ICL Technical Journal Volume 7 Issue 2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Validated Products List, 1995 No. 3: Programming Languages, Database
NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management. -
IDMS Conversion
IDMS Conversion The Modern Systems IDMS conversion includes the generation of a new relational database to replace the functionality, set relationships, indexes, and data structures that are currently part of the IDMS network database. The new target database can reside on or off the mainframe, and can use any of the standard relational database management systems (RDBMS): Microsoft SQL Server, Oracle or IBM DB2. Database Functionality DB-Shuttle™ provides The Modern Systems solution provides a complete replacement for all IDMS automated technology database functionality: that protects legacy assets, reduces • IDMS record layouts maintenance costs, • Group-level elements, Occurs and Redefines clauses within IDMS record provides agility and definitions flexibility, and enables • Set definitions (record-to-record relationships) Service-Oriented • System-owned indexes Architecture (SOA) • Bill-of-material structures within business-critical • Multi-member sets, multi-set relationships between two record types applications. • Duplicate CALC designations • Sorted sets, Chained sets and NEXT sets Relational Results The resulting database is fully relational. Primary keys, foreign keys and index definitions are automatically created. All constraints are generated into the resulting DDL. Table spaces, indexes, table names and column names are all generated according to your naming standards. Delivered Components As part of the delivery process, Modern Systems generates and delivers the following component types for installation in the new relational -
Miami-Dade County
MIAMI-DADE COUNTY Cognos Business Analytics and IDMS Integration at Miami-Dade County Abstract of the Program Miami-Dade County led the way as the first company in the world to successfully extract information from a CA IDMS network database using IBM Cognos Business Analytics. Miami- Dade County stores the majority of their critical data, such as Criminal Justice, Payroll, Traffic and Building information in CA IDMS mainframe databases and traditionally extracts this data using Computer Associates CA IDMS tools (CA ADS ADS/O and IDMS/Cobol/IDMS). Through the collaboration of CA Computer Associates, IBM, and Miami-Dade County, a driver was created for IBM Cognos to access this data directly by using Business Analytics tools without the need for exporting the data into a contemporary distributed environment. The problem or need for the program IDMS (Integrated Database Management System) is primarily a network (CODASYL) database management system for mainframes. Only CA tools could access IDMS data. IDMS mainframe technology did not have the capability to be accessed directly by contemporary business analytics software solutions. This limitation required data extraction, file transfer protocols, and script loading processes to expose IDMS, IMS, and DB2 mainframe data to contemporary technologies, including business analytics tools like IBM Cognos Analytics. Multiple data warehouses and operational data stores are loaded from the primary data sources originating from the IDMS mainframe platform and other relational data sources. More than 50 production IDMS databases are actively supported and used county-wide at Miami- Dade County. Access to data by the distributed world such as making the data available on an Oracle or MSSQL database requires adding multiple intermediate steps, using multiple technologies, and multiple points of failure to migrate data and make it available to analytic technologies. -
Computer Conservation Society
