• Create a language structure and WSBIND file from
a JSON schema
– New linkable interface
• Equivalent to EXEC CICS XMLTRANSFORM
– Allows application programs to process JSON data
– Provides support for JAX-RS and JSON Liberty
features
11. 17
CICS TS 52 Service Agility…
• Mobile Feature Pack integrated into base CICS
CICS JSON
Assistant
12. 19
CICS TS 52 Service Agility…
• Web Service Enhancements
– Simple Occurs Depending On and Occurs Indexed By
clauses supported in native web services
• Native web support
• JSON
• Axis2
– AMODE 64 exploitation by native SOAP parser
• Parser output stays in 64 bit storage
• SOAP message built in 64 bit storage
• Code page conversions use 64 bit storage
• Benefit is 31 bit Virtual Storage Constraint Relief
– Less TCB switching for DYNAMIC(NO) transactions
13. 21
CICS TS 52 Service Agility…
• CICS Transaction Gateway 9.1 *
– Planned availability September 2014
– Support for Mobile Applications
• JSON web services
– Security Enhancements
• NIST SP800-131A support
• SSL for .NET clients
– IPIC Connections
• Start and Stop connections without restarting the
gateway
• Heartbeat mechanism
– Ability to “virtualize” CICS back-end enabling isolated,
automated regression testing
* Separate Product
14. 23
CICS TS 52 Service Agility…
• Liberty
– Initially introduced in CICS 51
– Light weight web container
• Provides Servlets and JSPs support for CICS
• Runs in a JVMServer
• Access to CICS functionality through the JCICS
API
CICS TS V5.1
JVM Server
Web
Container
Web
Container
Servlet/JS
P
Servlet/JS
P
COBOL
Application
COBOL
Application
Business DataBusiness Data
15. 25
CICS TS 52 Service Agility…
• Liberty in CICS 52
– Core features
• Java Transaction API (JTA 1.0)
• Access to local DB2 resources (JDBC 1.0)
• CICS Liberty Security
– Liberty Features
• Access to remote DB2 resources with T4 driver
(JDBC 1.0)
• Java API for RESTful Services (JAX-RS 1.1)
• Java Script Object Notation (JSON 1.0)
• Java API for XML Web Services (JAX-WS 2.2)
• Java Architecture for XML Binding (JAXB 2.2)
16. 27
CICS TS 52 Service Agility…
• Java Transaction API
CICS TS 5.2
Transaction
Manager
Application
CICS
XAResource
Type 4 DB
Liberty Profile
OT Domain
RM Domain
JTA provides coordination of updates
across CICS and a remote DB
17. 29
CICS TS 52 Service Agility…
• IPIC High Availability
– Allows CICS to connect to a cluster entry point
• Allows CICS to know the actual endpoint for
recovery
– New TCPIPSERVICE attribute SPECIFTCPS
LPAR 3
CICS A
LPAR 2
LPAR 1
CICS 12
CICS 11
Common
DVIPA
DVIPA
AIVIPA 9
CICS 10
CICS 9
CICS 8
CICS 13
CICS 14
CICS 13
CICS 14
DVIPA identifies the Generic Entry Point to the
cluster, and resides on the Distributor Stack.
AIVIPA identifies the Specific Entry Point of a
HA Region, and moves with that region within
the Sysplex. If no need to move regions
between LPARs then VIPAs can be used.
