The Arcati Mainframe Yearbook 2020

Total Page:16

File Type:pdf, Size:1020Kb

The Arcati Mainframe Yearbook 2020 ArcatiArcati MainframeMainframe YearbookYearbook 20072020 Mainframe strategy The Arcati Mainframe Yearbook 2020 The independent annual guide for users of IBM mainframe systems SPONSORED BY: PUBLISHED BY: Arcati Limited 19 Ashbourne Way Thatcham Berks RG19 3SJ UK Phone: +44 (0) 7717 858284 Fax: +44 (0) 1635 881717 Web: http://www.arcati.com/ E-mail: [email protected] © Arcati Limited, 2020 1 Arcati Mainframe Yearbook 2020 Mainframe strategy Contents Welcome to the Arcati Mainframe Yearbook 2020 ............................................................ 3 10 Steps to True Mainframe DevOps: A Phased Approach to Cross-platform DevOps Success ................................................................................. 6 Mainframe Data Management .......................................................................................... 17 Join a Mainframe Development Revolution in 2020 – Embrace Open! ....................... 22 Indicators of Compromise and Why It Takes Six-Plus Months to ID a Breach ........... 27 Mainframe breaches: a beginner’s defensive strategy ................................................. 33 The 2020 Mainframe User Survey .................................................................................... 37 An analysis of the profile, plans, and priorities of mainframe users Vendor Directory ............................................................................................................... 55 Vendors, consultants, and service providers in the z/OS environment A guide to sources of information for IBM mainframers ............................................ 141 Information resources, publications, social media, and user groups for the z/OS environment Glossary of Terminology ................................................................................................ 147 Definitions of some mainframe-related terms Mainframe evolution ........................................................................................................ 179 Mainframe hardware timeline 1952-2019; mainframe operating system development SPONSORS Action Software 58, 59 Fujitsu 88. 88 BMC Software 27, 68 Key Resources 99, 100 Broadcom 22, 68 Model 9 17, 109 Compuware 6, 73 Software AG 123, 123 Data Kinetics 54, 77 Software Diversified Services 124, 125 ESAi 82, 82 Tone Software 131, 131 2 © Arcati Ltd, 2020 ArcatiArcati MainframeMainframe YearbookYearbook 20072020 Mainframe strategy Welcome to the Arcati Mainframe Yearbook 2020 We are very grateful – as always – to all those who have contributed this year by writing articles, taking part in our annual user survey, or updating their company profiles. In particular, I must thank the sponsors and advertisers, without whose support this Yearbook would not be possible. The big IBM announcement in 2019 was its new z15 mainframe, which culminates four years of development with over 3,000 IBM Z patents issued or in process and represents a collaboration with input from over 100 companies. Building on the z14’s pervasive encryption, IBM introduced Data Privacy Passports technology that can be used to gain control over how data is stored and shared. This gives users the ability to protect and provision data and revoke access to that data at any time. In addition, it not only works in the z15 environment, but also across an enterprise’s hybrid multi-cloud environment. This helps enterprises to secure their data wherever it travels. Also new with the z15 is IBM Z Instant Recovery, which uses z15 system recovery technologies, to limit the cost and impact of planned and unplanned downtime by accelerating the recovery of mission-critical applications by using full system capacity for a period of time. It enables general-purpose processors to run at full-capacity speed, and allows general-purpose workloads to run on zIIP processors. This boost period accelerates the entire recovery process in the partition(s) being boosted. Security is an on-going and growing issue for anyone with a computer, and enterprises especially. Back in the summer, the annual Evil Internet Minute report1 from RiskIQ, suggested that cyber-criminals cost the global economy $2.9 million every minute in 2018, for a total of $1.5 trillion. The report concluded this after analysing proprietary research and data derived from the volume of malicious activity on the Internet. Major companies are paying $25 per Internet minute because of security breaches, while hacks on cryptocurrency exchanges cost The Arcati Mainframe Yearbook 2020 $1,930. Criminals are leveraging multiple tactics, Publisher: Mark Lillycrop from ‘malvertising’ to phishing and supply chain Editorial Director: Trevor Eddolls attacks. The loss from phishing attacks alone is Contributors: Broadcom, Compuware, Model 9, $17,700 per minute. Global ransomware events BMC, Mark Wilson in 2019 were projected to total $22,184 by the © 2020, Arcati Limited. minute. Cyber-criminals have also increased their targets on e-commerce with Magecart hacks, All company and product names mentioned in this which grew by 20% over the last year. The study publication remain the property of their respective found 0.21 Magecart attacks were detected every owners. minute. It also found that in each Internet minute: This Yearbook is the copyright of Arcati Limited, and 8,100 identifier records are compromised, seven may not be reproduced or distributed in whole or in part malicious redirectors