IBM Mainframes – 45+ Years of Evolution
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
The Travelers IBM 1401 Exhibit Thematic Presentation, June 1984
THE TRAVELERS IBM 1401 EXHIBIT At The Computer Museum, Bay 3, Floor 5 THEMATIC PRESENTATION Overall The Travelers IBM 1401 Exhibit will illustrate general aspects of business computing in the mid-sixties. Four primary themes will be presented: the use of computers as information processors by businesses, the characteristics of this kind of computer operation, the rise in higher-level languages, and the replacement of punched cards by magnetic memory as the predominant secondary storage medium. The Travelers 1401 will exemplify these themes. In instances where reality does not quite serve the presentation artistic license will be exercized. Computers as Business Tools The use of the 1401 by The Travelers for policy processing and management report compilation will illustrate the general character of problems to which businesses a~plied computers. Charateristics of Computer Operation Batch-processing characterized the operation of computers in the mid-sixties. This reinforced the division between the machine and the programmers. Since only operators were allowed to run programs on the computer, the process of de-bugging a program was long and arduous. This method of operation will be contrasted with the contemporary operation of computers. The 1401 exhibit, by the relative position of the Programmer's Office and the Computer Room, and the contents thereof, will advance this theme. High-Level Languages The predominance of COBOL as the programming language for business illustrates the general move towards using higher-level languages which occured throughout the 1960's. The Travelers 1401 will be presented as being programmed in COBOL. The Fall of the Punched Card and the Ris~ of Magnetic Memory Inflexibility, serial storage, and size will be presented as three of the major problems of punched cards for data storage. -
Data Processing with Unit Record Equipment in Iceland
Data Processing with Unit Record Equipment in Iceland Óttar Kjartansson (Retired) Manager of Data Processing Department at Skýrr, Iceland [email protected] Abstract. This paper presents an overview of the usage of unit record equipment and punched cards in Iceland and introduces some of the pioneers. The usage of punched cards as a media in file processing started 1949 and became the dominant machine readable media in Iceland until 1968. After that punched cards were still used as data entry media for a while but went completely out of use in 1982. Keywords: Data processing, unit record, punched card, Iceland. 1 Hagstofa Íslands Hagstofa Íslands (Statistical Bureau of Iceland) initiated the use of 80 column punched cards and unit record equipment in Iceland in the year 1949. The first ma- chinery consisted of tabulating machine of the type IBM 285 (handled numbers only), the associated key punch machines, verifiers, and a card sorter. See Figures 1 and 2. This equipment was primarily used to account for the import and export for Iceland. Skýrr (Skýrsluvélar ríkisins og Reykjavíkurborgar - The Icelandic State and Munici- pal Data Center) was established three years later by an initiative from Hagstofa Íslands, Rafmagnsveita Reykjavíkur (Reykjavík Electric Power Utility), and the Medical Director of Health of Iceland as was described in an earlier article [3]. Fig. 1. IBM 285 Electric Accounting Machine at Hagstofa Íslands year 1949 J. Impagliazzo, T. Järvi, and P. Paju (Eds.): HiNC 2, IFIP AICT 303, pp. 225–229, 2009. © IFIP International Federation for Information Processing 2009 226 Ó. Kjartansson Fig. 2. Early form of the data registration using a punched card. -
IBM VM Recovery Manager DR for Power Systems Version 1.5: Deployment Guide Overview for IBM VM Recovery Manager DR for Power Systems
IBM VM Recovery Manager DR for Power Systems Version 1.5 Deployment Guide IBM Note Before using this information and the product it supports, read the information in “Notices” on page 195. This edition applies to IBM® VM Recovery Manager DR for Power Systems Version 1.5 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2020, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document............................................................................................vii Highlighting.................................................................................................................................................vii Case-sensitivity in VM Recovery Manager DR............................................................................................vii