Sysplex A
DVIPA – Dynamic Virtual IP Address
AIVIPA – Application Instance VIPA
19. 33
CICS TS 52 Operational Efficiency
• Policy Based Management
– Resource threshold and action
– Action can be:
• Emit a message
• Emit a system event
• Abend the task
Define a PolicyDefine a Policy
Threshold
breach
Threshold
breach
CICS Triggers an actionCICS Triggers an action
Abend EventMessage
Trigger an actionTrigger an action
SQLSQL
FilesFiles
StorageStorage
CPUCPU An XML Policy document defines the
threshold and action
20. 35
CICS TS 52 Operational Efficiency…
• New thresholds in CICS 52
– Temporary Storage
• Number of requests or amount of data written
– Transient Data
• Number of requests
– Elapsed Time
• Check is made at dispatch
• Action triggered at next API call
– STARTs
• Number of requests
– Syncpoints
• Number of requests
– Program Link
• INVOKE APPLICATION is now included
21. 37
CICS TS 52 Operational Efficiency…
• Support for TLS 1.2 protocol and FIPS 140.2
Cryptographic Standards
– FIPS 140.2 mandated by NIST SP800-131A directive
• Cipher suites can now be defined in XML in a zFS
file
• Greater flexibility and ease of definition
• APAR PM97207 available for TS 5.1
• System Initialization parameters
– ENCRYPTION={ALL|TLS12|STRONG|}
– USSCONFIG={/var/cicsts/dfhconfig|directory}
• Cipher XML files in USSCONFIG/security/ciphers
22. 39
CICS TS 52 Operational Efficiency…
• Extend NIST SP800-131A checking beyond sockets
domain
– New System Initialisation parameter
• NISTSP800131A={NOCHECK|CHECK}
• CHECK means CICS is required to check for
compliance with the NIST SP800-131A security
standard
• Checked by Sockets (SO), Java (SJ) and Pipeline
(PI) domains
23. 41
CICS TS 52 Operational Efficiency…
• Security Assertion Markup Language (SAML)
• OASIS open standard
• “XML based framework for
describing and exchanging security
information between on-line
business partners.”
• Web Single Sign-On
• Dynamic creation of Identity
Federations (SSO across domains)
25. 45
CICS TS 52 Operational Efficiency…
• SAML Feature Pack integrated into CICS 52
– Linkable interface program DFHSAML
– Channel and containers to provide input and output
– DFHSAML links to Secure Token Service (STS),
running inside a dedicated JVM server (preferably in a
dedicated CICS region)
– STS parses and validates SAML token
• Most of STS function is zIIP off loadable
26. 47
CICS TS 52 Operational Efficiency…
• Outbound SOAP support for reusing inbound SAML
Tokens
– Previously validated tokens only
– Requester pipeline retrieves token from DFHSAML-
OUTTOKEN container and puts in in WSSE security
header of the SOAP request
– Input SAML token is passed on unchanged
– Configuration sample samlrequester.xml provided
• Using the DFHTRANSACTION channel
– No application changes are necessary
27. 49
CICS TS 52 Operational Efficiency…
• Transaction Channel & Containers
– Created for use by SAML, but can be used
independently
– No changes to EXEC CICS API
• A PUT CONTAINER can create the Transaction
Channel
– CHANNEL(“DFHTRANSACTION”)
• If the Transaction Channel does not exist, a GET
CONTAINER command will return CHANNELERR
– New JCICS method in Task class
Task t = Task.getTask();
Channel tranChan = t.getTransactionChannel();
28. 51
CICS TS 52 Operational Efficiency…
• Kerberos Support
– Support for inbound tokens from Kerberos systems
– RACF definitions can map the Kerberos principal to a RACF
userid
– Web services can be configured to handle Kerberos tokens as the security
token
• Alternatively, the userid extracted from the Kerberos token can be used
to run the request
– CICS API enhancement to validate a Kerberos token/extract the RACF
userid
EXEC CICS VERIFY
TOKEN() TOKENLEN() TOKENTYPE(KERBEROS)
<ISUSERID()>
<ESM_RESPONSE()> <ESM_REASON()>
29. 53
CICS TS 52 Operational Efficiency…
• Threadsafe Commands
– EXTRACT, INQUIRE, SET STATISTICS
– INQUIRE, SET MONITOR
– INQUIRE, SET DISPATCHER
– INQUIRE, SET SYSTEM
– INQUIRE MVSTCB
– INQUIRE, SET, DISCARD PROGRAM
– INQUIRE, SET, DISCARD TRANSACTION
– INVOKE APPLICATION
30. 55
CICS TS 52 Operational Efficiency…
• Dispatcher Statistics
– New fields to understand the TCB pool performance
• Last Excess TCB Scan
– Date/time of the last CICS dispatcher excess MVS TCB scan
that did not detach any TCBs
• Last Excess TCB Scan–No TCB Detached
– Date/time of the last CICS dispatcher excess MVS TCB scan
• Pool Limit reached
– Time when pool limit reached
• Dispatchable Queue (only applicable to the single TCB non-
Open TCB modes):
– Current number of dispatchable tasks queued for the TCB
– Peak number of dispatchable tasks that have queued for the
TCB
– Average number of dispatchable tasks have queued for the
TCB
31. 57
