Download Print this page

IBM ZOS V1.12 Manual page 13

Advertisement

• A new option is planned for the ISGENQ service that can be used to serialize
resources. This new support will be designed to allow an unauthorized program
to interrupt serialization processing and opt not to continue to attempt to
obtain control of a resource when the resource is not available or to do other
work asynchronously while waiting to obtain an ENQ resource. For example, a
programmer might wish to set a time limit for obtaining control of a resource. This
is expected to help programmers to better manage contention delays and remove
pending enqueue requests in recovery.
• JES2 and JES3 are planned to provide function you can use to specify, using the
SYSOUT application programming interface (SAPI), that a program receive ENF
58 notifications when SYSOUT data sets have been deleted. This new function is
designed to help applications to monitor the progress of print data sets through
the system.
• The System Data Mover (SDM) component is planned to provide a REXX interface
for many of the functions of the SDM programming interface (ANTRQST). This new
function is designed to provide interfaces to FlashCopy®, Global Mirror (XRC), and
Metro Mirror (PPRC) SDM services.
• The CIM Server is planned to be upgraded to a newer version of the OpenPegasus
CIM Server. Also, the CIM Servers Schema repository is planned to be updated
to CIM Schema version 2.22. This is intended to keep the z/OS CIM Server and
schema current with the CIM standard from OpenGroup and DMTF, and to allow
z/OS management applications manage z/OS in an enterprise environment. It is
planned to include CIM providers for the Host Discovered Resources (HDR) and
Host Bus Adapter (HBA) profiles from the SMI-S standard.
• In z/OS V1.9 the C/C++ Run-time Library iconv() family of functions began to
use Unicode Services to perform most character conversions. In z/OS V1.12, the
ucmap source or genxlt source for character conversions is planned to be removed
from the C/C++ Run-time Library. You can create customized conversion tables
using Unicode Services to replace these functions.
• The WLM service for requesting LPAR-related data (REQLPDAT) is planned to be
enhanced to include character-based data about the machine model, a Model-
Permanent-Capacity Identifier, a Model-Temporary-Capacity Identifier, the Model-
Capacity Rating, the Model-Permanent-Capacity Rating, and the Model-Temporary-
Capacity Rating. This new data is intended to be used for reporting.
Security
Security is often a moving target. New security-related capabilities are often
followed by ever-more sophisticated and creative attempts to circumvent them.
Yet as vital as security is, sometimes it may be difficult to get funding for the latest
security features as it is difficult to show a return on investment (ROI) on security
solutions.
z/OS has a huge breadth of security capabilities built into the base of the operating
system at no extra cost. Many z/OS security functions, such as data encryption,
encryption key management, digital certificates, password synchronization, and
centralized authentication and auditing, can be deployed as part of enterprise-wide
security solutions and can help mitigate risk and reduce compliance costs, while
accelerating time to and reducing cost of implementation.
• Encryption obscures information and is intended to make it unreadable to
unauthorized parties. It can be used to protect the confidentiality, integrity,
and availability of both data at rest and data being transmitted, and in general
remains one of the strongest aspects of IT security. z/OS is the logical choice for
cryptography and storing and managing the cryptographic keys due to the nature
of key handling by z/OS Integrated Cryptographic Service Facility (ICSF). ICSF is
unique and could be considered more secure than other cryptographic solutions
because it can manage the encryption and decryption of sensitive material without
exposing the keys in clear.
z/OS V1.12 is planned to be updated with many cryptographic capabilities,
such as support for new smart card formats, new cryptography standards and
algorithms (such as DSA, DH, EC, AES GCM, BLOWFISH, RC4, Galois/Counter
Mode encryption for AES (GCM), Elliptic Curve Cryptography (ECC), Elliptic Curve
Diffie-Hellman key derivation (ECDH), Elliptic Curve Digital Signature Algorithm
IBM United States Software Announcement
210-008
IBM is a registered trademark of International Business Machines Corporation
13

Advertisement

loading