IBM DSS and DCE Cross-Platform Guide

Total Page:16

File Type:pdf, Size:1020Kb

IBM DSS and DCE Cross-Platform Guide SG24-2543-01 IBM DSS and DCE Cross-Platform Guide December 1996 IBM International Technical Support Organization SG24-2543-01 IBM DSS and DCE Cross-Platform Guide December 1996 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix B, “Special Notices” on page 155. Second Edition (December 1996) This edition applies to: • OpenEdition DCE for use with OS/390 • OpenEdition DCE for VM/ESA, a feature of VM/ESA Version 2 • DCE Base Serivces/400 Version 3 for use with OS/400 Version 3 • DSS and DFS for AIX Version 4 Product Family for use with AIX Version 4 • DSS and DFS for OS/2 Warp, Version 4 • DCE for Windows 3.1 and Windows NT • Other IBM and non-IBM products Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 045 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1996. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . ix Preface . xi How This Redbook Is Organized ........................... xi The Team That Wrote This Redbook ......................... xii Comments Welcome . xiii Chapter 1. Distributed Computing and IBM′s Strategy .............. 1 1.1 The History of Distributed Computing ...................... 1 1.2 Requirements for Global Distributed Solutions ................ 2 1.3 The Distributed Computing Environment .................... 3 1.4 The IBM Open Blueprint .............................. 5 1.5 IBM DSS and DCE Products ........................... 9 Chapter 2. DCE Overview . 11 2.1 OSF DCE Architecture ............................... 11 2.2 OSF DCE Components and Services ...................... 12 2.2.1 DCE Threads . 12 2.2.2 DCE Remote Procedure Call ........................ 12 2.2.3 DCE Security Service ............................. 13 2.2.4 DCE Directory Service ............................ 15 2.2.5 DCE Distributed Time Service ........................ 16 2.2.6 Distributed File System ............................ 17 2.3 Organization of DCE Networks .......................... 18 Chapter 3. DCE Implementations on IBM Platforms ................ 21 3.1 OS/390 Implementation of DCE .......................... 22 3.1.1 OS/390 UNIX Environment .......................... 22 3.1.2 DCE Implementation Specifics on OS/390 ................. 28 3.1.3 User Environment . 32 3.1.4 Administration Tools . 32 3.1.5 Application Development . 34 3.1.6 DCE Application Support for CICS and IMS ................ 34 3.1.7 Products Packaging and Prerequisites .................. 36 3.2 VM/ESA OpenEdition Implementation of DCE ................. 37 3.2.2 DCE Implementation Specifics ....................... 40 3.2.3 User Environment . 44 3.2.4 Administration Tools . 45 3.2.5 Application Development . 46 3.2.6 Products Packaging and Prerequisites .................. 47 3.3 OS/400 Implementation of DCE .......................... 47 3.3.1 OS/400 Environment . 48 3.3.2 DCE Implementation Specifics ....................... 51 3.3.3 User Environment . 52 3.3.4 Administration . 53 3.3.5 Application Development . 55 3.3.6 Products Packaging and Prerequisites .................. 56 3.4 AIX Implementation of DCE ............................ 57 3.4.1 AIX Environment . 58 Copyright IBM Corp. 1996 iii 3.4.2 DCE Implementation Specifics ....................... 59 3.4.3 User Environment . 63 3.4.4 Administration Tools . 63 3.4.5 Application Development . 65 3.4.6 Planning Considerations . 66 3.4.7 Product Packaging and Prerequisites ................... 67 3.5 OS/2 Warp Implementation of DCE ....................... 68 3.5.1 OS/2 Warp Environment ........................... 68 3.5.2 DCE Implementation Specifics ....................... 70 3.5.3 User Environment . 71 3.5.4 Administration Tools . 71 3.5.5 Application Development . 72 3.5.6 Planning Considerations . 73 3.5.7 Product Packaging and Prerequisites ................... 74 3.6 DOS/Windows Implementation of DCE ..................... 75 3.6.1 DOS/Windows Environment . 75 3.6.2 DCE Implementation Specifics ....................... 75 3.6.3 User Environment . 76 3.6.4 Administration Tools . 76 3.6.5 Application Development . 77 3.6.6 Planning Considerations . 78 3.6.7 Product Packaging and Prerequisites ................... 