SlideShare una empresa de Scribd logo
1 de 36
Insert
Custom
Session
QR if
Desired.
There’s a new Sheriff in Town
CICS Policy Based Management
Steve Zemblowski
zem@us.ibm.com
Session Abstract
My systems work perfectly—it’s the applications that are the
problem!” If you have ever said (or thought) that, then this session
is for you.
Outages do not have to be "an application issue" anymore. In CICS
TS 5, new policy-based capabilities allow you to set thresholds on
the resources that your applications are allowed to consume.
Rogue applications can be detected through various task threshold
policies, such as excessive file or database access, repetitive
program links, or abnormal storage requests. Once detected, you
have the ability to notify, to react, or to ABEND.
There’s a new sheriff in town, and it’s you. Come to this session to
learn how to exercise your new power wisely.
1
Session Agenda
• CICS Policy Based Management
• Resources
• Actions
• Policy Scope
• Summary
2
CICS Policies
• Can control the behavior of Applications and Platforms
• Define threshold conditions to manage user tasks
– Monitor the resource usage of a task
– Automatically take action when threshold is exceeded
• Detection of looping or runaway tasks
• A condition and action pair make up a policy rule
– Multiple rules can be defined in a policy
• Policies are defined in a CICS bundle
– Multiple policies can be in a single bundle
4
CICS Policies…
• Available Actions
– Issue a message
» DFHMP3001
– Emit an Event
– Abort the task
» Abend code AMPB or user specified
6
8
CICS Policies…
• Policy Based Management
– Condition and action
– Action can be:
• Emit a message
• Emit a system event
• Abend the task
Define a Policy
Threshold
breach
CICS Triggers an
action
Abend EventMessage
Trigger an action
SQL
Files
Storage
CPU An XML Policy document defines
the threshold and action
Policy Rule Types
• Database request
• File request
• Program request
• Start request
• Storage request
• Syncpoint request
• Transient Data request
• Temporary Storage request
10
Database
• Define a threshold for the
number of SQL requests
– Includes requests issued
in exits
• e.g. CICS VSAM
Transparency
12
File
• Define a threshold for the
number of FILE requests
– Applies to a specific file
command
– Not a cumulative count
– Counted whether the
command is successful
of not
– Counted for the user task
in the AOR whether the
file is local or remote
14
Program
• Define a threshold for the
number of LINK requests
– Includes a count of the
INVOKE APPLICATION
requests
16
Start
• Define a threshold for the
number of START
requests
– Request counted
whether successful or
not
• e.g. XICREQ returns
an IGNORE response
• e.g. XICERES returns
a resource not
available response
18
Storage
• Define a threshold for the
amount of STORAGE
allocated to the user task
– Count includes all
GETMAIN requests for a
task
• Explicit and Implicit
– Count is decremented
when an explicit or
implicit FREEMAIN is
issued
• Not for SHARED
storage
20
Storage Requests
• Define a threshold for the
number of STORAGE
requests for the user task
– Count includes all
requests for a task
• Explicit and Implicit
– e.g. EXEC CICS
READ FILE SET
22
Syncpoint
• Define a threshold for the
number of SYNCPOINT
requests for the user task
– ROLLBACK is included
in the count
24
Time
• Define a threshold for the
amount of TIME consumed
by a user task
– CPU Time
• Check is made when a
task gives up control
• Use RUNAWAY controls
to detect a tight loop
– ELAPSED Time
• Check is made when a
task issues an EXEC
CICS command or
invokes a TRUE
– ABEND action will be
taken after the
command completes
26
Transient Data
• Define a threshold for the
number of TRANSIENT
DATA requests for the
user task
– Be aware other products
write to Transient Data
• Language
Environment for
diagnostic information
• TCP/IP Socket
Interface for CICS
28
Temporary Storage Bytes
• Define a threshold for the
amount of data written to
TEMPORARY STORAGE
by a user task
– Both WRITEQ TS and
REWRITE TS are
counted
– REWRITE TS count is
the total size of the
rewrite, not the delta
30
Temporary Storage
• Define a threshold for the
number of TEMPORARY
STORAGE requests by a
user task
– REWRITE TS is counted
as a WRITEQ
– Request are counted
whether successful or
not
– Synchronous events to
temporary storage are
counted
32
Policy Exceptions
• Policies do not apply to:
– CICS system tasks
• Includes CPLT at systems initialization
– All terminal initiated CICS supplied transactions
• Except CECI
– All user tasks started by event processing
– All non-terminal CICS supplied transactions
• Except:
– All web interface tasks
– All CICS MQ bridge tasks
– All CICS mirror transactions
– All Liberty initiated transactions
– All CICS pipeline tasks
34
Policy Scope
• Policies are deployed to a specific scope
– Application scope
– Operation within an application scope
