Interview with Charles W

Total Page:16

File Type:pdf, Size:1020Kb

Interview with Charles W An interview with Charles W. Bachman1 OH XXX Conducted by Thomas Haigh On 25-26 September, 2004 Tucson, Arizona Interview conducted for the Special Interest Group on the Management of Data (SIGMOD) of the Association for Computing Machinery (ACM). Transcript and original tapes donated to the Charles Babbage Institute. Charles Babbage Institute Center for the History of Information Processing University of Minnesota, Minneapolis Copyright 2004, Charles Babbage Institute 1 The transcript has been edited by Thomas Haigh, and subsequently edited and clarified by Charlie Bachman, his wife, Connie Bachman, and Russ McGee, who was a major player in the following story. Charles W. Bachman, Oral History with Thomas Haigh 2 ABSTRACT Charles W. Bachman reviews his career. Born during 1924 in Kansas, Bachman attended high school in East Lansing, Michigan before joining the Army Anti Aircraft Artillery Corp, with which he spent two years in the Southwest Pacific Theater, during World War II. After his discharge from the military, Bachman earned a B.Sc. in Mechanical Engineering in 1948, followed immediately by an M.Sc. in the same discipline, from the University of Pennsylvania. On graduation, he went to work for Dow Chemical in Midland, Michigan. Bachman discusses his experiences as an engineer there, focusing on engineering economics issues, including his work on the development of methods for return-on-investment calculations, using punched card machines. In 1957, he was appointed the first head of Dow’s Central Data Processing department, where he was responsible for preparing the way for the arrival of its first big digital computer. Bachman organized a feasibility study to select a new machine and hired a staff of programmers and analysts. Through the IBM SHARE user group and its 9PAC project, he became involved with Harry Tellier, and Russ McGee in the design of programs to simply the file maintenance and report generation process. This was based on the earlier GE Hanford 702 File Maintenance and Report Generator System, which Bachman discusses in some detail. He also worked on the “theory of information” with Bill Orchard-Hays and Tom Steel. However, Dow canceled its IBM 709 order before the machine arrived, ending Bachman’s association with SHARE and, shortly afterwards, with Dow Chemical. In 1961, Bachman went to work for General Electric in New York City. He worked for a corporate staff group providing internal consulting services, and was assigned to an “integrated systems project” to produce a generic manufacturing control system for GE departments, using the firm’s new GE 225 computer. Here he worked with Stan Williams and Bill Helgeson. This system, MIACS, an early transaction processing system, was built around Bachman’s new creation: the IDS (Integrated Data Store). IDS is called the first database management system, and Bachman explains its origin, development, capabilities, design and relationship to MIACS in detail. IDS used a virtual memory database, with a DDL and DML, and introduced the network data model. Bachman created the first data structure diagrams to illustrate the complex data structures required to picture the adaptive manufacturing control logic of MIACS. In 1964, Bachman transferred to GE’s Computer Department in Arizona, where he worked on a number of other database related projects including the GE 400 IDS, GE 600 IDS, DataBASIC, a personal data storage system, and WEYCOS 1 and 2, both built for Weyerhaeuser Lumber. The latter two were an attempt to build a complex online management information system around a database. Bachman believes WEYCOS 2 produced the first database management system able to support multiple application programs executing simultaneously against the same database. Bachman also describes his work with Warren Simmons, Bill Olle and others on the CODASYL Data Base Task Group during the late 1960s. The database standards produced by this group were heavily influenced by IDS and by Bachman’s ideas. Bachman also discusses the links between IDS and Cullinane’s IDMS, a successful commercial system, built to run on the IBM 360 series of computers, which was based on IDS. Page 2 of 166. Printed 6/19/2006. Charles W. Bachman, Oral History with Thomas Haigh 3 When Honeywell acquired GE’s computer business in 1970, Bachman worked for the merged operation in Honeywell’s advanced research group, in Boston. He continued to work on database topics, investigating what he called the “role data model” and serving on an ANSI-SPARC committee intended to standardize database systems. While failing in this objective, this committee made a highly influential distinction between external, conceptual, and internal (database) schemata. In 1973, Bachman received