IBM CICS and Liberty: What You Need to Know

Total Page:16

File Type:pdf, Size:1020Kb

IBM CICS and Liberty: What You Need to Know Front cover IBM CICS and Liberty: What You Need to Know Hernan Cunico Andreas Hümmer Jonathan Lawrence Shayla Robinson Andre Schreiber Inderpal Singh Prabhat Srivastava Phil Wakelin Dan Zachary Redbooks International Technical Support Organization IBM CICS and Liberty: What You Need to Know January 2016 SG24-8335-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (January 2016) This edition applies to V5R3M0 of CICS Transaction Server (product number 5655-Y04). © Copyright International Business Machines Corporation 2016. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x IBM Redbooks promotions . xi Preface . xiii Authors. xiii Now you can become a published author, too! . .xv Comments welcome. .xv Stay connected to IBM Redbooks . .xv Chapter 1. Introduction. 1 1.1 What to expect from this book. 2 1.1.1 Intended audiences. 2 1.1.2 Scenarios . 2 1.2 What is Liberty? . 2 1.2.1 Java EE 6 . 3 1.2.2 Java EE 7 . 4 1.2.3 Additional resources . 4 1.3 Benefits of running web applications in CICS . 5 1.3.1 Skills . 5 1.3.2 Integration . 5 1.3.3 Performance . 6 1.3.4 Cost reduction. 6 1.3.5 Porting a web application . 6 1.3.6 Creating an integration logic interface. 8 1.3.7 Creating a Java business logic application . 8 1.4 What’s new in Liberty for CICS TS V5.3 . 9 1.4.1 Supported Liberty features . 9 1.4.2 CICS features . 13 1.4.3 Unsupported APIs. 13 Part 1. Technology essentials . 15 Chapter 2. Application development. 17 2.1 Application development . 18 2.1.1 Web invocation options. 18 2.2 Accessing CICS data . 19 2.2.1 CICS Java class library (JCICS) API . 19 2.3 Database access options . 20 2.3.1 JDBC access options . 20 2.3.2 Java Transaction API . 25 2.3.3 Access to non-SQL databases . 26 2.4 Optimizing static content . 27 2.4.1 Static content separation . 28 2.4.2 Dynamic caching. 29 2.5 Application deployment options . 32 2.5.1 Liberty deployment methods. 33 2.5.2 CICS deployment methods . 35 © Copyright IBM Corp. 2016. All rights reserved. iii 2.5.3 Deploying shared (middleware) bundle. 36 2.6 Application redeployment options . 39 2.6.1 Redeploy by using Liberty deployment methods . 39 2.6.2 Redeploy using CICS bundle deployment . 39 2.7 Migrating a Java EE application to Liberty . 42 2.7.1 Application validation . 42 2.7.2 Server environment migration. 43 2.7.3 External dependency migration . 44 Chapter 3. Workload management . 45 3.1 IP load balancing. 46 3.1.1 Port sharing. 46 3.1.2 Sysplex Distributor . 47 3.2 Web server plug-in . 48 3.2.1 Load balancing . 51 3.2.2 Failover . 51 3.2.3 HTTP session management . 52 3.3 CICSPlex SM workload management. 53 3.3.1 Workload balancing . 54 3.3.2 Workload separation . 55 Chapter 4. Security options . 57 4.1 Java Platform, Enterprise Edition security . 58 4.1.1 Deployment descriptor . 58 4.1.2 Key steps in security processing. 59 4.2 Confidentiality . ..
Recommended publications
  • Cloud Enabling CICS
    Front cover Cloud Enabling IBM CICS Discover how to quickly cloud enable a traditional IBM 3270-COBOL-VSAM application Use CICS Explorer to develop and deploy a multi-versioned application Understand the benefits of threshold policy Rufus Credle Isabel Arnold Andrew Bates Michael Baylis Pradeep Gohil Christopher Hodgins Daniel Millwood Ian J Mitchell Catherine Moxey Geoffrey Pirie Inderpal Singh Stewart Smith Matthew Webster ibm.com/redbooks International Technical Support Organization Cloud Enabling IBM CICS December 2014 SG24-8114-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (December 2014) This edition applies to CICS Transaction Server for z/OS version 5.1, 3270-COBOL-VSAM application. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii IBM Redbooks promotions . ix Preface . xi Authors. xii Now you can become a published author, too! . .xv Comments welcome. .xv Stay connected to IBM Redbooks . xvi Part 1. Introduction . 1 Chapter 1. Cloud enabling your CICS TS applications . 3 1.1 Did you know?. 4 1.2 Business value . 4 1.3 Solution overview . 5 1.4 Cloud computing in a CICS TS context. 6 1.5 Overview of the cloud-enabling technologies in CICS TS V5 . 11 1.5.1 Platform overview . 12 1.5.2 Application overview . 13 Chapter 2. GENAPP introduction. 15 2.1 CICS TS topology . 16 2.2 Application architecture. 17 2.2.1 GENAPP in a single managed region.
