IBM Mainframe
IBM Mainframe
MIPS – Million Instruct Per Second – adalah pengukuran kecepatan processor untuk banyaknya
instruksi yang dapat di process CPU dalam satu detik.
MSU (Million Service Unit) adalah pengukuran untuk banyaknya processing yang bisa dilakukan
computer dalam satu jam. Biasanya MSU dipakai untuk menentukan biaya software license
CBU atau Capacity Backup menyediakan emergency Processor jika ada suatu kondisi yang
megharuskan processor ini dibutuhkan seperti bencana atau mainframe utama mati. Contohnya
adalah terdapat 10k mibs tetapi yang menyala di DRC hanya 2000 sedangkan yg 8000 di posisi idle
siap diaktifkan bila di perlukan.
OSA (Open Sys adapter) adalah komponen perangkat keras yang menyediakan konektivitas jaringan
dan kemampuan komunikasi untuk sistem mainframe dengan berbagai jenis jaringan terbuka. OSA
memfasilitasi integrasi mainframe dengan jaringan LAN (Local Area Network) dan WAN (Wide Area
Network), serta mendukung berbagai protokol dan teknologi jaringan.
BCA 4 mainframe
Sistem Manajemen Transaksi: CICS adalah perangkat lunak untuk mengelola transaksi
aplikasi dalam lingkungan mainframe. Ini memungkinkan pemrosesan transaksi yang sangat
cepat dan aman, sering kali dalam waktu nyata (real-time).
Berdasarkan Komponen dan Layanan: CICS menyediakan berbagai layanan untuk aplikasi
yang mencakup pemrosesan transaksi, akses database, dan komunikasi antara aplikasi.
Pemrosesan Transaksi: CICS dapat memproses ribuan transaksi per detik, memberikan
kinerja tinggi untuk aplikasi yang memerlukan pemrosesan data dalam jumlah besar.
Manajemen Sumber Daya: CICS mengelola sumber daya sistem dengan efisien, termasuk
memori dan I/O, untuk memastikan performa yang optimal.
Keamanan dan Kontrol Akses: CICS menyediakan fitur keamanan yang kuat untuk
melindungi data dan mengontrol akses pengguna serta transaksi.
Integrasi dengan VSAM dan Db2: CICS dapat berintegrasi dengan berbagai sistem
manajemen database, seperti VSAM dan Db2, untuk mengakses dan mengelola data secara
efisien.
3. Arsitektur CICS
Transaction Server: Di jantung CICS adalah server transaksi yang menangani eksekusi dan
pemrosesan transaksi. Server ini berinteraksi dengan aplikasi, database, dan sumber daya
lainnya.
Aplikasi Bisnis Kritis: CICS sering digunakan dalam aplikasi yang sangat penting seperti
perbankan, asuransi, dan sistem pemrosesan transaksi besar lainnya.
Aplikasi Real-Time: CICS dirancang untuk mendukung aplikasi yang memerlukan pemrosesan
dan respons transaksi dalam waktu nyata.
CICS TS (Transaction Server): Versi terbaru dari CICS, CICS Transaction Server, menyediakan
berbagai peningkatan dan fitur baru untuk mendukung teknologi terbaru dan kebutuhan
bisnis yang berkembang.
Dukungan untuk Cloud dan Integrasi: CICS terus beradaptasi dengan perkembangan
teknologi, termasuk dukungan untuk cloud dan integrasi dengan sistem dan aplikasi modern.
CICS adalah bagian integral dari ekosistem mainframe IBM, memberikan kemampuan pemrosesan
transaksi yang kuat dan andal yang penting bagi banyak aplikasi bisnis kritis. Dengan kemampuannya
untuk menangani beban kerja yang besar dan berbagai fitur canggih, CICS tetap menjadi solusi utama
untuk manajemen transaksi di lingkungan mainframe.
IMS (Information Management System) untuk Data transaksi, berbasis hierarki. IMS dapat
menangani transaksi dan data dengan volume besar dan sering digunakan dalam aplikasi
yang memerlukan pemrosesan transaksi yang cepat dan andal.
