On Fri, 24 Jun 2005 16:54:56 +0000, john gilmore wrote: >Richard Verville writes >> >> Each programs sets its identifier flag in the table. Richard >> >and it nay be that we are at last making some small progress. > >What I now suspect is that this 'program' is a table that has an entry for >each of a set of [other] programs and that in addition to identifying each >of these programs, perhaps by name, it contains an identifier flag byte or >the like that each of these programs may set to register its presence for >some as yet undetermined purpose. > >An alternative design would use a read-only, assembled table to identify >these programs and a list, binary-search tree or the like for the >registration function.
Taking John's suggested design improvement one teeny step forward, by using Name/Token service(s) to anchor both the assembled table and the list/tree for the registered (dynamic) data seems as if it would produce a method that you could use in CICS or batch and not require storage protect key transformations. -- Tom Schmidt Madison, WI ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

