IBM Soliddb: Delivering Data with Extreme Speed

Total Page:16

File Type:pdf, Size:1020Kb

IBM Soliddb: Delivering Data with Extreme Speed Front cover IBM® Information Management Software IBM solidDB Delivering Data with Extreme Speed Provides low latency, high throughput, and extreme availability Offers fully featured relational in-memory database software Has universal cache with shared memory access Marko Milek Chuck Ballard Michael Roche Dan Behman John Seery Asko Huumonen Katriina Vakkila Kyosti Laiho Jamie Watters Jan Lindstrom Antoni Wolski ibm.com/redbooks International Technical Support Organization IBM solidDB: Delivering Data with Extreme Speed May 2011 SG24-7887-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (May 2011) This edition applies to Version 6.5 of IBM solidDB (product number 5724V17) and IBM solidDB Universal Cache (product number 5724W91). © Copyright International Business Machines Corporation 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team who wrote this book . xii Now you can become a published author, too! . xv Comments welcome. xvi Stay connected to IBM Redbooks . xvi Chapter 1. Introduction. 1 1.1 The opportunity of the in-memory database . 2 1.1.1 Disk databases cannot expand to memory . 2 1.1.2 IBM solidDB IMDB is memory-friendly . 3 1.1.3 Misconceptions . 5 1.1.4 Throughput and response times . 7 1.2 Database caching with in-memory databases. 9 1.2.1 Databases are growing . 9 1.2.2 Database caching off-loads the enterprise server. 10 1.2.3 IBM solidDB Universal Cache . 10 1.3 Applications, competition, and the marketplace . 11 Chapter 2. IBM solidDB details . 13 2.1 Introduction . 14 2.2 Server architecture . 15 2.2.1 Database access methods and network drivers . 16 2.2.2 Server components . 18 2.3 Data storage in solidDB. 20 2.3.1 Main-memory engine . 21 2.3.2 Disk-based engine . 22 2.4 Table types . 24 2.4.1 In-memory versus disk-based tables . 24 2.4.2 Persistent versus non-persistent tables . 25 2.4.3 Choosing between different table types . 26 2.5 Transactionality . 27 2.5.1 Concurrency control and locking. 27 2.5.2 Isolation levels. 29 2.5.3 Durability levels . 30 2.6 solidDB SQL extensions . 31 2.6.1 solidDB SQL standard compliance . 32 © Copyright IBM Corp. 2011. All rights reserved. iii 2.6.2 Stored procedures. 32 2.6.3 Triggers . 33 2.6.4 Sequences . 33 2.6.5 Events . 34 2.6.6 Replication . 35 2.7 Database administration . 36 2.7.1 Configuration settings . 36 2.7.2 ADMIN COMMAND. 37 2.7.3 Data management tools . 37 2.7.4 Database object hierarchy . 38 Chapter 3. IBM solidDB Universal Cache details . 39 3.1 Architecture . 40 3.1.1 Architecture and key components. 40 3.1.2 Principles of operation. 41 3.2 Deployment models. 45 3.3 Configuration alternatives . 46 3.3.1 Typical configuration . 46 3.3.2 Multiple cache nodes . 47 3.3.3 SMA for collocation of data . 47 3.3.4 solidDB HSB servers for high availability . 49 3.4 Key aspects of cache setup . 50 3.4.1 Deciding on the replication model . 50 3.4.2 Defining what to replicate . 52 3.4.3 Starting replication . 56 3.5 Additional functionality for cache operations . 56 3.5.1 SQL pass-through . 56 3.5.2 Aging . 58 3.5.3 Improving performance with parallelism . 60 3.6 Increasing scale of applications . 63 3.6.1 Scaling strategies . 63 3.6.2 Examples of cache database applications . 64 3.7 Enterprise infrastructure effects of the solidDB Universal Cache . 65 3.7.1 Network latency and traffic . 65 3.7.2 Back-end machine load. 65 3.7.3 Database operation execution . 66 Chapter 4. Deploying solidDB and Universal Cache . 67 4.1 Change and consideration . 68 4.2 How to develop applications that use solidDB . 68 4.2.1 Application program structure . 68 4.2.2 ODBC . 70 4.2.3 JDBC. 74 iv IBM solidDB: Delivering Data with Extreme Speed 4.2.4 Stored procedures. 77 4.2.5 Special considerations . 79 4.3 New application development on solidDB UC. 84 4.3.1 Awareness of separate database connections . 85 4.3.2 Combining data from separate databases in a transaction. 87 4.3.3 Combining data from different databases in a query . 87 4.3.4 Transactionality with Universal Cache . 88 4.3.5 Stored procedures in Universal Cache architectures . 88 4.4 Integrate an existing application to work with solidDB UC . 89 4.4.1 Programming interfaces used by the application . 89 4.4.2 Handling two database connections instead of one . 90 4.5 Data model design . 91 4.5.1 Data model design principles . 91 4.5.2 Running in-memory and disk-based tables inside solidDB . 92 4.5.3 Data model design for solidDB UC configurations . 94 4.6 Data migration.