DB2 untuk Private data seperti data pengguna dari bank. Db2 for z/OS menawarkan
performa tinggi, skalabilitas, dan fitur keamanan tingkat lanjut. Ini sering digunakan untuk
aplikasi bisnis kritis yang membutuhkan keandalan dan efisiensi tinggi.
VSAM (Virtual Storage Access Method), adalah metode akses data yang digunakan dalam
lingkungan mainframe IBM, termasuk pada IBM z15. VSAM dirancang untuk mengelola akses
data secara efisien dalam lingkungan mainframe yang mendukung sistem operasi z/OS
(sebelumnya dikenal sebagai MVS). Digunakan untuk Data Transaksi
IBM Software
SYSTEM
CHANNEL
IBM MQ
CICS
IBM z/OS Connect EE UNLMT
TOOLS
Db2 admin
zSecure Admin, Alert, audit
IBM z System Automation
Debug Tool
MONITORING
OMEGAMON
Discover & classify data, Crypto inventory, Crypto agility, and Quantum-safe
Your client agrees that some of their data has a long life and they ask you how long it will take to
convert their long-lived data to quantum-safe encryption. How many years can it take?
5 to 15 years
Your client recently experienced a breach. One of their x86 servers got hacked, and the hacker
modified the server's firmware to always leave the hacker's access open on a reboot. What do you
tell the client about IBM z16's secure boot features to alleviate the client's concern about this
happening again?
During the boot process of the system, each firmware component will utilize hardware-based
verification, using digital signatures to provide the firmware integrity and help defend against
attacks that attempt to inject malware into the boot process.
Your client is worried about protecting their proprietary data, both now and in the future. You
suggest that they encrypt their data using quantum-safe algorithms. Your client is concerned that
this process will slow down their applications and internal processes. What do you tell your client?
Plan for minimal impact – the IBM z16 system includes hardware accelerators that offload
the encryption and decryption processing from the CPU
Your client asks what a cyber-criminal would be capable of doing if they had access to a quantum
computer. What do you tell them?
Manipulate updates and forge transactions through fraudulent authentication, decrypt lost
or harvested confidential historical data, and manipulate legal history by forging digital
signatures
How many IBM Crypto Express cards are included with an IBM z16 system by default?
0
If an organization has cryptographic agility, what are they able to do that they cannot do without
cryptographic agility?
Your client uses cryptography across their entire IBM Z environment. The Chief Information
Security Officer (CISO) asks how they can discover and classify their data. You tell the CISO that
IBM has three tools that assist clients in creating the cryptographic inventory: IBM Crypto Analytics
Tool (CAT), IBM Application Discovery and Delivery Intelligence (ADDI) and IBM Integrated
Cryptographic Service Facility (ICSF) Crypto Statistic Monitor. What do these three tools do?
CAT analyzes information such as crypto keys, functions and configuration settings; ADDI
locates and identifies where crypto is being used within applications; ICSF Crypto Statistic
Monitor provides clients the means to assess their cryptographic usage and determine any
areas that might need attention
Which of the following applications can IBM Application Discovery and Delivery Intelligence
(ADDI) scan to find and examine encryption and decryption calls?
COBOL
Your client attempts to end the conversation by saying that cryptography is for the security team
and does not affect the rest of the business. You respond by saying that cryptography impacts
every corner of the digital world. What are some of the areas that cryptography impacts?
Scan the environment to determine where their data (structured and unstructured) resides
and then classify that data
Your client is worried about their data (now and in the future) so you have suggested that they
encrypt their data to protect it. The client asks what encryption algorithm they should be using now,
to be as safe as they can while waiting for the world to settle on some standards for being quantum
safe. What algorithm do you tell them to use?
AES-256
The cryptographic accelerators (Central Processor Assist for Cryptographic Function or CPACF) on
the IBM z16 system provide hardware-accelerated encryption and decryption of data. Which one
of the following does IBM z16 hardware-accelerated encryption protect?