    [Show full text]
  • Efficiency of Tuna Purse-Seiners and Effective Effort’ « Efficacité Des Senneurs Thoniers Et Efforts Réels » (ESTHER)
    SCTB15 Working Paper FTWG–5 ‘Efficiency of Tuna Purse-Seiners and Effective Effort’ « Efficacité des Senneurs Thoniers et Efforts Réels » (ESTHER) 1 Selected Annotated Bibliography Marie-Christine REALES ESTHER Project Document Officer 1 To receive the complete ESTHER ANNEXE BIBLIOGRAPHIQUE, contact Daniel Gaertner, 1 Institute of Research for Develoment (IRD - UR 109), CHMT BP 171, 34203 Séte Cedex, France PROGRAMME DE RECHERCHES N° 98/061 IRD (Institut de Recherches pour le Développement) / IEO (Instituto Español de Oceanografía) ‘Efficiency of Tuna Purse-Seiners and Effective Effort’ « Efficacité des Senneurs Thoniers et Efforts Réels » (ESTHER) ANNEXE BIBLIOGRAPHIQUE Marie-Christine REALES Documentaliste du projet ESTHER 1 SOMMAIRE INTRODUCTION……………………………………………………………………p. 4 I.Méthodologie………………………………………………………..…………….…p. 5 I.1 Etablissement d'une liste de mots-clés……………………………………...………...p. 5 I.2 Sources utilisées………………………………………………………………………p. 5 I.3 Recherche et validation des résultats…………………………………………………p. 7 I.3.1 Interrogation des bases…………………………………………………………p. 7 I.3.2 Evolution de la liste de mots-clés………………………………………………p. 7 I.3.3 Validation des références…………………………………………………...….p. 9 I.3.4 Diffusion des références……………………………………………………..…p. 9 I.4 Transfert des références sous le logiciel bibliographique PROCITE……………….p. 10 II.Quelques adresses de sites sur Internet………………………………….…p. 23 CONCLUSION………………………………………………………….…….……..p. 26 * * * Bibliographie thématique…………………………………………………………p. 3 Fishing Fleet…………………………………………………………………….…….…p. 3 Purse Seiner Technology…………………………………………………….……..……p. 7 Fisher's Behavior…………………………………………………………………….......p. 13 Fish Catch Statistics……………………………………………………………………...p. 18 Fishing Operations……………………………………………………………..………...p. 30 Tuna Behaviour………………………………………………………………..………...p. 34 Models…………………………………………………………………………………...p. 39 2 Bibliographie Thématique FISHING FLEET Abrahams, M.V. ; Healey, M.C., 1993. Some consequences of variation in vessel density : a manipulative field experiment. Fisheries Research , 15 (4) : 315-322.
    [Show full text]
  • Harris Sierra II, Programmable Cryptographic
    TYPE 1 PROGRAMMABLE ENCRYPTION Harris Sierra™ II Programmable Cryptographic ASIC KEY BENEFITS When embedded in radios and other voice and data communications equipment, > Legacy algorithm support the Harris Sierra II Programmable Cryptographic ASIC encrypts classified > Low power consumption information prior to transmission and storage. NSA-certified, it is the foundation > JTRS compliant for the Harris Sierra II family of products—which includes two package options for the ASIC and supporting software. > Compliant with NSA’s Crypto Modernization Program The Sierra II ASIC offers a broad range of functionality, with data rates greater than 300 Mbps, > Compact form factor legacy algorithm support, advanced programmability and low power consumption. Its software programmability provides a low-cost migration path for future upgrades to embedded communications equipment—without the logistics and cost burden normally associated with upgrading hardware. Plus, it’s totally compliant with all Joint Tactical Radio System (JTRS) and Crypto Modernization Program requirements. The Sierra II ASIC’s small size, low power requirements, and high data rates make it an ideal choice for battery-powered applications, including military radios, wireless LANs, remote sensors, guided munitions, UAVs and any other devices that require a low-power, programmable solution for encryption. Specifications for: Harris SIERRA II™ Programmable Cryptographic ASIC GENERAL BATON/MEDLEY SAVILLE/PADSTONE KEESEE/CRAYON/WALBURN Type 1 – Cryptographic GOODSPEED Algorithms* ACCORDION FIREFLY/Enhanced FIREFLY JOSEKI Decrypt High Assurance AES DES, Triple DES Type 3 – Cryptographic AES Algorithms* Digital Signature Standard (DSS) Secure Hash Algorithm (SHA) Type 4 – Cryptographic CITADEL® Algorithms* SARK/PARK (KY-57, KYV-5 and KG-84A/C OTAR) DS-101 and DS-102 Key Fill Key Management SINCGARS Mode 2/3 Fill Benign Key/Benign Fill *Other algorithms can be added later.
