Appendix I: Index
Page numbers are not applicable to this digital edition. References use the format Chapter.Section (e.g., 8.4 means Chapter 8, Section 4). Bold references indicate the primary discussion of a topic; plain references indicate secondary mentions.
A
abend codes, Appendix D; diagnosis, 3.4, 18.3; S0C4, 2.3; S0C7, 3.3, 27.5; S80A, 2.2, 3.2; S878, 2.2, 3.3; U4038, 8.5
above the bar, 2.4, 3.2, 29.3
above the line, 1.2, 2.2
access path, 6.1–6.5, 11.1–11.5; changes after RUNSTATS, 6.4, 9.3; regression, 6.5, 11.4; stability, 6.5, 11.5
ACH processing, 22.3, 23.2, 38.3
address space, 1.2, 2.1–2.4; isolation, 1.2, 28.2
Ahmad Rashidi (character), 28.1, 28.3, 28.5, 38.6
AMODE/RMODE, 2.3, 3.2
AOR (Application Owning Region), 13.2, 13.3, 13.7, 17.1
APF authorization, 1.3, 28.2
APREUSE, 6.5, 11.5, Appendix G
AT-TLS, 28.4, 16.4
audit trail, 28.5, 7.3, 38.6; design, 28.5; gaps, 28.5; retention, 28.5
B
backout queue, 19.4, 19.5, 20.3
batch monitoring, 27.1–27.6, 23.7; alerting, 27.3; dashboards, 27.4; milestones, 27.2; SMF records, 27.5
batch performance, 26.1–26.6; buffer optimization, 26.2; SORT optimization, 26.4; I/O tuning, 26.3; zIIP offload, 26.5
batch window, 23.1–23.7; compression, 23.6; critical path, 23.2, 23.5; DAG, 23.2; failure recovery, 23.7; parallel streams, 25.1–25.5, 23.5; throughput math, 23.3
below the line, 1.2, 2.2, 2.3
BIND (DB2), 12.5, 6.5; options, 12.5; PLANMGMT, 6.5
BMS maps, 13.2, 14.2
buffer pool (DB2), 6.3, 9.2, 11.3, 26.2
BUFNO, 26.2, 4.3, 23.3
C
capacity planning, 29.1–29.6; CPU forecasting, 29.2; DASD growth, 29.3; MSU projection, 29.4; transaction volume, 29.5
Carlos Vega (character), 14.3, 21.1, 33.2, 34.3, 36.2
CARDF/COLCARDF, 6.2, 9.3, 11.2
CEEDOPT/CEEUOPT, 3.3, 3.5
CEE3ABD, 3.4, 18.3
channel (CICS), 15.1–15.6, 14.3, 21.3
channel (MQ), 19.2, 19.6, 30.4
checkpoint/restart, 24.1–24.6; checkpoint data, 24.2; frequency, 24.3; GDG handling, 24.5; restart logic, 24.4; DB2 cursor repositioning, 24.4
CI/CD pipeline, 36.1–36.6; Git branching, 36.2; Jenkins/Zowe, 36.3; automated testing, 36.4
CICS architecture, 13.1–13.7; failure/recovery, 18.1–18.6; performance/tuning, 17.1–17.6; security, 16.1–16.5; web services, 14.1–14.6
CICSPlex SM, 13.5, 13.3, 17.4; CMAS, 13.5; system groups, 13.5; workload management, 13.3
CLUSTERRATIO, 6.3, 9.2, 26.2
COBOL compiler options, 3.2, 12.5, Appendix A
COBOL-to-cloud patterns, 34.1–34.6
COBOL-to-Java conversion (limitations), 32.3, 35.2
COMMAREA, 13.4, 15.1, 15.2
commit frequency, 8.4, 12.2, 24.3, 26.3; and lock escalation, 8.4; and restart granularity, 24.3
Common Service Area (CSA/ECSA), 2.2, 1.2
condition handling (LE), 3.4, 18.3
