|
IMS clients can now modernize legacy applications using Java and COBOL. This video showcases how IMS customers use 31-bit COBOL and 64-bit Java interoperability to leverage their existing modern…
|
|
Check out the latest IBM IMS product enhancements released in V15.3: IMS Support for Z Security & Compliance Center 31-bit COBOL and 64-bit Java ™ Interoperability Performance…
|
|
This video provides a brief overview of IMS components and architecture.
|
|
This video discusses HIDAM databases, which provide all the function of HISAM but without the space-management drawbacks.
|
|
This video describes DRD, which you can use to issue commands to create, update, and delete MODBLKS resources dynamically and to create programs or transactions, instead of running an IMS Gen.
|
|
This video describes TSO SPOC, which is an ISPF application that is invoked by using the command DFSSPOC and can be used to control one or more IMS DBCTL, IMS DB/DC, or IMS DBCTL systems.
|
|
This video describes several type-2 commands including the update resource and query transaction commands.
|
|
This video introduces IMSplex-related Type 2 commands. These commands can be entered only through the OM interface.
|
|
This video describes the Operations Manager (OM), which is a server address space in the IMSplex. It acts as a common point of command entry into the IMSplex.
|
|
This video describes how shared resources are managed in an IMSplex and the Common Service Layer, or CSL, that consists of additional address spaces providing systems management functions not…
|
|
This video describes generally how failures are handled in a data sharing environment.
|
|
This video describes Shared VSO that also uses a cache structure to store the contents of some or all of a DEDB area and the data stored in the CF is the “official” copy. The contents of…
|
|
This video describes n-way data sharing, which allows up to 255 IMSs in up to 32 z/OSs to share the same set of databases with complete update authority (SHARELVL permitting). This technology…
|
|
This video describes block-level sharing in more detail. IRLM coordinates lock requests between (and within) IMS systems to ensure that lock requests for any specific block at any given time are…
|
|
This video describes how DBRC controls data sharing with share-level options. Unless a database is registered to DBRC with a SHARELVL set to 1, 2, or 3, IMS and DBRC code will prevent a database from…
|
|
This video introduces data sharing, which provides two levels of sharing: database-level sharing and block-level sharing.
|