CICS Transactions Measurement with no Pain
|
|
|
- Dorthy Burke
- 10 years ago
- Views:
Transcription
1 CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS transactions reported on SMF type 110 Performance records throughout the use of z/os Dynamic Exits facility to buffer the collected data in memory. The data is downloaded on real-time basis to SQL databases on open platforms via TCP/IP protocol. This innovative approach totally eliminates the need for DASD space and its associated I/O demands on the mainframe. Introduction CICS is by far the most commonly used IBM transaction monitor often supporting the execution of thousands of transactions per second and is present in virtually all large IT shops and data centers worldwide. In many online environments, CICS regions consume more CPU resources than any other component on the system however it lacks sufficient measurement facilities to address the following critical issues adequately: Average transaction response time; Resource usage; and Chargeback. The following charts show examples of the typical behavior of seven different applications (transactions) during a 4- month period. Figure 1 presents the number of transactions by month, and figure 2 presents average transaction response times. Figure 1 Transactions per month
2 Figure 2 Response times Indeed, CICS measures the execution of each transaction execution in great detail; however, it does not consolidate or report the information so IT managers end up requiring additional software to measure and analyze such transactions. Figure 3 shows a list of commonly used CICS monitoring and reporting software: Figure 3 CICS measuring products Product CICS Performance Analyzer (CICS PA) Tivoli Decision Support for z/os MXG Software SAS IT Resource Manager CA JARS Resource Accounting CA MICS Resource Management Vendor IBM IBM Merrill Consultants SAS Institute Computer Associates Computer Associates Unfortunately, all these products have the same problem: they require a lot of mainframe disk space and also use a considerable amount of I/O channel bandwidth for data movements in order to perform the measurements and consolidate the information. The reason for the high volume of disk required is that CICS reports the details of each transaction execution such as date and time, issuer and CPU time usage, via the SMF type 110 records. Depending on the volume of transactions, this log can require an enormous amount of space just for the SMF raw records. In addition, consolidation of the information often demands a similar amount of DASD resources. It is not surprising then that in the largest shops, these data requirements have become a storage management nightmare, requiring such a long time to process on daily basis that most IT managers prefer not to process this kind of information. This paper proposes an alternative method to store and process this information out of the mainframe environment. In this approach, the records are intercepted before they are written to disk (while they are still in memory), then sent directly to a database on a less expensive platform.
3 Proposed Model The following sections describe the process used to intercept the SMF records as they are created, through the implementation of SMF exits. The SMF exit copies the contents of the records to another address space in order to process them in parallel, so there is no additional burden on the CICS regions due to I/O delays or any additional CPU consumption involved for the record processing. The exit also tells to SMF to discard the record. The following diagram illustrates this process: Figure 4 Proposed model diagram CICS SMFEWTM SMF exit copy circular buffer process Record Processor A.S. TCP/IP Data Loader insert DB The record processor address space accepts the intercepted records and sends them to another process on the remote machine where they are inserted directly into the database. CICS Monitoring Facility (CMF) CICS uses the SMF infrastructure to record all the transactions through the CICS Monitoring Facility (CMF) which create SMF type 110 Performance class records with the details of many transactions. The MCT (Monitoring Control Table) can be used to select the fields that will be recorded. There are more than 200 fields which can be select for logging. Figure 5 shows some examples: Figure 5 Monitoring field descriptions ID Mnemonic Description ID Mnemonic Description 1 TRAN Transaction code 71 PGMNAME Program name 5 START Transaction start time 89 USERID User name 6 STOP Transaction end time 167 SRVCLAS WLM service class 2 TERM Terminal identification 7 USRDISPT Elapsed time on CICS The performance class record is a multiple-transaction record; in other words, it holds as many transactions as possible provided the record does not exceed the 32 KB length limit. The CMF buffers the transaction counters in memory until an entire record is complete, then invokes the SMFEWTM macro to write the record. Selecting a few fields on the MCT to reduce the volume of information saved on SMF can be a good practice. The default CICS configuration logs 2672 bytes of data per transaction, resulting in 12 transactions per SMF record. Selecting a smaller set of fields provides the ability to log more than 200 transactions on a single record quite easily. The monitoring can be activated dynamically through the following transaction: CEMT SET MONITOR ON PERF. SMF data collection The System Management Facilities (SMF) is a z/os component responsible for centralizing the records from various system components in a complex infrastructure where each component generates pre-formatted records. SMF then time-stamps the records and buffers them in memory. The records are written to VSAM datasets known as SYS.MANx files. When these files become full, they are copied (dumped) to sequential datasets which can be retained for many years.