Recommended publications
  • Translating Risk Assessment to Contingency Planning for CO2 Geologic Storage: a Methodological Framework
    Translating Risk Assessment to Contingency Planning for CO2 Geologic Storage: A Methodological Framework Authors Karim Farhat a and Sally M. Benson b a Department of Management Science and Engineering, Stanford University, Stanford, California, USA b Department of Energy Resources Engineering, Stanford University, Stanford, California, USA Contact Information Karim Farhat: [email protected] Sally M. Benson: [email protected] Corresponding Author Karim Farhat 475 Via Ortega Huang Engineering Center, 245A Stanford, CA 94305, USA Email: [email protected] Tel: +1-650-644-7451 May 2016 1 Abstract In order to ensure safe and effective long-term geologic storage of carbon dioxide (CO2), existing regulations require both assessing leakage risks and responding to leakage incidents through corrective measures. However, until now, these two pieces of risk management have been usually addressed separately. This study proposes a methodological framework that bridges risk assessment to corrective measures through clear and collaborative contingency planning. We achieve this goal in three consecutive steps. First, a probabilistic risk assessment (PRA) approach is adopted to characterize potential leakage features, events and processes (FEP) in a Bayesian events tree (BET), resulting in a risk assessment matrix (RAM). The RAM depicts a mutually exclusive and collectively exhaustive set of leakage scenarios with quantified likelihood, impact, and tolerance levels. Second, the risk assessment matrix is translated to a contingency planning matrix (CPM) that incorporates a tiered- contingency system for risk-preparedness and incident-response. The leakage likelihood and impact dimensions of RAM are translated to resource proximity and variety dimensions in CPM, respectively. To ensure both rapid and thorough contingency planning, more likely or frequent risks require more proximate resources while more impactful risks require more various resources.
    [Show full text]
  • 2017 Ram 1500/2500/3500 Truck Owner's Manual
    2017 RAM TRUCK 1500/2500/3500 STICK WITH THE SPECIALISTS® RAM TRUCK 2017 1500/2500/3500 OWNER’S MANUAL 17D241-126-AD ©2016 FCA US LLC. All Rights Reserved. fourth Edition Ram is a registered trademark of FCA US LLC. Printed in U.S.A. VEHICLES SOLD IN CANADA This manual illustrates and describes the operation of With respect to any Vehicles Sold in Canada, the name FCA features and equipment that are either standard or op- US LLC shall be deemed to be deleted and the name FCA tional on this vehicle. This manual may also include a Canada Inc. used in substitution therefore. description of features and equipment that are no longer DRIVING AND ALCOHOL available or were not ordered on this vehicle. Please Drunken driving is one of the most frequent causes of disregard any features and equipment described in this accidents. manual that are not on this vehicle. Your driving ability can be seriously impaired with blood FCA US LLC reserves the right to make changes in design alcohol levels far below the legal minimum. If you are and specifications, and/or make additions to or improve- drinking, don’t drive. Ride with a designated non- ments to its products without imposing any obligation drinking driver, call a cab, a friend, or use public trans- upon itself to install them on products previously manu- portation. factured. WARNING! Driving after drinking can lead to an accident. Your perceptions are less sharp, your reflexes are slower, and your judgment is impaired when you have been drinking. Never drink and then drive.