Continental National Bank (CNB), all chapters; architecture overview, 1.1, 38.1; batch window, 23.1; CICS topology, 13.2; DB2 data sharing, 8.6; MQ architecture, 19.5; security model, 28.3
copybook, 12.5, 22.4, 40.3
cost-based optimizer, 6.1–6.2, 11.1; filter factors, 6.2; statistics dependency, 6.2, 9.3
Coupling Facility, 1.4, 8.6, 13.6, 19.6, 30.2
CPACF, 28.4, 29.4
critical path (batch), 23.2, 23.5, 23.6, 27.2
cross-memory communication, 1.3, 6.1, 13.4
CTE (common table expression), 7.3, 7.4; recursive, 7.3
cursor management, 12.2, 8.3, 24.4; repositioning after commit, 12.2, 24.4; WITH HOLD, 12.2, 24.4
D
data integration patterns, 22.1–22.6; file-based, 22.2; MQ-based, 22.3; API-based, 22.4
data sharing (DB2), 1.4, 8.6, 30.3
dataset management, 4.1–4.6; catalogs, 4.1; DFSMS, 4.2; GDGs, 4.4, 23.2; SMS classes, 4.2; VSAM, 4.3
DB2 application patterns, 12.1–12.6
DB2 locking, 8.1–8.7; deadlocks, 8.5, 8.7; escalation, 8.4; hierarchy, 8.2; isolation levels, 8.3; lock avoidance, 8.7; lock modes, 8.2; online/batch coexistence, 8.6
DB2 optimizer, 6.1–6.5; see also access path, EXPLAIN, filter factor, RUNSTATS
DB2 performance diagnosis, 11.1–11.6; DSN_STATEMNT_TABLE, 11.3; EXPLAIN, 11.2; PLAN_TABLE, 11.2
DB2 stored procedures, 10.1–10.5
DB2 utilities, 9.1–9.6; COPY, 9.4; LOAD, 9.5; RECOVER, 9.4; REORG, 9.2; RUNSTATS, 9.3
dead letter queue, 19.4, 19.5
deadlock, 8.5; detection (IFCID 0172), 8.5; prevention, 8.5; retry logic, 8.5, Appendix G
DevOps for mainframe, 36.1–36.6
DFSMS, 4.2, 4.3
Diane Okoye (character), 6.6, 10.4, 28.5, 32.4
disaster recovery, 30.1–30.6; GDPS, 30.3; Metro Mirror/PPRC, 30.2; RPO/RTO, 30.1; Sysplex failure, 30.4; testing, 30.5
dispatcher (z/OS), 1.3, 5.2
dynamic SQL, 12.4; security, 12.4, 28.3; PREPARE/EXECUTE, 12.4
E
EBCDIC, 12.3, 22.4
enclave (LE), 3.2, 3.3
encryption, 28.4; CPACF, 28.4; data at rest, 28.4; data in transit, 28.4; key management (ICSF/CSFKEYS), 28.4
entry thread (DB2), 1.3, 12.5, 17.3
error handling, 18.1–18.6, 19.4, Appendix G; CICS RESP/RESP2, 18.2; DB2 SQLCODE, all DB2 chapters; MQ COMPCODE/REASON, 19.4
event-driven architecture, 20.1–20.6, 19.3
EXPLAIN, 6.4, 11.2; PLAN_TABLE, 6.4, 11.2; DSN_STATEMNT_TABLE, 11.3; DSN_FILTER_TABLE, 11.3
F
Federal Benefits Administration (FBA), 1.1, 28.5, 32.4, 35.3, 40.1; IMS legacy, 32.4; modernization, 32.4, 33.3
file owning region (FOR), 13.2, 13.4
filter factor, 6.2, 11.2; compound predicates, 6.2; frequency statistics, 6.2
FOR UPDATE OF, 8.5, 12.2
FREESPACE (VSAM), 4.3, 9.2
function shipping (CICS), 13.4, 14.5
G
GDG (Generation Data Group), 4.4, 23.2, 24.5
GDPS, 30.3, 30.4
goal mode (WLM), 5.2, 5.3
H