Issue Number 88 Winter 2019/20 Computer Conservation Society Aims and Objectives The Computer Conservation Society (CCS) is a co-operative venture between BCS, The Chartered Institute for IT; the Science Museum of London; and the Science and Industry Museum (SIM) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of BCS. The objects of the Computer Conservation Society (“Society”) are: To promote the conservation, restoration and reconstruction of historic computing systems and to identify existing computing systems which may need to be archived in the future; To develop awareness of the importance of historic computing systems; To develop expertise in the conservation, restoration and reconstruction of historic computing systems; To represent the interests of the Society with other bodies; To promote the study of historic computing systems, their use and the history of the computer industry; To publish information of relevance to these objectives for the information of Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by a grant from BCS and from donations. There are a number of active projects on specific computer restorations and early computer technologies and software. Younger people are especially encouraged to take part in order to achieve skills transfer. The CCS also enjoys a close relationship with the National Museum of Computing. Resurrection The Journal of the Computer Conservation Society ISSN 0958-7403 Number 88 Winter 2019/20 Contents Society Activity 2 News Round-Up 9 The Data Curator 10 Paul Cockshott From Tea Shops to Computer Company: The Improbable 15 Story of LEO John Aeberhard Book Review: Early Computing in Britain Ferranti Ltd. -
CASE STUDY GE CAPITAL ASSESSING, CONVERTING, & REPLATFORMING a MASSIVE BUSINESS CRITICAL APPLICATION with ASTONISHING RESULTS Introduction
CASE STUDY GE CAPITAL ASSESSING, CONVERTING, & REPLATFORMING A MASSIVE BUSINESS CRITICAL APPLICATION WITH ASTONISHING RESULTS Introduction GE Capital is the financial services unit of the American conglomerate General Electric, it provides commercial lending and leasing, as well as a range of financial services for consumers. Most of GE Capital’s commercial loans are to small and midsized companies, spread across multiple industries and geographies, and secured by tangible assets. GE Capital’s consumer lending activities are also diversified by product and geography and include operations in 55 countries. Project Summary GE Capital was looking to move their PMS suite of $ 2014 Net Income: $7.0 billion applications from ADS/O and COBOL/IDMS running 2014 Assets: $499 billion on a mainframe, to COBOL running with Oracle on Unix without changing the user interface in the Operations in 40+ Countries process. PMS was built by GE Capital in 1987 500,000+ Commercial Customers and began its life as a 20,000 account schedule system without any interfaces. 35,000+ Employees As with most homegrown systems, it was built out of necessity and to serve the business as it existed at the time. Over the decades, this small system grew in size and complexity to become the central nervous system of both GE Capital’s direct and indirect business units comprised of four highly customized implementations. With over 5 million account schedules, 382 interfaces, 1,700 concurrent users, and 3.5 million transactions per day running against 71 million lines of code, the PMS system had come a long way from its humble roots. -
DATABASE SYSTEMS: a BRIEF TIMELINE Event Consequence Pre-1960S 1945 Magnetic Tapes Developed (The First Medium Replaced Punch Cards and Paper Tape
DATABASE SYSTEMS: A BRIEF TIMELINE Event Consequence Pre-1960s 1945 Magnetic tapes developed (the first medium Replaced punch cards and paper tape. to allow searching). 1957 First commercial computer installed. 1959 McGee proposed the notion of generalized access to electronically stored data. 1959 IBM introduced the Ramac system. Read data in a non-sequential manner, and access to files became feasible. The '60s 1961 The first generalized DBMS-GE'S Integrated Formed the basis for Network Data Model Data Store (IDS)-designed by Bachman; developed by Conference on Data Systems wide distribution by 1964. Bachman Languages Database Task Group (CODASYL popularized data structure diagrams. DBTG). 1965- · Generalized file management systems Provided two-level conceptual/user view 1970 developed by numerous vendors. organization of data. · Information Management System (IMS) developed by IBM. Formed the basis for Hierarchical Data Model. · IMS DB/DC (database/data communication) System was the first Supported network views on top of the large-scale DB/DC system. hierarchies. · SABRE, developed by IBM and American Airlines. Allowed multiple-user access to data involving a communication network. The '70s Database technology experienced rapid Commercial systems followed CODASYL growth. DBTG Proposal, but none fully implemented it. IDMS system by B. F. Goodrich, Honeywell's IDS II, UNIVACs DMS 1100, Burroughs's DMS-II, CDCs DMS-170, Phillips's PHOLAS, and Digital's DBMS-11. Several integrated DB/DC systems: Cincom’s TOTAL plus ENVIRON/l. DBMS developed as an academic discipline and a research area. 1970 The relational model is developed by Ted Laid foundation for database theory. Codd, an IBM research fellow. -