    [Show full text]
  • Superman(Jjabrams).Pdf
    L, July 26, 2002 SUPERMAN FADE IN: . .. INT. TV MONITOR - DAY TIGHT ON a video image of a news telecast. Ex ~t th efs no one there -- just the empty newsdesk. Odd. e Suddenly a NEWSCASTER appears behind the desk - rushed and unkempt. Fumbles with his clip mic trembling. It's unsettling; be looks up at us, desperately to sound confident. But his voice Nm?!3CASTER Ladies and gentlen. If you are watching this, and are taking shelter underground, we strongly urg you -- all of vou -- to do so immediately. Anywhere-- anywhere e are, anywhere you can find. (beat) At this hour, all we know is that there are visitors on this planet-- and that there's a conflict between 'v them-- the Giza Pyramids have been @ destroyed-- sections of Paris. Massive fires are raging from Venezuela to Chile-- a great deal of Seoul, Korea ... no longer exists ... All this man wants to-do is cry. But he's a realize now that werite been SLOWLY PUSHING IN NEWSCASTER ( con t ' d ) Only weeks ago this report would've seemed.. ludicrous. Aliens.. usi Earth as a battleground. .. ( then, with growing venom: ) ... but that was before Superman. (beat1 It turns out that our faith was naive. Premature. Perhaps, given Y the state pf the world. .- simply desperate-- .. , Something urgent is YELLED from behind the c Newscaster looks off, ' fied -- he yells but it's masked by a SHATT!L'RING -- FLYING GLASS -- the video . .. camera SHAKES -- . -.~. &+,. 9' .. .-. .. .. .: . .I _ - - . - .. ( CONTINUED) . 2. CONTINUED: 4 -. A TERRIBLE WHI.STLE, then an EXPIX)SION -- '1 WHIPPED OUT OF FRAME in the same horrible inst .
    [Show full text]
  • Sabre Corporation (Exact Name of Registrant As Specified in Its Charter)
    ' UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D. C. 20549 FORM 10-K ~ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2018 or • TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Sabre Corporation (Exact name of registrant as specified in its charter) Delaware 001-36422 20-8647322 (State or other jurisdiction (Commission File Number) (I.R.S. Employer of Incorporation or organization) Identification No.) 3150 Sabre Drive Southlake, TX 76092 (Address, including zip code, ofprinc ipal executive offices) (682) 605-1000 (Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Common Stock, $0.01 par value The NASDAQ Stock Market LLC (Title of class) (Name of exchange on which registered ) Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrantis a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes l!I No • Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act Yes • No l!I Indicate by check mark whether the registrant (1) has fi led all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Airline Control System Version 2: General Information Manual Figures
    Airline Control System Version 2 IBM General Information Manual Release 4.1 GH19-6738-13 Airline Control System Version 2 IBM General Information Manual Release 4.1 GH19-6738-13 Note Before using this information and the product it supports, be sure to read the general information under “Notices” on page ix. This edition applies to Release 4, Modification Level 1, of Airline Control System Version 2, Program Number 5695-068, and to all subsequent releases and modifications until otherwise indicated in new editions. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. A form for readers’ comments appears at the back of this publication. If the form has been removed, address your comments to: ALCS Development 2455 South Road P923 Poughkeepsie NY 12601-5400 USA When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 2003, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures .................................... v Tables .................................... vii Notices .................................... ix Trademarks ................................... ix About this book ................................ xi Who should read this book .............................. xi Related publications ...............................
    [Show full text]
  • Forging the Future of Hospitality: Blockchain for Trust Now And
    Expert Insights Forging the future of hospitality Blockchain for trust now—and in a post-pandemic world In collaboration with: Experts on this topic Kurt Wedgwood Kurt leads IBM’s Blockchain North America practice for the Retail, Consumer Product and Travel industries. He helps IBM North America Blockchain clients build deeper trust in information and process Leader for Retail, Consumer execution. He is an adjunct professor, chair emeritus of Products, Travel & Transport Seattle University’s Innovation and Entrepreneurship [email protected] Board, and is working with the World Business Council for linkedin.com/in/wedgwood Sustainable Development. Kurt lives in Seattle, WA and received his MBA from the University of Chicago. Rob Grimes Robert (“Rob”) Grimes is the Founder & CEO of the IFBTA (International Food & Beverage Technology Association), International Food and Beverage a non-profit professional trade association promoting and Technology Association advancing technology and innovation for the global food Founder & CEO and beverage industries. Previously, Rob also founded [email protected] FSTEC (Foodservice Technology Conference and linkedin.com/in/rogrimes Showcase) and ConStrata Consulting & Services, which www.ifbta.org provides IT services for the global hospitality, foodservice and retail industries. Greg Land Greg serves as Global Industry Leader with global responsibility for Aviation, Hospitality, and Travel Related IBM Distinguished Industry Leader, Services industry segment. Prior to joining IBM, held Travel & Transportation leadership roles with American Airlines, Sabre, Wyndham [email protected] Hotel Group and Radius Global Travel Management, linkedin.com/in/gregland spanning a 23-year career across the travel industry. Greg holds bachelor’s degrees in Computer Science and Accounting, and an MBA from Oklahoma State University.
