Part III: CICS Production Mastery

"CICS isn't an application server. It's a transaction manager that happens to run your application. The moment you understand that distinction, everything about CICS architecture — regions, routing, MRO, recovery — clicks into place."

What This Part Covers

Part III takes you from writing CICS programs to architecting CICS systems. Six chapters cover the production-level knowledge that keeps online transaction processing running at enterprise scale: multi-region architecture, web services integration, modern data passing with channels and containers, security architecture, performance tuning, and failure recovery.

If you've written CICS programs with EXEC CICS commands, you know the surface. This part shows you what's underneath: how the CICS dispatcher manages thousands of concurrent tasks, how MRO routes transactions across regions for load balancing and isolation, how XA transactions maintain consistency across DB2 and MQ, and how to design systems that recover automatically from failures that would bring down lesser platforms.

Continental National Bank's CICS environment processes 500 million transactions per day across four LPARs. SecureFirst Retail Bank is wrapping its CICS services behind REST APIs for a new mobile app. Both appear throughout these chapters.

Chapters in This Part

Chapter Title Key Question
13 CICS Architecture for Architects How do regions, routing, and MRO work at scale?
14 CICS Web Services How do you expose COBOL programs as REST/SOAP services?
15 Channels and Containers How do you pass complex data without COMMAREA limitations?
16 CICS Security How do you implement RACF-based security that satisfies auditors?
17 CICS Performance and Tuning How do you diagnose and fix MAXT conditions?
18 CICS Failure and Recovery How do you design for automatic recovery from any failure?

Progressive Project

You'll design the online transaction processing layer for your HA banking system: the CICS region topology, transaction routing strategy, web service interfaces, security model, and recovery procedures. By Chapter 18, your system handles funds transfers, balance inquiries, and account maintenance with five-nines availability.

Prerequisites

Part I (especially Chapter 1). CICS basic and intermediate programming from Books 1 and 2 (BMS maps, pseudo-conversational design, basic EXEC CICS commands).

Chapters in This Part