– Platform scope
– No scope (e.g. Region scope)
• Policies are defined in CICS bundles
– Scope is determined by where the bundle is deployed
• Platform: packaged as part of the platform and deployed during
platform installation
• Application: packaged as part of the application and deployed
when the application is installed
• Operation: policy associated with the entry point (operation)
• Region: defined in the CSD and installed in any CICS region
36
Policy Scope…
• Associating a policy with an operation
– A PROGRAM or URIMAP can be an entry point and thus
provide an operation to which policy can be applied
38
Policy Scope…
• Configuration example
4040
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy Scope…
• No scope (Region scope)
Region
Task Task Task Task
Policy
Policy Scope…
• Platform scope
44
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy
Policy Scope…
• Application scope
46
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P
Policy
Binding B2P
Operation
Policy Scope…
• Operation scope
48
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy
Policy Scope…
• Application scope – Multi-versioning
50
Application A 1.0.0
Platform P
Operation
Application A 1.0.1
Operation Operation
Binding A2P 1.0.0
Policy P
Binding A2P 1.0.1
Operation
Policy P’Policy Q Policy Q
Policy Scope…
• An example of a multiple policies being applied
Monitoring
• Performance class group, DFHCICS
– MPPRTXCD
» Number of policy rule thresholds that this task has exceeded
• Performance Analyzer 52
– Sample forms provided for current policies
System Events
 Capture events when:
– DB2 connection status changes
– FILE enable status changes
– FILE open status changes
– CICS message is issued
– Unhandled transaction abends
– Current active tasks for a TRANCLASS goes above or below
a certain percentage of MAXACTIVE
– Current active task in a region goes above or below a certain
percentage of MAXTASKs
56
Differences between Policies and Events
• Events
– Emitted when something of interest happens
• e.g. Transaction abend
– Convey information about what happened
– Cannot control or constrain processing
• Policies
– Define a contract on how the system/application is to behave
• Define a boundary within the task can execute
– Apply to instances of user tasks
– Can enforce the rules with in a policy
• Tasks that break the rules are subject to the specified
action
58
Documentation (SG24-8114)
CICS Transaction Server V5.3 open beta
• New Policy Rules
– Name Counter Server
• GET COUNTER|DCOUNTER
– Temporary Storage
• Support for Shared TS
– WebSphere MQ
• Number of MQ requests
– IMS
• Number of DBCTL calls
• New Entry Point
– Transaction
• Allows association of a policy with a TRANID
62
Summary
• CICS Policy Based Management
– Allow you to set thresholds on the resources that your
applications are allowed to consume
– Allow you the ability to notify, to react, or to ABEND rogue
tasks
– Allow you to define the scope of your policy rules
– Give you capabilities to protect and control your CICS
systems
64
Notices and Disclaimers
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or
transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been
reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM
shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY,
EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF
THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT
OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the
agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without
notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are
presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual
performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products,
programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not
necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither
intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal
counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s
business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or
represent or warrant that its services or products will ensure that the customer is in compliance with any law.
Notices and Disclaimers (con’t)
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products in connection with this
publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any
IBM patents, copyrights, trademarks or other intellectual property right.
• IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document
Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand,
ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™,
PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®,
pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®,
urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of
International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the
Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.