    [Show full text]
  • Virgil, Aeneid 11 (Pallas & Camilla) 1–224, 498–521, 532–96, 648–89, 725–835 G
    Virgil, Aeneid 11 (Pallas & Camilla) 1–224, 498–521, 532–96, 648–89, 725–835 G Latin text, study aids with vocabulary, and commentary ILDENHARD INGO GILDENHARD AND JOHN HENDERSON A dead boy (Pallas) and the death of a girl (Camilla) loom over the opening and the closing part of the eleventh book of the Aeneid. Following the savage slaughter in Aeneid 10, the AND book opens in a mournful mood as the warring parti es revisit yesterday’s killing fi elds to att end to their dead. One casualty in parti cular commands att enti on: Aeneas’ protégé H Pallas, killed and despoiled by Turnus in the previous book. His death plunges his father ENDERSON Evander and his surrogate father Aeneas into heart-rending despair – and helps set up the foundati onal act of sacrifi cial brutality that caps the poem, when Aeneas seeks to avenge Pallas by slaying Turnus in wrathful fury. Turnus’ departure from the living is prefi gured by that of his ally Camilla, a maiden schooled in the marti al arts, who sets the mold for warrior princesses such as Xena and Wonder Woman. In the fi nal third of Aeneid 11, she wreaks havoc not just on the batt lefi eld but on gender stereotypes and the conventi ons of the epic genre, before she too succumbs to a premature death. In the porti ons of the book selected for discussion here, Virgil off ers some of his most emoti ve (and disturbing) meditati ons on the tragic nature of human existence – but also knows how to lighten the mood with a bit of drag.
    [Show full text]
  • Mobile to Mainframe Devops for Dummies®, IBM Limited Edition Published by John Wiley & Sons, Inc
    These materials are © 2015 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Mobile to Mainframe DevOps IBM Limited Edition By Rosalind Radcliffe These materials are © 2015 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Mobile to Mainframe DevOps For Dummies®, IBM Limited Edition Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030‐5774 www.wiley.com Copyright © 2015 by John Wiley & Sons, Inc. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. IBM and the IBM logo are registered trademarks of International Business Machines Corporation. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Timeline of Computer History
    Timeline of Computer History By Year By Category Search AI & Robotics (55) Computers (145)(145) Graphics & Games (48) Memory & Storage (61) Networking & The Popular Culture (50) Software & Languages (60) Bell Laboratories scientist 1937 George Stibitz uses relays for a Hewlett-Packard is founded demonstration adder 1939 Hewlett and Packard in their garage workshop “Model K” Adder David Packard and Bill Hewlett found their company in a Alto, California garage. Their first product, the HP 200A A Called the “Model K” Adder because he built it on his Oscillator, rapidly became a popular piece of test equipm “Kitchen” table, this simple demonstration circuit provides for engineers. Walt Disney Pictures ordered eight of the 2 proof of concept for applying Boolean logic to the design of model to test recording equipment and speaker systems computers, resulting in construction of the relay-based Model the 12 specially equipped theatres that showed the movie I Complex Calculator in 1939. That same year in Germany, “Fantasia” in 1940. engineer Konrad Zuse built his Z2 computer, also using telephone company relays. The Complex Number Calculat 1940 Konrad Zuse finishes the Z3 (CNC) is completed Computer 1941 The Zuse Z3 Computer The Z3, an early computer built by German engineer Konrad Zuse working in complete isolation from developments elsewhere, uses 2,300 relays, performs floating point binary arithmetic, and has a 22-bit word length. The Z3 was used for aerodynamic calculations but was destroyed in a bombing raid on Berlin in late 1943. Zuse later supervised a reconstruction of the Z3 in the 1960s, which is currently on Operator at Complex Number Calculator (CNC) display at the Deutsches Museum in Munich.
