Let's Build a z Environment 101
Project and Program:
Enterprise-wide,
zNextGen Project
Tags:
Proceedings ,
2018 ,
SHARE St. Louis 2018
This is the first of two presentations that will focus on the building of a z Environment – Hardware, Software, Security – with the goal of establishing a ‘Trusted Computing Base’ - a z/OS System that can provide the reliability needed to meet demanding service levels, integrity and security objectives. All are necessary to execute mission critical applications. The sessions are intended for those new to z Systems or just beginning their careers with organizations that maintain information systems anchored to the power and reliability of the IBM Mainframe.
In 101, the presenter will focus on the platform, in this case a z14, hardware divisions of the Central Processing Complex (CEC), its various channel pathways and related devices that define a UCW (Unit Control Work), the front half of the z System Device Chain. It continues with the definition of an associated Operating System configuration, its various I/O devices and related features that define a UCB (Unit Control Block), the back half of the z System Device. Detailing both the Power-On-Reset and IPL process will join UCWs and UCBs to form a fully addressable device across which data (encrypted or not) may flow to and from the CEC.
In 102, the focus will shift to a discussion of Multiple Virtual Storage (MVS), what is z/OS, how to get it, install it, support it and upgrade/migrate from release to release. The elements of the IPL path - IPLPARM, IRIMS, IODF, SYSRES - to name a few will be examined in detail as will the Post-IPL environment - APFLST, LNKLST, LPALST, SVCs, EXITs, PPT. The integrity of the environment will be described within the context of the IBM Integrity Statement and the Authorized Program Facility (APF). This session ends with a discussion concerning system vulnerabilities, their potential impact and sources of possible remediation.-Paul Robichaux-NewEra Software, Inc.
Back to Proceedings File Library