ISO 9000....................................................................................................................................................viii Overview...............................................................................................................1 Concepts...............................................................................................................5 KSYS............................................................................................................................................................. 5 HMC............................................................................................................................................................. -
Introduction to Database Systems
CO-560-A Databases and Web Services Instructors: Peter Baumann email: [email protected] office: room 88, Research 1 Databases & Web Services (P. Baumann) 1 Where It All Started Source: Wikipedia . 1890 census on 62,947,714 US population “Big Data” • was announced after only six weeks of processing . Hollerith „tabulating machine and sorter“ . Tabulating Machine Company International Business Machines Corporation Herman Hollerith in 1888 Hollerith card puncher, used by the United States Census Bureau Hollerith punched card Databases & Web Services (P. Baumann) 2 Databases & Web Services (P. Baumann) [image: Intel] 3 What Is „Big Data“? . Internet: the unprecedented . Typical Big Data: information collector • Business Intelligence • 2012: 200m Web servers [Yahoo] • Social networks - Facebook, • estd 50+b static pages [Yahoo] Twitter, GPS, ... • 40 b photos [Facebook] • Life Science: patient data, imagery • 2012: 31b searches/m [Google] • Geo: Satellite imagery, weather . 2025: 463 Exabytes / day data, crowdsourcing, ... Data = the „new gold“, „new oil“ Petrol industry: „more bytes than barrels“ Databases & Web Services (P. Baumann) 4 Today: „Data Deluge“ . „It is estimated that a week„s work at the New York Times contains more information than a person in the 18th Century would encounter in their entire lifetime and the thought is that within 10 years the rate of information doubling will occur every 72 hours.“ -- P. „Bud“ Peterson, U Colorado . “global mobile data traffic 597 petabytes per month in 2011 (8x the size of the entire global Internet in 2000) estimated to grow to 6,254 petabytes per month by 2015” -- Forbes, June 2012 . a typical new car has about 100 million lines of code • -- http://www.wired.com/autopia/2012/12/automotive-os-war/ Databases & Web Services (P. -
IBM System Z Functional Matrix
IBM System z July 2013 IBM System z Functional Matrix IBM System z This functional matrix consists of a list of features and functions that are supported on IBM System z® servers (this includes the IBM zEnterprise ® EC12 (zEC12), IBM zEnterprise BC12 (zBC12), IBM zEnterprise 196 (z196), IBM zEnterprise 114 (z114), IBM System z10 ® Enterprise Class (z10 ™ EC), IBM System z10 Business Class ™ (z10 BC), IBM System z9 ® Enterprise Class (z9 ® EC), and IBM System z9 Business Class (z9 BC). It is divided into nine functional areas; – Application Programming Interfaces, – Cryptographic features, – I/O, – Business On Demand, – Parallel Sysplex ®, – Performance, – Processor Resource Systems Manager (PR/SM ™) – Reliability, Availability, Serviceability (RAS) – IBM zEnterprise BladeCenter ® Extension (zBX) There is also a legend at the end of the matrix to identify the symbols that are being used. Note: This matrix is not intended to include services, RPQs or specific quantities or measurements related performance, memory size, bandwidth, etc. The intention of this matrix is to provide a comparison of the standard and optional features for the various System z servers. For further details on the features and functions listed in the tables, refer to the system specific reference guide documentation. This document is available from the Library area of Resource Link ™ at: www.ibm.com/servers/resourcelink Key: S = standard O = optional - = not supported zEnterprise System z10 System z9 ™ Application Programming Interface (API) ™ zEC12 zBC12 z196 z114 -
IBM 1401 Simulator Usage 31-Mar-2015