    [Show full text]
  • In the United States District Court for the District of Delaware
    Case 1:19-cv-01548-LPS Document 277 Filed 04/08/20 Page 1 of 97 PageID #: 6849 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE UNJTED STATES OF AMERICA Plaintiff, v. C.A. No. 19-1548-LPS SABRE CORP., REDACTED PUBLIC SABRE GLBL INC., VERSION FARELOGIXINC., and (RELEASED APRIL 8, SANDLER CAPITAL PARTNERS V, L.P., 2020) Defendants. David C. Weiss, Laura D. Hatcher, and Shamoor Anis, UNITEDSTATES DEPARTMENT OF JUSTICE, Wilmington, DE Julie S. Elmer, Scott A. Westrich, Sarah P. McDonough, Robert A. Lepore, Aaron Comenetz, Brian E. Hanna, Craig W. Conrath,Dylan M. Carson, Rachel A. Flipse, Michael T. Nash, Jeremy P. Evans, Vittorio Cottafavi,Seth J. Wiener, John A. Holler, Grant A. Bermann, and Katherine A. Celeste, UNITED STATES DEPARTMENT OF JUSTICE, Washington, DC Attorneys forPlaintiff United States of America Joseph 0. Larkin and Veronica A. Bartholomew, SKADDEN, ARPS,SLATE, MEAGHER & FLOM LLP, Wilmington, DE Tara L. Reinhart and Steven C. Sunshine, SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP, Washington, DC Matthew M. Martino, Michael H. Menitove, and Evan R. Kreiner, SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP, New York, NY Attorneys forDefendants Sabre Corporation and Sabre GLBL Inc. Case 1:19-cv-01548-LPS Document 277 Filed 04/08/20 Page 2 of 97 PageID #: 6850 Daniel A. Mason, PAUL, WEISS, RIFKIND, WHARTON & GARRISON LLP, Wilmington, DE Kenneth A. Gallo, Jonathan S. Kanter, Joseph J. Bia!, and Daniel J. Howley, PAUL, WEISS, RIFKIND, WHARTON & GARRISON LLP, Washington, DC Attorneys for Defendants Farelogix Inc. and Sandler Capital Partners V, L.P. OPINION April 7, 2020 Wilmington, Delaware Case 1:19-cv-01548-LPS Document 277 Filed 04/08/20 Page 3 of 97 PageID #: 6851 INTRODUCTION The United States Department of Justice ("DOJ" or "government") filed this expedited antitrust action seeking to permanently enjoin the proposed acquisition by Defendants Sabre Corporation and Sabre GLBL Inc.
    [Show full text]
  • Rise of the Intelligent Machines in Healthcare March 2, 2016
    Rise of the Intelligent Machines in Healthcare March 2, 2016 Kenneth A. Kleinberg, FHIMSS Managing Director, Research & Insights The Advisory Board Company Conflict of Interest Kenneth A. Kleinberg, MA Has no real or apparent conflicts of interest to report. Agenda • Roundtable Learning Objectives • Overview of Intelligent Computing • Use in Other Industries • Uses in Health Care • Challenges and Futures • Roundtable Questions/Discussion • Summary/Wrap-Up Learning Objectives • Identify what advances in intelligent computing are having the greatest effect on other industries such as transportation, retail, and financial services, and how these advances could be applied to healthcare • Compare the types of technological approaches used in intelligent computing, such as inferencing, constraint-based reasoning, neural networks, and machine learning, and the types of problems they can address in healthcare • Identify examples of the application of intelligent computing in healthcare and the Internet of Things (IoT) that are already deployed or are in development and the benefits they provide, such as robotic assistants, smart pumps, speech interfaces, scheduling systems, and remote diagnosis • Recognize the workflow, workforce, and cultural changes that will need to occur in a world of intelligent machines, such as the morphing or elimination of job roles, comparisons of human to computer performance, and the reliance, risks and benefits of use of intelligent systems • Discuss the IT implications and how healthcare industry professionals can
    [Show full text]
  • Z/TPF Application Modernization Using Standard and Open Middleware
    IBM® WebSphere® Front cover z/TPF Application Modernization using Standard and Open Middleware Understanding extreme transaction rates and availability in SOA Refacing z/TPF applications Leveraging z/TPF in an open systems environment Lisa Banks Bradd Kadlecik Mark Cooper Colette A. Manoni Chris Coughlin David McCreedy Jamie Farmer Carolyn Weiss Chris Filachek Joshua Wisniewski Mark Gambino ibm.com/redbooks International Technical Support Organization z/TPF Application Modernization using Standard and Open Middleware June 2013 SG24-8124-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (June 2013) This edition applies to z/TPF Enterprise Edition 1.1 PUT 9. © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii Authors. xiii Now you can become a published author, too! . .xv Comments welcome. xvi Stay connected to IBM Redbooks . xvi Part 1. Overview . 1 Chapter 1. An introduction to z/TPF and its role in a service-oriented architecture . 3 1.1 Introduction . 4 1.2 z/TPF and service-oriented architecture . 4 1.3 z/TPF and WebSphere Application Server . 4 1.4 Overview of z/TPF. 5 1.5 TPF family of products . 5 1.6 Brief history of z/TPF . 6 1.7 Transaction . 6 1.8 Speed and reliability, availability, and scalability . 7 1.8.1 Speed and reliability. 7 1.8.2 Availability . 9 1.8.3 Scalability.
    [Show full text]