On Fri, 24 Jun 2005 16:54:56 +0000, john gilmore wrote:
>Richard Verville writes
>>
>>  Each programs sets its identifier flag in the table. Richard
>>
>and it nay be that we are at last making some small progress.
>
>What I now suspect is that this 'program' is a table that has an entry for
>each of a set of [other] programs and that in addition to identifying each
>of these programs, perhaps by name, it contains an identifier flag byte or
>the like that each of these programs may set to register its presence for
>some as yet undetermined purpose.
>
>An alternative design would use a read-only, assembled table to identify
>these programs and a list, binary-search tree or the like for the
>registration function.


Taking John's suggested design improvement one teeny step forward, by using
Name/Token service(s) to anchor both the assembled table and the list/tree
for the registered (dynamic) data seems as if it would produce a method
that you could use in CICS or batch and not require storage protect key
transformations.

--
Tom Schmidt
Madison, WI

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to