During a client meeting, the client Chief Technology Officer (CTO) tells you that they are not
concerned about quantum computers because all their data is encrypted. What is your response?
Data encryption is not the only use case for cryptography in an enterprise
A classical computer represents a basic unit of information with a binary digit or “bit”, which can
have a state of 0 or 1. A quantum computer represents a basic unit of information with a qubit.
What are the possible states of a qubit?
You are talking with your client about building an application cryptographic inventory. The client
tells you that they are using cryptography across their IBM Z landscape. What tool can the client
use to capture the inventory?
While in a client meeting, the client mentions that they are using numerous Public Key
Infrastructure (PKI) solutions and services across their organization. What should the client do to
stay ahead of the quantum curve?
The nature, capability, and availability of quantum computers is unknown. To be prepared, what
must classical systems be able to do?
Make them self safe overtime
Your client asks if there are any use cases for quantum-safe encryption that are NOT addressed.
What examples do you give?
Which of the following is the correct list of the things that a cryptographic inventory should
contain?
Red Hat Ansible does not support existing mainframe automation products.
To be impactful, IBM's Mainframe Application Modernization Point-of-View (POV) must reach all but
which ONE of the following audiences?
You're talking to a client that is looking to accelerate their application modernization journey. What is
one of the best ways to accelerate the application modernization journey?
You're talking to a client that asks how IBM Cloud differentiates from other hyperscalers. How do you
reply?
IBM Cloud differentiates with its built-in security, z/OS developer experience, and
sustainability by leveraging IBM Z technologies.
Which of the following areas is IBM Z collaborating on with public cloud providers?
Project-based starting points that align to client needs and deliver near term value.
Why are industry-based solution architectures important to illustrate in discussions with clients?
They highlight the cumulative benefit of executing the different entry points in support of
transformation initiatives.
You're talking to a client that asks how much more value they can expect to see with hybrid cloud
and IBM Z together vs public cloud alone. How do you reply?
2.5x
How many appendices are available to help you customize your application modernization client
presentation?
11
You're talking to a client that asks how much growth IBM Z has seen in the last decade. How do you
reply?
3x
Which of the following areas is IBM Z NOT currently working on with AWS and Azure?
You're talking to a client that's considering implementing a hybrid cloud approach for their
mainframe applications. Which of the following insights do you share with the client?
A hybrid cloud approach to mainframe applications is faster, lower cost, and less risk than
migration to public cloud alone.
In the Mainframe Application Modernization on IBM Z level 2 course which of the following areas
is NOT covered in customization of the Application Modernization story?
AIOps
You're talking to a client that asks which IBM Software offering enables API creation and z/OS
development on public clouds. How do you reply?
You're talking to a client that wants to optimize the cost and performance of their existing
applications. What do you propose?
What is the primary objective of the content covered in the Mainframe Application Modernization
on IBM Z level 2 course?
Passport Advantage clients should select IBM Z part numbers unless which of the following
statements is TRUE?
They have no intention of using the software on or with IBM Z.
Why is IBM focused on creating reference architectures with IBM Cloud, AWS, and Azure?
You're talking to a client about simplifying access to applications and data. What do you recommend
as a good strategy?
The IBM Z pipeline must be different from those core technologies used elsewhere within
the organization, but the IBM DevOps for IBM Z portfolio brings a lot of value to IBM Z
clients.
Insulates the application from the physical environment increasing the programmer's
productivity.
Db2 delivers business insights faster while helping to reduce costs; enables easy access,
scale, and application development for the mobile enterprise.
Which of the following security solutions protects resources by granting access only to authorized
users of the protected resources, retains profile information about users and refers to these profiles
when deciding who should be permitted access?
RACF
Which of the following represents the focus of enterprises related to software development and
delivery?
Enterprises need continuous software delivery and management. This enables organizations
to innovate more rapidly to capitalize on new market opportunities.
In many enterprises, IBM Z is and will remain at the center of business-critical function,
which means it must also be central to an AIOps adoption effort.