CICS TS 52 Operational Efficiency…
• Transaction Statistics
– New fields to understand the TCB pool performance
• Time MAXTASKS last changed
• Time last transaction was attached
• Time MAXTASK was last reached
• Currently at MAXTASK indicator
• New Monitoring Domain statistics fields
• Number of user transactions ended in interval
• Number of system transactions ended in interval
• Time last transaction attached
• Time last transaction ended
• MAXTASK at last transaction attached
• Current user tasks at last transaction attached
• Average user response time
• Peak user response time
• Time of peak user response time
32. 59
CICS TS 52 Operational Efficiency…
• Private resource statistics
– New records to support multi-versioning for private
resources
• Library record
• JVM Programs
• Programs
• Program definitions
– New fields for Platform, Application and Version
– Reports via DFHSTUP
33. 61
CICS TS 52 Operational Efficiency…
• CICS Performance Analyzer 52*
* Separate Product
• IBM CICS Transaction Server V5.2 support
• Performance summary reports for platforms
and applications
• Multi-version analysis of applications
• Reporting, visualization, statistics alerts and
analysis enhancements
• Transaction Performance Alert plug-in view
• Visualization of the performance of individual
transactions
• IBM CICS Transaction Server V5.2 support
• Performance summary reports for platforms
and applications
• Multi-version analysis of applications
• Reporting, visualization, statistics alerts and
analysis enhancements
• Transaction Performance Alert plug-in view
• Visualization of the performance of individual
transactions
What’s new in CICS PA V5.2?What’s new in CICS PA V5.2?
• Comprehensive Performance Reporting and
Analysis for CICS including DB2, WebSphere MQ,
and MVS System Logger
• Understand trends and develop capacity plans
• View statistics and create statistical alerts
• Comprehensive Performance Reporting and
Analysis for CICS including DB2, WebSphere MQ,
and MVS System Logger
• Understand trends and develop capacity plans
• View statistics and create statistical alerts
CICS PA enables you to…CICS PA enables you to…
37. 67
CICS TS 52 Cloud
Platform
Region Type
Region Type
Region Type
Platform Lifecycle
Top down Platform definition now available
38. 69
CICS TS 52 Cloud…
• CICS Deployment Assistant for z/OS V5.2*
• Support for IBM CICS Transaction Server
V5.2
• New RESTful API to access model
• Cloning of unmanaged and cross-logical
partition (LPAR) regions
• New Comparison view
• New TCP/IP usage report.
• Support for IBM CICS Transaction Server
V5.2
• New RESTful API to access model
• Cloning of unmanaged and cross-logical
partition (LPAR) regions
• New Comparison view
• New TCP/IP usage report.
What’s new in CICS DA V5.2?What’s new in CICS DA V5.2?
• Visualize and manage your CICS topology
• Discover existing regions and sub-systems
• Automation creates new CICSplex
• Plexify and clone CICS regions
• Start and stop a CICS region
• Share model with other applications
• Visualize and manage your CICS topology
• Discover existing regions and sub-systems
• Automation creates new CICSplex
• Plexify and clone CICS regions
• Start and stop a CICS region
• Share model with other applications
CICS DA enables you to…CICS DA enables you to…
* Separate Product
40. 73
CICS TS 52 Cloud…
• Application Multi-versioning
CICS TS
Transition to newer (or older) version
Version
1.0.0
Version
1.0.1
Version
1.2.0
Version
2.0.0
Install, enable,
make available
make
unavailable
Rolling back to an
older version of an
application is a
simple operation -
mark the version
as ‘unavailable”
Versioning provides
support for the
“major.minor.micro”
system
41. 75
CICS TS 52 Cloud…
• Application Multi-versioning
CICS TS
XX
YY
Private programs
Customer App
Private programs
Payroll AppURIMAP
PROG1
LIBRARY
URIMAP
PROG1
LIBRARY
Resources private
to an application
PROGRAM
LIBRARY
42. 77
CICS TS 52 Cloud…
• CICS Interdependency Analyzer*
• Support for CICS® Transaction Server V5.2
• Enhanced cloud application analysis
• New resource use and dependencies by
platform
• New visualization of TCB, region, and
application switches
• New plug-in view for Program Details
• New affinity analysis in the plug-in
• New Dependency collection sampling
technique
• Deeper thread-safe analysis
• Support for CICS® Transaction Server V5.2
• Enhanced cloud application analysis
• New resource use and dependencies by
platform
• New visualization of TCB, region, and
application switches
• New plug-in view for Program Details
• New affinity analysis in the plug-in
• New Dependency collection sampling
technique
• Deeper thread-safe analysis
What’s new in CICS IA V5.2?What’s new in CICS IA V5.2?