78 3.7 IBM DCE Cross Platform Matrix 11/96 ..................... 78 Chapter 4. DCE Implementations on Non-IBM Platforms ............. 81 4.1 IBM DCE for Windows NT ............................. 81 4.1.1 Components . 81 4.1.2 Implementation Specifics . 82 4.1.3 Ordering Information . 82 4.2 Microsoft Windows 3.X, Windows 95, and Windows NT (Non-IBM) ..... 82 4.3 Apple Macintosh . 83 4.4 Novell NetWare . 83 4.5 UNIX World . 84 4.6 Other Operating Systems and Platforms .................... 84 Chapter 5. Security in a Distributed Environment ................. 87 5.1 Generic Security Service Application Programming Interface (GSS-API) . 88 5.2 Access Control List (ACL) ............................. 89 5.3 Privacy ........................................ 90 Chapter 6. IBM′s Software Products Will Exploit DCE .............. 91 6.1 IBM OS/2 Warp Server and OS/2 LAN Server ................. 91 6.2 IBM AIX Connections ............................... 93 6.3 IBM DATABASE 2 .................................. 94 6.4 IBM MQSeries .................................... 95 6.5 IBM Transaction Servers ............................. 95 6.5.1 IBM Transaction Server for AIX ....................... 95 6.5.2 IBM Transaction Server for Windows NT ................. 97 6.6 IBM Single Sign-On ................................ 97 6.7 IBM DFS Web .................................... 98 6.8 IBM LAN Distributed Platform (LANDP) .................... 100 6.9 IBM Printing Systems Manager for AIX .................... 103 6.10 DCE Distributed File System Exploitation .................. 105 6.10.1 DFS for Application Development Environments ........... 105 6.10.2 DFS for CATIA ............................... 105 iv IBM DSS and DCE Cross-Platform Guide 6.11 Adstar Distributed Storage Manager (ADSM) ............... 106 Chapter 7. Client/Server Application Development ............... 107 7.1 Why Use Client/Server Technology? ..................... 107 7.1.1 Introduction . 107 7.1.2 What Is Client/Server? ........................... 108 7.1.3 Communication Between Client and Server .............. 108 7.1.4 The Programmer’s Interface to the Communication Protocols ... 108 7.2 The DCE Programming Model ......................... 110 7.2.1 Low-Level DCE Programming ....................... 110 7.2.2 High-Level DCE Programming ...................... 111 7.3 DCE Application Development: What Does It Mean? ............ 111 7.3.1 The RPC Paradigm ............................. 112 7.3.2 Using Threads . 112 7.3.3 Using Security Services .......................... 112 7.3.4 Using Directory Services .......................... 114 7.3.5 Using Time Services ............................ 114 7.3.6 How to Create DCE-Based Applications ................. 114 7.4 Converting Legacy Applications ........................ 115 7.4.1 Using RPCs . 115 7.4.2 Using the Generic Security Service API ................. 116 7.5 DCE Development Solutions on the Market ................. 118 7.5.1 DCE Development Tools .......................... 119 7.5.2 DCE Object Oriented Development Tools ................ 122 7.5.3 Middleware that Exploits DCE ....................... 123 7.5.4 Additional IBM Tools ............................ 125 Chapter 8. DCE Administration Tools ....................... 129 8.1 Standard Administration ............................. 129 8.2 Platform-Specific Add-Ons to Standard Tools ................ 130 8.3 IBM DCE Manager for AIX ........................... 131 8.4 Tivoli Management Environment, TME 10 .................. 132 8.5 DCE Cell Manager from Chrisholm Technologies .............. 132 8.6 DCE/Sleuth from IntelliSoft Corp. ....................... 133 8.7 IBM Strategy for DCE Administration ..................... 133 Chapter 9. DCE Evolution and Future Directions ................. 135 9.1 OSF DCE 1.1 .................................... 135 9.1.1 Integration Services ............................. 135 9.1.2 Enhanced Enterprise Support ....................... 136 9.1.3 Improved Administration . 137 9.1.4 Performance Enhancements ........................ 138 9.1.5 DFS/NFS Gateway . 138 9.1.6 Other New Features ............................ 