United States Patent (19) 11 Patent Number: 4,912,628 Briggs (45) Date of Patent: Mar

Total Page:16

File Type:pdf, Size:1020Kb

United States Patent (19) 11 Patent Number: 4,912,628 Briggs (45) Date of Patent: Mar United States Patent (19) 11 Patent Number: 4,912,628 Briggs (45) Date of Patent: Mar. 27, 1990 54 SUSPENDING AND RESUMING or processing of a program running in a virtual machine PROCESSING OF TASKS RUNNING INA is described. The method involves creating and running WRTUAL MACHINE DATA PROCESSENG a special program in the virtual machine which is to be SYSTEM accorded suspend and resume control functions. The (75) Inventor: Alton A. Briggs, Scottsdale, Ariz. suspend/resume control function program is run first before a user's task is run. The special suspend/resume 73 Assignee: International Business Machines program seizes control over the virtual machine's exter Corp., Armonk, N.Y. mal interrupt controls and modifies them to direct all 21 Appl. No.: 168,300 incoming interrupts to the program itself rather than allowing CMS of the virtual machine to handle inter (22 Filed: Mar. 15, 1988 rupts as is normally done. With incoming interrupts 51 Int. Cl." ................................................ G06F 9/44 being sent to the suspend/resume program for analysis 52 U.S. C. ................................. 364/200; 364/228.2; and response, incoming commands that generate such 364/230.2; 364/261.2; 364/264.2; 364/300 interrupts may be responded to and sub-routines con (58) Field of Search ........................ 364/200, 900, 300 tained within the suspend/resume task program may be 56 References Cited employed to save all of these addressing registers and general register contents. The suspend/resume task U.S. PATENT DOCUMENTS program operates to modify the interrupt controls of 4,400,769 8/1983 Kaneda et al. ...................... 364/200 the virtual machine to create a suspension of operation 4,631,674 12/1986 Blandy .............. ... 364/300 4,642,756 2/1987. Sherrod ............. ... 364/200 of the user's task program by enabling the virtual ma 4,674,038 6/1987 Brelsford et al. ... 364/200 chine only for external interrupts. The machine is later 4,695,945 9/1987 Irwin ..................... ... 364/200 restored to operation and the user's task is resumed 4,860,190 8/1989 Kaneda et al. ...................... 364/200 from its interrupted point by restoring all register con tents, resetting the program status words and resetting Primary Examiner-Thomas C. Lee the interrupt controls to enable full restoration of all Attorney, Agent, or Firm-Edward H. Duffield operations. (57 - ABSTRACT A method for suspending and later resuming operation 7 Claims, 4 Drawing Sheets U.S. Patent Mar. 27, 1990 Sheet 1 of 4 4,912,628 (TYPICAL VM COMPUTER SYSTEM) (SYSTEM 37O) SYSTEM CONTROL PROGRAM (CP) F.G. 1 - CONTROLS ALL PHYSICAL/LOGICAL RESOURCES OF SYSTEM - PROVIDES COMMUNICATIONS AMONG PROGRAMS AND WIRTUAL MACHINES 2-1 - MANAGES SYSTEM-WIDE SERVICES - ALLOCATES SHARED RESOURCES AMONG WMS - RECEIVES EXTERNAL INTERRUPTS SGNALS CMS EXTERNA AUTHORIZED VM OR USER INTERRUPTS/ INTER-PROGRAM COMMANDS COMMUNICATIONS ONE TYPCAL VM) Psws VMCF-SMSG CONVERSATIONAL MONTOR SYSTEM CMS 