4 Figure 6 illustrates a typical SMF processing flow: Figure 6 SMF data flow JES2 RACF CICS DB2 others events SMF I/O SYS.MAN1 SYS.MANn SMF Dump SMF I/O I/O I/O I/O... datasets SMF Extractor (IFASMFDP) Data The logging components format a record according to its type and pass the record the SMF via the SMFEWTM macro; The SMF exits (IEFU8x) timestamp the records and write them to the SMF buffer in memory; The records are written to the VSAM datasets (SYS.MANx); When the SYS.MANx dataset is full, SMF switches to a new SYS1.MANx dataset and sends a console message to inform the operator that the file can be copied; The SMF Dump utility (program IFASMFDP) copies the VSAM dataset records to a sequential file (SMF dump files), in VBS (variable blocked spanned) format and empties the VSAM dataset for reuse; The SMF dump files are normally kept for very long periods of time. The SMF records are the raw measurement and recording source for many software products and in-house applications and such records are usually read many times and retained for many years. Some IT shops consolidate the SMF records on daily and monthly basis, merging all records of a certain period and LPARS on the same dataset to facilitate further data handling. Dynamic Exits and SMF The Dynamic Exits Facility is another MVS component responsible for managing the connection of installation exit programs to their exit entry points dynamically and in a uniform way. The Dynamic Exits perform the following functions: Dynamic adding and removing of exit modules; Managing the chain of exit modules for each exit; Deactivating the exit module when it abends. The exit module can be dynamically activated and deactivated through the SETPROG EXIT console command or programmatically using the CSVDYNEX macro. SMF has three exits which are called every time the SMF writes a record: IEFU83, IEFU84 and IEFU85. These exits receive the entire SMF record and have the ability to alter its contents or even discard the record: Figure 7 SMF Records Exits Exit name Calling macro Entry method IEFU83 SMFWTM Issue an SVC IEFU84 SMFEWTM Branch mode from primary address space IEFU85 SMFEWTM Branch mode from cross-memory CMF issues the SMFEWTM macro in primary mode when a full record is complete in its buffer, so in order to intercept the performance records, the necessary code must be included in the IEFU84 exit. Figure 8 describes the available dynamic SMF exits for shops containing different SMF configurations.
5 Figure 8 IEFU84 names Exit name Used for: SYS.IEFU84 Default exit SYSJES2.IEFU84 CICS started as batch with SUBSYS(JES2) on SMFPARMxx SYSSTC.IEFU84 CICS started as started task and SUBSYS(STC) specified on SMFPRMxx Keep in mind that the exit routine code has many restrictions and must be fast enough so as not to impact CICS due to processing delays. Normally, the best practice is to copy the contents of the record and process it in another address space. Perhaps the easiest way to pass the record to another address space is via the buffers on Common Storage Area (CSA) which are common to all address spaces. Thus, a circular buffer in Extended CSA can be used to hold records temporarily until they are ready for processing. The exit module should verify that the record is the performance class record, and if so, copy the contents to the buffer in common storage and suppresses record writing by placing a return code of X 04 in R15. Figure 9 illustrates the portions of the SMF type 110 records used to determine its subtype and class. Figure 9 Monitoring record Field Value SMF Type 110 SMF Subtype 1 Monitoring Monitoring class 3 Performance class Processing the Records The performance records are multi-transaction records in which the field layout depends on the configuration defined on the Monitoring Control Table (MCT). They do not have any field delimiters and depend on the Dictionary record for their mapping. The Dictionary record is also written as an SMF type 110 record. Every time the CICS starts or when the monitoring process is activated, a dictionary record is written. Dictionary records describe the fields present on the record, their type, size and offset. Therefore processing any performance record requires the corresponding dictionary record. The dictionary record is identified by three key information fields: CICS name, CICS version and MCT modification version. Thus, changing the monitored fields in the MCT creates a new dictionary segment. Hopefully, every performance record will contain this key information. The following table describes the dictionary record key information fields: Figure 10 Dictionary record key fields Field Name Description SMF Type SMFMNRTY 110 SMF Subtype SMFMNSTY 1 Monitoring Monitoring Class SMFMNCL 1 Dictionary record CICS name SMFMNPRN Generic CICS APPLID CICS version SMFMNRVN CICS revision number CICS modification SMFMNMFL Version of the MCT layout The process can be simplified by using a common dictionary (MCT definition) for all CICS or alternatively, by saving all dictionary records in a dataset and loading them when processing the performance records.
