Tip:
Highlight text to annotate it
X
Managed operations are a key benefit of CICS V5.1, and enable you to reduce cost and business
risk.
Managed operations are provided through the introduction of policies, which deliver automated
control over critical system resources. CICS policies are a declarative way of ensuring
that applications and platforms continue to run efficiently. Having this degree of control
built in to your CICS system can help you reduce both cost and risk to your business.
So how do policies work? In CICS V5.1, task thresholds can now be set for data access
requests, storage usage, program loops, and processor time used. For example, a threshold
could be defined based on the amount of above-the-line storage used by a task, the number of times
a task accesses IBM DB2 or a file, or the number of EXEC LINK requests issued by a user
task. Should any subsequent policy breaches occur, CICS can issue a message, abend the
task, or emit one or more events that can trigger further actions.
A policy can be applied to any combination of applications and platforms. And the even
better news? Policies can be applied dynamically during runtime operations.
So how can you really get to grips with improving the management of your operations? Whether
you're handling policies, reviewing resource usage, or making changes to system topology,
CICS Tools are there to help, making it easier to exploit CICS capabilities.
Having managed operations is just one of the many benefits that CICS V5.1 brings.
Watch our other videos for more details of other CICS capabilities.