|
|
|
|
LEADER |
03178nmm a2200445 u 4500 |
001 |
EB001925811 |
003 |
EBX01000000000000001088713 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9780738491943
|
050 |
|
4 |
|a TK5105.525
|
100 |
1 |
|
|a Bari, Paola
|
245 |
0 |
0 |
|a Implementing and managing APPC protected conversations
|c [Paola Bari and others]
|
250 |
|
|
|a 1st ed
|
260 |
|
|
|a San Jose, CA
|b IBM, International Support Organization
|c 2005
|
300 |
|
|
|a xii, 168 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Chapter 1. APPC Protected Conversation introduction and theory -- Chapter 2. Upgrading your configuration to support APPC/MVS Protected Conversations -- Chapter 3. Protected Conversations exploiters -- Chapter 4. How to operate in an APPC/MVS Protected Conversations environment -- Chapter 5. Sample scenario: IMS to IMS -- Chapter 6. Sample scenario: IMS to CICS -- Chapter 7. Monitoring
|
653 |
|
|
|a Peer-to-peer architecture (Computer networks) / fast
|
653 |
|
|
|a Traitement réparti
|
653 |
|
|
|a P2P (Réseaux d'ordinateurs)
|
653 |
|
|
|a Electronic data processing / Distributed processing / fast
|
653 |
|
|
|a z/OS. / http://id.loc.gov/authorities/names/n2002065831
|
653 |
|
|
|a Electronic data processing / Distributed processing / http://id.loc.gov/authorities/subjects/sh85042293
|
653 |
|
|
|a Programmation système (Informatique)
|
653 |
|
|
|a z/OS / fast
|
653 |
|
|
|a Peer-to-peer architecture (Computer networks) / http://id.loc.gov/authorities/subjects/sh2001003097
|
653 |
|
|
|a Systems programming (Computer science) / http://id.loc.gov/authorities/subjects/sh88004167
|
653 |
|
|
|a Systems programming (Computer science) / fast
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a IBM redbooks
|
500 |
|
|
|a "February 2005.". - "SG24-6486-00."
|
776 |
|
|
|z 0738491942
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738491942/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 004.6/5
|
082 |
0 |
|
|a 500
|
520 |
|
|
|a APPC Protected Conversation is a function provided by the operating system to exploiters running on z/OS. This function improves data integrity in distributed processing environments by enabling participation in the two-phase commit protocol. This IBM Redbooks publication provides system programmers with a solid understanding of the APPC Protected Conversation environment. It describes how to upgrade your environment to support protected conversations, how to configure protected conversation exploiters, how to operate in this environment, and how to manage resources. Sample scenarios illustrate how transactions are executed in a protected conversation environment, and how they fail. Design considerations for avoiding failures are also included, as well as a discussion of tools and utilities for monitoring and tuning your APPC environment. Detailed installation definitions are provided for protected conversation exploiters (IMS, CICS and DB2). Please note that the additional material referenced in the text is not available from IBM.
|