HA Banking Transaction Processing System (progressive project), all chapters; requirements, 1.6; DB2 design, 6.6–12.6; CICS design, 13.7–18.6; MQ design, 19.6–22.6; batch design, 23.7–27.6; security, 28.6; DR, 30.6; capstone, 38.1–38.7
HANDLE ABEND, 18.3, 18.4
HIPAA, 28.5, 28.6
host variable, all DB2 chapters; arrays, 7.2; indicator variables, 7.2
hybrid architecture, 37.1–37.6, 33.5, 34.5
I
ICSF, 28.4
IFCID, 8.5, 11.3; 0003 (accounting), 11.3; 0172 (deadlock), 8.5; 0196 (timeout), 8.5
image copy (DB2), 9.4, 30.2
IMS, 1.2, 32.4
index design, 6.3, 11.4; clustering, 6.3; composite, 6.3; index-only access, 6.3, 11.2
initiator (z/OS), 1.3, 23.4
integration patterns, 22.1–22.6; see also data integration patterns
IPIC, 13.4, 14.3
IRLM, 8.2, 8.4
ISC, 13.4
isolation levels (DB2), 8.3; CS, 8.3; RR, 8.3; RS, 8.3; UR, 8.3
J
JCL, Appendix B, 1.3, 23.4; COND parameter, 23.4; DD statement, 4.3; REGION, 2.3; TIME, 23.4
JES2, 1.3, 23.4
JSON transformation, 14.3, 21.3
K
knowledge transfer, 40.1–40.6; documentation strategies, 40.3; mentoring, 40.4; Marcus Whitfield's retirement, 40.1; tribal knowledge, 40.2
KSDS, 4.3, 13.2
Kwame Mensah (character), all chapters; production war stories, 1.1, 8.5, 23.1, 30.1, 38.1
L
Language Environment, 3.1–3.6; condition handling, 3.4; heap/stack, 3.3; runtime options, 3.3, 3.5
Lisa Tran (character), 6.1, 6.4, 8.5, 9.3, 11.1, 11.4
lock avoidance, 8.7
lock escalation, 8.4; LOCKMAX, 8.4; prevention, 8.4
lock hierarchy, 8.2
LOCKSIZE, 8.2, 8.4, 8.6
LPAR, 1.2, 1.4, 29.2, 30.2
M
Marcus Whitfield (character), 32.4, 35.3, 40.1, 40.2
MATCHCOLS, 6.3, 11.2
MAXTASK, 17.2, 13.7
MEMLIMIT, 2.4, 3.2
MERGE statement, 7.4
messaging, 19.1–22.6; see also IBM MQ, event-driven architecture
Metro Mirror, 30.2, 30.3
modernization, 32.1–37.6; assessment, 32.2; COBOL-to-cloud, 34.1–34.6; decision matrix, 32.3; hybrid architecture, 37.1–37.6; strangler fig, 33.1–33.6
monitoring (batch), 27.1–27.6; (CICS), 17.4, 13.5; (DB2), 11.3, 11.5
MQ, see IBM MQ
MQGET, 19.3, 19.4
MQMD, 19.2, 19.3
MQPUT, 19.3, 19.4
MRO, 13.4, 13.7
MSU, 29.4, 29.2
multi-row FETCH/INSERT, 7.2, 12.2, 26.3
N
naming conventions, 4.1, 13.2, 19.5
nested loop join, 6.3, 11.2
O
OLAP functions, 7.4
operational automation, 31.1–31.6; REXX-based recovery, 31.3; self-healing batch, 31.4
optimistic locking, 8.7, 14.4
P
package (DB2), 12.5, 6.5
parallel batch processing, 25.1–25.5; dataset contention, 25.3; DB2 concurrency, 25.4; partition-level, 25.2
Parallel Sysplex, 1.4, 8.6, 13.6, 30.2
partition-parallel processing, 25.2, 12.2
PCI-DSS, 28.3, 28.4, 28.5
performance index (WLM), 5.3, 29.2
Pinnacle Health Insurance, 6.6, 10.4, 22.4, 23.5, 25.3, 28.5
PLAN_TABLE, 6.4, 11.2
PLANMGMT, 6.5, 11.5, Appendix G
poison message, 19.4, 20.3
pool thread (DB2), 1.3, 12.5