138 9.2 OSF DCE 1.2 .................................... 139 9.2.1 Integration with Other Environments ................... 139 9.2.2 Administration Enhancements . 140 9.2.3 Object Oriented Programming ...................... 140 9.2.4 Improvements to Distributed File System ................ 140 9.2.5 Other Enhancements . 141 9.3 DCE Technology for the Internet and Intranet ................ 142 9.4 More DCE Integration in IBM Products .................... 144 9.4.1 Products Incorporating DCE Core Technology ............. 144 9.4.2 DCE Integration in Distributed Application-Enablers ......... 145 9.4.3 IBM Professional Services Organizations ................ 146 Contents v Appendix A. Other Sources of Information .................... 147 A.1 Finding Information
Recommended publications
  • Programming Languages, Database Language SQL, Graphics, GOSIP
    b fl ^ b 2 5 I AH1Q3 NISTIR 4951 (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 100 . U56 4951 1992 NIST (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1992 (Supersedes July 1992 issue) U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director - ;,’; '^'i -; _ ^ '’>.£. ; '':k ' ' • ; <tr-f'' "i>: •v'k' I m''M - i*i^ a,)»# ' :,• 4 ie®®;'’’,' ;SJ' v: . I 'i^’i i 'OS -.! FOREWORD The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FTPS identified in this document. The Validated Products List is updated quarterly. iii ' ;r,<R^v a;-' i-'r^ . /' ^'^uffoo'*^ ''vCJIt<*bjteV sdT : Jr /' i^iL'.JO 'j,-/5l ':. ;urj ->i: • ' *?> ^r:nT^^'Ad JlSid Uawfoof^ fa«Di)itbiI»V ,, ‘ isbt^u ri il .r^^iytsrH n 'V TABLE OF CONTENTS 1.
    [Show full text]
  • Installation: Getting Started
    Tivoli® IBM Tivoli NetView for z/OS Version 5 Release 4 Installation: Getting Started SC31-8872-06 Tivoli® IBM Tivoli NetView for z/OS Version 5 Release 4 Installation: Getting Started SC31-8872-06 Note Before using this information and the product it supports, read the information in “Notices” on page 145. This edition applies to version 5, release 4 of IBM Tivoli NetView for z/OS (product number 5697-ENV) and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. This edition replaces SC31-8872-05. © Copyright International Business Machines Corporation 2001, 2009. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...................................vii About this publication .............................ix Intended audience .................................ix Publications ...................................ix IBM Tivoli NetView for z/OS library ..........................ix Related publications ...............................xi Accessing terminology online ............................xi Using NetView for z/OS online help ..........................xii Using LookAt to look up message explanations ......................xii Accessing publications online ............................xii Ordering publications...............................xiii Accessibility ...................................xiii Tivoli technical training ...............................xiii Downloads ...................................xiii
    [Show full text]
  • Eeeeett., '1 H-{6'~-H~-4Ttf1ete
    ~eeeeett., '1 H-{6'~-H~-4ttf1ete ommission Delegation European C ~~;;~ street, NW ~ JANVIER 199 7 '1W&Shin.gton, DO 2 Message de Monsieur E. BRACKENIERS . 3 COMMUNICATIONS . 5 STB INFO ................................................ 7 INFORMATIONS DU CENTRE DE CALCUL ....................... 18 ARTICLES . Translation Centre for the bodies of the European Union ............... 21 . La signature électronique . 22 . SNet - les fondations ........................................ 26 . INTRANET- Application architectures ............................ 27 . INTRANET - Application development tools ........................ 35 . Migration "Nouvelle plate-forme technologique" en site pilote à la DI ...... 44 . D'autres questions/réponses sur le projet 11Next Technological Platform" ..... 46 . New information technologies applied to statistics .................... 49 . SDTvista - vos originaux, nos traductions, des références intéressantes ...... 52 . Chaîne des SIC Outils logistiques ................................ 57· ORGANISATION ........................................... 61 TABLEAUX DE BORD . Budget informatique . 64 . Ressources humaines . 65 . Projets d'infrastructure ....................................... 67 . Formation ................................................ 68 LISTE DES PRODUITS ....................................... 72 COMITES 1 GROUPES DE TRAVAIL ............................ 91 -' CALENDRIER ............................................. 92 ~,---------------------------------------------------------~ lj C.E. 1 Direction Informatique