the ACM Turing award. He recalls his reactions to this, and his subsequent service on committee to select future winners. Bachman was elected a Distinguished Fellow of the British Computer Society in 1977. Bachman also discusses his thoughts on the relational data model and its creator Ted Codd, including a well known 1974 meeting in which he debated Codd on the merits of the two approaches. Bachman also chaired the ISO committee working on Open Systems Interconnection (OSI), well known for its elaboration of a seven layer model for computer communication. In 1981, Bachman went to work for Cullinane Database Systems, a major software company built around IDMS. While at Cullinane, he supported marketing, and continued the ISO/OSI committee work, while working on tools to model high level schemata for enterprise database design and translate them into data definitions. He also worked on the “partnership set data model,” which was granted a US patent, and used as the basis for a enhanced network data model and conceptual schema modeling. In 1983, he left to pursue this work at his own firm, Bachman Information Systems. He describes the rise and fall of this company, which obtained venture capital funding, grew rapidly and made a successful IPO. Despite enjoying success with its Data Analyst product with its reverse and forward engineering capabilities, the firm struggled financial and managerially, including an initially successful, but ill-fated, spell as an IBM Business Partner. It eventually merged with Cadre Systems to create Cayenne Software, which was acquired by Sterling Software in 1998, which was subsequently acquired by Computer Associates. Since then Bachman has worked as a database consultant to Constellar Systems and in 2006 was still working with Cbr Systems. Page 3 of 166. Printed 6/19/2006. Charles W. Bachman, Oral History with Thomas Haigh 4 HAIGH: Thank you very much for agreeing to take part in this interview. BACHMAN: Thank you. Good morning. HAIGH: I wonder if you could begin by talking a little bit about your early life and family background. BACHMAN: I was born in Manhattan, Kansas2. I moved shortly to Gainesville, Florida. And then, by the second grade, I had moved to East Lansing, Michigan. Now, this is what happens when your father is a football coach. Charley Bachman3 was the head coach at Kansas Agriculture College4, when I was born. Then, he went to be the head coach job at The University of Florida, and then on to Michigan State College, now Michigan State University. He was a very successful football coach, so part of my life comes from that background. I’m always interested in sports. He was a graduate from Notre Dame, and I happen to have a ring for years that he was given as being the best scholar on the football team, although we don’t think of scholars and football teams going together. My mother5 was a college graduate from the University of Oklahoma, before World War I. She had gone back to graduate school at Kansas State where she met my father. He was the football coach. They got married, and by and by I came along, number two in the family. I came from an academic background, although if you talk to people from academic backgrounds, they say, well, there’s the academics on one side, and then there’s the athletic department and the military department (ROTC) on a different side, and they’re different communities. They do not mix very well. That’s true. But certainly I grew up knowing college backgrounds and was interested in things out there, although I was never a good athlete myself. I had fun in high school. I played football and basketball and hurtled and high jumped for the track team, but I was never a star athlete, as my younger brothers were. Cary was terribly interested in sports and built his life and career on it. I went to lots of football games when I was young, maybe too many. HAIGH: When you were in school, what kind of topics were you interested in? What kinds of subjects did you do better in? BACHMAN: In East Lansing (Michigan) High School, at least when I was in high school in the 1940, ’41, ’42, and ’43 time frame, everybody took much the same courses, with a few options for extra study. I enjoyed all of my courses. I was a good student. Things seemed to come easily. I enjoyed the math part, I enjoyed the science part, but then I enjoyed English and other things. I was not the best student in my high school class, but always in the top 10%. But, I don’t think anyone-- Well, I got an e-mail from someone the other day saying, “Well, Charlie, you’re the brain!” Well, I never thought of myself as that much of a brain, but I did well. At the end of my high school career—I was scheduled to graduate in June, 1943, but we were in the middle of World War II—I left high school early and started college at 2 December 11, 1924.
