z/VSE- 4569
IBM-2007-04569-E-01
©2007 Sine Nomine Associates
iii
Table of Contents
1
INTRODUCTION AND PREFACE ........................................................................ 1
1.1
Executive Summary .............................................................................................................................1
2
THE Z/VSE PIE STRATEGY.................................................................................. 3
2.1
Pieces of the PIE....................................................................................................................................3
2.1.1
Protect....................................................................................................................................................... 3
2.1.2
Integrate.................................................................................................................................................... 3
2.1.3
Extend ....................................................................................................................................................... 4
2.1.3.1
Exploiting Connectors ..................................................................................................................... 4
2.1.3.2
Web Serving ...................................................................................................................................... 4
2.1.3.3
DB2 Connect ..................................................................................................................................... 4
2.1.3.4
CICS Transaction Gateway ............................................................................................................ 4
3
TECHNOLOGY ENABLEMENT............................................................................ 5
3.1
System z9.................................................................................................................................................5
3.2
z/VSE 4.1 .................................................................................................................................................5
3.2.1
z/Architecture .......................................................................................................................................... 5
3.2.2
Storage Constraint Relief ...................................................................................................................... 6
3.2.3
New Pricing Metrics............................................................................................................................... 6
3.2.4
Network Connectivity............................................................................................................................ 6
3.2.5
Security Enhancements.......................................................................................................................... 6
3.2.6
SCSI Disk Support.................................................................................................................................. 7
3.3
Overall Technology Impact................................................................................................................7
4
PRICING AND ROI .................................................................................................. 8
4.1
The Introduction of MWLC Pricing ...............................................................................................8
4.1.1
What counts as Full-Capacity?............................................................................................................. 8
4.1.2
What counts as Sub-Capacity? ............................................................................................................. 9
4.1.3
Why MWLC? .......................................................................................................................................... 9
4.1.4
Applicability ............................................................................................................................................ 9
4.2
ISV Support............................................................................................................................................9
4.2.1
CSI International..................................................................................................................................... 9
4.2.2
CA ............................................................................................................................................................. 9