5 - PROVIDES SERVICE TO THS VM-B ONY - NORMALLY SERVICES INTERRUPTS - SUPPORTS EXECUTION OF USERS APPLICATION PROGRAM, INTERACTIVE OR BATCH - U.S. Patent Mar. 27, 1990 Sheet 2 of 4 4,912,628 FG. 2A FLOW DAGRAM OF SUSPEND/RESUME PROCESS ON VM SYSTEM (ALL STATEMENTS ON () ARE TO BE OMITTED FROM ACTUAL FIND CHART THEY ARE JUST FOR EXPLANATION NOW) (BEGIN) 1OO 105 (SPECIAL TASK PROG...) TASK VM'S CMS NVOKES MODFES VM CONTROL SPECIAL ASK PROG. REGS TO ACCEPT ONLY N. S. VM EXT. INTERRUPTS FOR WMCF-SMSG COMMUNICATIONS SPECIAL TASK PROG, BEGINS TO EXECUTE 106 (SPECIAL TASK PROG...) SAVES ORIGINAL CMS (SPECIAL TASK PROG) EXTERNAL INTERRUPT RELOCATES ITSELF TO PSW SETINGS RESERVED STROAGE AREA TO AVOD POTENTIAL CONFLCTS WITH USER'S O7 TASK PROG TO BE RUN IN SAME VM) (SPECIAL TASK PROG...) WRITES A NEW CMS EXT. INTERRUPT NEW PSW TO ROUTE EXT. INTERRUPTS TO SPECIAL (SPECIAL ASK PROG) TASK PROG, FOR NITALIZES VM TO RESPONSE AND RE SUPPORT WMCF-SMSG ENABLES INTERRUPTS COMMUNICATIONS WH TO TASK WM THAT AUTHORIZED CONTROL WERE EARLIER DISABLED VM OR USER WHICH ISSUES SUSPEND/ OE RESUME COMMANDS (SPECIAL TASK PROG...) SIGNALS CMS OF TS (SPECIAL TASK PROG...) TASK WM TO INITIATE TEMPORARY DISABLES USER'S TASK PROCESSING ALL INTERRUPTS TO WM (BY PASSING STARTUP (BY SETTING MACHINE PARAMETERS FOR USER'S CONTROL MASK BITS EN TASK TO TASK VM'S CMS) MACHINES PSW TO DISALLOW INTERRUPTS) U.S. Patent Mar. 27, 1990 Sheet 3 of 4 4.912,628 (FROM 126) O9 s USERS ASK EXECUTES N TASK WM UNTIL (SPECIAL TASK PROG) SAVES D INTERRUPTED OR FINISHED CONTENTS OF TASK WMS GEN, REG, RX USED AS BASE FENSH ADDRESS REGAT TIME OF NTERRUPT AND SETS NEW INTERRUPT O RX CONTENTS TO A PRE ARRANGED CONTEN AS USERS TASK FINISHED; NEW BASE ADDRESS FOR SPECIAL TASK PROG. SUBSEOUENT MEMORY RETURNS CONTROL BY ACCESSES TO HANDLE SIGNALNG CMS O LOGOFF INTERRUPT, AND SAVES FROM VM CONTROL PROG, ALL REMAINING GEN. REG CONTENS AT TIME OF INTERRUPT. 14 is EXT. INTERRUPT YES (NTERRUPT PROCESSING) PATH AN ENCOMING SMSG 15 NO e f MOME ORIGINAL CMS CONTROL PROG FOR WM EXTERNAL INTERRUPT NEW RECOGNIZES ARECUEST PSW THAT WAS SAVED FROM AUTHORIZED CONTROL IN 108 TO SCRATCH VM OR USER TO SEND AREA OF MEMORY FOR VMCFSMSG TO USERS ASK. CONTROL PROG GENERATES EX, INTERRUPT TO ASK 18 VMAND PASSESSMSG TO RESTORE CONTENTS OF RX TASK VMWHICH ROUTES AND ALL OTHER GEN, REGS, SMSG AND INTERRUPT SAVED IN 13) TO CON DIRECY TO SPECIAL TEN AT TIME OF EXT. TASK PROG FOR HANDLING NTERRUPT SPECIAL ASK PROG RECEIVES RELOAD CMSS EXT INTER EX, INTERRUPT FROMAND RUPT NEW PSW FROM SMSG PASSED ON EY SCRATCH AREA FOR CMS CONTROL PROG TO PROCESS INTERRUPT 118 USERS TASK EXECUTION FG. 2B CONTINUES IN 109 U.S. Patent Mar. 27, 1990 Sheet 4 of 4 4.912,628 19 120 ATESIS SMSG FROMNos YES is SMSG SUSPEND"? YES NO 122 t21 AREADY IN S SMSG "RESUME" SUSPENDED STATE YES 12 5 YES NO ALREADY IN (TO 130 123 NO C. SUSPENDED STATE SAVE EXISTING EXTERNA INTERRUPT OLD PSW OF YES ASK VMAND COPY SAVED 28 REGS CONTENTS (FORM STEP 113) TO RESERVED COPY EXT, NTERRUPT OLD SPACE FOR LATER PSW OF TASK WM SAVED RELOADING N STEP 123) TO SCRATCH AREA OF MEMORY RESTORE REG8 TO CONTENTS 124 8AVED (IN 123) MODIFY SETING FOR OLD RELOAD OLD PSW OF TASK PSW OF TASK WM TO ENABLE VM, THUS