Recommended publications
  • Netezza EOL: IBM IAS Is a Flawed Upgrade Path Netezza EOL: IBM IAS Is a Flawed Upgrade Path
    Author: Marc Staimer WHITE PAPER Netezza EOL: What You’re Not Being Told About IBM IAS Is a Flawed Upgrade Path Database as a Service (DBaaS) WHITE PAPER • Netezza EOL: IBM IAS Is a Flawed Upgrade Path Netezza EOL: IBM IAS Is a Flawed Upgrade Path Executive Summary It is a common technology vendor fallacy to compare their systems with their competitors by focusing on the features, functions, and specifications they have, but the other guy doesn’t. Vendors ignore the opposite while touting hardware specs that mean little. It doesn’t matter if those features, functions, and specifications provide anything meaningfully empirical to the business applications that rely on the system. It only matters if it demonstrates an advantage on paper. This is called specsmanship. It’s similar to starting an argument with proof points. The specs, features, and functions are proof points that the system can solve specific operational problems. They are the “what” that solves the problem or problems. They mean nothing by themselves. Specsmanship is defined by Wikipedia as: “inappropriate use of specifications or measurement results to establish supposed superiority of one entity over another, generally when no such superiority exists.” It’s the frequent ineffective sales process utilized by IBM. A textbook example of this is IBM’s attempt to move their Netezza users to the IBM Integrated Analytics System (IIAS). IBM is compelling their users to move away from Netezza. In the fall of 2017, IBM announced to the Enzee community (Netezza users) that they can no longer purchase or upgrade PureData System for Analytics (the most recent IBM name for its Netezza appliances), and it will end-of-life all support next year.
    [Show full text]
  • SAP Database Administration with IBM
    André Faustmann, Michael Greulich, André Siegling, Benjamin Wegner, and Ronny Zimmerman SAP® Database Administration with IBM® DB2® Bonn Boston Contents at a Glance 1 Introduction ............................................................................ 19 2 SAP System Landscapes ......................................................... 25 3 Basics and Architecture of the IBM DB2 for LUW Database ................................................................................. 71 4 Lifecycle ................................................................................. 233 5 Administration Tools Inside and Outside the SAP System .... 327 6 Backup, Restore, and Recovery .............................................. 463 7 Monitoring DB2 SAP Systems with SAP Solution Manager .................................................................................. 575 8 SAP NetWeaver Business Warehouse and IBM DB2 for LUW .................................................................................. 647 9 Common Problems and Their Solutions for DB2 Administrators ........................................................................ 697 Contents Foreword .................................................................................... 15 Acknowledgments ....................................................................... 17 1 Introduction ................................................................. 19 1.1 Who This Book Is For .................................................... 21 1.2 Focus of This Book .......................................................
    [Show full text]
  • IBM DB2 for Z/OS: the Database for Gaining a Competitive Advantage!
    Why You Should Read This Book Tom Ramey, Director, DB2 for z/OS IBM Silicon Valley Laboratory “This book is a ‘must read’ for Enterprise customers and contains a wealth of valuable information! “It is clear that there is a technology paradigm shift underway, and this is opening enormous opportunities for companies in all industries. Adoption of Cloud, Mobile, and Analytics promises to revolutionize the way we do business and will add value to a company’s business processes across all functions from sales, marketing, procurement, manufacturing and finance. “IT will play a significant role enabling this shift. Read this book and find out how to integrate the heart of your infrastructure, DB2 for z/OS, with new technologies in order to maximize your investment and drive new value for your customers.” Located at IBM’s Silicon Valley Laboratory, Tom is the director of IBM’s premiere relational database management system. His responsibilities include Architecture, Development, Service, and Customer Support for DB2. He leads development labs in the United States, Germany, and China. Tom works closely with IBM’s largest clients to ensure that DB2 for z/OS continues as the leading solution for modern applications, encompassing OLTP to mobile to analytics. At the same time he continues an uncompromising focus on meeting the needs of the most demanding operational environments on Earth, through DB2’s industry- leading performance, availability, scaling, and security capabilities. IBM DB2 for z/OS: The Database for Gaining a Competitive Advantage! Shantan Kethireddy Jane Man Surekha Parekh Pallavi Priyadarshini Maryela Weihrauch MC Press Online, LLC Boise, ID 83703 USA IBM DB2 for z/OS: The Database for Gaining a Competitive Advantage! Shantan Kethireddy, Jane Man, Surekha Parekh, Pallavi Priyadarshini, and Maryela Weihrauch First Edition First Printing—October 2015 © Copyright 2015 IBM.