IBM MQ provides a safe place for messages between applications. Which answer is correct related to
IBM MQ?
IBM MQ offers asynchronous messaging. Applications or servers being down doesn't mean
that messages are lost.
An API is a software-to-software interface. The mainframe APIs expose the data that is
requested from other APIs that are in the cloud or in other mobile applications.
Which of the following statements is correct about the IBM Z operating systems?
IBM Z Operating System or z/OS has been around in one form or another since the 1960s
and applications developed back then can still run on the latest version of z/OS.
Which of the following statements is correct related to IBM Z and a client's hybrid cloud strategy?
IBM Z must be an integral part of a client’s hybrid cloud strategy. By integrating with IBM Z,
clients will realize the full value of the platform, leveraging a highly resilient and secure
environment that is cost-efficient as it scales.
The mainframe (IBM Z) always operates in a stand-alone environment, which protects it form
common vulnerabilities.
Cyber Security is not enough to be able to operate during, adapt to, and recover from cyber
events or attacks. Business continuity and cyber security need an integrated approach to key
areas such as access management, incident response, and disaster recovery.
Clients need to integrate a broad set of practices and capabilities to navigate the complexity of
operations management and accelerate their journey to IBM Z AIOps. What are the three areas that
these practices and capabilities are organized into?
Telum chip
Which IBM LinuxONE 4 model is a lower cost, simply configured version for smaller client businesses
who want to swiftly onboard a Linux platform?
IBM is constantly innovating the IBM Z and IBM LinuxONE platforms and continues to focus on the
design principles in every iteration of the mainframe to ensure they are ahead of market
expectations. What are these design principles?
How many years has Linux been an integral part of the IBM Z platform?
24 years
You have likely used an IBM Z mainframe when you completed which of the following tasks?
IBM exports IBM Z to 73 countries around the globe and utilizes it across how many industries?
28
What is the IBM Z integrated and comprehensive cyber resiliency approach to mitigate risk and cost?
SEAL
IBM is working with their business partners and clients to boost the mainframe skill set in the
market. What are the three approaches?
Build a sustainable workforce, open standards and tooling, and Industry standard
IBM watsonx Code Assistant for Z is a generative AI that accelerates mainframe application
modernization. What are the capabilities included to modernize mainframe COBOL applications?
A client who is interested in purchasing IBM LinuxONE for their workload consolidation but is
concerned about energy efficiency asks you how much reduction in energy consumption can be
anticipated from the system. What would you say in response?
75%
At Mass General Hospital, IBM shot a proton beam into one of the chips in the IO cards, replicating a
soft failure. IBM performed this test to ensure the firmware detected that the error occurred. What
is the name of this test?
Clients and IBM service personnel interact with an IBM z16 via different interfaces. What is the name
of interface used by IBM service personnel?
Support Service
In which geography do Business Partners have a fee-based option where IBM will perform the
Technical and Delivery Assessments (TDA) on their behalf?
US
Who is ultimately responsible for the completion of the Action Items created during the Technical
and Delivery Assessments (TDA)?
Opportunity Owner
IBM Software requires which types of Technical and Delivery Assessments TDAs?
Pre-sale only
What level of Solution Assurance review is usually required for IBM Z and IBM LinuxONE?
Expert
Do Business Partner opportunities follow the same Worldwide Solution Assurance requirements as
IBM opportunities?
Yes, but only if IBM performs the review
Can Solution Assurance review team members (Quality Practitioner and SMEs) be directly involved in
the opportunity?
Who is ultimately responsible for the timely execution of the Technical and Delivery Assessments
(TDA)?
Opportunity Owner
What are the two types of Technical and Delivery Assessments (TDAs)?
IMPACT is the strategic Solution Assurance tool. What functionality does IMPACT NOT provide?
Per the standard Solution Assurance process will IBM Quality Practitioners organize and facilitate
Business Partner Technical and Delivery Assessment (TDA) reviews?
No, Business Partner’s are responsible for conducting TDAs on their opportunities with their
resources