    [Show full text]
  • 13347 CICS Introduction and Overview
    CICS Introduction and Overview Ezriel Gross Circle Software Incorporated August 13th, 2013 (Tue) 4:30pm – 5:30pm Session 13347 Agenda What is CICS and Who Uses It Pseudo Conversational Programming CICS Application Services CICS Connectivity CICS Resource Definitions CICS Supplied Transactions CICS Web Services CICS The Product What is CICS? CICS is an online transaction processing system. Middleware between the operating system and business applications. Manages the user interface. Retrieves and modifies data. Handles the communication. CICS Customers Banks Mortgage Account Reconciliations Payroll Brokerage Houses Stock Trading Trade Clearing Human Resources Insurance Companies Policy Administration Accounts Receivables Claims Processing Batch Versus Online Programs The two ways to process input are batch and online. Batch requests are saved then processed sequentially. After all requests are processed the results are transmitted. Used for order entry processing such as warehouse applications. Online requests are received randomly and processed immediately. Results are transmitted as soon as they are available. Response time tends to be sub-second. Used for applications – such as: Credit Card Authorization. Transaction Processing Requirements Large volume of business transactions to be rapidly and accurately processed Multiple users, single/sysplex or distributed With potentially: – A huge number of users – Simultaneous access to data – A large volume of data residing in multiple database types – Intense security and data integrity controls necessary The access to the data is such that: – Each user has the perception of being the sole user of the system – A set of changes is guaranteed to be logically consistent. If a failure occurs, any intermediate results are undone before the system becomes available again – A completed set of changes is immediately visible to other users A Business Transaction A transaction has a 4-character id.
    [Show full text]
  • Conclusions and Overall Assessment of the Bloody Sunday Inquiry Return to an Address of the Honourable the House of Commons Dated 15 June 2010 for The
    Principal Conclusions and Overall Assessment of the Principal Conclusions and Overall Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Principal Conclusions and Overall Assessment of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) The Hon William Hoyt OC The Hon John Toohey AC Bloody Sunday Inquiry Published by TSO (The Stationery Office) and available from: The Principal Conclusions and Overall Assessment Online (Chapters 1–5 of the report) are reproduced in this volume www.tsoshop.co.uk This volume is accompanied by a DVD containing the full Mail, Telephone, Fax & E-mail TSO text of the report PO Box 29, Norwich NR3 1GN Telephone orders/General enquiries: 0870 600 5522 Order through the Parliamentary Hotline Lo-Call: 0845 7 023474 Fax orders: 0870 600 5533 E-mail: [email protected] Textphone: 0870 240 3701 The Parliamentary Bookshop 12 Bridge Street, Parliament Square, London SW1A 2JX Telephone orders/General enquiries: 020 7219 3890 Fax orders: 020 7219 3866 Email: [email protected] Internet: www.bookshop.parliament.uk TSO@Blackwell and other Accredited Agents Customers can also order publications from TSO Ireland 16 Arthur Street, Belfast BT1 4GD Telephone: 028 9023 8451 Fax: 028 9023 5401 HC30 £19.50 Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Principal Conclusions and Overall Assessment of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) The Hon William Hoyt OC The Hon John Toohey
    [Show full text]
  • Volume I Return to an Address of the Honourable the House of Commons Dated 15 June 2010 for The
