Modified on by KeithWinnard
We have just released A Practical Guide to ICF Catalogs. This IBM® Redbooks® publication is a book (90 pages) and is intended to give you a broad understanding of Integrated Catalog Facility (ICF) catalog environments. It includes suggestions for design, planning, and deployment activities that will help you create and maintain a balanced and efficient catalog environment.
Four scenarios are provided to illustrate typical activities that are associated with an organization's catalog requirements.
Please provide us with your feedback on the guide and if you would like additional topics to be addressed or any other information which may help you.
Here is the Table of Contents,
Chapter 1. Technical Overview
Chapter 2. Planning integrated catalog facility catalog environments
Chapter 3. Deploying ICF catalogs
Chapter 4. Maintaining ICF catalogs
Chapter 5. Record-level sharing support for ICF catalogs
You can download this guide right now from: http://www.redbooks.ibm.com/abstracts/sg248262.html?Open
The world is becoming more digitized and interconnected, which opens the door to emerging threats, leaks and attacks. The average cost of a security breach in 2013 was $5.4 million US dollars1 (USD)! Not to mention the impact a security breach can have on your company’s reputation and brand. Can your customers trust that their personal data is secure?
Analytics, mobile, social, and cloud computing all have one thing in common: They need a platform that has a deeply integrated security stack.
The IBM z13, IBM’s newest addition to the mainframe, has a rich and proven legacy of delivering a secure infrastructure. It’s built on a set of hardware security capabilities that include multi-state operation modes, storage key isolation, high speed standards-based encryption, logical partitions as well as many other features and benefits. The operating systems that can be run on the IBM z13 include z/OS, with SSL (a component of the z/OS Communications Server) to support both SSL and TLS protocols, z/VM, and Linux on z Systems.
Back in October, 2014, I wrote a blog announcing a residency to write an IBM Redpaper on End-to-end security using z Systems.
In that blog post, I discussed the reasons why reviewing security in your enterprise was so important. The cost of poor security or even loose security is just too great. In November, I ran the residency and that IBM Redpaper is currently in draft. It provides a high level architectural overview of how to secure your z Systems enterprise from end to end.
Modified on by JamesPistilli
The IBM z13, like its predecessors, is designed from the chip level up to support data processing. This includes a strong, fast I/O infrastructure, cache on the chip to bring data close to processing power, security and compression capabilities of the coprocessors and I/O features, and the 99.999% data availability design of the coupling technologies.
The figure below shows ten easy steps for implementing an I/O configuration for your z13. The numbered steps are described after the figure.
a. When planning to migrate to a z13, the IBM Technical Support team can help you define a configuration design that meets your needs. The configuration is then used during the ordering process.
b. The IBM order for the configuration is created and passed to the manufacturing process.
c. The manufacturing process creates a configuration file that is stored at the IBM Resource Link website. This configuration file describes the hardware being ordered. This data is available for download by the client installation team.
d. A New Order report is created that shows the configuration summary of what is being ordered along with the Customer Control Number (CCN). The CCN can be used to retrieve CFReport (a data file that contains a listing of hardware configuration and changes for a central processor complex (CPC)) from Resource Link.
Make sure that you have the current PSP Bucket installed. Also, run the SMP/E report with fix category (FIXCAT) exceptions to determine whether any Program Temporary Fixes (PTFs) must be applied. Ensure that you have the most current physical channel ID (PCHID) report and CCN from your IBM service representative. Have extra cables (fiber optic and copper) available just in case some get damaged as they are being relocated.
When you plan your configuration, consider this information:
– Naming standards
– FICON switch and port redundancy
– Adequate I/O paths to your devices for performance
– OSA Channel Path Identifier (CHPID) configuration for network and console communications
– Coupling facility connections internally and to other systems.
Because the z13 server does not support attachment to the IBM Sysplex Timer, you must consider how the z13 will receive its time source. A z13 cannot join a CTN that includes a z10 or before as a member. Since the z10 was the last server that supported the IBM Sysplex Timer (9037) connectivity, the z13 cannot be configured as a member of a mixed CTN. The z13 can only join an STP-only CTN. When you are planning to replace a z196 or zEC12 with a new z13, plan the replacement of channels that are not supported on z13. You must carefully plan how to replace those, for instance, ISC-3 to HCA3-O or ICA SR for connectivity between z13 and z13. You might need to increase CF storage size when you replace z196 or zEC12 with z13. Coupling Facility Control Code (CFCC) level 20 requirements may be different from CFCC level 19 and earlier. Use the CFSizer Tool to get the new CF storage requirements.