• Visualize application flow and structure
• Identify mobile and web service candidates
• Identify threadsafe / non-threadsafe programs
• Isolate and remove affinities
• Speed CICSPlex® SM workload management
• Advanced CICS command flow analysis
• Visualize application flow and structure
• Identify mobile and web service candidates
• Identify threadsafe / non-threadsafe programs
• Isolate and remove affinities
• Speed CICSPlex® SM workload management
• Advanced CICS command flow analysis
CICS IA enables you to…CICS IA enables you to…
* Separate Product
43. 79
CICS TS 52 Cloud…
• CICS Configuration Manager*
* Separate Product
• Plug-in support for migration schemes
• New deployment analysis from plug-in
• New support for IBM CICSPlex SM topology
and workload management definitions
• New support for NIST SP800-131A security
standard
• New migration of TCPIPSERVICE and
IPCONN definitions for high availability
connections
• Plug-in support for migration schemes
• New deployment analysis from plug-in
• New support for IBM CICSPlex SM topology
and workload management definitions
• New support for NIST SP800-131A security
standard
• New migration of TCPIPSERVICE and
IPCONN definitions for high availability
connections
What’s new in CICS CM V5.2?What’s new in CICS CM V5.2?
• Manage changes throughout the life-cycle
• Create reports to identify redundant definitions,
show resource relationships, and change
management history
• Manage audit, back-out and change authorizations
• Manage changes throughout the life-cycle
• Create reports to identify redundant definitions,
show resource relationships, and change
management history
• Manage audit, back-out and change authorizations
CICS CM enables you to…CICS CM enables you to…
44. 81
CICS TS 52 Explorer
• Support for new Bundle and Policy definitions
• Purge action for shared TS Queues
• Mixed case credentials
• System group editor
• New views
– Dumps
– Task related user exits
– Repository view
– Active workloads
45. 83
CICS TS 52 Explorer…
• Workload specification editor
– Creates default routing rules
– Add and rename additional routing rules
– Can import an existing rule
83 IBM Confidential83 IBM Confidential
46. 85
CICS TS 52 Documentation
• IBM Knowledge Center
– All IBM product documentation from one URL
– Replacing online Information Centers for all supported
versions of CICS from March 2014
• Downloadable ICs will still be available
http://www.ibm.com/support/knowledgecenter/
48. 89
Statements of Direction
• IBM intends to deliver IBM WebSphere Liberty z/OS Connect (z/OS
Connect) as a common program component of WebSphere Application
Server for z/OS, IMS Enterprise Suite for z/OS, CICS Transaction
Server for z/OS, and CICS Transaction Gateway.
z/OS Connect is intended to provide a simplified, secure, and scalable
gateway functionality to route web, cloud, and mobile application traffic
that accesses applications provided by the aforementioned z/OS
products, as well as z/OS Batch and z/OS UNIX™ System Services
applications.
z/OS Connect intends to offer: (i) a fast on-ramp interface to z/OS
applications by providing a common access mechanism based on
RESTful services; (ii) tooling to allow a cloud or mobile developer to
define secure enterprise connectivity without the need for extensive
code development or knowledge of System z.
49. 90
IBM CICS Transaction Server V5
the premier enterprise grade mixed language application server
Runtime support for
production ready web
applications.
Integration with mobile
applications.
Service
Agility
Increased system capacity and
capability to achieve more with
less.
Automatic control of critical
resources using policies.
Operational
Efficiency
Simplified system management
and rapid application deployment.
On premise pattern based cloud
deployment.
Cloud
Enablement