IBM i Program Conversion: Getting Ready for 6.1 and Beyond


Book Description

IBM® delivered IBM i 6.1 in March 2008. With 6.1, IBM exploits the capabilities of the Machine Interface (MI) architecture to significantly improve programs. Programs can benefit from better performance, a range of new operating system and processor capabilities, and even stronger system integrity. To enable these improvements, all MI programs created for previous releases must be converted to run on 6.1 or a later release. MI programs include integrated language environment (ILE) and original program model (OPM) programs. To convert a program, its creation data, which is a subset of observability, must be available. MI programs retain creation data by default, so that most programs can be converted, going all the way back to programs that were originally created for System/38. Even if an option was chosen to remove creation data from external access, Licensed Internal Code (LIC) can still access the creation data if the target releases of the program and its constituent modules are V5R1 or later. Thus a program lacks sufficient creation data for conversion only if the program or at least one of its modules was created for IBM OS/400® V4R5 or an earlier release and creation data was explicitly removed. You can run the Analyze Object Conversion (ANZOBJCVN) command on V5R4 or V5R3 to help plan for your upgrade. The ANZOBJCVN command identifies programs that will not convert to run on 6.1 or later releases, if any, and estimates the times that are required for the program conversions. It also provides information about two other types of conversions: integrated file system names and spooled files. You can access the ANZOBJCVN command by loading and applying the appropriate PTFs that are listed in this paper. This IBM RedpaperTM publication is intended for system administrators and field technicians to help them understand and prepare for upgrading or migrating to 6.1 or a later release. It explains what the program conversion is and why programs are being created or recreated on 6.1 or a later release. It then provides detailed steps for using the ANZOBJCVN tool on V5R3 or V5R4 to prepare for object conversions. Finally, it discusses the program conversion methods for converting programs to run on 6.1 or a later release. Note: The first edition of this paper was entitled IBM i5/OS Program Conversion: Getting Ready for i5/OS V6R1, REDP-4293-00. The title of this second edition has been slightly modified to IBM i Program Conversion: Getting Ready for 6.1 and Beyond, REDP-4293-01, to reflect the new naming conventions for IBM i.




DB2 9 for Z/OS Stored Procedures


Book Description




Customizing and Extending IBM Content Navigator


Book Description

IBM® Content Navigator provides a unified user interface for your Enterprise Content Management (ECM) solutions. It also provides a robust development platform so you can build customized user interface and applications to deliver value and an intelligent, business-centric experience. This IBM Redbooks® publication guides you through the Content Navigator platform, its architecture, and the available programming interfaces. It describes how you can configure and customize the user interface with the administration tools provided, and how you can customize and extend Content Navigator using available development options with sample code. Specifically, the book shows how to set up a development environment, and develop plug-ins that add an action, service, and feature to the user interface. Customization topics include implementing request and response filters, external data services (EDS), creating custom step processors, and using Content Navigator widgets in other applications. This book also covers mobile development, viewer customization, component deployment, and debugging and troubleshooting. This book is intended for IT architects, application designers and developers working with IBM Content Navigator and IBM ECM products. It offers a high-level description of how to extend and customize IBM Content Navigator and also more technical details of how to do implementations with sample code.




IBM CICS and the Coupling Facility: Beyond the Basics


Book Description

It's easy to look at the title of a book and think "that's old news" or "I already know all there is to know on that subject." But before you dismiss this publication, consider just how far the IBM® Parallel Sysplex® architecture has come. From the early days the mainframe has embraced a shared everything approach. The original designers coded IBM z/OS® (called IBM MVSTM or IBM OS/390® back then) with the functionality necessary for the operating system to create the repositories, manage the data flow, and ensure the integrity of the systems involved. From there, the middleware systems provided the exploitation and advanced functions to mature the technology. The component in the middle of all this great technology can easily be taken for granted. That is the IBM Coupling Facility. This IBM Redbooks® publication discusses both traditional uses for the IBM Coupling Facility technology and new ways to use it with products such as IBM CICS®. You can learn how to perform new functions and have these functions benefit from the scalability and availability achieved only in a mainframe ecosystem. Open standards are a large part of considerations today, as most companies run IT shops with a mix of technology components. As the world embraces these technologies, it is necessary to understand how to mix the world of mainframe architectures and products with other open architectures. This mix allows the best tool to be used to solve processing needs, at the right cost and service levels. Often the functions needed for modern processing can be found in house, in places where staff are skilled and that already deliver the robust production environments you count on daily. This book discusses these modern functions and how to achieve them with CICS use of the IBM Coupling Facility. You will learn how one IBM client, Walmart, took these concepts far beyond the original design as they share their experiences and even share code examples to help you get started. The last chapter of this book shows what can be achieved when a combination of old and new functions are use together. Even if you have familiarity with what could be done with the IBM Coupling Facility in the past, there is much to learn and deploy in a modern world. Those who are familiar with the IBM Coupling Facility might find the content of this book helpful. Additionally, readers who are considering how to use the IBM Coupling Facility technology within their environment might also find useful information in the chapters that follow




MySQL to DB2 Conversion Guide


Book Description

Switching database vendors is often considered an exhausting challenge for database administrators and developers. Complexity, total cost, and the risk of downtime are often the reasons that restrain IT decision makers from starting the migration project. The primary goal of this book is to show that, with the proper planning and guidance, converting from MySQL to IBM® DB2® is not only feasible but straightforward. If you picked up this book, you are most likely considering converting to DB2 and are probably aware of several of the advantages of to converting to DB2 data server. In this IBM Redbooks® publication, we discuss in detail how you can take advantage of this industry leading database server. This book is an informative guide that describes how to convert the database system from MySQLTM 5.1 to DB2® V9.7 on Linux® and the steps that are involved in enabling the applications to use DB2 instead of MySQL. This guide also presents the best practices in conversion strategy and planning, conversion tools, porting steps, and practical conversion examples. It is intended for technical staff that is involved in a MySQL to DB2 conversion project.




Getting Started with z/OS Data Set Encryption


Book Description

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.




Aix 5l Porting Guide


Book Description




Application and Program Performance Analysis Using PEX Statistics on IBM I5/OS


Book Description

This IBM Redbooks publication is intended for use by those generally familiar with most of the iSeries IBM-provided performance tools available through the i5/OS operating system's commands and the additional cost Performance Tools for iSeries, 5722-PT1, licensed program. i5/OS comes with a detailed program level performance data collection capability called the Performance Explorer (PEX). i5/OS commands supporting the collection include Add PEX Definition, Start Performance Explorer, and End Performance Explorer. One of the Performance Explorer (PEX) collection options is called Statistics (*STATS), which collects the program level performance statistics, including CPU usage, disk I/O activity, and the occurrence of certain i5/OS and System i microcode level events. The Print PEX Report function of 5722-PT1 provides a basic view of this *STATS data. PEX Statistics provides a richer interface for collection and analysis of the *STATS performance data than is available through the i5/OS PEX command and the Print PEX Report output.







Computerworld


Book Description

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.