    [Show full text]
  • Developing Embedded SQL Applications
    IBM DB2 10.1 for Linux, UNIX, and Windows Developing Embedded SQL Applications SC27-3874-00 IBM DB2 10.1 for Linux, UNIX, and Windows Developing Embedded SQL Applications SC27-3874-00 Note Before using this information and the product it supports, read the general information under Appendix B, “Notices,” on page 209. Edition Notice This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. You can order IBM publications online or through your local IBM representative. v To order publications online, go to the IBM Publications Center at http://www.ibm.com/shop/publications/ order v To find your local IBM representative, go to the IBM Directory of Worldwide Contacts at http://www.ibm.com/ planetwide/ To order DB2 publications from DB2 Marketing and Sales in the United States or Canada, call 1-800-IBM-4YOU (426-4968). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1993, 2012. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Introduction to embedded Include files for COBOL embedded SQL SQL................1 applications .............29 Embedding SQL statements
    [Show full text]
  • Proc SQL Vs. Pass-Thru SQL on DB2® Or How I Found a Day
    NESUG 15 Beginning Tutorials Proc SQL vs. Pass-Thru SQL on DB2® Or How I Found a Day Jeffrey S. Cohen, American Education Services/PHEAA Abstract When extracting data from multiple tables, you must employ Join conditions to avoid a Cartesian product, Many people use Proc SQL to query DB2 where each row from table one will be joined with databases yet ignore the Pass-thru ability of this each row in table two. A Join condition will tell the Proc. This paper will compare the Proc SQL of DBMS how to match the rows of the two tables. Consider the above example, only now we want the SAS® and Pass-thru SQL on the same 30 million- color of the person's car as well: row table to highlight the time and resource Select A.Name, savings that Pass-through SQL can give. A.Age, A.City, Overview B.Color From Table_Demographics A Inner Join One of the most useful features of SAS software is Table_Cars B on its ability to read data in almost any form or A.Name = B.Name storage medium from multiple data sets. When Where A.Age < 30 and accessing data from a Database Management (A.City = 'Syracuse' or System (DBMS) such as DB2, the SQL procedure A.State = 'Maine') is required. Like many SAS procedures there are a Notice that when selecting multiple columns a variety of options available, some greatly comma must separate them. Also notice that the impacting performance. We will examine three table Table_Demographics is given the pseudonym techniques to use when joining three tables with of A and the table Table_Cars is given the Proc SQL and the results on performance.
    [Show full text]
  • Toad for IBM DB2 Release Notes
    Toad for IBM DB2 7.1.x Release Notes Monday, November 18, 2019 Contents About Toad for IBM DB2 1 New Features 1 System Requirements 2 Resolved Issues and Enhancements 4 Known Issues 4 Third Party Known Issues 6 Getting Started 7 Toad for DB2 Editions 7 Product Licensing 8 Globalization 8 About Us 9 Copyright 9 About Toad for IBM DB2 With Toad, developers and database administrators can use a familiar, proven tool to manage databases. Toad empowers developers and administrators, of varying skill levels, to rapidly create and execute queries, automate database object management, and develop SQL more efficiently. Toad also provides utilities to compare, extract and search for objects, manage projects, import/export data and administer the database, while increasing your productivity and delivering access to an active user community. Toad for IBM DB2 7.1.2 is a patch release with new features, security enhancements and resolved issues. New Features In Toad for IBM DB2 7.1 the following new features were implemented: Security and Installation Enhancements For this release of Toad for IBM DB2 we have provided internal security adjustments. We have revised a list of third party components in use according to their known and potential vulnerabilities. Toad uses only reliable and safe components by third party vendors. See the list of third party components in Toad for IBM DB2the help file, section About Us | Third Party Components. Our Toad installers are now based on the Wix Toolset , which improves user experience and performance of the installation process. See Resolved Issues for more enhancements and resolved issues in this release of Toad for IBM DB2.
    [Show full text]
  • Appendix E: an Overview of the Network Data Model
    Elmasri_APPC Page 1 Monday, April 3, 2006 3:40 PM An Overview of the APPENDIXE Network Data Model This appendix provides an overview of the network data model.1 The original network model and language were presented in the CODASYL Data Base Task Group’s 1971 report; hence it is sometimes called the DBTG model. Revised reports in 1978 and 1981 incorporated more recent concepts. In this appendix, rather than concentrating on the details of a particular CODASYL report, we present the general concepts behind net- work-type databases and use the term network model rather than CODASYL model or DBTG model. The original CODASYL/DBTG report used COBOL as the host language. Regardless of the host programming language, the basic database manipulation commands of the net- work model remain the same. Although the network model and the object-oriented data model are both navigational in nature, the data structuring capability of the network model is much more elaborate and allows for explicit insertion/deletion/modification semantic specification. However, it lacks some of the desirable features of the object mod- els that we discussed in Chapter 11, such as inheritance and encapsulation of structure and behavior. 1. The complete chapter on the network data model and about the IDMS system from the second edition of this book is available at http://www.awl.com/cseng/titles/0-8053-1755-4. This appendix is an edited excerpt of that chapter. E–1 Elmasri_APPC Page 2 Monday, April 3, 2006 3:40 PM E–2 Appendix E / An Overview of the Network Data Model E.1 Network Data Modeling Concepts There are two basic data structures in the network model: records and sets.