    [Show full text]
  • Class and Objects in C++ 193–278
    OBJECT-ORIENTED PROGRAMMING C++ SIMPLIFIED OBJECT-ORIENTEDOBJECT-ORIENTED PROGRAMMINGPROGRAMMING C++C++ SIMPLIFIEDSIMPLIFIED By HARI MOHAN PANDEY Assistant Professor Computer Engineering Department NMIMS University Mumbai (Maharashtra) UNIVERSITY SCIENCE PRESS !N)MPRINTOF,AXMI0UBLICATIONS0VT,TD "E.'!,U2U ∑ #(%..!)∑ #/#(). ∑ '57!(!4) ∑ (9$%2!"!$ *!,!.$(!2∑ +/,+!4! ∑ ,5#+./7 ∑ -5-"!) ∑ 2!.#() ∑ NEW DELHI ).$)! 53! '(!.!∑ +%.9! OBJECT-ORIENTED PROGRAMMING C++ SIMPLIFIED © by Laxmi Publications (P) Ltd. All rights reserved including those of translation into other languages. In accordance with the Copyright (Amendment) Act, 2012, no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise. Any such act or scanning, uploading, and or electronic sharing of any part of this book without the permission of the publisher constitutes unlawful piracy and theft of the copyright holder’s intellectual property. If you would like to use material from the book (other than for review purposes), prior written permission must be obtained from the publishers. Typeset at ABRO Enterprises, Delhi First Edition: 2015 ISBN 978-93-81159-50-7 Limits of Liability/Disclaimer of Warranty: The publisher and the author make no representation or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties. The advice, strategies, and activities contained herein may not be suitable for every situation. In performing activities adult supervision must be sought. Likewise, common sense and care are essential to the conduct of any and all activities, whether described in this book or otherwise. Neither the publisher nor the author shall be liable or assumes any responsibility for any injuries or damages arising herefrom.
    [Show full text]
  • Manage Your Software Budget with IBM Software Subscription for AIX
    Software Announcement September 13, 1999 Manage Your Software Budget with IBM Software Subscription for AIX Overview Highlights Include At a Glance • Software Subscription for AIX Agreement with no signature enables a single-site or worldwide required The Software Subscription for AIX enterprise customer to maintain • No minimum contract value includes: software version and release • currency. The offering, which • One-year contract Either one agreement for the includes base license, users, and entire enterprise under one • Automatic notification of program additional license upgrades, is a customer number or an upgrades one-year term agreement that helps agreement at the machine level you better manage your software • Automatic renewal and invoicing • Predictable budgeting for migration strategy at a known cost. upgrade maintenance • Ability to order multiple media You are billed annually with supply types with quantities on • Annual billing with automatic automatic renewal unless IBM is the same order renewal notified in writing. • Guidelines for IBM development For ordering, contact: With this subscription you can easily laboratories that release products Your IBM representative, an IBM acquire and manage selected AIX under this program Business Partner, or IBM Americas software upgrades and better Call Centers at • Clarification of area and customer manage your software budget. 800-IBM-CALL Reference: RE001 responsibilities Software Subscription for AIX EXTRA! EXTRA! . replaces the IBM Software Upgrade Key Prerequisites Protection Plan for AIX and UNIX Subscribe to IBM iSource, your electronic Original licensed program eligible for source for customized IBM information! Operating System Based Software Go to our Web site at (5692-ADV) for new and expired upgrade protection http://www.ibm.com/isource contracts.