6 The records can either be processed on the mainframe before sending them to the remote system, or be sent in binary format and then processed remotely. If they are processed remotely, it will be necessary to perform some string conversions from EBCDIC to ASCII and also send the dictionary records. Processing them remotely can save some CPU cycles involved with converting the fields. Data transfer The record processor runs in its own address space and can easily transfer the intercepted records to the remote system. One should be always cautious, however, to maintain enough space in the circular buffer into which the SMF exit writes the intercepted records so as avoid losing records. The main idea is to send the records directly to the remote system without any disk access, such as what usually happens when data is written to disk. The file transfer process must them read the data from disk and send it to the remote file transfer program which writes the data on the remote disk where the data loader program reads the data again: Figure 11 File transfer model Record Processor save read File Transfer File Transfer save read Data Loader insert DB send A much better solution would be a messaging facility such as IBM MQ-Series where the record processor can open a queue and send the data directly to the remote program, even in binary format. Also, protocols, connections and parallel producers and consumers on either side become non-issues.
7 Remote system On the remote system, the data loader program should receive the performance records and insert them into the database. Preparing the records to be inserted in bulk operations will improve performance. Some portability may be lost, but on the other hand, it is possible to load up to 10 thousand records per second. Once the data is stored in the database it can easily be grouped into intervals and saved in historical tables. In our experiments the historical data occupies less than 5% of the original data. The following figure shows an example of transaction summary: Figure 12 CICS transaction summary Conclusion Nowadays, most typical mainframe workloads consist of online CICS transactions running around the clock; however, it is often a daunting and time-consuming task to figure out what is going inside the box. Unfortunately, most of the traditional measuring solutions add even more stress to the existing workload. The new approach summarized in this paper has several advantages; substantially alleviating space and channel bandwidth demands on the DASD infrastructure; loading the transaction logs directly on the database, which is the best place to store such data; and reducing the CPU workload on the mainframe thus releasing resources that may be used to process even more CICS transactions.