CAUSING ONLY FOR EXT. INTERRUPTS. RESUMPTION OF OPERATION LOAD MODIFIED PSW, FROM PONT WHERE US SUSPENDING OFPERATIO OF PROCESSING IN TASK SUSPEND OCCURRED, VM FOR ALL EXCEPT EX, INTERRUPTS. (RETURN TO Og 27 S SMSG LOGOFF (SUSPENDED STATE) YES 28 t22) CLOSE ANY OPEN FILES RESTORE ALL GEN, REG8. TO CONTENT SAVEDAT 29 NTERRUPT ON STEP 113 ERMINATE VM EXECUTION VIA LOGOFF RECUEST 13 TO CONTROL PROG LOAD OLD PSW FOR TASK VM (As SAMED INSTEP 123) TASK PROG, CONTINUES FG, OR REMAINS SUSPENDED 2A F.G. 2 A8 APPROPRIATE 4,912,628 1. 2 suitable for usage by the characteristic users of such a SUSPENDING AND RESUMNG PROCESSING OF system or of the system operators themselves. TASKS RUNNING IN A WRTUAL MACHINE In light of these difficulties with the known prior DATA PROCESSING SYSTEM systems, it is an object of this invention to provide a means of suspending and resuming operation of process BACKGROUND OF THE INVENTION ing a task in a virtual machine data processing system 1. Field of the Invention utilizing only standard available programming and con This invention relates to data processing computer trol techniques and without jeopardizing any other system controls and architecture generally and specifi programs or processes operating in the data processing cally to the so-called "virtual machine' operational O system at that time. systems known as the IBM System 370 and 370/XA and other similar systems. BRIEF SUMMARY 2. Prior Art The foregoing and still other objects of the invention In virtual machine operating systems such as the IBM not specifically enumerated are accomplished in a pre System 370 or the like, it has long been desirable but not 15 ferred embodiment of the invention that will be de practically feasible to perform temporary suspension of scribed further herein. Briefly, the process of safely a job running in a particular virtual machine without risking interference with other programs running in facilitating suspension and later resumption of a task other virtual machines in the same system. There are being processed in a virtual machine involves execution numerous reasons why users of such systems may wish 20 of a small special task program in the virtual machine in to suspend and ordinarily resume at some later point the which a given task or job is to be run just prior to run work being done as a task in one or more portions of the ning the job itself. computer system's workload. A common reason that The special small program implements the techniques suspension of a given task or tasks may be requested is for facilitating suspension and resumption of the actual to reduce contention for the computer system's re 25 task that will be run in that virtual machine. When the sources and to allow temporary allocation of the re special program for suspend and resume operation is sources for other work. For example, interactive system loaded, it first noves itself to an area of otherwise free users often experience a slower response time when the or reserved storage so that its operation will not be computer system is occupied with long-term tasks such overwritten or interfered with when the task program as batch tasks for which the actual completion time of 30 runs.