Más contenido relacionado

La actualidad más candente

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
Automating the Donut Donation
Automating the Donut DonationAutomating the Donut Donation
Automating the Donut DonationMichael Erichsen
 
Leveraging Operational Data in the Cloud
Leveraging Operational Data in the CloudLeveraging Operational Data in the Cloud
Leveraging Operational Data in the CloudInductive Automation
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyKevin Lloyd
 
PayPal Customer Presentation
PayPal Customer PresentationPayPal Customer Presentation
PayPal Customer PresentationSplunk
 
Architecture Concepts
Architecture ConceptsArchitecture Concepts
Architecture ConceptsPratip Mallik
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”MarketingArrowECS_CZ
 
New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10Peak 10
 
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...Amazon Web Services Korea
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup Ricoh India Limited
 
Taking Over & Managing Large Messy Systems
Taking Over & Managing Large Messy SystemsTaking Over & Managing Large Messy Systems
Taking Over & Managing Large Messy SystemsSteve Mushero
 
9 postproduction
9 postproduction 9 postproduction
9 postproduction Len Bass
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerManageEngine, Zoho Corporation
 
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsContinuous Delivery of Cloud Applications:Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications: Blue/Green and Canary DeploymentsPraveen Yalagandula
 

La actualidad más candente (19)

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Automating the Donut Donation
Automating the Donut DonationAutomating the Donut Donation
Automating the Donut Donation
 
Leveraging Operational Data in the Cloud
Leveraging Operational Data in the CloudLeveraging Operational Data in the Cloud
Leveraging Operational Data in the Cloud
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
PayPal Customer Presentation
PayPal Customer PresentationPayPal Customer Presentation
PayPal Customer Presentation
 
Architecture Concepts
Architecture ConceptsArchitecture Concepts
Architecture Concepts
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10
 
Open Daylight Forum India 2015
Open Daylight Forum India 2015Open Daylight Forum India 2015
Open Daylight Forum India 2015
 
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
Taking Over & Managing Large Messy Systems
Taking Over & Managing Large Messy SystemsTaking Over & Managing Large Messy Systems
Taking Over & Managing Large Messy Systems
 
Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 
Cybernetyx introduction
Cybernetyx introductionCybernetyx introduction
Cybernetyx introduction
 
Chapter14
Chapter14Chapter14
Chapter14
 
9 postproduction
9 postproduction 9 postproduction
9 postproduction
 
Butterfly
ButterflyButterfly
Butterfly
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
 
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsContinuous Delivery of Cloud Applications:Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
 

Destacado

SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networkingnick_garrod
 
SHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile PricingSHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile Pricingnick_garrod
 
Características Físicas
Características FísicasCaracterísticas Físicas
Características FísicasBianca Costa
 
4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dance4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dancenick_garrod
 
Facebook - The Social Network
Facebook - The Social NetworkFacebook - The Social Network
Facebook - The Social Networkgeersb
 
F004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programación
F004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programaciónF004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programación
F004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programaciónssmmille
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)nick_garrod
 
2014 1 pr커뮤니케이션세미나 강의록 3월4월
2014 1 pr커뮤니케이션세미나 강의록 3월4월2014 1 pr커뮤니케이션세미나 강의록 3월4월
2014 1 pr커뮤니케이션세미나 강의록 3월4월래경 류
 
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big Tummy
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big TummyThe Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big Tummy
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big TummySensual Occasions
 
IBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts wsIBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts wsnick_garrod
 
designing windows user experiences
 designing windows user experiences designing windows user experiences
designing windows user experiencesLaila Omran
 
ده مورد از بزرگترین اشتباهاتی که در تحقیقات بازاریابی باید از آنها اجتناب کرد
ده مورد از بزرگترین اشتباهاتی که در تحقیقات  بازاریابی باید از آنها اجتناب کردده مورد از بزرگترین اشتباهاتی که در تحقیقات  بازاریابی باید از آنها اجتناب کرد
ده مورد از بزرگترین اشتباهاتی که در تحقیقات بازاریابی باید از آنها اجتناب کردبازآران
 
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesSHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesnick_garrod
 
محدودیت ها در تحقیقات بازاریابی
محدودیت ها در تحقیقات بازاریابیمحدودیت ها در تحقیقات بازاریابی
محدودیت ها در تحقیقات بازاریابیبازآران
 

Destacado (18)