The existing z196 or zEC12 I/O configuration is used as a starting point for using Hardware Configuration Definition (HCD). The z196 or zEC12 production input/output definition file (IODF) is used as input to HCD to create a work IODF that becomes the base of the new z13 configuration. When the new z13 configuration is added and the obsolete hardware is deleted, a validated version of the configuration is saved in a z13 validated work IODF.
a. From the validated work IODF, create a file that contains the z13 IOCP statements. This IOCP statements file is transferred to the workstation used for the CHPID Mapping Tool (CMT). Hardware Configuration Manager (HCM) can also be used here to transfer the IOCP deck to and from the CMT.
b. The configuration file that is created by the IBM Manufacturing process in step 1d is downloaded from Resource Link to the CMT workstation. The CHPID Mapping Tool (CMT) uses the input data from the files to map logical channels to physical ones on the new z13 hardware. You might have to make decisions in response to the following situations, among others: Resolving situations in which the limitations on the purchased hardware cause a single point of failure (SPoF). You might must purchase more hardware to resolve some SPoF situations. Prioritizing certain hardware items over others.
c. After the CMT processing finishes, the IOCP statements contain the physical channels to logical channels assignment that is based on the actual purchased hardware configuration. The CHPID Mapping Tool (CMT) also creates configuration reports to be used by the IBM service representative and the installation team. The file that contains the updated IOCP statements created by the CMT, which now contains the physical channels assignment, is transferred to the host system.
d. Use HCD, the validated work IODF file created in step 5a, and the IOCP statements updated by the CMT to apply the physical channel assignments created by the CMT to the configuration data in the work IODF.
After the physical channel data is migrated into the work IODF, a z13 production IODF is created and the final IOCP statements can be generated. The installation team uses the configuration data from the z13 production IODF when the final power-on reset is done, yielding a z13 with an I/O configuration ready to be used.
IODFs that are modifying existing configurations can be tested in most cases to verify that the IODF is making the intended changes.
a. If you are upgrading an existing z196 or zEC12, you might be able to use HCD to write an IOCDS to your system in preparation for the upgrade. If you can write an IOCDS to your current system in preparation for upgrade, do so and let the IBM service representative know which IOCDS to use.
b. If the z196 or zEC12 is not network connected to the CPC where HCD is running, or if you are not upgrading or cannot write an IOCDS in preparation for the upgrade, use HCD to produce an IOCP input file. Download this input file to a USB flash drive.
The new production IODF can be applied to the z13 in these ways:
– Using the power-on reset process
– Using the Dynamic IODF Activate process
Communicating new and changed configurations to operations and the appropriate users and departments is important.
For more information refer to IBM z13 Configuration Setup.
Modified on by KeithWinnard
Runtime Diagnostics is a “point-in-time” diagnostics tool that detects problems that could be contributing to system issues RIGHT NOW with the goal of finding the problems in sixty seconds or less. It has been available since V1R12 and as of V1R13, diagnoses seven types of problems which are documented in this IBM Redbooks Publication http://www.redbooks.ibm.com/abstracts/sg248070.html?Open.
Is that all? Of course not! We are pleased to announce our eighth diagnostic event: JES2 Health Exceptions. This event is available starting in z/OS V2R1 with APAR OA46531. This will be added to the IBM Redbooks Publication at a later date but we wanted to make you aware of this option as soon as possible.
Runtime Diagnostics gathers information about the JES2 subsystem from the JES2 subsystem interface (SSI). Runtime Diagnostics analyzes the information received, determines a possible corrective action, and presents it to the caller on the system console, the hardcopy log, and optionally, to a sequential dataset. An example of a possible event appears below:
HZR0200I RUNTIME DIAGNOSTICS RESULT
REQ: 004 TARGET SYSTEM: SY1 HOME: SY1 2015/01/12
INTERVAL: 60 MINUTES
FOUND: 01 - PRIORITIES: HIGH:01 MED:00 LOW:00
EVENT 01: HIGH - JES2 - SYSTEM: SY1 2015/01/12
$HASP9158 JES2 PROCESSING STOPPED, $S NEEDED
ERROR: JES2 CANNOT PROCESS NEW WORK.