Recommended publications
  • Security on the Mainframe Stay Connected to IBM Redbooks
    Front cover Security on the IBM Mainframe Operating system and application security IBM Security Blueprint and Framework IBM mainframe security concepts Karan Singh Lennie Dymoke-Bradshaw Thomas Castiglion Pekka Hanninen Vincente Ranieri Junior Patrick Kappeler ibm.com/redbooks International Technical Support Organization Security on the IBM Mainframe April 2010 SG24-7803-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (April 2010) This edition applies to the IBM System z10 Enterprise Class server, the IBM System z10 Business Class server, and Version 1, Release 11, Modification 0 of z/OS (product number 5694-A01). © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 IBM Security Framework. 4 1.1.1 People and identity . 5 1.1.2 Data and information. 5 1.1.3 Application and process . 5 1.1.4 Network, server, and endpoint . 5 1.1.5 Physical Infrastructure . 6 1.2 Framework and Blueprint . 7 1.3 IBM Security Blueprint. 7 Chapter 2. Security of the IBM Mainframe: yesterday and today . 13 2.1 Operating systems . 14 2.1.1 z/OS operating system family . 14 2.1.2 z/VM Hypervisor family .
    [Show full text]
  • - -:§';'§: ISG PROGRAM INDEX (Alphabetic)
    --- - Do not reproduce without written permission PI.1 ------ ---- Jan 84 :: - -:§';'§: ISG PROGRAM INDEX (Alphabetic) Program Name Number Available Type Page No. A Departmental Reporting System II (ADRS) 5796-PLN Now IUP 5796-PLK.1 A8CS Format Distribution Services - 4700 5799-8QZ Now PRPQ 5799-8QZ.1 Access Method Services Cryptographic Option Re1.1.0 5740-AM8 Now PP 5740-AM8.1 Accounting Applications - 5120 - Accounts Payable 5721-X83 Now PP 5721-X81.1 Accounting Applications - 5120 - Accounts Receivable 5721-X84 Now PP 5721-XB1.1 Accounting Applications - 5120 - Billing 5721-XB1 Now PP 5721-XB1.1 Accounting Applications - 5120 - General Ledger 5721-XB6 Now PP 5721-XB1.1 Accounting Applications - 5120 - Inventory Reporting 5721-XB5 Now PP 5721-XB1.1 Accounting Applications - 5120 - Payroll 5721-XB2 Now PP 5721-XB1.1 Account Network Management Programs - CICS/DOS/VS 5798-DAT Now FDP 5798-DAP.1 Account Network Management Programs - CICS/OS/VS 5798-DAQ Now FDP 5798-DAP.1 Account Network Management Program - IMS/VS 5798-DBP Now FDP 5798-DBJ.1 Accounts Payable 5798-CAC Now FDP 5798-BCT.1 Accounts Receivable 5798-CAE Now FDP 5798-BCT.1 ACF/NCP Version 2 5735-XX9 Now PP 5735-XX9.1 ACF/NCP Version 2 for the 3275 5735-XX9 Now PP 5735-XX9.1 ACF/NCP Version 3 for 3705/3725 5667-124 4/84 PP 5667-124.1 ACF/NCP/VS Releases 1, 2, 2.1 & 3 5735-XX1 Now PP 5735-XX1.1 ACF/NCP/VS Releases 2,2.1 & 3 Sys. Supp. Prog. 5735-XX3 Now PP 5735-XX3.1 ACF/System Support Programs V2 5735-XXA Now PP 5735-XXA.1 ACF /System Support Programs V2 R1.1 5735-XXA Now PP 5735-XXA.1
    [Show full text]
  • Database Machines in Support of Very Large Databases
    Rochester Institute of Technology RIT Scholar Works Theses 1-1-1988 Database machines in support of very large databases Mary Ann Kuntz Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Kuntz, Mary Ann, "Database machines in support of very large databases" (1988). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology School of Computer Science Database Machines in Support of Very large Databases by Mary Ann Kuntz A thesis. submitted to The Faculty of the School of Computer Science. in partial fulfillment of the requirements for the degree of Master of Science in Computer Systems Management Approved by: Professor Henry A. Etlinger Professor Peter G. Anderson A thesis. submitted to The Faculty of the School of Computer Science. in partial fulfillment of the requirements for the degree of Master of Science in Computer Systems Management Approved by: Professor Henry A. Etlinger Professor Peter G. Anderson Professor Jeffrey Lasky Title of Thesis: Database Machines In Support of Very Large Databases I Mary Ann Kuntz hereby deny permission to reproduce my thesis in whole or in part. Date: October 14, 1988 Mary Ann Kuntz Abstract Software database management systems were developed in response to the needs of early data processing applications. Database machine research developed as a result of certain performance deficiencies of these software systems.