8 References 1. MVS System Management Facilities (SMF), IBM Corporation, SA , September CICS TS for z/os 4.1: Performance Guide, IBM Corporation, SC , CICS TS for z/os: CICS Customization Guide, IBM Corporation, SC , April z/os MVS Installation Exits, IBM Corporation, SA , September MVS Programming: Authorized System Services Reference Volume I (ALESERV DYNALLOC), IBM Corporation, SC
z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket
z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket Gary Henderson ASG (Allen Systems Group) 1 March 2011, 9:30 AM-10:30 AM Session Number 8695 Installation and Maintenance Installation and
Computer Associates Unicenter CA-JARS Resource Accounting Software
John Inverso Product Report 1 October 2003 Computer Associates Unicenter CA-JARS Resource Accounting Software Summary CA s Unicenter CA-JARS Resource Accounting suite brings several resource management
CA MICS Resource Management r12.7
PRODUCT SHEET agility made possible CA MICS Resource Management r12.7 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the
z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com
1 z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key Resources, Inc. incorporated in 1988
CA JCLCheck Workload Automation
PRODUCT SHEET CA JCLCheck Workload Automation CA JCLCheck Workload Automation CA JCLCheck Workload Automation (CA JCLCheck WA) validates z/os JCL before it is submitted for execution. CA JCLCheck WA helps
Performance Analytics with TDSz and TCR
Performance Analytics with TDSz and TCR Bradley Snyder IBM March 4, 2015 Session Number Insert Custom Session QR if Desired. Agenda How did this presentation come about? Business and Data Center Analytics
Buffering, Record Level Sharing, and Performance Basics for VSAM Data Sets
Buffering, Record Level Sharing, and Performance Basics for VSAM Data Sets Session 12999 Presented by Michael E. Friske Expectations From This Session You will be given some general rules of thumb for
z/os Curriculum Job Control Language (JCL) Curriculum JES Curriculum WebSphere Curriculum TSO/ISPF for z/os Curriculum
A relação de cursos de mainfame a seguir representa mais de 1.000 horas de treinamento e-learning, fornecendo uma abordagem ampla e atual sobre o assunto. z/os Curriculum z/os 1.13 Series o z/os Concepts
Big Data Storage in the Cloud
Big Data Storage in the Cloud Russell Witt Scott Arnett CA Technologies Tuesday, March 11 Session Number 15288 Tuesday, March 11Tuesday, March 11 Abstract Need to reduce the cost of managing storage while
SupportPac CB12. General Insurance Application (GENAPP) for IBM CICS Transaction Server
SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server ii General Insurance Application
File Manager base component
Providing flexible, easy-to-use application development tools designed to enhance file processing IBM File Manager for z/os, V13.1 Figure 1: File Manager environment Highlights Supports development and
CA TPX Session Management r5.3
PRODUCT SHEET CA TPX Session Management CA TPX Session Management r5.3 CA TPX Session Management (CA TPX) helps you manage user menus for accessing VTAM applications on the mainframe while offering end
CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible
PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler [email protected] 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring
In-memory Tables Technology overview and solutions
In-memory Tables Technology overview and solutions My mainframe is my business. My business relies on MIPS. Verna Bartlett Head of Marketing Gary Weinhold Systems Analyst Agenda Introduction to in-memory
21 Things You Didn t Used to Know About RACF
21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,
SMF Digital Signatures in z/os 2.2. Anthony Sofia ([email protected]) Software Engineer at IBM August 14 th 2015
SMF Digital Signatures in z/os 2.2 Anthony Sofia ([email protected]) Software Engineer at IBM August 14 th 2015 Agenda What is a digital signature? How digital signatures enhance SMF data Configuration
Session 2826 February 2001. Stop those Unnecessary IPLS: The Dynamic OS/390 Functions
Stop those Unnecessary IPLS: The Dynamic OS/390 Functions [email protected] March 6, 2002 Session 2859 1 Trademarks and Copyrights Trademarks and Registered trademarks used in this presentation
Storing Measurement Data
Storing Measurement Data File I/O records or reads data in a file. A typical file I/O operation involves the following process. 1. Create or open a file. Indicate where an existing file resides or where
z/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
Utility Mainframe System Administration Training Curriculum
Utility Mainframe System Administration Training Curriculum MVS SYSTEM ADMINISTRATION MVS SYSTEM ADMINISTRATION- LEVEL 1 TO 1.5 Name of the Module Common for All Administration LSO TSO/ISPF JCL & UTILITIES
CA Log Analyzer for DB2 for z/os
CA Log Analyzer for DB2 for z/os User Guide Version 17.0.00, Third Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as
Predictive Analytics And IT Service Management
IBM Software Group Session 11479 Wednesday, August 8 th 1:30 2:30 PM Predictive Analytics And IT Service Management Ed Woods Consulting IT Specialist IBM Corporation Agenda What is Predictive Analytics?