    Report of the Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Report of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) Bloody Sunday Inquiry – Volume I Bloody Sunday Inquiry – Volume The Hon William Hoyt OC The Hon John Toohey AC Volume I Outline Table of Contents General Introduction Glossary Principal Conclusions and Overall Assessment Published by TSO (The Stationery Office) and available from: Online The Background to Bloody www.tsoshop.co.uk Mail, Telephone, Fax & E-mail Sunday TSO PO Box 29, Norwich NR3 1GN Telephone orders/General enquiries: 0870 600 5522 Order through the Parliamentary Hotline Lo-Call: 0845 7 023474 Fax orders: 0870 600 5533 E-mail: [email protected] Textphone: 0870 240 3701 The Parliamentary Bookshop 12 Bridge Street, Parliament Square, London SW1A 2JX This volume is accompanied by a DVD containing the full Telephone orders/General enquiries: 020 7219 3890 Fax orders: 020 7219 3866 text of the report Email: [email protected] Internet: www.bookshop.parliament.uk TSO@Blackwell and other Accredited Agents Customers can also order publications from £572.00 TSO Ireland 10 volumes 16 Arthur Street, Belfast BT1 4GD not sold Telephone: 028 9023 8451 Fax: 028 9023 5401 HC29-I separately Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Report of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) The Hon William Hoyt OC The Hon John Toohey AC Ordered by the House of Commons
    [Show full text]
  • W^Ffs^Jlpâltlfmllpla^I N E, Frescos
    Fundado em 1930 •• Ano XIX ¦¦ IN." 7880 A. DIÁRIO UE NOTICIAS- Tiragem da Propriedade da S. *'<>n>er» O Matutino de Maior O. R. Dantas, presidente; RI. Moreira. Capital da República leRoiirrire; Aurélio Silva, seeretmio. Dis- ASSINATURAS: Previsões ate. 2 horas de amanhã, no n TEMPO rom nebulosidade. »s- Federa!:' Tunnn nom XO.O0: Trim. Cr» ».i.IK, „.„„ Em elevaçüo. Venlns — Dr. Ano, Cri 100,00; Semestre. Crf vni>lrci. Temperatura W^ffS^JlpâltlfmllPla^i N E, frescos. Rep.B. Paulo: VY Farinello - 8. Bento, 220-3.» T. <-íBJi F,n. »E HOJE, 2 SEi;OEsTll PAUS - Cr* 0.50 Universidade Rural, ¦*'•*!'£• «.íi-- •1q1.15.2-; Penha, Rio de Janeiro, Sábado, 3 de Julho de 1918 «¦"-«••• 11 — Tel.: 42-2910 (Rede Interna) ^í^íBua^^-"*''^^"o***^--- ^r4..?jT"uo5"-.^»:i-.?i..M.,ep. Qú?«i«. Constituição, Éstralésia para enfrentar o bloqueio russo Marshall declara que os Estados Unidos, Inglaterra e APELAM PARA STÀLIN OS COMUNISTAS DA IUGOSLÁVIA combater a ati- França estão traçando planos para Quinze mil marxistas dirrçem-lhe um telegrama, solicitando que elimine as Resolveu não convocar o Congresso "falsas tude soviética em Berlim acusações" feitas pelo Cominform contra o mal. Tito e seu governo decisão do presiden- ação conjunta Oficialmente anunciada essa "amor "premier" — Declinou de revelar qualquer detalhe sobre a Protestaram ilimitado" ao russo Que- — considerada na Casa Branca acaoar com a das três potências Também ram «ue nao comparecerão*- rem que êste faça tudo ao seu alcance para o líder anunciado que » pre.lde»te - Ordens só dos russos, diz T ^v -'- (V '«• •'> - 1*1 ».fUda.n,e,,.e..
    [Show full text]
  • Introduction-To-Mainframes.Pdf
    Mainframe The term ‘MainFrame’ brings to mind a giant room of electronic parts that is a computer, referring to the original CPU cabinet in a computer of the mid-1960’s. Today, Mainframe refers to a class of ultra-reliable large and medium-scale servers designed for carrier-class and enterprise-class systems operations. Mainframes are costly, due to the support of symmetric multiprocessing (SMP) and dozens of central processors existing within in a single system. Mainframes are highly scalable. Through the addition of clusters, high-speed caches and volumes of memory, they connect to terabyte holding data subsystems. Mainframe computer Mainframe is a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. In the hierarchy that starts with a simple microprocessor at the bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe. The distinction between small mainframes and minicomputers is vague, depending really on how the manufacturer wants to market its machines. Modern mainframe computers have abilities not so much defined by their single task computational speed (usually defined as MIPS — Millions of Instructions Per Second) as by their redundant internal engineering and resulting high reliability and security, extensive input-output facilities, strict backward compatibility with older software, and high utilization rates to support massive throughput. These machines often run for years without interruption, with repairs and hardware upgrades taking place during normal operation.