    [Show full text]
  • The IBM System/38
    8 The IBM System/38 8.1 Introduction IBM’s capability-based System38 [Berstis 80a, Houdek 81, IBM Sa, IBM 82b], announced in 1978 and delivered in 1980, is an outgrowth of work that began in the late sixties and early seventies on IBM’s future system (FS) project. Designers at the IBM Development Laboratory in Rochester, Minnesota incorporated ideas from FS, modified by their needs, to pro- duce a system for the commercial marketplace. It is interesting that such an advanced, object-based architecture has been ap- plied to a very traditional product space. Initially, only the COBOL and RPG III languages were provided. The system, which includes the CPF (Control Program Facility) operating system, is intended to support transaction processing and data- base applications constructed in commercial languages. A major goal of the System38 design is to maintain pro- grammer independence from the system implementation [Dahlby SO]; IBM wished to retain maximum flexibility to modify System38’s implementation for future technologies while supporting previously written System38 programs. The designers also wished to support a high level of integrity and security at the machine interface and to support commonly executed user and system functions efficiently, such as data- base searches and memory management [Hoffman 801. To meet these goals, IBM chose a layered machine structure with a high-level programming interface. The layers of this design are shown in Figure 8-l. At the lowest level is a hardware machine that directly exe- 137 The IBM System/38 User Applications Verticai Microcode Horizon&/ Microcode Hardware Machine Figure 8-1: System/38 Implementation Layers cutes 32-bit horizontal microcode.
    [Show full text]
  • IBM Z/VM Version 6 Release 4 Security Target
    IBM z/VM Version 6 Release 4 Security Target Version: 1.2 Status: Released Last Update: 2017-11-29 Classification: Public IBM Corporation IBM z/VM Version 6 Release 4 Security Target Trademarks The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both: ● Enterprise Systems Architecture/390 ● ESA/390 ● IBM ● IBM logo ● HiperSockets ● PR/SM ● Processor Resource/Systems Manager ● RACF ● S/390 ● z System ● VM/ESA ● z/Architecture ● z/VM Other company, product, and service names may be trademarks or service marks of others. Legal Notice This document contains information of a confidential nature. Review and Approval Process: Refer to the inspection process in the z System Software Programming Process. Required Reviewers ● Brian Hugenbruch Document Distribution and Change Notification: The document is distributed to the reviewers of this line item. When reissued with changes, the document owner sends a note to the reviewers notifying them of the availability of a new document version. Revision History Revision Date Author(s) Changes to Previous Revision 1.2 2017-11-29 Brian W. Released public version Hugenbruch Version: 1.2 Classification: Public Page 2 of 125 Last update: 2017-11-29 Copyright © 2017 by atsec information security and IBM IBM Corporation IBM z/VM Version 6 Release 4 Security Target Table of Contents 1 Introduction ................................................................................................... 10 1.1 Security Target
    [Show full text]
  • System Design for Usability Richard A
    COMPUTING PRACTICES System Design for Usability Richard A. Demers IBM Information Systems Division 1. Introduction Computers are a major tool for SUMMARY: The factors underlying system design for usabil- increasing productivity. The accept- ity are examined and the role and responsibilities of a usability ability of computers to their users is, committee described. Under the control of a usability com- therefore, of growing importance. mittee, a balance between high levels of system function and Clerks and executives must be at- tracted to a computer system because usability was reached for the IBM System/38. The System/ of the enormous help it provides. 38 command language is presented to illustrate this balance. Martin [8] says, "To be effective, sys- tems will have to be designed from the outside in. The terminal or con- sole operator, instead of being a pe- cations and must be viewed as one of functions, however, can become a ripheral consideration, will become of the prime objectives of new com- barrier to usability unless equal at- the tail that wags the whole dog." puter systems. Ease of programming tention is paid to the quality and Ease of use is critical in making any is thus a prerequisite to increased consistency of their interfaces. tool attractive. usability on the part of clerks and Functions that eliminate con- It is primarily the application operators. cerns about the details of system op- programmer's responsibility to pro- Our paper examines the factors eration (by automating them) allow vide clerks and executives with usa- affecting system design for usability, users to concentrate on their appli- ble tools, but application program- especially for programmers.