CA IDMS Best Practices Guide
CA IDMS™ Best Practices Guide Version 18.0.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. -
Tcvision IBM Mainframe Integration Through Change Data Capture Fact Sheet
tcVISION IBM Mainframe Integration Through Change Data Capture Fact Sheet Mainframe data integration has taken on more urgency in recent years The tcVISION Solution as organizations seek to relocate mainframe workloads to lower-cost tcVISION is ready to meet new technologies and challenges. Thanks to platforms, modernize mainframe applications and leverage analytics for tcVISION’s flexible architecture, support for new targets—including AWS, customer insight and competitive advantage. These factors are driving specialty, NoSQL and analytic databases such as Exasol, IBM DB2 BLU adoption of Cloud (e.g., Amazon Web Services [AWS]) and Big Data as and MongoDB—, transport layers and protocols is being continuously strategic components in corporate technology architecture. added, quickly and with minimal effort. With tcVISION, real-time Cloud and Big Data integration can embrace both mainframe (IBM DB2, IMS/ tcVISION’s support for Cloud and Big Data as targets is fully integrated DB, DL/1, Software AG Adabas, CA IDMS, CA Datacom and alongside traditional Linux/Unix/Windows (LUW) targets such as Oracle VSAM), Cloud, and LUW (IBM DB2 LUW, Oracle, IBM Informix, Database, IBM DB2 LUW, Software AG Adabas LUW, IBM Informix, Sybase, Microsoft SQL Server, PostgreSQL, Software AG Adabas Sybase, Microsoft SQL Server, PostgreSQL and ODBC. LUW) sources. tcVISION can deliver replicated data to Cloud and Big Data targets Why tcVISION? through a variety of means: creating files, writing directly into Hadoop • Increasing number of enterprise applications that utilize their own HDFS, and via streaming using Apache Kafka as the transport layer. Data databases. can be packaged using standard JSON and CSV protocols. • Requirement for up-to-date information demands real-time, bi- directional data synchronization between mainframe and open systems. -
Chapter 3. the Persistent Programming Language, PS-Algol
https://theses.gla.ac.uk/ Theses Digitisation: https://www.gla.ac.uk/myglasgow/research/enlighten/theses/digitisation/ This is a digitised version of the original print thesis. Copyright and moral rights for this work are retained by the author A copy can be downloaded for personal non-commercial research or study, without prior permission or charge This work cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Enlighten: Theses https://theses.gla.ac.uk/ [email protected] On The Utilisation of Persistent Programming Environments Richard Cooper A thesis submitted to the Faculty of Science, University of Glasgow For the degree of Doctor of Philosophy September, 1989 © R. L. Cooper, 1989 ProQuest Number: 10999281 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 10999281 Published by ProQuest LLC(2018). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States C ode Microform Edition © ProQuest LLC. -
IDMS File Access Guide
IDMS File Access Guide Release 8.1.3 November 2013 IKAN Solutions N.V. Kardinaal Mercierplein 2 B-2800 Mechelen BELGIUM Copyright © 2013, IKAN Solutions N.V. No part of this document may be reproduced or transmitted in any form or by any means, electronically or mechanically, for any purpose, without the express written permission of IKAN Solutions N.V. MetaSuite, MetaStore Manager, MetaMap Manager and Generator Manager are trademarks of IKAN Solutions N.V. IDMS is a trademark of Computer Associates (CA Inc). Table of Contents Chapter 1 - About This Manual........................................................................... 