Theories of power
Theories of powerTheories of power
Theories of power
 
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
 
SOP Merakit PC
SOP Merakit PCSOP Merakit PC
SOP Merakit PC
 
SHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile PricingSHARE 2014, Pittsburgh IBM Mobile Pricing
SHARE 2014, Pittsburgh IBM Mobile Pricing
 
Características Físicas
Características FísicasCaracterísticas Físicas
Características Físicas
 
4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dance4156 Twist and cloud-how ibm customers make cics dance
4156 Twist and cloud-how ibm customers make cics dance
 
看图写话
看图写话看图写话
看图写话
 
JavaScript Classified
JavaScript ClassifiedJavaScript Classified
JavaScript Classified
 
Facebook - The Social Network
Facebook - The Social NetworkFacebook - The Social Network
Facebook - The Social Network
 
F004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programación
F004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programaciónF004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programación
F004 p006-gfpi guia de aprendizaje 2 -- aplicar los fundamentos de programación
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
 
2014 1 pr커뮤니케이션세미나 강의록 3월4월
2014 1 pr커뮤니케이션세미나 강의록 3월4월2014 1 pr커뮤니케이션세미나 강의록 3월4월
2014 1 pr커뮤니케이션세미나 강의록 3월4월
 
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big Tummy
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big TummyThe Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big Tummy
The Natural Tummy Tuck: 5 Lingerie Tips To Flatten A Big Tummy
 
IBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts wsIBM Impact session Ed addison nuts and bolts ws
IBM Impact session Ed addison nuts and bolts ws
 
designing windows user experiences
 designing windows user experiences designing windows user experiences
designing windows user experiences
 
ده مورد از بزرگترین اشتباهاتی که در تحقیقات بازاریابی باید از آنها اجتناب کرد
ده مورد از بزرگترین اشتباهاتی که در تحقیقات  بازاریابی باید از آنها اجتناب کردده مورد از بزرگترین اشتباهاتی که در تحقیقات  بازاریابی باید از آنها اجتناب کرد
ده مورد از بزرگترین اشتباهاتی که در تحقیقات بازاریابی باید از آنها اجتناب کرد
 
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resourcesSHARE 2014, Pittsburgh Using policies to manage critical cics resources
SHARE 2014, Pittsburgh Using policies to manage critical cics resources
 
محدودیت ها در تحقیقات بازاریابی
محدودیت ها در تحقیقات بازاریابیمحدودیت ها در تحقیقات بازاریابی
محدودیت ها در تحقیقات بازاریابی
 

Similar a Share cics policy (2844)

2844 inter connect cics policy (2844)
2844  inter connect cics policy (2844)2844  inter connect cics policy (2844)
2844 inter connect cics policy (2844)nick_garrod
 
1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...Matthew Webster
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...nick_garrod
 
Share 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical OverviewShare 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical Overviewnick_garrod
 
Mainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataMainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataDevOps for Enterprise Systems
 
IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview nick_garrod
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Glen Roberts, CISSP
 
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Prolifics
 
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...NETWAYS
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz wordQuadrisk
 
Application Performance Management
Application Performance ManagementApplication Performance Management
Application Performance ManagementNoriaki Tatsumi
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...AlgoSec
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloudnick_garrod
 
Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014Lari Hotari
 
GRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_HowtoperformasystemGRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_HowtoperformasystemBarun Kumar
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_systemJithin Zcs
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_centernick_garrod
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIsCisco DevNet
 

Similar a Share cics policy (2844) (20)

2844 inter connect cics policy (2844)
2844  inter connect cics policy (2844)2844  inter connect cics policy (2844)
2844 inter connect cics policy (2844)
 
1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
 
Share 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical OverviewShare 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical Overview
 
Mainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataMainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live Data
 
IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
 
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz word
 
Application Performance Management
Application Performance ManagementApplication Performance Management
Application Performance Management
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud
 
Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014
 
GRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_HowtoperformasystemGRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_Howtoperformasystem
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_system
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_center
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
 

Más de nick_garrod

Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesnick_garrod
 
Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)nick_garrod
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devopsnick_garrod
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternitenick_garrod
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudnick_garrod
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
 