occur, and 0.32 apps are without the permission of the owner. A licence for internal blacklisted. Plus, there are 2.4 phish traversing e-mail or intranet distribution may be obtained from the the Internet per minute. publisher. Please contact Arcati for details. © Arcati Limited, 2020 3 Arcati Mainframe Yearbook 2020 Mainframe strategy IBM’s “Cost of a Data Breach Report”2, in 2019, highlighted the financial impact that organizations can feel for years after an incident. The actual cost of a breach has risen from $3.86m to $3.92m over the past year, and by over 12% over the past five years. According to IBM, in the USA, the cost of a breach is $8.19m. For companies with fewer than 500 employees, losses averaged out at over $2.5m, a potentially fatal sum. Mega breaches of over one million records cost $42m, while those of 50 million records are estimated to cost companies $388m. IBM also found that on average 67% of data breach costs were realized within the first year after a breach, but over a fifth (22%) accrued in the second year and another 11% accrued more than two years after the initial incident. Organizations in highly-regulated environments (like healthcare and financial services) were more likely to see higher costs in the second and third years, apparently. Malicious breaches accounted for the majority (51%) of cases, up 21% over the past six years, and cost firms more – on average $4.45m per breach. Accidental breaches, 49% of all incidents, cost slightly less than the global breach average. Human error cost $3.5m, and system glitches cost $3.24m. For the ninth year in a row, healthcare organizations suffered the highest cost of a breach – nearly $6.5m on average. IBM suggested that extensively tested incident response plans can minimize the financial impact of a breach, saving on average $1.23m. Other factors affecting the cost of a breach include how many records were lost, whether the breach came from a third party, and whether the victim organization had in place security automation tech and/or used encryption extensively. IBM’s most significant acquisition this year concluded on 9 July when it acquired Red Hat, which is best known for its version of Linux. IBM acquired all the issued and outstanding common shares of Red Hat for $190.00 per share in cash, representing a total equity value of around $34 billion. At the time, IBM said that the companies together will accelerate innovation by offering a next-generation hybrid multi-cloud platform. Based on open source technologies, such as Linux and Kubernetes, the platform will allow businesses to securely deploy, run, and manage data and applications on-premises and on private and multiple public clouds. The year ended with the news that Compuware intends to acquire Innovation Data Processing. This, perhaps, is another example of larger companies looking round for mid-range companies to strengthen their product range – like Syncsort’s acquisition of Pitney Bowes’ software and data business. As well as Data Privacy Passports, introduced with the z15 mainframe, some other acronyms we’re getting used to this year are zCX, WMLz, and Db2ZAI. zCX stands for z/OS Container Extensions (zCX), which let you run Linux capabilities in a container on z/OS. WMLz stands for IBM Watson Machine Learning for z/OS. It’s designed to simplify the production implementation of AI models. Users can develop models where they want. And, users can readily deploy them within their transaction applications for real-time insight. Db2ZAI stands for IBM Db2 AI for z/OS, which can optimize a Db2 for z/OS engine to determine the best-performing query access paths, based on the workload characteristics. You may also have come across fog computing or fog networking or fogging, which is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and then routes it over the Internet backbone. Looking forward to 2020, it’s interesting to see what Gartner highlights as the top 10 strategic technology trends for the year. They are: • Hyperautomation – the combination of multiple
Recommended publications
  • Implementing REXX Support in SDSF
    Front cover Implementing REXX Support in SDSF Harness the power of SDSF with the versatility of REXX Write powerful REXX code to manage your environment Access SDSF outside of your mainframe Lydia Parziale Ludvik Drobnic Dario Facchinetti Richard Levey Amy Miu ibm.com/redbooks International Technical Support Organization Implementing REXX Support in SDSF June 2007 SG24-7419-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (June 2007) This edition applies to z/OS Release 1 Version 9 with APAR PK43448 Note: This book is based on a pre-GA version of a product and might not apply when the product becomes generally available. We recommend that you consult the product documentation or follow-on versions of this book for more current information. © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . ix Notices . xi Trademarks . xii Preface . xiii The team that wrote this book . xiv Become a published author . xv Comments welcome. xvi Introduction and overview. 1 The REXX with SDSF interface . 2 Telling SDSF to execute commands . 4 Panel display commands . 5 New capabilities of REXX with SDSF in z/OS V1.9 . 11 SDSF programming practices . 13 Host environment verses interactive environment . 13 Recommendations . 14 Tune the command processing. 16 Areas to consider . 16 Debugging tools . 17 VERBOSE parameter . 17 SDSF trace . 17 Running REXX executables . 21 TSO/E address spaces . 21 Batch non TSO/E address spaces .
