Threadsafe considerations for CICS

Beginning with IBM® CICS® Version 2, applications can run on TCBs apart from the QR TCB, which has positive implications for improving system throughput and for implementing new technologies inside of CICS. Examples of implementing new technologies include using the IBM MVS™ Java virtual machine (JV...

Full description

Bibliographic Details
Corporate Author: International Business Machines Corporation (-)
Other Authors: Rayns, Chris Author (author), Bogner, George Contributor (contributor), Hale, Phil Contributor
Format: eBook
Language:Inglés
Published: [Place of publication not identified] IBM Corporation International Technical Support Organization 2012
Edition:5th ed
Series:IBM redbooks.
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629657906719
Description
Summary:Beginning with IBM® CICS® Version 2, applications can run on TCBs apart from the QR TCB, which has positive implications for improving system throughput and for implementing new technologies inside of CICS. Examples of implementing new technologies include using the IBM MVS™ Java virtual machine (JVM) inside CICS and enabling listener tasks written for other platforms to be imported to run under CICS. The newest release, CICS Transaction Server for z/OS® (CICS TS) V4.2, includes scalability enhancements so that you can perform more work more quickly in a single CICS system. The advantage of this enhancement is that you can increase vertical scaling and decrease the need to scale horizontally, reducing the number of regions that are required to run the production business applications. The scalability enhancements in CICS TS V4.2 fall into two broad areas, which are increased usage of open transaction environment (OTE) and of 64-bit storage. This IBM Redbooks® publication is a comprehensive guide to threadsafe concepts and implementation for IBM CICS. This book explains how systems programmers, applications developers, and architects can implement threadsafe applications in an environment. It describes the real-world experiences of users, and our own experiences, of migrating applications to be threadsafe. This book also highlights the two most critical aspects of threadsafe applications: system performance and integrity.
Item Description:Bibliographic Level Mode of Issuance: Monograph
Physical Description:1 online resource (1 v.) : ill
Bibliography:Includes bibliographical references.