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring
CA Insight Database Performance Monitor for DB2 for z/os
PRODUCT SHEET CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os (CA Insight DPM)
RACF PERFORMANCE TUNING
SHARE - August 2010 Robert S. Hansel Lead RACF Specialist - RSH Consulting, Inc. [email protected] - 617-969-9050 - www.rshconsulting.com 1 RSH PRESENTER Robert S. Hansel is Lead RACF Specialist
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access
CA MICS Resource Management r12.6
PRODUCT SHEET CA MICS Resource Management CA MICS Resource Management r12.6 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information
z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products
Tivoli Software z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products Laura Knapp [email protected] August 2006 2006 IBM Corporation Agenda Opportunity New work loads
The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005
IBM eserver The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005 Wai Choi IBM Corporation RACF Development Poughkeepsie, NY Phone: (845) 435-7623 e-mail: [email protected]
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Welcome to today's webinar: How to Transform RMF & SMF into Availability Intelligence
Welcome to today's webinar: How to Transform RMF & SMF into Availability Intelligence The presentation will begin shortly Session Abstract: How to Transform RMF & SMF into Availability Intelligence It
Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect [email protected]
Data Masking Secure Sensitive Data Improve Application Quality Becky Albin Chief IT Architect [email protected] Data Masking for Adabas The information provided in this PPT is entirely subject
Java on z/os. Agenda. Java runtime environments on z/os. Java SDK 5 and 6. Java System Resource Integration. Java Backend Integration
Martina Schmidt [email protected] Agenda Java runtime environments on z/os Java SDK 5 and 6 Java System Resource Integration Java Backend Integration Java development for z/os 4 1 Java runtime
Writing the Definitive Systems Programmer Resume
Writing the Definitive Systems Programmer Resume Joe Gallaher Systems Programming Consultants, Inc. (SPCI) Monday, March 2, 2015 SHARE Session: 17133 Insert Custom Session QR if Desired. PowerPoint slides:
CICS TS Migration User Experience
CICS TS Migration and Exploitation User Experiences Big M, Inc. Presented by: 12 Vreeland Ave. John Lawson Totowa, NJ 07512 illustro Systems [email protected] Company Background Specialty stores for women
DBAs having to manage DB2 on multiple platforms will find this information essential.
DB2 running on Linux, Unix, and Windows (LUW) continues to grow at a rapid pace. This rapid growth has resulted in a shortage of experienced non-mainframe DB2 DBAs. IT departments today have to deal with
Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices
Version 5.0 MIMIX ha1 and MIMIX ha Lite for IBM i5/os Using MIMIX Published: May 2008 level 5.0.13.00 Copyrights, Trademarks, and Notices Product conventions... 10 Menus and commands... 10 Accessing online
Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer
Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer Version 2.0.0 Notes for Fixpack 1.2.0-TIV-W3_Analyzer-IF0003 Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment
Cloud Infrastructure Management - IBM VMControl
Cloud Infrastructure Management - IBM VMControl IBM Systems Director 6.3 VMControl 2.4 Thierry Huche IBM France - Montpellier [email protected] 2010 IBM Corporation Topics IBM Systems Director /
SQL Replication Guide and Reference
IBM InfoSphere Data Replication Version 10.1.3 SQL Replication Guide and Reference SC19-3638-00 IBM InfoSphere Data Replication Version 10.1.3 SQL Replication Guide and Reference SC19-3638-00 Note Before
How to Secure Mainframe FTP
How to Secure Mainframe FTP Stu Henderson (301) 229-7187 [email protected] Scott Myers (408) 973-8374 [email protected] 1 AGENDA I. Introduction II. III. IV. How Mainframe FTP is Different Mainframe
Sharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference
IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference
Managed File Transfer
Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability
RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012
RACF & Payment Card Industry (PCI) Data Security Standards Robert S. Hansel Lead RACF Consultant [email protected] 617 969 9050 Robert S. Hansel Robert S. Hansel is Lead RACF Specialist and founder
how can I optimize performance of my z/vm and Linux on System z environments?
SOLUTION BRIEF Velocity zvps Performance Suite how can I optimize performance of my z/vm and Linux on System z environments? agility made possible Measure, monitor and control the performance of your z/vm,
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?