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe: z/OS Basics An introduction to mainframe computing on the IBM zSeries platform z/OS concepts and facilities for students and beginners zSeries hardware and peripheral devices Mike Ebbers Wayne O’Brien Bill Ogden ibm.com/ International Technical Support Organization z/OS Basics March 2005 SG24-6366-00 Note: Before using this information and the product it supports, read the information in “Notices” on page -1. First Edition (March 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . xvii How this text is organized . xvii How each chapter is organized . xviii Acknowledgements . xix Comments welcome. xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 1-1 1.1 The new mainframe. 1-2 1.2 Evolving architecture . 1-2 1.3 Mainframes in our midst . 1-4 1.4 What is a mainframe? . 1-5 1.5 Who uses mainframe computers?. 1-7 1.6 Factors contributing to mainframe use . 1-8 1.6.1 Reliability, availability, and serviceability. 1-9 1.6.2 Security . 1-10 1.6.3 Scalability . 1-10 1.6.4 Continuing compatibility . 1-11 1.7 Typical mainframe workloads . 1-11 1.7.1 Batch processing. 1-12 1.7.2 Online transactional processing . 1-15 1.8 Roles in the mainframe world . 1-17 1.8.1 Who is the system programmer? . 1-19 1.8.2 Who is the system administrator? .
    [Show full text]
  • Z/OS Basics Preface
    Contents Preface . iii How this course is organized . iii How each topic is organized . iv Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The S/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 6 1.5 What is a mainframe? . 7 1.6 Who uses mainframe computers?. 10 1.7 Factors contributing to mainframe use . 11 1.8 Typical mainframe workloads . 14 1.9 Roles in the mainframe world . 21 1.10 z/OS and other mainframe operating systems . 27 1.11 Summary . 29 Chapter 2. z/OS overview. 31 2.1 What is an operating system? . 32 2.2 Overview of z/OS facilities. 32 2.3 What is z/OS? . 34 2.4 Virtual storage and other mainframe concepts . 39 2.5 What is workload management? . 57 2.6 I/O and data management. 60 2.7 Supervising the execution of work in the system . 60 2.8 Defining characteristics of z/OS . 68 2.9 Licensed programs for z/OS . 69 2.10 Middleware for z/OS . 70 2.11 A brief comparison of z/OS and UNIX. 71 2.12 Summary . 73 Chapter 3. TSO/E, ISPF, and UNIX: Interactive facilities of z/OS . 75 3.1 How do we interact with z/OS? . 76 3.2 TSO overview . 76 3.3 ISPF overview . 80 3.4 z/OS UNIX interactive interfaces. 99 3.5 Summary .
    [Show full text]
  • Abcs of Z/OS System Programming Volume 1
    Front cover ABCs of z/OS System Programming Volume 1 Lydia Parziale Luiz Fadel Stanley Jon Redbooks International Technical Support Organization ABCs of z/OS System Programming Volume 1 November 2017 SG24-6981-04 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Fifth Edition (November 2017) This edition applies to version 2 release 3 of IBM z/OS (product number 5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2014, 2017. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. .x Now you can become a published author, too . .x Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. The World of IBM Z . 1 1.1 IBM Z hardware configuration . 2 1.2 Parallel Sysplex. 2 1.3 Coupling facility . 3 1.3.1 CF structure encryption. 3 1.4 Cryptographic hardware . 5 1.5 z/OS services . 5 1.6 ICSF . 7 1.7 z/OS security. 10 1.7.1 SAF . 10 1.7.2 RACF . 10 1.8 Data Facility Storage Management Subsystem . 11 1.8.1 z/OS Data Set Encryption . 12 1.9 IBM Health Checker for z/OS . 13 1.9.1 Health Checker for z/OS processing. 14 1.10 IBM z/OS Management Facility. 15 Chapter 2. The z/OS system programmer. 17 2.1 The role of the system programmer .
