Threadsafe considerations for CICS

Beginning with IBM® CICS® Version 2, applications can run on TCBs apart from the QR TCB, which has positive implications for improving system throughput and for implementing new technologies inside of CICS. Examples of implementing new technologies include using the IBM MVS™ Java virtual machine (JV...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: International Business Machines Corporation (-)
Otros Autores: Rayns, Chris Author (author), Bogner, George Contributor (contributor), Hale, Phil Contributor
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] IBM Corporation International Technical Support Organization 2012
Edición:5th ed
Colección:IBM redbooks.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629657906719
Descripción
Sumario:Beginning with IBM® CICS® Version 2, applications can run on TCBs apart from the QR TCB, which has positive implications for improving system throughput and for implementing new technologies inside of CICS. Examples of implementing new technologies include using the IBM MVS™ Java virtual machine (JVM) inside CICS and enabling listener tasks written for other platforms to be imported to run under CICS. The newest release, CICS Transaction Server for z/OS® (CICS TS) V4.2, includes scalability enhancements so that you can perform more work more quickly in a single CICS system. The advantage of this enhancement is that you can increase vertical scaling and decrease the need to scale horizontally, reducing the number of regions that are required to run the production business applications. The scalability enhancements in CICS TS V4.2 fall into two broad areas, which are increased usage of open transaction environment (OTE) and of 64-bit storage. This IBM Redbooks® publication is a comprehensive guide to threadsafe concepts and implementation for IBM CICS. This book explains how systems programmers, applications developers, and architects can implement threadsafe applications in an environment. It describes the real-world experiences of users, and our own experiences, of migrating applications to be threadsafe. This book also highlights the two most critical aspects of threadsafe applications: system performance and integrity.
Notas:Bibliographic Level Mode of Issuance: Monograph
Descripción Física:1 online resource (1 v.) : ill
Bibliografía:Includes bibliographical references.