1 1.1. Prerequisites ...........................................................................................................................................................1 1.2. Related Publications ...............................................................................................................................................1 Chapter 2 - MetaSuite File Access Overview...................................................... 3 Chapter 3 - CA-IDMS Concepts and Terminology .............................................. 4 3.1. Overview.................................................................................................................................................................4 3.2. CA-IDMS data structures........................................................................................................................................4 3.3. Records...................................................................................................................................................................4 -
ICL Technical Journal Volume 5 Issue 3
TECHniCAl j o u m n i Volume 5 Issue 3 May 1987 Published by INTERNATIONAL COMPUTERS LIMITED at OXFORD UNIVERSITY PRESS iCL The ICL Technical Journal is published twice a year by TECHniCRl International Computers Limited at Oxford University jouRnfli Press. Editor J. Howlett ICL House, Putney, London SW15 ISW, UK Editorial Board J. Howlett (Editor) F.F. Land H.M. Cropper (F International) (London School of Economics & D.W. Davies, FRS Political Science) G.E. Felton K.H. Macdonald M.D. Godfrey M R. Miller C.H.L. Goodman (British Telecom Research (Standard Telephone Laboratories) Laboratories and Warwick J.M. Pinkerton University) E.C.P. Portman All correspondence and papers to be considered for publication should be addressed to the Editor. The views expressed in the papers are those of the authors and do not necessarily represent ICL policy. 1987 subscription rates: annual subscription £32 UK, £40 rest of world, US $72 N. America; single issues £17 UK, £22 rest of world, US $38 N. America. Orders with remittances should be sent to the Journals Subscriptions Department, Oxford University Press, Walton Street, Oxford 0X2 6DP, UK. This publication is copyright under the Berne Convention and the Interna tional Copyright Convention. All rights reserved. Apart from any copying under the UK Copyright Act 1956, part 1, section 7, whereby a single copy of an article may be supplied, under certain conditions, for the purposes of research or private study, by a library of a class prescribed by the UK Board of Trade Regulations (Statutory Instruments 1957, No. 868), no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior permission of the copyright owners. -
Fcommi SS IONEN for DE EUROPÆISKE FÆLLESSKABER
fcoMMI SS IONEN FOR DE EUROPÆISKE FÆLLESSKABER KOM(93) 454 end«lig udg. Bruxelles, den 22. oktober 1993 (forelagt af Kommissionen) EVALUERINGSRAPPORT VEDRØRENDE DET STATISTISKE PROGRAM 1989-1992 INDHOLD INDHOLD FORORD 8 INDLEDNING ; 9 DEL 1 - SAMMENFATNING .. 9 I. Målsætninger for det statistiske program 1989-1992 JO II. Overvågning af det statistiske program 10 III. Gennemførelsen af det statistiske program 1989-1992 11 III.A. Redskaber til gennemførelsen 11 III.B. Aktioner for gennemførelsen 12 III.B.1. Den almindelige koordinering i institutionerne 12 III.B.2. Dialogen med de nationale statistiksystemer 12 III.B.3. Det internationale statistiske samarbejde 12 IV. Midler til opfyldelse af de fastlagte målsætninger 13 V. Budget for det statistiske program 17 VI. Evaluering af de overordnede resultater 19 DEL 2: SAMMENFATNING AF RESULTATER SAMT PROBLEMER VED IVÆRKSÆTTELSEN AF DE STATISTISKE PROGRAMMER, DER ER UDARBEJDET I FORBINDELSE MED FÆLLESSKABSPOLITIKKER 22 I. STATISTISKE OPGAVER INDEN FOR RAMMERNE AF DEN EUROPÆISKE FÆLLES AKT ;............22 I.A. Statistiske opgaver med henblik på virkeliggørelsen af det indre marked 22 I.A.1. Standardisering og beskyttelse af fortrolige oplysninger 22 I.A.2 Statistik over EF-samhandelen efter 1992 22 I.A.3. Virksomhedsstatistik 24 - Page 2 - EVALUERINGSRAPPORT VEDRØRENDE DET STATISTISKE PROGRAM 1989-1992 INDHOLD I.B. Statistik med henblik på etablering af et udvidet økonomisk og socialt samarbejde 24 I.B.1. Statistik til styrkelse af den sociale og økonomiske samhørighed - standardisering 24 I.B.2. Statistik til styrkelse af det sociale samarbejde 25 I.B.3. Statistik til støtte for Den Økonomiske og Monetære Union 28 I.B.4.