    [Show full text]
  • Reassessing Client/Server Tools and Technologies Lawrence K
    Previous 4-04-40 Reassessing Client/Server Tools and Technologies Lawrence K. Cooper John S. Whetstone Payoff Client/server computing has not yet realized its promise of faster applications development, reduced maintenance costs, and enterprise scalability. This article's review of client/server technologies from the perspective of whether they cause developers to focus more on the tool than on the business problem helps IS and business managers appreciate what each technology can and cannot do. Understanding that client/server computing is more a concept than a technology is key to the proper evaluation of the tools and strategies flooding the marketplace. Introduction During the past 10 years, client/server architecture and technologies have been hailed as spelling the demise of the mainframe-centric view of computing. Corporations purchased PC by the truckload and bought myriad development tools, languages, and frameworks for developers and users alike. Products with descriptions such as GUI-builders, front ends, gateways, back ends, middleware, and glue flooded the client/server marketplace. Applications were supposed to be able to be developed faster and maintenance costs were supposed to decrease. Clearly this has not been the case: Client/server computing has proven to be both a boon and a bust. Although it provides more flexibility, it requires more computing resources, faster networks, and higher maintenance. According to a recent Gartner study, client/server computing costs often exceed mainframe-centric computing by up to 70%. Client/server computing also poses an abundance of data security problems. Current technologies are at a middle stage between the rigorous structures of mainframes and the total openness implicit in many of the new architectures.
    [Show full text]
  • Network Control Program System Support Program Emulation Program Messages and Codes Publication No
    Network Control Program SC31-6222-06 System Support Program Emulation Program Messages and Codes ÉÂÔ Network Control Program SC31-6222-06 System Support Program Emulation Program Messages and Codes Note Before using this document, read the general information under “Notices” on page vii. Seventh Edition (October 1998) This is a major revision of, and obsoletes, SC31-6222-05 (which was available in softcopy only). This edition applies to: Advanced Communications Function/Network Control Program (ACF/NCP) Version 7 Release 7 (program number 5648-063) Advanced Communications Function/System Support Programs (ACF/SSP) Version 4 Release 7 for MVS (program number 5655-041) Advanced Communications Function/System Support Programs (ACF/SSP) Version 4 Release 7 for VM (program number 5654-009) Advanced Communications Function/System Support Programs (ACF/SSP) Version 4 Release 7 for VSE (program number 5686-064) Emulation Program for IBM Communication Controllers Release 14 (program number 5735-XXB) and to all subsequent releases and modifications until otherwise indicated in new editions or technical newsletters. See “What Is New in This Book” for the changes made to this manual. Technical changes or additions to the text and illustrations are indicated by a vertical line to the left of the change. Make sure you are using the correct edition for the level of the product. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address below. IBM welcomes your comments. A form for readers’ comments is provided at the back of this publication. If the form has been removed, you may address your comments to: Design & Information Development Dept.
    [Show full text]
  • Zcs Technical Update.Pptx
    z/OS V2R2 Communications Server Technical Update, Parts 1 & 2 SHARE 2015 Winter Technical Conference Sessions 16739 and 16740 Gus Kassimis [email protected] Insert Sam Reynolds Custom Session [email protected] QR if Desired. Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. IBM* IBM Logo* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • Price Changes: CATIA V5 Automotive Extensions/Vehicle
    Price Changes in Monthly License Charges (MLC) for Selected Price Metrics on Selected IBM System z Software Programs Announcement Letter Number PA15-166 (516-009) Europe Middle East and Africa Table of Contents Announcement Letter No. PA15-166 (516-009) dated October 13, 2015 Price Changes in Monthly License Charges (MLC) for Selected Price Metrics on Selected IBM System z Software Programs Effective date: February 1, 2016 Overview Terms and Conditions Announcement Countries Announcement Letter No. PA15-166 (516-009) dated October 13, 2015 Price Changes in Monthly License Charges (MLC) for Selected Price Metrics on Selected IBM System z Software Programs Overview IBM® announces increases in monthly license charges (MLC) on select operating system and select middleware software programs and their features. For the affected programs, the price changes will only apply to the following monthly license charge (MLC) software pricing metrics: FWLC, TWLC, PSLC, PSF Printer Block Tiers, Per System with VOQ and non variable charge. The price increase for a given program will be approximately 4% depending on the features selected. In addition, IBM® announces an increase in the monthly license charges for IP Transform AFP2PCL V2.1 (5655P19), IP Transform AFP2PDF V2.1 (5655P20) and IP Transform AFP2PS V2.1 (5655P21) which will apply to all software billing metrics. This increase will align the price of these products with the price of their respective replacement products Print Transform AFPXPCL (5655TF2), Print Transform AFPXPDF (5655TF1) and Print Transform AFPXPS (5655TF3) and will reflect approximately a 13% to 25% increase depending on the server type. The timing of this announcement allows most clients to understand these changes before budgeting for the following year.
