|Monitoring the JVM server in CICS with IBM Support Assistant
Memory leaks in Java programs can be as critical as they are in programs written in other languages. While Java has a Garbage Collector, it sometimes cannot remove objects because they are still referenced. Therefore memory leaks require you to first, locate them, and second, identify the class responsible. This article uses a sample Java program running in the CICS JVM server to show you how to locate a memory leak and identify the class responsible.
|13 Mar 2013|
|Comment lines by Kyle Brown: Paying back technical debt
If you have ever put off completing part of a project with the intention of coming back later to finish it, then you have incurred technical debt. Like financial debt, technical debt is serious and can snowball unless you are aware of it and have a plan in place to manage it. This article presents five steps to help you identify, reduce, and handle your organization's ongoing technical debt situation.
|27 Jan 2010|
|Security architecture when integrating TXSeries with CICS Transaction Server: Part 3, Configuring centralized security with IP/SSL connectivity
Part 3 of this series focuses on the configuration steps for the deployment solutions described in Part 1, explaining the configuration steps for setting up security between CICS TS and TXSeries in an integrated, centralized security environment over internet protocol (IP) connectivity with secure sockets layer (SSL).
Also available in: Chinese
|16 Dec 2009|
|Security architecture when integrating TXSeries with CICS Transaction Server: Part 2, Configuring centralized security with IP connectivity
Part 2 of this series describes a typical customer scenario where CICS and TXSeries are in an integrated, centralized security environment over IP connectivity. We show how to configure security in CICS TS and TXSeries in this architecture, and cover some known limitations.
|16 Dec 2009|
|Efficiently transferring large data between TXSeries and CICS TS programs
This article gives an overview of channels and containers, including their creation, usage, advantages, best practices, migrating COMMAREA-based application to use channels and some customer scenarios. A sample application shows how to pass data from a TXSeries to a CICS TS program using channels and containers.
|02 Dec 2009|
|Security architecture when integrating TXSeries with CICS Transaction Server: Part 1, Concepts and design considerations
This article explains how to use security features provided by CICS Transaction Server and TXSeries in enterprise environments. It also discusses real customer scenarios with case studies demonstrating the security mechanism provided by CICS Transaction Server and TXSeries.
|16 Sep 2009|
|Techdoc: WebSphere for z/OS - Feature Pack for Web Services
Learn what the Feature Pack for Web Services (FPWS) for WebSphere Application Server on z/OS provides, and how to install and configure it. You update an existing configuration so it can link to and make use of this new functionality. The process is not difficult, but it may be unfamiliar territory for those who have not done this before. So this paper provides a step-by-step guide to installing, configuring and validating the new Feature Pack for Web Services.
|31 Jan 2008|
|Transactionally integrate CICS COBOL applications into WebSphere Process Server SOA solutions
This article discusses the importance of integrating existing CICS COBOL assets into new SOA solutions. It then presents common integration patterns between CICS COBOL applications and WebSphere Process Server V6. A detailed development process for one of the patterns is also included in this article.
|17 Oct 2007|
|Build a resilient SOA infrastructure, Part 1: Why blocking application server threads can lead to a brittle SOA
Resiliency -- defined as the continued availability and performance of a service despite negative changes in its environment -- is vital in a Service-Oriented Architecture (SOA). An SOA infrastructure must ensure that a service is highly available regardless of unpredictable conditions, such as sudden and significant degradation of network latency, increase in database response times, or degradation of dependant services. This article, the first in a series that describes design issues and techniques for building resilient SOA infrastructures, focuses on how IBM WebSphere Application Server for z/OS factors into the SOA and how it contributes to SOA resiliency.
Also available in: Chinese
|27 Sep 2007|
|Options for integrating new applications with current applications that run on a mainframe
Get an overview of both point-to-point and ESB-based integration options for integrating Java applications with existing mainframe CICS and IMS applications.
|05 Jun 2007|
|Exposing a CICS program as a Web service using IBM Rational Application Developer
IBM Rational Application Developer v126.96.36.199 provides new tooling to simplify the creation of J2EE applications that use the J2EE Connector Architecture to access applications running on legacy systems. This article will start with a simple CICS program, and show how basic wizards can be used to expose the program as a Web service running on IBM WebSphere Application Server. It will also cover some of the pitfalls encountered on the way. This will be useful to people wishing to use their legacy CICS applications in a Service-Oriented Architecture.
|18 Oct 2005|
|Finding Java Memory Leaks in WebSphere Application Server
This two-part series explains how to diagnose and find the source of memory leaks in WebSphere Application Server. Part 1 focuses on Java heap leaks and two different trace formats, Sun's Hprof and IBM's heapdump, that you can use for diagnosis. Part 2 focuses on Java heap leaks and z/OS tools you can use for diagnosis.
|10 Mar 2004|
|Schwab puts growth plan to the test
This paper describes how IBM's High Volume Web Sites team used WebSphere technology to put their best practices for performance and scalability to the test at Charles Schwab and Co. Inc. It details their goals, scenarios, and the large-scale system environment they set up for benchmarking and testing
|30 May 2001|