    [Show full text]
  • Network Control Program and System Support Programs Resource Definition Guide
    SC30-3349-0 -------.......- - - ----.- ----_- _..._._ --. -- ----- Network Control Program and System Support Programs Resource Definition Guide Advanced Communications Function for Network Control Program Versions 3 and 4 Program Numbers: 5667-124, 5668-854 Advanced Communications Function for System Support Programs Version 3 Program Numbers: 5665-338 (MVS), 5666-322 (VSE), 5664-289 (VM) Advanced Communications Function for Network Control Program V4 Subset Program Number: 5668-754 SC30-3349-0 File No. S370/4300130XX-50 First Edition (May 1986) This edition applies to: • Advanced Communications Function for Network Control Program Version 3, Program Product 5667-124 • Advanced Communications Function for Network Control Program Version 4, Program Product 5668-854 • Advanced Communications Function for Network Control Program V4 Subset Program Product 5668-754 • Advanced Communications Function for System Support Programs Version 3, Program Products: 5665-338 5666-322 5664-289. This edition also applies to all subsequent releases and modifications until otherwise indicated in new editions or Technical Newsletters. Changes are made periodically to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/370, 30XX and 4300 Processors Bibliography, GC20-0001, for the editions that are applicable and current. References in this publication to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Any reference to an IBM program product in this publication is not intended to state or imply that only IBM's program product may be used. Any functionally equivalent program may be used instead.
    [Show full text]
  • Systems Application Architecture N
    Systems Application Architecture GC26-4341-2 An Overview Please Return To Room 330 n Systems Application Architecture GC26-4341-2 An Overview n Third Edition (February 1988) This edition applies to IBM's Systems Application Architecture as announced in March 1987, and expanded in October of that year. Changes are made periodically to this publication; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/370. SOxx, 4300, and 9370 Processors Bibliography, GC20-0001, IBM System/36 Guide to Publications, GC21-9015, or IBM System/38 Guide to Publications, GC21-7726, for the editions that are applicable and current. References in this publication to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. If you request publications from the address given below, your order will be delayed because publications are not stocked there. A Reader's Comment Form is provided at the back of this publication. If the form has been removed, com- ments may be addressed to IBM Corporation, Programming Publishing, P. O. Box 49023, San Jose, \ ) California, U.S.A. 95161-9023. IBM may use or distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1987,1988. All rights reserved. Contents Parti.
    [Show full text]
  • IBM Z Performance and Capacity Analytics: IBM I System Performance Feature Guide and Reference Introducing the SP400 Feature
    IBM Z Performance and Capacity Analytics Version 3 Release 1 IBM i System Performance Feature Guide and Reference IBM SC28-3212-00 Note Before using this information and the product it supports, read the information in “Notices” on page 129 . This edition applies to version 3, release 1 of IBM Z Performance and Capacity Analytics (program number 5698-AS3) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: August 2020 © Copyright International Business Machines Corporation 1994, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. © Teracloud S.A. 2018, 2020. Contents Figures................................................................................................................ vii Tables.................................................................................................................. xi Preface...............................................................................................................xiii Who should read this book .......................................................................................................................xiii What this book contains............................................................................................................................ xiii Publications............................................................................................................................................... xiv Accessing publications
    [Show full text]
  • System Overview
    SYSTEM OVERVIEW ---- - ------ ---- --- ---------- - - _.----_..... - 3) System Modularity IBM's System/38 is a general purpose data processing system designed to significantly improve the user's productivity in developing, maintaining and enhancing applications in an interactive workstation environment. The system provides 5l2K to 1 ,536K positions of main storage, 64.5 to more than 2672.6 million bytes of nonremovable auxiliary (disks) storage, a diskette magazine facility, and a system console with keyboard and display. A mUlti-function 96-columm card reader/punch, up to two 650 line per minute system printers and up to four 3410 magnetic tape subsystems may be attached. The system supports direct attachment of up to 40 local 5250 workstation displays and printers and a large number of remotely attached workstations through SOLe teleprocessing lines. The workstations can be placed where they are needed in the organization (in the offices, departments, plants and the warehouses) so that company personnel can share a common data base and the processing power of a computer. System/38 supports this workstation environment with the function required to maintain up-to-date business data available for retrieval on request by any of the workstation users. By providing these users with information that is current and accurate, the efficiency of an organization can be greatly improved. The workstation environment requires many unique functions such as the ability for workstation users to share programs, data files, and system resources without significant delays to any user. This environment also requires the ability to access data records by more than one access path (index). For example, one user may need to access inventory item records by item stock number while another user is accessing the same records by vendor number.