S105 performance
S105 performanceS105 performance
S105 performancenick_garrod
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloudnick_garrod
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilitynick_garrod
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridgednick_garrod
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you nick_garrod
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle libertynick_garrod
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSnick_garrod
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloudnick_garrod
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewnick_garrod
 
Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenariosnick_garrod
 
16370 cics project opening and project update f
16370  cics project opening and project update f16370  cics project opening and project update f
16370 cics project opening and project update fnick_garrod
 

Más de nick_garrod (20)

Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilities
 
Api management customer
Api management customerApi management customer
Api management customer
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devops
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternite
 
S109 cics-java
S109 cics-javaS109 cics-java
S109 cics-java
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloud
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cics
 
S105 performance
S105 performanceS105 performance
S105 performance
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloud
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agility
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle liberty
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloud
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overview
 
Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenarios
 
16370 cics project opening and project update f
16370  cics project opening and project update f16370  cics project opening and project update f
16370 cics project opening and project update f
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Share cics policy (2844)

  • 1. Insert Custom Session QR if Desired. There’s a new Sheriff in Town CICS Policy Based Management Steve Zemblowski zem@us.ibm.com
  • 2. Session Abstract My systems work perfectly—it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be "an application issue" anymore. In CICS TS 5, new policy-based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rogue applications can be detected through various task threshold policies, such as excessive file or database access, repetitive program links, or abnormal storage requests. Once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely. 1
  • 3. Session Agenda • CICS Policy Based Management • Resources • Actions • Policy Scope • Summary 2
  • 4. CICS Policies • Can control the behavior of Applications and Platforms • Define threshold conditions to manage user tasks – Monitor the resource usage of a task – Automatically take action when threshold is exceeded • Detection of looping or runaway tasks • A condition and action pair make up a policy rule – Multiple rules can be defined in a policy • Policies are defined in a CICS bundle – Multiple policies can be in a single bundle 4
  • 5. CICS Policies… • Available Actions – Issue a message » DFHMP3001 – Emit an Event – Abort the task » Abend code AMPB or user specified 6
  • 6. 8 CICS Policies… • Policy Based Management – Condition and action – Action can be: • Emit a message • Emit a system event • Abend the task Define a Policy Threshold breach CICS Triggers an action Abend EventMessage Trigger an action SQL Files Storage CPU An XML Policy document defines the threshold and action
  • 7. Policy Rule Types • Database request • File request • Program request • Start request • Storage request • Syncpoint request • Transient Data request • Temporary Storage request 10
  • 8. Database • Define a threshold for the number of SQL requests – Includes requests issued in exits • e.g. CICS VSAM Transparency 12
  • 9. File • Define a threshold for the number of FILE requests – Applies to a specific file command – Not a cumulative count – Counted whether the command is successful of not – Counted for the user task in the AOR whether the file is local or remote 14
  • 10. Program • Define a threshold for the number of LINK requests – Includes a count of the INVOKE APPLICATION requests 16
  • 11. Start • Define a threshold for the number of START requests – Request counted whether successful or not • e.g. XICREQ returns an IGNORE response • e.g. XICERES returns a resource not available response 18
  • 12. Storage • Define a threshold for the amount of STORAGE allocated to the user task – Count includes all GETMAIN requests for a task • Explicit and Implicit – Count is decremented when an explicit or implicit FREEMAIN is issued • Not for SHARED storage 20
  • 13. Storage Requests • Define a threshold for the number of STORAGE requests for the user task – Count includes all requests for a task • Explicit and Implicit – e.g. EXEC CICS READ FILE SET 22
  • 14. Syncpoint • Define a threshold for the number of SYNCPOINT requests for the user task – ROLLBACK is included in the count 24
