Consider that job-end statistics (if the output is captured or reviewed by the 
submitter) only
represents a portion of what would normally be a chargeback 
bill/invoice/receipt (okay, or call it
cost allocation or recovery).  Also, how will a DB2 DDF (remote) customer get 
their bill or a CICS
transaction user, etc. -- these typically involve tables mapping USERIDs to a 
related owner/group?
Considering the cost of DASD and tape storage (local/vault, reel, real, 
virtual, high-capacity), how
will these resources be tallied and communicated to the appropriate 
department/cost_center or
resource consumer?

CPU normalization, rates, and possibly surcharge/discount logic may need to be 
maintained, depending
on the chargeback algorithm and IT chargeback methodology intended to be used 
for any given
system/customer.  Support for "new rates" with effective dates and other 
comprehensive logic should
likely be considered, if the reported charges are to be considered credible, 
especially when
transitioning between fiscal calendar cycles.

Better to consider generating a consolidated resource consumer report, at day's 
end (or otherwise),
and accumulate the various resource buckets/areas, in a back-end system that 
post-processes the
various SMF and other system logs.  Some that come to mind are SMF type 30 
(address space activity
for batch, TSO, STC, OMVS/USS, and maybe APPC), type 6 (output/print), type 101 
(DB2), type 110
(CICS/CMF), IMS log (or BMC's Patrol / IMF), other DBMS tools (IDMS, M204, 
Datacom, Supra), and DASD
(IBM DCOLLECT snapshot), tape (tape mgmt catalog snapshot) focusing on 
long-term data storage.

Given the possibilities of unknowns, it's best to get management's expectations 
well-documented,
evolve that information along with technical/business considerations into an 
explanation and/or
position paper, so all involved parties understand what's at stake before 
valuable staff resources
are expended.

Sincerely,

Scott Barry
SBBWorks, Inc.
 
 
Date:         Thu, 3 Aug 2006 12:00:24 -0400
From:         Anne Crabtree <[EMAIL PROTECTED]>
Subject:      IEFACTRT

Does anyone have an example of IEFACTRT using type 30 and doing chargeback that 
they would be
willing to share?  

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to