ACTION: $S TO ENABLE JES2 TO START PROCESSING NEW WORK.
The analysis for this new event is automatically incorporated into the existing processing. After Runtime Diagnostics has been started, issue the command F HZR,ANALYZE to now have all eight types of analysis performed. Additional information on this new event will also be available in z/OS V2R2 Problem Management when it is available.
Runtime Diagnostics is easy to use and there when you need it, but since it isn't needed very often, it's also easy to forget, so always remember the value of these tools - and that you have them almost literally at the end of your fingertips!
Modified on by wgwhite
Data is growing at an unprecedented rate. With the introduction of mobile technologies and social media into our everyday lives new sources of data are eagerly captured and stored by organizations to improve their understanding of customer behaviors and needs. The need for personalization is paramount in remaining competitive and with establishing a unique connection with the customer.
The increasing volumes of data must be properly captured, stored, and managed for multiple processes to gain value and advantage from the data. The increased processing will demand more storage resources and therefore an increase in capacity is needed to satisfy the ever increasing amounts of data.
One possible solution is to use the software compression algorithms, but there is an increase in CPU utilization and therefore, it is necessary to trade off the savings in storage against the costs associate with increased CPU utilization. An alternative is to use a hardware accelerator that performs data compression and decompression with lower CPU consumption than software algorithms, and still be able to achieve savings in storage occupancy levels.
With the IBM z13, IBM zEC12, and IBM zBC12 a hardware feature called IBM zEnterprise Data Compression (zEDC) is offered. The zEDC Express delivers an integrated solution to help reduce CPU consumption, optimize performance of compression-related tasks, and enable more efficient use of storage resources, while providing a lower cost of computing and also helping to optimize the cross-platform exchange of data.
Data is the fundamental building block for organizations and the focus on capture, storage and management are key for the organization to continue to offer customers a viable and inviting relationship.
A recently published IBM Redbook called "Reduce Storage Occupancy and Increase Operations Efficiency with IBM zEnterprise Data Compression" provides samples of the possible savings the zEDC compression can make and examples for setting up such environments.
Modified on by KeithWinnard
The previous four posts in this blog series have touched on the demands of the modern workload generated by the acceptance of mobile devices into many aspects of our lives. We looked at the changes this has brought to organizations and how they might respond to the new order. But while we may have technical solutions available to satiate the demand, what changes are necessary in the capacity planning process?
Mobile devices have created the consumer expectations of immediacy in terms of information delivery, ease of use, media quality, and personalization. The requests for information need Systems of Engagement (SOE) and Systems of Record (SOR). The data necessary to fulfill the request may not reside in one particular organization but across several and must be drawn together quickly to present the requested information in an accurate, secure and timely manner. The consumer is not constrained by device or contact availability (as in ATM locations or call centers) and mobile technologies have empowered consumers to be able to issue multiple requests on a personal mobile device whenever they wish.
One outcome of this empowerment is the change in traditional IT workload patterns. External circumstances may trigger a sudden increase in transaction volumes, collaborations may increase the transaction count or perhaps cause issues if there is a failure in the intertwined processes. Marketing departments may push for more dynamic campaigns in addition to their published plan. The result can lead to erratic workload patterns causing overloads and temporary demands for inadequate IT resources.
The scope of coverage for capacity planners must expand to accommodate the new challenges. The answer lies not just in technology capability but also in the management of the technology which in turn requires an understanding of mapping the business applications of the organization onto business goals, organizational structure, and the IT infrastructure and capability of both the organization and its partners.
The IBM z13 is ideally positioned to meet the challenges. To help produce an effective plan the following areas might be considered:
The value of virtualization
The impact of specialty engines, SMT and SIMD
Real time analytics.
The speed of I/O
Large memory benefits
SOE and SOR integration
The above capabilities will help to form, protect, and manage your capacity plan. However, it is suggested that input to the plan and new organization-wide commitment to capacity plan ought to include the following:
A capacity planning team structure to include IT, the business, and collaborative partners
Close liaison with marketing to establish expectations
Review of internal and external SLAs
Expansion of analytics for business and infrastructure
Automatic response to busy periods resource allocation
Understanding what resources lie within and outside of the organization
Processes to encourage accountability and understanding in the extended capacity planning team
See IBM Redbooks for more information on the IBM z13 capabilities.