  • 15. Time • Define a threshold for the amount of TIME consumed by a user task – CPU Time • Check is made when a task gives up control • Use RUNAWAY controls to detect a tight loop – ELAPSED Time • Check is made when a task issues an EXEC CICS command or invokes a TRUE – ABEND action will be taken after the command completes 26
  • 16. Transient Data • Define a threshold for the number of TRANSIENT DATA requests for the user task – Be aware other products write to Transient Data • Language Environment for diagnostic information • TCP/IP Socket Interface for CICS 28
  • 17. Temporary Storage Bytes • Define a threshold for the amount of data written to TEMPORARY STORAGE by a user task – Both WRITEQ TS and REWRITE TS are counted – REWRITE TS count is the total size of the rewrite, not the delta 30
  • 18. Temporary Storage • Define a threshold for the number of TEMPORARY STORAGE requests by a user task – REWRITE TS is counted as a WRITEQ – Request are counted whether successful or not – Synchronous events to temporary storage are counted 32
  • 19. Policy Exceptions • Policies do not apply to: – CICS system tasks • Includes CPLT at systems initialization – All terminal initiated CICS supplied transactions • Except CECI – All user tasks started by event processing – All non-terminal CICS supplied transactions • Except: – All web interface tasks – All CICS MQ bridge tasks – All CICS mirror transactions – All Liberty initiated transactions – All CICS pipeline tasks 34
  • 20. Policy Scope • Policies are deployed to a specific scope – Application scope – Operation within an application scope – Platform scope – No scope (e.g. Region scope) • Policies are defined in CICS bundles – Scope is determined by where the bundle is deployed • Platform: packaged as part of the platform and deployed during platform installation • Application: packaged as part of the application and deployed when the application is installed • Operation: policy associated with the entry point (operation) • Region: defined in the CSD and installed in any CICS region 36
  • 21. Policy Scope… • Associating a policy with an operation – A PROGRAM or URIMAP can be an entry point and thus provide an operation to which policy can be applied 38
  • 22. Policy Scope… • Configuration example 4040 Application A Platform P Operation Application B Operation Operation Binding A2P Binding B2P Operation
  • 23. Policy Scope… • No scope (Region scope) Region Task Task Task Task Policy
  • 24. Policy Scope… • Platform scope 44 Application A Platform P Operation Application B Operation Operation Binding A2P Binding B2P Operation Policy
  • 25. Policy Scope… • Application scope 46 Application A Platform P Operation Application B Operation Operation Binding A2P Policy Binding B2P Operation
  • 26. Policy Scope… • Operation scope 48 Application A Platform P Operation Application B Operation Operation Binding A2P Binding B2P Operation Policy
  • 27. Policy Scope… • Application scope – Multi-versioning 50 Application A 1.0.0 Platform P Operation Application A 1.0.1 Operation Operation Binding A2P 1.0.0 Policy P Binding A2P 1.0.1 Operation Policy P’Policy Q Policy Q
  • 28. Policy Scope… • An example of a multiple policies being applied
  • 29. Monitoring • Performance class group, DFHCICS – MPPRTXCD » Number of policy rule thresholds that this task has exceeded • Performance Analyzer 52 – Sample forms provided for current policies
  • 30. System Events  Capture events when: – DB2 connection status changes – FILE enable status changes – FILE open status changes – CICS message is issued – Unhandled transaction abends – Current active tasks for a TRANCLASS goes above or below a certain percentage of MAXACTIVE – Current active task in a region goes above or below a certain percentage of MAXTASKs 56
  • 31. Differences between Policies and Events • Events – Emitted when something of interest happens • e.g. Transaction abend – Convey information about what happened – Cannot control or constrain processing • Policies – Define a contract on how the system/application is to behave • Define a boundary within the task can execute – Apply to instances of user tasks – Can enforce the rules with in a policy • Tasks that break the rules are subject to the specified action 58
  • 33. CICS Transaction Server V5.3 open beta • New Policy Rules – Name Counter Server • GET COUNTER|DCOUNTER – Temporary Storage • Support for Shared TS – WebSphere MQ • Number of MQ requests – IMS • Number of DBCTL calls • New Entry Point – Transaction • Allows association of a policy with a TRANID 62
  • 34. Summary • CICS Policy Based Management – Allow you to set thresholds on the resources that your applications are allowed to consume – Allow you the ability to notify, to react, or to ABEND rogue tasks – Allow you to define the scope of your policy rules – Give you capabilities to protect and control your CICS systems 64
  • 35. Notices and Disclaimers Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
  • 36. Notices and Disclaimers (con’t) Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. • IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.