    [Show full text]
  • System/38 Employs Both Advanced Tech­ Nology and Many New Data Processing Concepts
    Preface The IBM System/38 employs both advanced tech­ nology and many new data processing concepts. While the laboratory in Rochester, Minnesota, had primary responsibility for design and development, IBM people in laboratories in Boeblingen, Germany, Burlington, Vermont, and East Fishkill, New York, made important contributions. Our mutual objective was to produce a system that would be both accessible and extendable, and at the same time offer efficient conversion facilities. Function menus, help keys, multilayer messages, and a system-wide control language are essential elements of System/38, along with a flexible "user authoriza­ tion" scheme for system integrity and security. We chose to avoid traditional hardware-dependent addressing and storage management and instead to readily accommodate new technologies and storage organizations through a high-level machine archi­ tecture that not only frees the user from earlier restrictions but also supports a new kind of data base facility. Finally, because System/38 is viewed as a growth path from present systems, especially the IBM System/3, we developed conversion techniques rather than an emulator to give these users an opportunity The papers in this volume are not intended to replace IBM to benefit from the novel, even unique, capabilities of publications in describing the capabilities of the system the System/38. components and how to use them. Keep in mind that the papers are for general technical communication purposes; they do not represent an IBM warranty or commitment to Some 50 authors are represented in this special specific capabilities in the referenced products. collection of papers. I want to thank them and their Different structures and levels of detail may exist in the many colleagues whose combined efforts made papers because they were written as technical articles by System/38 a distinguished family of IBM products.
    [Show full text]
  • Tivoli Decision Support for Z/OS Library
    IBM Z Decision Support Version 1.9.0 AS/400 System Performance Feature Guide and Reference SC27-9060 IBM Z Decision Support Version 1.9.0 AS/400 System Performance Feature Guide and Reference SC27-9060 Note Before using this information and the product it supports, read the information in “Notices” on page 135. Sixteenth Edition (July 2018) This edition applies to version 1, release 9 of IBM Z Decision Support (program number 5698-B06) and to all subsequent releases and modifications until otherwise indicated in new editions. © COPYRIGHT 21ST CENTURY SOFTWARE and © COPYRIGHT INTERNATIONAL BUSINESS MACHINES CORPORATION. ALL RIGHTS RESERVED. Note to U.S. Government Users -- Documentation related to restricted rights -- Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. 1994, 2018 Contents Figures ..............vii 2. Updating OS400_DASDTYPE ......16 3. Updating OS400_JOBGROUP ......16 Tables ...............ix 4. Updating OS400_DATE_FORMAT .....16 Step 4: Test the SP400 feature installation ....17 Step 5: Put the SP400 feature into production . 17 Preface ...............xi Who should read this book .........xi Chapter 4. Using the SP400 feature on What this book contains ..........xi Publications ..............xii the AS/400 .............19 Tivoli Decision Support for z/OS library . xii Description of the OS/400 log files ......19 Accessing terminology online .......xiii Collecting data on the AS/400 ........20 Using LookAt to look up message explanations xiv Start SP400 Monitor ..........21 Accessing publications online .......xiv Collection Services ...........21 Ordering publications..........xiv Start SP400 data capturing ........22 Accessibility ..............xv Transferring the captured performance data files Tivoli technical training ..........xv to z/OS ..............24 Support information ...........xv Conventions used in this book ........xv Part 2.
    [Show full text]