Modified on by wgwhite
The combination of versatility of the connectivity options, the use of open standards, and the separation of data processing and I/O operations.
Data is produced on an unprecedented scale and access to that data must be quick, safe and guarantee integrity. Data is an organization's most valuable asset in the digital age. As the growth continues it is essential that the technology improves to keep the organization competitive.
The most efficient IT infrastructures that handle today's workloads usually have well balanced systems with superior data processing and I/O capabilities that are responsive and reliable. Such I/O capabilities have been a standard component of the IBM mainframe architecture since first introduced with the IBM S/360 in 1964. Over the past 50+ years I/O technologies have advanced significantly and so have the mainframe I/O capabilities. From the original parallel channels, where I/O devices were connected directly using two copper cables (called bus cable and tag cable) to today's Fibre Connection (FICON®), where optical transmitters, Fiber Channel switches/directors, and fiber-optic cables transport data at link rates of 2 Gbps, 4 Gbps, 8 Gbps, or 16 Gbps. A bus cable only carried one byte of information each way and a tag cable indicated the meaning of the data on the bus cable.
In addition, z Systems platforms have a unique channel subsystem that delivers high I/O bandwidth. The channel subsystem (CSS) was added to the IBM mainframe architecture to provide a pipeline through which data can be exchanged between systems or between a system and external devices via storage area networks and local area networks. The CSS is the channel path management layer that enables communication to and from system memory and peripheral devices at very fast rates.
The z Systems platforms have dedicated system assist processors (SAPs) in addition to the general purpose and specialty processors. I/O requests are handled by the SAPs, freeing up the general purpose and specialty processors to do other work. The IBM z13 offers up to 24 SAPs, supporting millions of I/O operations per second. This is also possible because all I/O features offered on the z Systems platforms offload some of the I/O operations to the hardware, using licensed internal code (LIC). The result is a significant improvement in both latency and bandwidth for transporting data.
In the z13, I/O features are plugged into an industry standard PCIe I/O drawer with PCIe Gen3 interconnects, delivering throughput speeds of 16 GBps to and from the I/O features. Different types of I/O features are available for each channel or link type and they can be installed or replaced concurrently, so no disruption to the production environment. Each PCIe I/O drawer can support up to 320 FICON channels, which provide unmatched bandwidth to back-end storage systems, while up to 96 OSA-Express ports allow for direct high-speed Ethernet connectivity.
Other I/O features used for system-to-system communications are Integrated Coupling Adapter (ICA SR) and 10GbE RoCE Express (for IBM z/OS®-to-z/OS communications), while HiperSockets technology can be used for communications between logical partitions within the z Systems platform.
If you would like to learn more about z Systems connectivity options, typical uses, coexistence, and relative merits of the available I/O features, go to:
Did you know that all IT vendor products must go through rigorous qualification testing before they are supported on IBM z Systems® platforms?
To acquire qualification, vendors obtain licensed IBM patents, intellectual property, and know-how. This licensing provides vendors access to the proprietary IBM protocols and applications that are used on z Systems platforms.
In this post we will look at the criteria and processes required to successfully complete the IBM z Systems Geographically Dispersed Parallel Sysplex™ (GDPS®) qualification testing for Dense Wavelength Division Multiplexing (DWDM) vendors.
GDPS is an enterprise-wide continuous availability (CA) and disaster recovery (DR) solution that can manage recovery from planned and unplanned outages across distributed servers and z Systems platforms. GDPS can be configured in either a single site or in a multi-site configuration. It is designed to manage remote copy configuration between storage subsystems, automate Parallel Sysplex operational tasks, and affect failure recovery.
GDPS qualification testing for z Systems platforms is conducted at the IBM Vendor Solutions Connectivity (VSC) Lab in Poughkeepsie, New York.
IBM proprietary software and microcode utility test suites form a part of the GDPS qualification tests. They drive the various GDPS components and protocols to the full data rate of each link type that is transported by the DWDM equipment. This level of testing ensures that the maximum channel utilization is achieved and tested to levels well beyond typical client environments.
The test suites are used for verification of z Systems architecture functionality. The functionality test suites must be completely error free to be considered sucessful; all components within the complex are subject to this standard. Any errors detected during this testing are captured and analyzed by the test suites.
