>A Devil's Advocate might be tempted to say just because you don't ABEND  does
>not mean that a user did not overlay or incorrectly modify VSAM control
>blocks that are in user key.  How can you ever trust the stats?
>Bill Fairchild

Note:
CICS, recovering an application abend (via DTB) does not have to Close a VSAM 
file, since the in-flight work is backed out, and the CIs that are "frozen" 
(enqueued) are released at sync-point rollback. This lets other transactions 
continue against that VSAM file. Closing during/after DTB is irrelevant. DB2 
and IMS are careful users of VSAM also.

Another thread on this list is discussing "destructive" moves, etc.  Why 
mention it?
The point is this. In higher level languages one has to be particularly lax as 
a programmer to cause VSAM control block overlays and destructive (when 
unintended) moves.

So it is assembler that can bite the unwary yet diligent programmer. But if you 
are coding assembler in the first place, it is because you need some function 
that should be denied to Joe programmer. This language imposes a stiffer 
testing methodology and (dare I say) greater knowledge about how things work on 
the developer.

TRUST is inherent in a (debuged) language and (debuged) OS, since the hardware 
will do exactly what it is told... no more, no less.
What user? We're talking programmer.
What programmer? Using his native language?
Perhaps there should be a "TRUST" quotient assigned to each program based on 
the author's skill and care and test time, divided by the language complexity 
and factored by its size and host of the program (CICS, batch, Websphere, etc).

If you want VSAM to make the stats trustworthy, write trustworthy programs. At 
least acknowledge the probability of a failure and plan for it.

(I'll not debate the imagined solution of user-written ESTAEx and the problems 
of having an FFR, VSAM under SRB, VSAM in a Plex under RRS in the CCF, 
distributed LUWs, etc)



--

This e-mail may contain confidential and/or privileged information. If you are 
not the intended recipient (or have received this e-mail in error) please 
notify the sender immediately and destroy this e-mail. Any unauthorized 
copying, disclosure or distribution of the material in this e-mail is strictly 
forbidden.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to