H211L Bulk File Transfer (BFX)
H211L Bulk File Transfer (BFX) for IBM z/os Operating Systems Limited Edition Release 1.6 Memo to Users May 2014 2002-2014 Network Executive Software, Inc. 6420 Sycamore Lane N #300 Maple Grove, MN 55369
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
BROCADE PERFORMANCE MANAGEMENT SOLUTIONS
Data Sheet BROCADE PERFORMANCE MANAGEMENT SOLUTIONS SOLUTIONS Managing and Optimizing the Performance of Mainframe Storage Environments HIGHLIGHTs Manage and optimize mainframe storage performance, while
Improve your IT Analytics Capabilities through Mainframe Consolidation and Simplification
Improve your IT Analytics Capabilities through Mainframe Consolidation and Simplification Ros Schulman Hitachi Data Systems John Harker Hitachi Data Systems Insert Custom Session QR if Desired. Improve
LES LOGICIELS MAINFRAME
LES LOGICIELS MAINFRAME PrintSubSystem AFP printing on network printers and AFP2PDF conversion Enterprise Print Manager The OS/390 software printing solution AFP Conversion Module PDF makes mainframe data
Mainframe alternative Solution Brief. MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA)
Mainframe alternative Solution Brief MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA) Mainframe alternative Solution Brief MFA Sizing Study for a
Second Edition (May 1984)
5C28-1342-1 File No. 5370-40 Program Product Resource Access Control Facility (RACF) Auditor's Guide Program Number 5740-XXH Version 1, Release 6 ---- - ----- - - - --- -- ------ -. - Second Edition (May
SQL Server Business Intelligence on HP ProLiant DL785 Server
SQL Server Business Intelligence on HP ProLiant DL785 Server By Ajay Goyal www.scalabilityexperts.com Mike Fitzner Hewlett Packard www.hp.com Recommendations presented in this document should be thoroughly
New Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
FDRSOS (Safeguard Open Storage)
Introducing FDRSOS (Safeguard Open Storage) FDRSOS (Safeguard Open Storage) provides high-speed, reliable backups of Open Systems (SCSI) data to an MVS or OS/390 System. FDRSOS and the SYMMETRIX 3000 and
Performance and scalability of a large OLTP workload
Performance and scalability of a large OLTP workload ii Performance and scalability of a large OLTP workload Contents Performance and scalability of a large OLTP workload with DB2 9 for System z on Linux..............
PCI DSS, z/os and Keeping You from Becoming a News Headline
PCI DSS, z/os and Keeping You from Becoming a News Headline Charles Mills CorreLog, Inc. March 13, 2012 Session #11089 Copyright and Trademarks Copyright 2012 CorreLog, Inc. Trademarks CorreLog is a registered
EPM2000 LabVIEW Building Applications Instructions
EPM2000 LabVIEW Building Applications Instructions Copyright (C) 2000 Molectron Detector, Incorporated Introduction The EPM2000 LabVIEW VI library is a collection of 57 configuration VIs that allow the
CA FAQS Production Control System for z/vse r5.0
PRODUCT BRIEF: CA FAQS PRODUCTION CONTROL SYSTEM FOR Z/VSE CA FAQS Production Control System for z/vse r5.0 CA FAQS PRODUCTION CONTROL SYSTEM FOR Z/VSE IS A BUSINESS PROCESS EVENT-DRIVEN SCHEDULER THAT
Tools for Managing Big Data Analytics on z/os
Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID 14948 Test link: www.share.org Introduction Heterogeneous Analysis Addressing
SAP Performance Review/System Health Check
Albert Rodi Consulting IT Specialist IBM e-business Technical Sales IBM Corporation 1507 LBJ Freeway Dallas, TX 75381-9054 (972) 280-4791 [email protected] Copyright 2005 IBM Solutions Technical Sales
The Comeback of Batch Tuning
The Comeback of Batch Tuning By Avi Kohn, Time Machine Software Introduction A lot of attention is given today by data centers to online systems, client/server, data mining, and, more recently, the Internet.