    [Show full text]
  • DB2 Database Facilities Management …
    IBM Jay.Manaloto Search Submit IBM Profiles Communities Apps Share Wikis This Wiki Search IBM TRIRIGA Following Actions Wiki Actions TRIRIGA Wiki Home You are in: IBM TRIRIGA > IBM TRIRIGA Application Platform > Performance > Best Practices for System Performance > Database specific considerations > DB2 database Facilities Management … Facilities Maintenance DB2 database Like | Updated December 4, 2019 by Jay.Manaloto | Tags: db2, db2_database, db2_performance, db2_tuning, performance, reserve_performance, system_performance Add or Environmental & Ener… remove tags Real Estate Management Edit Page Actions Capital Project Manag… CAD Integrator-Publis… IBM TRIRIGA Connect… IBM TRIRIGA Anywhere IBM TRIRIGA Applicati… Best Practices for System Performance. Support Matrix 5 Database Server Tuning and Maintenance (continued) Hints and Tips Installing < Back to Table of Contents Admin Console 5 Database Server Tuning and Maintenance (continued) 5.3 IBM DB2 Database (was 5.6) Builder Tools 5.3.1 IBM DB2 Database Server Tuning (was 5.2) a. DB2 Automatic Buffer Pool Size and Auto Extends (was 5.5.5) Connector for Busin… b. DB2 Diagnostic Log (was 5.5.6) 5.3.2 IBM DB2 Application Platform Indexes (was 5.4.2.a) Connector for Esri GIS 5.3.3 Reserve Indexes for DB2 (was 5.4.2.d) Document Manager 5.3.4 Lease Indexes for DB2 5.3.5 Internal Lease Benchmark Findings Extended Formula a. Performance Benchmark Index Objectives b. Performance Environments Gantt Scheduler b.1 Data-Load Hardware Environment b.2 Multi-User Benchmark Test Environment Globalization b.3 Software Environment Group Object b.4 Key Configurations b.4.1 IBM DB2 Database Server Label Manager b.4.2 IBM WebSphere Application Server b.4.3 Operating System Licensing b.4.4 IBM TRIRIGA Platform c.
    [Show full text]
  • IBM DB2 Database (Was 5.6) Builder Tools 5.3.1 IBM DB2 Database Server Tuning (Was 5.2) A
    IBM Jay.Manaloto Search Submit IBM Profiles Communities Apps Share Wikis This Wiki Search IBM TRIRIGA Following Actions Wiki Actions TRIRIGA Wiki Home You are in: IBM TRIRIGA > IBM TRIRIGA Application Platform > Performance > Best Practices for System Performance > Database specific considerations > DB2 database Facilities Management … Facilities Maintenance DB2 database Like | Updated December 4, 2019 by Jay.Manaloto | Tags: db2, db2_database, db2_performance, db2_tuning, performance, reserve_performance, system_performance Add or Environmental & Ener… remove tags Real Estate Management Edit Page Actions Capital Project Manag… CAD Integrator-Publis… IBM TRIRIGA Connect… IBM TRIRIGA Anywhere IBM TRIRIGA Applicati… Best Practices for System Performance. Support Matrix 5 Database Server Tuning and Maintenance (continued) Hints and Tips Installing < Back to Table of Contents Admin Console 5 Database Server Tuning and Maintenance (continued) 5.3 IBM DB2 Database (was 5.6) Builder Tools 5.3.1 IBM DB2 Database Server Tuning (was 5.2) a. DB2 Automatic Buffer Pool Size and Auto Extends (was 5.5.5) Connector for Busin… b. DB2 Diagnostic Log (was 5.5.6) 5.3.2 IBM DB2 Application Platform Indexes (was 5.4.2.a) Connector for Esri GIS 5.3.3 Reserve Indexes for DB2 (was 5.4.2.d) Document Manager 5.3.4 Lease Indexes for DB2 5.3.5 Internal Lease Benchmark Findings Extended Formula a. Performance Benchmark Index Objectives b. Performance Environments Gantt Scheduler b.1 Data-Load Hardware Environment b.2 Multi-User Benchmark Test Environment Globalization b.3 Software Environment Group Object b.4 Key Configurations b.4.1 IBM DB2 Database Server Label Manager b.4.2 IBM WebSphere Application Server b.4.3 Operating System Licensing b.4.4 IBM TRIRIGA Platform c.