The test suites are also used for verification of z Systems architecture recovery by creating various fault and error conditions. The recovery tests check for the correct detection of a fault or error condition by the attached subsystems, and ensure that the recovery adheres to the z Systems architecture.
Below depicts the environment that is used for DWDM vendor qualification testing.
The IBM Redbooks team recently published IBM Redpapers related to z Systems qualified DWDM vendor products for GDPS solutions with Server Time Protocol (STP). The papers describe the z Systems qualification process and the applicable environments, protocols, and topologies that were tested.
The team members that wrote the papers are subject matter experts from the IBM VSC Lab: Pasquale Catalano and Andrew Crimmins, and Bill White (IBM Redbooks team leader).
For more information about IBM Redpapers related to z Systems qualified DWDM vendor products, go to:
IBM z Systems qualified Dense Wavelength Division Multiplexing platforms
Modified on by KeithWinnard
The recently announced IBM z13, positioned to meet the evolving demands of the modern workload, and at the same time, continue to improve the more traditional and well established applications. It scales from a small singular deployment instance to serving global organizations.
The IBM z13 is a combination of enhanced technologies brought together in a single footprint. The design takes full advantage of the established foundations of z Systems and builds upon them. New functionality has been added to help with processing data in a more efficient manner than ever before.
In this blog series we are touching on how technologies have changed our lives, and how, in turn, our new expectations are forcing changes onto those technologies. It's a full circle of symbiotic engagement. How things have changed since 2007 – and are still changing; rapidly redefining the way we live, our expectations, and our understandings. The IBM z13 is a product of understanding; it will meet the new demands and help us move forwards with confidence both as consumer and as an organization.
The key pillars on which our new era stand are:
Concurrent multiple operating systems in one machine
Ensuring availability and scalability
Processing large amounts of data with speed
Embracing open systems standards
Expanding the scope of analytical intelligence
Making use of Simultaneous Multi-threading (SMT), large memory, Single Instruction Multiple Data (SIMD)
Providing end-to-end security
The inclusion of mobile devices is accommodated by Systems of Engagement (SOE) and how they integrate with Systems of Record (SOR) to provide a single solution. The mobile Enterprise Application Platform (MEAP) offers the ideal environment to develop and maintain mobile device apps and communicates with the various components in the SOR for request fulfillment.
The organization's traditional workloads can integrate with mobile devices via the SOE. The advantage of the SOR and SOE approach is that the longer established routes to the SOR are also still viable and require little if any change. In terms of TCO and TCA this is a very attractive path and less disruption helps to ease the curve of the risk assessment when moving towards the mobile device apps.
A sample of the inclusion of analytics to appreciate how this might integrate into the whole scenario could be as follows:
In the case above a suspicious transaction is identified.
The advantage of a centrally managed data repository is that it can be referenced by various processes and tools to provide focused advantage through streamlined insight. Content relevance is essential to attract consumer interest and subsequent interaction. Personalization is key in the modern world; it lies at the core of the digital era. Our urge to connect as humans is strong; we are in the social digital era of connections.
The IBM z13 is perfectly positioned to take you and organizations further into this age of connections.
For further reading click on the link to be taken to the IBM Redbooks site to download these two brief but insightful publications.
IBM z13 for Mobile Applications
Reliable Analytics by Using IBM z13
Modified on by lydiap
Analytics is changing the face of business. Technology enablement has brought us to a new era, and the journey continues.
IBM z Systems and, in particular, IBM z13 with its new features and functions enable all of the advantages of improved performance and lowered costs, providing real-time analytics-based decisions.
With the many new features and functions of IBM z13, your organization's workloads will definitely benefit.
One of the new features/functions of the IBM z/13 includes the addition of SIMD-MASS and ATLAS libraries for IBM z/OS® and Linux on z Systems: single-instruction, multiple-data (SIMD), Mathematical Acceleration Subsystem (MASS ), and Automatically Tuned Linear Algebra Software (ATLAS).
The MASS software libraries offer improved performance over standard mathematical library routines and are thread-safe. A piece of code is thread-safe if it only manipulates shared data structures in a manner that guarantees safe execution by multiple threads at the same time. The MASS for z/OS software libraries include accelerated sets of frequently-used mathematical functions for SIMD libraries. Additionally, you can now bring MASS code running on other platforms onto z/OS.