SHARE Lunch & Learn #15372
SHARE Lunch & Learn #15372 Data Deduplication Makes It Practical to Replicate Your Tape Data for Disaster Recovery Scott James VP Global Alliances Luminex Software, Inc. Randy Fleenor Worldwide Data Protection
Tuning WebSphere Application Server ND 7.0. Royal Cyber Inc.
Tuning WebSphere Application Server ND 7.0 Royal Cyber Inc. JVM related problems Application server stops responding Server crash Hung process Out of memory condition Performance degradation Check if the
Computer Associates BrightStor CA-Vtape Virtual Tape System Software
Edward E. Cowger, Herb Gepner Product Report 8 October 2002 Historical Computer Associates BrightStor CA-Vtape Virtual Tape System Software Summary Computer Associates (CA s) BrightStor CA-Vtape Virtual
Version 14.0. Overview. Business value
PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Monitoring CICS TS Version 5 Application Performance Billy Bigelow BMC Software, Inc. August 13, 2015 Session 17265
Monitoring CICS TS Version 5 Application Performance Billy Bigelow BMC Software, Inc. August 13, 2015 Session 17265 Agenda What is an Application? CICS TS Version 5 Application Review Application Monitoring
Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 13-1
Slide 13-1 Chapter 13 Disk Storage, Basic File Structures, and Hashing Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and Extendible
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
SHARE in Seattle The Benefits of using FATSCOPY for EMC DLm tape migration
SHARE in Seattle The Benefits of using FATSCOPY for EMC DLm tape migration Session 17012 Speakers: Deb McCarty, EMC Tom Meehan, INNOVATION Data Processing Walgreens Experience Insert Custom Session QR
Click to edit Master title style. User Experience with zhpf
User Experience with zhpf Keith Martens February 5, 2013 GEICO Session 13056 GEICO Company Overview GEICO (Government Employees Insurance Company) Founder Leo Goodwin first targeted a customer base of
Order from Chaos: Using the Power of SAS to Transform Audit Trail Data Yun Mai, Susan Myers, Nanthini Ganapathi, Vorapranee Wickelgren
Paper CC-027 Order from Chaos: Using the Power of SAS to Transform Audit Trail Data Yun Mai, Susan Myers, Nanthini Ganapathi, Vorapranee Wickelgren ABSTRACT As survey science has turned to computer-assisted
EView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this
Interactive System Productivity Facility (ISPF)
National Finance Center Office of the Chief Financial Officer U.S. Department of Agriculture August 2013 PUBLICATION CATEGORY Reporting PROCEDURE MANUAL Table of Contents Introduction... 1 System Overview...
Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
Performance Management for
for Capacity Planners Performance Analysts System Programmers Version 1.0 I July, 2013 Author: Wolfram Greis European Mainframe Academy GmbH Max von Laue Straße 9 D 86156 Augsburg Tel. +49 821 56756 10
Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.
Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations
Enforcive /Cross-Platform Audit
Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you
Monitoring CICS TS Version 5 Application Performance. Billy Bigelow BMC Software, Inc. March 3, 2015 Session 16559
Monitoring CICS TS Version 5 Application Performance Billy Bigelow BMC Software, Inc. March 3, 2015 Session 16559 Agenda What is an Application? CICS TS Version 5 Application Review Application Monitoring
Chapter 13 Disk Storage, Basic File Structures, and Hashing.
Chapter 13 Disk Storage, Basic File Structures, and Hashing. Copyright 2004 Pearson Education, Inc. Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files
ERserver. iseries. Work management
ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication
WINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
Computer Organization & Architecture Lecture #19
Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of
Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.
z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration
Field Developed Solution Catalog. Version 7.0
Table of Contents OVERVIEW... 1 SUMMARY OF CHANGES... 2 ENTERPRISE SERVER ( ES ) FDS... 3 ES FDS, including hours for Customer Specific Configuration Assistance... 3 ENTERPRISE ANALYZER ( EA ) FDS... 9
Router Security Audit Logs
Router Security Audit Logs The Router Security Audit Logs feature allows users to configure audit trails, which track changes that have been made to a router that is running Cisco IOS software. History