    [Show full text]
  • A Survey: Security Perspectives of ORACLE and IBM-DB2 Databases
    International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 ISSN 2250-3153 A Survey: Security Perspectives of ORACLE and IBM- DB2 Databases Lavanya Pamulaparty*, T. Praveen Kumar**, P. Vijaya Babu Varma** * Associate Professor and Head of CSE, Methodist College of Engineering. & Technology. ** Assistant Professor, Dept. of CSE, Methodist College of Engineering. & Technology. *** Assistant Professor, Dept. of CSE, Methodist College of Engineering & Technology. Abstract- As storage of data plays an integral part of databases, independent assurance of the security built into DB2. Whereas security issues becomes major concerns. Relational databases Oracle has undergone multiple evaluations of its database, IBM hold a significant portion of data stored in software, therefore has failed to have independent experts formally evaluate DB2, today’s database purchase decisions revolve around how secure making it difficult to qualify their assertions about their security the product is. This paper provides a categorical feature implementations. Oracle’s business model is to secure products comparison between Oracle9i Database (Oracle) and IBM DB2 out-of-the-box, and IBM’s is to make customers pay to secure Universal Database (DB2), in addition to examining features the products they purchase. This divergence in approach provided in the SecureWay product line from Tivoli, an IBM demonstrates the value of security to these database competitors subsidiary [7]. It explores the impact of IBM’s and Oracle’s and the resulting security built-in to their customers’ security models on users seeking to protect their critical deployments [7]. information systems and contrasts IBM’s strategy of building security outside of the DB2 database against Oracle’s strategy of securing information in the database server[6].In addition to the II.
    [Show full text]
  • Z/OS Basics Preface
    Contents Preface . iii How this course is organized . iii How each topic is organized . iv Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The S/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 6 1.5 What is a mainframe? . 7 1.6 Who uses mainframe computers?. 10 1.7 Factors contributing to mainframe use . 11 1.8 Typical mainframe workloads . 14 1.9 Roles in the mainframe world . 21 1.10 z/OS and other mainframe operating systems . 27 1.11 Summary . 29 Chapter 2. z/OS overview. 31 2.1 What is an operating system? . 32 2.2 Overview of z/OS facilities. 32 2.3 What is z/OS? . 34 2.4 Virtual storage and other mainframe concepts . 39 2.5 What is workload management? . 57 2.6 I/O and data management. 60 2.7 Supervising the execution of work in the system . 60 2.8 Defining characteristics of z/OS . 68 2.9 Licensed programs for z/OS . 69 2.10 Middleware for z/OS . 70 2.11 A brief comparison of z/OS and UNIX. 71 2.12 Summary . 73 Chapter 3. TSO/E, ISPF, and UNIX: Interactive facilities of z/OS . 75 3.1 How do we interact with z/OS? . 76 3.2 TSO overview . 76 3.3 ISPF overview . 80 3.4 z/OS UNIX interactive interfaces. 99 3.5 Summary .
    [Show full text]
  • DB2 Spatial Extender User's Guide and Reference
    IBM® DB2® Spatial Extender User’s Guide and Reference Ve r s i o n 8 SC27-1226-00 IBM® DB2® Spatial Extender User’s Guide and Reference Ve r s i o n 8 SC27-1226-00 Before using this information and the product it supports, be sure to read the general information under Notices. This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. You can order IBM publications online or through your local IBM representative. v To order publications online, go to the IBM Publications Center at www.ibm.com/shop/publications/order v To find your local IBM representative, go to the IBM Directory of Worldwide Contacts at www.ibm.com/planetwide To order DB2 publications from DB2 Marketing and Sales in the United States or Canada, call 1-800-IBM-4YOU (426-4968). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1998 - 2002. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Part 1. Introduction........1 System requirements for installing Spatial Extender............28 Chapter 1. About DB2 Spatial Extender . 3 Installing DB2 Spatial Extender for Windows ............30 The purpose of DB2 Spatial Extender ....3 Installing DB2 Spatial Extender for AIX .
    [Show full text]