    [Show full text]
  • CICS Transaction Server for OS/390 Installation Guide
    CICS® Transaction Server for OS/390® Installation Guide Release 3 GC33-1681-30 CICS® Transaction Server for OS/390® Installation Guide Release 3 GC33-1681-30 Note! Before using this information and the product it supports, be sure to read the general information under “Notices” on page xi. Third edition (June 1999) This edition applies to Release 3 of CICS Transaction Server for OS/390, program number 5655-147, and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. Make sure you are using the correct edition for the level of the product. This edition replaces and makes obsolete the previous edition, SC33-1681-00. The technical changes for this edition are summarized under ″Summary of changes″ and are indicated by a vertical bar to the left of a change. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. At the back of this publication is a page entitled “Sending your comments to IBM”. If you want to make comments, but the methods described are not available to you, please address them to: IBM United Kingdom Laboratories, Information Development, Mail Point 095, Hursley Park, Winchester, Hampshire, England, SO21 2JN. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1989, 1999. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • CA Datacom CICS Services Best Practices Guide
    CA Datacom® CICS Services Best Practices Guide Version 14.02 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
    [Show full text]
  • Enterprise PL/I for Z/OS V5.3 Compiler and Runtime Migration Guide Part 1
    Enterprise PL/I for z/OS Version 5 Release 3 Compiler and Run-Time Migration Guide IBM GC27-8930-02 Note Before using this information and the product it supports, be sure to read the general information under “Notices” on page 181. Third Edition (September 2019) This edition applies to Version 5 Release 3 of Enterprise PL/I for z/OS, 5655-PL5, and to any subsequent releases until otherwise indicated in new editions or technical newsletters. Make sure you are using the correct edition for the level of the product. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address below. A form for readers' comments is provided at the back of this publication. If the form has been removed, address your comments to: IBM Corporation, Department H150/090 555 Bailey Ave San Jose, CA, 95141-1099 United States of America When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Because IBM® Enterprise PL/I for z/OS® supports the continuous delivery (CD) model and publications are updated to document the features delivered under the CD model, it is a good idea to check for updates once every three months. © Copyright International Business Machines Corporation 1999, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables.................................................................................................................. xi Figures............................................................................................................... xiii About this book....................................................................................................xv Using your documentation........................................................................................................................
    [Show full text]
  • CICS System Services
    CICS System Services Mainframe CICS System Services July 2021 Rate Description Rate FY22/FY23 Debit Code CICS zIIP $0.1780/CICS Unit 5 CICS zIIP $0.1780/CICS Unit 6 All OCIO rates can be found at: https://cio.nebraska.gov/financial/serv-rates.html General Overview Customer Information Control System or CICS System Services provide an interactive transaction-based processing environment to host business applications that are reliable, scalable, and secure. CICS features include: • Ability to process a high volume of transactions. • Ability to efficiently support event processing, dynamic scripting, web browser (HTML), and 3270 presentation of data. • Ability to access multiple types of data structures, such as relational databases, hierarchical databases (IMS), and VSAM data sets. • Ability to support other application features such as; report printing, document imaging, application help functionality, and other z/OS automation capabilities. Service Details The service includes: • 24/7 CICS application and business event hosting with traditional 3270 and web browser presentation. • z/OS Enterprise mainframe security and protection for CICS application software, application data, and user security. • 24/7 Service Desk support. This includes ‘incident troubleshooting’ for CICS application environments. • Complete CICS application data backup and recovery services. • Complete CICS application disaster recovery facilities and services provided. Office of the CIO/ Mainframe CICS System Services | Contact: CIO Service Desk: 402.471.4636 or 800.982.2468 1 CICS System Services • z/OS System automation available for unique CICS application mainframe requirements. • CICS automated services to coordinate application “On-line” and “Batch” processes. • Automated software to generate CICS maps. • Automated software to assist applications with reporting (style sheets).
    [Show full text]