PPRC, 30.2
prefetch (DB2), 6.3, 11.2, 26.2; list, 6.3; sequential, 6.3
production readiness, Appendix G; checklists, Appendix G; sign-off, Appendix G
progressive project, see HA Banking Transaction Processing System
pseudo-conversational, 13.3, 15.2, 15.3
pub/sub, 20.2, 19.3, 20.4
Q
queue manager, 19.1, 19.2, 19.6
queue sharing group, 19.6, 30.4
R
RACF, 28.2–28.3; discrete profiles, 28.2; generic profiles, 28.2; IRRDBU00, 28.3; TCICSTRN class, 16.4, 28.3; UACC, 28.2
REORG (DB2), 9.2, 26.2
request/reply (MQ), 19.3, 19.5
RESP/RESP2, 18.2, 14.4
restart, see checkpoint/restart
return codes, Appendix D
Rob Calloway (character), 23.1, 23.5, 24.1, 25.1, 26.1, 27.1, 31.2
RPO/RTO, 30.1, 30.2, 30.5
RUNSTATS, 9.3, 6.2, 6.4; column groups, 9.3; distribution statistics, 9.3; scheduling, 9.3
S
SAF, 28.2
Sandra Chen (character), 32.1, 32.4, 33.3, 34.4, 35.3, 40.1
SecureFirst Retail Bank, 14.3, 21.1, 33.2, 34.3, 36.1
security, 28.1–28.6; CICS, 16.1–16.5; DB2, 12.4, 28.3; encryption, 28.4; MQ, 19.5, 28.3; RACF, 28.2–28.3; SQL injection, 12.4, 28.3
service class (WLM), 5.2, 5.3, 29.2
SHAREOPTIONS (VSAM), 4.3, 25.3
SKIP LOCKED DATA, 8.7
SMF records, 27.5, 28.5, 29.2
SORT optimization, 26.4, 23.3
SQL injection, 12.4, 28.3
SQLCODE, all DB2 chapters; -803 (duplicate key), 7.2; -904 (resource unavailable), 9.2, 23.7; -911 (deadlock/timeout), 8.5; -913 (timeout), 8.5
stored procedure, 10.1–10.5; COBOL implementation, 10.2; WLM-managed, 10.3
strangler fig pattern, 33.1–33.6, 32.3, 37.3
SYNCPOINT, 18.4, 8.4, 19.4
T
tablespace, 6.3, 9.2; partitioned, 6.3, 25.2; restrictive states, 9.2; universal, 6.3
temporal tables, 7.3, 38.3
thread (DB2), 1.3, 12.5; entry, 1.3, 12.5; pool, 1.3, 12.5
TOR (Terminal Owning Region), 13.2, 13.3
transaction affinity, 13.3, 13.6, 15.2
transaction routing, 13.3, 13.5
trigger (MQ), 20.2, 20.3
TWS (Tivoli Workload Scheduler), 23.4, 27.2, 31.3
U
UACC, 28.2, Appendix G
UDF (user-defined function), 10.4, 10.5
V
velocity goal (WLM), 5.2, 5.3
virtual storage, 2.1–2.4; layout, 2.2; above the bar, 2.4; above the line, 2.2; below the line, 2.2
volume elasticity, 23.3, 29.5
VSAM, 4.3; CI/CA, 4.3; KSDS/ESDS/RRDS, 4.3; SHAREOPTIONS, 4.3
W
web services (CICS), 14.1–14.6; JSON, 14.3; pipeline, 14.2; REST, 14.3, 21.3; SOAP, 14.2
WITH HOLD, 12.2, 8.4, 24.4
WLM, 5.1–5.6; classification rules, 5.2; dispatching priority, 5.2; goal mode, 5.2; performance index, 5.3; service class, 5.2
X
XA transactions, 18.5, 19.4
XRC, 30.2, 30.3
Y
Yuki Nakamura (character), 33.2, 36.1, 36.2, 36.4
Z
z/OS, 1.1–1.5; address spaces, 1.2; dispatcher, 1.3; subsystems, 1.2; Sysplex, 1.4
z/OS Connect, 21.2, 14.3, 33.4, 34.3
zIIP, 29.4, 26.5, 29.3
Zowe, 36.3, 36.4