IBM 1401 Simulator Usage 31-Mar-2015 COPYRIGHT NOTICE The following copyright notice applies to the SIMH source, binary, and documentation: Original code published in 1993-2015, written by Robert M Supnik Copyright (c) 1993-2015, Robert M Supnik Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL ROBERT M SUPNIK BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of Robert M Supnik shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from Robert M Supnik. 1 Simulator Files ............................................................................................................. 3 2 IBM 1401 Features ...................................................................................................... 3 2.1 CPU ...................................................................................................................... 4 2.2 1402 Card Reader/Punch (CDR, CDP, STKR) .................................................... -
CA Top Secret for Z/OS Control Options Guide
CA Top Secret® for z/OS Control Options Guide r15 Ninth Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE. -
Facility/370: Introduction
File No. S370-20 Order No. GC20-1800=9 IDl\n \/:u+ •• ".1 I\n"n"': ..... ft IDIVI V IIlUQI .Via"'lllIlv Facility/370: Systems Introduction Release 6 PLC 4 This publication introduces VM/370, and is intended for anyone who is interested in VM/370. However, the reader should have a basic understanding of I BM data processing. VM/370 (Virtual Machine Facility/370) is a system control program (SCP) that tailors the resources and capabilities of a single System/370 computer to provide concurrent users their one unique (virtual) machine. VM/370 consists of a Control Program (CP), which manages the real computer, a Conversational Monitor System (CMS), which is a general-purpose conversational time-sharing system that executes in a virtual machine, a Remote Spooling Communications Subsystem (RSCS), which spools files to and from geographically remote locations, and a Interactive Problem Control System (I PCS), which provides problem analysis and management faci I ities. The first section of the publication is an introduction; it describes what VM/370 can do. The second, third, fourth, and fifth sections describe the Control Program, Conversational Monitor System, Remote Spooling Communications Subsystem, and Interactive Problem Control System respectively. The appendixes include information about VM/370 publication-to-audience relationship and VM/370-related publications for CMS users. , This publication is a prerequisite for the VM/370 system library. --...- --- ---.-- ------- ------ --..- --------- -~-y- Page of GC20-1800-9 As Updated Aug 1, 1979 by TNL GN25-0U89 ~b Edition (Karch 1919) This edition (GC20-1800-~ together with Technical Newsletter GN25-0489. dated August 1, 1919, applies to Release 6 PLC 4 (Program Level Change) of IBM Virtual Machine Facility/310 and to all subsequent releases until otherwise indicated in new editions or Technical Newsletters. -
OS Structures and System Calls
COS 318: Operating Systems OS Structures and System Calls Kai Li Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Outline Protection mechanisms OS structures System and library calls 2 Protection Issues CPU Kernel has the ability to take CPU away from users to prevent a user from using the CPU forever Users should not have such an ability Memory Prevent a user from accessing others’ data Prevent users from modifying kernel code and data structures I/O Prevent users from performing “illegal” I/Os Question What’s the difference between protection and security? 3 Architecture Support: Privileged Mode An interrupt or exception (INT) User mode Kernel (privileged) mode • Regular instructions • Regular instructions • Access user memory • Privileged instructions • Access user memory • Access kernel memory A special instruction (IRET) 4 Privileged Instruction Examples Memory address mapping Flush or invalidate data cache Invalidate TLB entries Load and read system registers Change processor modes from kernel to user Change the voltage and frequency of processor Halt a processor Reset a processor Perform I/O operations 5 x86 Protection Rings Privileged instructions Can be executed only When current privileged Level (CPR) is 0 Operating system kernel Level 0 Operating system services Level 1 Level 2 Applications Level 3 6 Layered Structure Hiding information at each layer Layered dependency Examples Level N THE (6 layers) . MS-DOS (4 layers) . Pros Level 2 Layered abstraction -
IBM System Z9 Enterprise Class