You may ask yourself, but what does this mean in the realm of analytics? Well, it allows for the construction of richer, more complex analytics models that exploit SIMD to provide better accuracy of insight. And better accuracy of insight means more accurate linkage to customer information across channels. You want to translate that data into something meaningful to your company, and you want to make sure it is accurate!
Is there a topic you want to hear about based on analytics? Let me know in the comments below!
Modified on by KeithWinnard
The rise in expectations shapes a new landscape for applications development and infrastructure management. The old must be merged with the new in a seamless fashion.
The challenge is to establish a new equilibrium by leveraging the full investment from existing applications and to build and integrate the new possibilities and technologies of mobile. However the challenge is much deeper than that, we must understand its true nature. On the surface we can expect to see the flowing demands:
Performance – engagement response time is critical
Accurate data and information
A pleasant presentation layer
Easy to use applications
Confidence in mobile security
For these demands to be met, we must delve a little deeper to uncover hidden demands. The challenges which lay just below the surface are the building blocks of the enterprise. Here we find the need to:
Capture and manage structured and unstructured data
Increase enterprise intelligence
Provide end-to-end security
Integrate consistent collaboration
Improve application availability and stability
Respond to unprecedented shifts in workload
Take advantage of collaborations opportunities for fulfillment
Manage rapidly growing amounts of data
In summary, we need a platform that is reliable, performant, scalable, responsive, and secure. One that has built-in governance to meet the demands and deliver insight so we can make informed decisions.
See IBM Redbooks for more information.
Modified on by KeithWinnard
As new mobile apps have found their way onto our devices so too has the amount of data we consume. Prior to 2007, did we know that booking a flight, choosing a seat, receiving an electronic ticket, making a payment, checking live flight status, and tracking a journey on our phones was just around the corner?
The scope of data consumed has increased to be more informative to the consumer. Competition for delivering information to our devices has intensified as marketers vie to attract our attention and win our focus and business. We have quickly adapted to the new order and enjoy the benefits of mobile technologies to:
Talk to friends via video across the world
Search for extended shopping options
Learn about healthcare improvements
Effortlessly manage our bank accounts
Personalize our needs of products and services
Track people or goods
Be available to others for immediate contact
True, we could do some of these things before 2007, but not with the intensity we can now - and while on the move. It appears to be socially acceptable to carry our mobile devices everywhere with us. Perhaps it is the need to connect with others that drives us to have them constantly close by.
Our appetites for new apps and managing the aspects of our lives has made us want more; we now have post 2007 expectations. We want apps that are easy to use. We want to be able to do what we want, when we want, and how we want. And we want the information now. We don’t want a drawn out process to achieve it, we just want to do it and be on our way.
Our expectations will continue to rise. New mobile apps will extend in functionality and scope and will create a more competitive space on the mobile device. As consumers we will expect continuous quality improvement, creativity, and value.
For further information see IBM Redbooks z13 Publications
Modified on by KeithWinnard
The Consequences of Change blog series
This mini blog series of 5 posts looks at the modern workloads organizations have to face today and touches on some of the points that have brought new challenges and new solutions to the our digital era.
The Consequences of Change Post 1 of 5: Behavioral Changes by Keith Winnard
In 2007 the invasion started. A revolution of gargantuan proportions began from a single presentation by one man. The impact would be global. Your life was about to change, the way you think was about to change, those around you were about to change. Forever.
One day. One speech. One man. One device. Mobile had arrived.
What followed, was 7 years of an ever-growing realization of new possibilities, a new breed of application, new techniques, new thinking, new wants, and new devices rapidly changed our options and our choices. Social was truly born and part of our everyday life. Who foresaw the implications? Our personal lives and careers became interwoven as our welfare, personal interests, daily routines, and contacts morphed into a new way of living. From the moment of that speech, the global revolution began, and amassed an unprecedented momentum which today sees us with nearly 7 billion devices providing us with new opportunities to improve every day of our lives.
Where is the evidence of behavioral change?
Would you like facts, figures, charts, and references to quantitate studies? Sorry. There are none here today for you. Just look around you. Look at people in cafes & restaurants – count the people count the mobile devices. How many emails, messages, and social interactions have you had today? How much information did your mobile device provide you with today – the time? The weather? A photo? A download? Internet access? TV listing? A recipe? A sports update? Your bank balance? A game?