    [Show full text]
  • Enterprise Computing Mainframe
    Enterprise Computing Mainframe Dr. Shan Barkataki Chan Nguyen Viet Hoang Tu Tran Enterprise Computing Project Team Computer Science Dept California State University, Northridge 1 Contents • Two Parts – Mainframe (This set of slides) – Enterprise programming (COBOL, Tools and Techniques) • Mainframe • What is a Mainframe? Who uses them? Who runs them? • Important characteristics: reliability, availability, security • Computing power, batch, transaction, online processsing • Operating system & Programming • Jobs, internships, salary • Learning resources • Demonstrations • CSUN Enterprise Computing project 2 Why Learn Enterprise Computing? • The World economy runs on Enterprise systems • Banks, brokerage, stock exchanges – Point of sell transactions • Travel sites, air line ticketing, supermarket stock control – Healthcare & Insurance systems – Large manufacturing and commerce systems – Government computing • Enterprise systems run on Mainframes – Why? Speed, simplicity, reliability, scalability • Good part of the software is based on legacy code – COBOL 3 What is a Mainframe? • Part 1 – http://www.youtube.com/watch?v=d0-pLcgq-2M 4 People don’t know mainframes • Hollywood Myths vs. Reality 5 Modern Mainframe Physical Dimensions 79” Air flow Air flow front to rear front to rear 71” 31” 62” Business Class (BC) Enterprise Class (EC) 6 What is a mainframe • Part 2 – http://www.youtube.com/watch?v=ewsaYde59C0 7 Webopedia “A very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. In the hierarchy
    [Show full text]
  • JCL and SDSF
    Uni Hamburg – Mainframe Summit 2010 z/OS – The Mainframe Operating System Appendix 1 – JCL and SDSF Redelf Janßen IBM Technical Sales Mainframe Systems [email protected] © Copyright IBM Corporation 2010 Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.1 Introduction to the new mainframe Chapter 6: Using Job Control Language (JCL) and System Display and Search Facility (SDSF) © Copyright IBM Corp., 2010. All rights reserved. Introduction to the new mainframe Chapter 6 objectives Be able to: • Explain how JCL works with the system, give an overview of JCL coding techniques, and know a few of the more important statements and keywords • Create a simple job and submit it for execution • Check the output of your job through SDSF © Copyright IBM Corp., 2010. All rights reserved. 3 Introduction to the new mainframe Key terms in this chapter • concatenation • record format (RECFM) • DD statement • system display and search • Job Control Language (JCL) facility (SDSF) • JOB statement • step name • EXEC statement • system catalog • job name • system library • procedure (PROC) • utility © Copyright IBM Corp., 2010. All rights reserved. 4 Introduction to the new mainframe What is JCL? Job control language (JCL) tells the system what program to execute and provides a description of program inputs and outputs. There are three basic JCL statements: • JOB statement • EXEC statement • DD statement © Copyright IBM Corp., 2010. All rights reserved. 5 Introduction to the new mainframe Basic JCL coding syntax JCL must be uppercase Forward slash in column 1 and 2 Name (1-8 characters) follow the slashes Space separators //JOBNAME JOB //STEPNAME EXEC //DDNAME DD //* comment - upper or lower case /* ....end of JCL stream © Copyright IBM Corp., 2010.
    [Show full text]
  • Z/OS V1R1.0 Parallel Sysplex Overview Figures
    z/OS Parallel Sysplex Overview: Introducing Data Sharing and ParallelisminaSysplex SA22-7661-00 z/OS Parallel Sysplex Overview: Introducing Data Sharing and ParallelisminaSysplex SA22-7661-00 Note Before using this information and the product it supports, be sure to read the general information under “Appendix. Notices” on page 41. First Edition, March 2001 This edition applies to Version 1 Release 1 of z/OS (5694-A01), and to subsequent releases and modifications until otherwise indicated in new editions. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address below. IBM welcomes your comments. A form for readers’ comments may be provided at the back of this publication, or you may address your comments to the following address: International Business Machines Corporation Department 55JA, Mail Station P384 2455 South Road Poughkeepsie, NY 12601-5400 United States of America FAX (United States & Canada): 1+845+432-9405 FAX (Other Countries): Your International Access Code +1+845+432-9405 IBMLink (United States customers only): IBMUSM10(MHVRCFS) Internet e-mail: [email protected] World Wide Web: http://www.ibm.com/servers/eserver/zseries/zos/webqs.html If you would like a reply, be sure to include your name, address, telephone number, or FAX number. Make sure to include the following in your comment or note: v Title and order number of this book v Page number or topic related to your comment When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you.
    [Show full text]