The server built to help optimize your resources throughout the enterprise IBM System z9 Enterprise Class A “classic” might just be the best Today’s market finds that business needs are changing, and having a com petitive advantage isn’t always about having more or being bigger, but more about being smarter and responding faster to change and to your clients. Often, being reactive to change has led to infrastructures with mixed technolo gies, spread across an enterprise, that are complex and difficult to control and costly to manage. Integration of appli cations and data is limited and difficult. Using internal information to make insightful decisions for the company Highlights can be difficult because knowing you are using the “best” data—that which is ■ Strengthening the role of the ■ Continued improvement in most current and complete—may not mainframe as the data hub of IBM FICON® performance and be possible. the enterprise throughput In many situations, investments have ■ New versatile capacity settings ■ On demand innovative tech been made in disparate technologies designed to optimize capacity nologies to help meet ever- that may fall short of meeting their and cost changing business demands goals. Merging information from one branch to another may not be possible ■ IBM System z9™ Integrated and so company direction is set with Information Processor (IBM zIIP) is designed to improve resource optimization and lower the cost of eligible work only a portion of the data at hand, and help achieve advanced I/O function and But data management can be a big in a global economy that can really hurt. -
Ist Das Z/OS (Objekt-) Relationale Datenbank-Produkt
Betriebssysteme it-Akademie Bayern z/OS und OS/390 Lehrgang 2009 Prof. Dr.-Ing. Wilhelm G. Spruth Teil 9b z/OS Subsysteme bs 0901 ww6 © copyright W. G. Spruth, 10-2000 wgs 03-95 Server Zugriff Unterschied zwischen Einzelplatzrechner und Client/Server Betriebssystemen. NT und Unix werden für beides eingesetzt. OS/390 ist ein reinrassiges Server Betriebssystem. Andere Beispiele für Server Betriebssysteme: Tandem Pathway, DEC Vax. Ein Server Zugriff benötigt spezielle Client Software. Möglichkeiten für selbstgeschriebene Klient-Anwendungen: Sockets, RPC, Corba, DCOM, RMI Zeilenorientierte Klienten: Unix Server Telnet Client OS/390 Server 3270 Client Vax Server VT 100 Client Klienten mit graphischer Oberfläche: NT Server Citrix Client WWW Server Browser Client SAP R/3 Server SAPGUI Client OS/390 Server Servlet, Java Server Page Client Client Server NT OS/390 LAN oder Internet Jedi 3270 Client Telnet, TN3270 es 0537 ww6 wgs 07-00 Typical online use Typical online use 1. A customer uses an ATM, which presents a user- friendly interface for various functions: Withdrawal, query account balance, deposit, transfer, or cash advance from a credit card account. 2. Elsewhere in the same private network, a bank employee in a branch office performs operations such as consulting, fund applications, and money ordering. 3. At the bank’s central office, business analysts tune transactions for improved performance. Other staff use specialized online systems for office automation to perform customer relationship management, budget planning, and stock control. 4. All requests directed to the mainframe computer for processing. 5. Programs running on the mainframe computer perform updates and inquires to the database management system (for example, DB2). -
Details Von Neumann/Turing Structure of Von Nuemann Machine
ENIAC - background 168 420 Computer Architecture ] Electronic Numerical Integrator And Computer ] Eckert and Mauchly Chapter 2 ] University of Pennsylvania Computer Evolution and ] Trajectory tables for weapons Performance ] Started 1943 ] Finished 1946 \ Too late for war effort ] Used until 1955 ENIAC - details ENIAC ] Decimal (not binary) ] 20 accumulators of 10 digits ] Programmed manually by switches ] 18,000 vacuum tubes ] 30 tons ] 15,000 square feet ] 140 kW power consumption ] 5,000 additions per second Structure of von Nuemann von Neumann/Turing machine ] Stored Program concept ] Main memory storing programs and data Arithmetic and Logic Unit ] ALU operating on binary data ] Control unit interpreting instructions from Input Output Main memory and executing Equipment Memory ] Input and output equipment operated by control unit ] Princeton Institute for Advanced Studies Program Control Unit \ IAS ] Completed 1952 1 IAS - details Structure of IAS - detail ] 1000 x 40 bit words Central Processing Unit Arithmetic and Logic Unit \ Binary number Accumulator MQ \ 2 x 20 bit instructions ] Set of registers (storage in CPU) Arithmetic & Logic Circuits \ Memory Buffer Register Input MBR Output Instructions \ Memory Address Register Main Equipment & Data \ Instruction Register Memory \ Instruction Buffer Register IBR PC MAR \ Program Counter IR Control \ Accumulator Circuits Address \ Multiplier Quotient Program Control Unit IAS Commercial Computers ] 1947 - Eckert-Mauchly Computer Corporation ] UNIVAC I (Universal Automatic Computer) ]