Stop off for a coffee; it won’t take long; you can order it on the way with a few swishes; Choose the coffee you want; pay for it; pick up your loyalty bonus; and if you are trying somewhere new for your coffee, listen to the directions. As you open the cap and sit down look around you. It’s all happening right there in front of you. People sending, searching, shopping, and sharing.
No time for a coffee? Okay, well carry on your day as normal but I ask you to watch. Watch those around you. Watch what they are doing. How many devices do you see?
We are in the 8th year of the revolution and the progress is both relentless and unstoppable. Each one of us has changed since that speech back in 2007. When and where will it stop? This journey has no destination, it probably never will, but one thing is for sure; you are on board and there is no option to jump ship at the next port of call.
Post 2 of this series to be published tomorrow will look at the rise of expectations.
For more information visit https://www.pinterest.com/ibmmainframe/ibm-z-redbooks/
Modified on by lydiap
With the holiday shopping season fast approaching, once again I read in the news from Mitchell D. Weiss, Credit.com on November 2, 2014 how consumer fear of credit card fraud now tops terrorism.
And from the banking analytics blog from FICO, I read about the four essentials for fraud detection
Fraud detection in real time.
Efficient rules engine.
Why aren’t more banks and retail operations thinking about this? And with IBM System z, the whole package of essentials is right there! System z and its suite of products can integrate your customers’ transactions with analytics – all in real time! And it’s FAST because all of the operational analytics on System z take place at banking transaction speeds.
Watch the extended version of my demonstration featuring IBM System z – Integrating Transactions and Analytics. This one demonstrates real-time fraud detection in the banking environment as it pertains to you debit and credit cards, but it can easily also pertain to store credit cards:
Modified on by MartinKeen
Have you ever found one of your LPARs running jobs that you never expected to see? Or maybe some smartypants using Job Classes reserved to High Priority Jobs? Maybe you spent money and/or time trying to have more control and avoid these situations. Now, there's a new assistance for these scenarios; JES2 and JES3 come with SAF protection for Job Classes.
Let’s consider an example. We have a MAS, all members in z11 mode, using JES2 or JES3, z/OS 1.13 and Joan. She found that the LPAR is very loaded and it takes longer to answer, since there are many other jobs in the queue. So by routing Jobs to a different node and using another class, the same Job runs faster. Why? Simple. It´s the Production environment.
She may not know, but this can lead to real outages and other serious problems, so we can’t let this happen. So first thing we need to do is let her know that is not a good thing to do. But we can’t just go talk with each one of the people and ask them to stop. It’s not a very practical thing to do.
By this time of the year either you already moved to z/OS 2.1 or at least you are planning on doing so. Well, beginning with this z/OS version, you can use the new enhancement that comes with the JESCLASS; define a profile like JOBCLASS.NODE1.*.*, and then deny access to all the users similar to Joan’s to that profile in your production environment. For this, JES.JOBCLASS.OWNER and JES.JOBCLASS.SUBMITER must be defined in the FACILITY class with Universal Access set in Read.
This may also be useful, in the opposite direction where people are trying to relief the workload in a Production System or by watching that the system´s queue is full. They may want to run jobs in a Development environment, not realizing that the information they handle could be exposed if not handled properly could compromise other resources of that other LPAR where the job is not supposed to be running or even crash that environment.
So, in fact this is just one of the features, I can go on and on, talking about the new things you’ll find in z/OS V2.1. I could talk about enhancements you didn’t know exist, and how to combine some of these enhancements. But instead of listening to me, check out the IBM Redbooks publication Key Functions in z/OS Version 2 Release 1. In it you’ll learn about enhancements like the 8 Characters Classes in JES2, Batch Modernization, Communications Server Updates, the new HMC 3270 Console, Catalogs new enhancements for Aliases, Extended Addressability and RLS.
Guillermo Cosimo is a z/OS System Programmer at Banco Galicia in Buenos Aires, Argentina. He has 7 years of experience in the Mainframe architecture. His areas of expertise include z/OS, USS, DFSMS, zFS, REXX, SMPe, DR. He holds a graduate degree in Systems Engineering from the Universidad Abierta Interamericana.