    [Show full text]
  • IBM System/36 Facts Folder
    System/36 Facts Folder G360-0809-4 Preface This facts folder describes the IBM System 36. Topics discussed include the IBM 5360, 5362 and 5364 Sys- tem Units highlights, I/O devices, communications capabilities, the System Support Program (SSP), and application software. This publication will be updated periodically to reflect changes; however, the authoritative sources of infor- mation for the associated components and for pro- gramming support are the System Library publications. Consult your local IBM Marketing Representative for availability dates of the system hardware components and the various programming functions. Fifth Edition (August 1985) This major revision obsoletes G360-0809-3. Changes may be periodically made to the information herein; any such changes will be reported in subsequent revisions. References in this publication to IBM products, pro- grams, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Any reference to an IBM program product in this docu- ment is not intended to state or imply that only IBM’s program product may be used. Any functionally equiva- lent program may be used. Publications are not stocked at the address given below. Requests for IBM publications should be made to your IBM representative or to an IBM branch office serving your locality. Address your comments concerning this publication to IBM Corporation, Dept. 796, PO. Box 2150, Atlanta, Georgia 30055. IBM may use or distribute whatever information you supply in any way it believes appro- priate without incurring any obligation to you. Contents Introduction ................................... 3 IBM System/36 highlights ........................ 3 Hardware general description ...................
    [Show full text]
  • Z/OS Communications Server Glossary
    z/OS Communications Server Glossary Version2Release1 Glossary This glossary provides terms and definitions for the z/OS Communications Server software and products. For other terms and definitions, see the IBM Terminology website. Numerics 31-bit storage addressing An addressing structure introduced with the MVS/XA operating system that supports addressing up to 2 GB of real and virtual memory, in addition to the prior support for 24-bit addressing. The architecture has since been extended with 64-bit addressing. 3270 data stream The commands, control codes, orders, attributes, and data or structured fields for 3270 devices, that are transmitted inbound to an application program or outbound to a terminal. A AAL See ATM adaptation layer. AARP See AppleTalk Address Resolution Protocol. abend See abnormal end of task. abend dump A dump that is produced when a program ends abnormally. ABM 1. See activity based management. 2. See asynchronous balanced mode. abnormal end of task (abend) The termination of a task, job, or subsystem because of an error condition that recovery facilities cannot resolve during execution. abnormal termination A system failure or operator action that causes a job to end unsuccessfully. ABR See area border router. abstract syntax A data specification that includes all distinctions that are needed in data transmissions, but that omits (abstracts) other details such as those that depend on specific computer architectures. See also Abstract Syntax Notation One, Basic Encoding Rules. Abstract Syntax Notation One (ASN.1) 1. The international standard for defining the syntax of information data. It defines a number of simple data types and specifies a notation for referencing these types and for specifying values of these types.
    [Show full text]
  • Validated Products List: Programming Languages, Database Language
    NISTIR 469 (Supersedes NISTIR 4623) VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Language SQL Graphics ®OSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director — QC 100 .U56 NIST //4690 1991 V C.2 NISTIR 4690 (Supersedes NISTIR 4623) - ' J JF VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Langucige SQL Graphics GOSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director FOREWORD The Validated Products List (formerly called the Validated Processor List) is a collection of registers describing implementations of Federal Information Processing Standards (FIPS) that have been tested for conformance to FIPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The Validated Products List is updated quarterly. TABLE OF CONTENTS 1. INTRODUCTION 1-1 1.1 Purpose 1-1 1.2 Document Organization 1-1 1.2.1 Programming Languages 1-1 1.2.2 Database Language SQL 1-2 1.2.3 Graphics 1-2 1.2.4 GOSIP 1-2 1.2.5 POSIX 1-2 1.2.6 FIPS Conformance Testing Products 1-2 2.
    [Show full text]