Peter,

My answers are obviously slanted as I work as a developer for an ISV, however 
...

>In practice, is it the case that a debugger typically needs to know "what is 
>the status of this name/token pair" (does it exist, what is the token) more 
>than "what are all the name/token pairs that I might have created"?

My own personal experience I find that both are equally likely and the ability 
to see them whilst debugging can be as useful as the ability to see the TCB 
tree.

Currently I am in a suituation where my internal and external customers want 
the software that I write to be able to show them the list of name/tokens and I 
have to make a choice between not supplying the functionality or running a few 
OCO control blocks - so I plump for the latter and wrap the code in a couple of 
layers of recovery code.

Is there a need outside of debugging - maybe not - but does that invalidate the 
requirement? Funnily enough I considered raising a requirement for this very 
thing a few years back as I hate having to use reverse-engineered OCO control 
blocks, but I did not in the end because I could not see any way of convincing 
IBM of the real "business" benefit.



Rob Scott
Rocket Software, Inc
275 Grove Street
Newton, MA 02466
617-614-2305
[EMAIL PROTECTED]


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of 
Peter Relson
Sent: 12 September 2008 13:15
To: [email protected]
Subject: Re: Name/Tokens

I obviously stirred up a hornet's nest. Good.

Every post basically said "I don't care what are programming interfaces, I am 
going to use whatever I feel like using".  A customer will have very little 
sympathy with that approach if his system stops working because of it.

Not one addressed my point of why you would design an approach that relies on 
using something that does not exist and forces you to use non-interfaces when 
other alternatives are available. Dave Cole at least has a different need than 
most in that he is trying to surface "everything" to his users.
In practice, is it the case that a debugger typically needs to know "what is 
the status of this name/token pair" (does it exist, what is the token) more 
than "what are all the name/token pairs that I might have created"?

Bob Shannon wrote
>It seems to me that people wouldn't have gone through the effort of
>writing code to list name/tokens if there was an easier way to
>accomplish what they needed.
Is that a valid assumption?   I think not. Especially for the cases that
have been mentioned so far. Just because you used one approach with ENQ and 
GQSCAN does not mean that it is appropriate for you to use the same approach 
with the names of a name/token pair.

Dave Cole write
>Several of us have documented our
>need for a name/token list/search service,
I have seen nothing in what has been posted to far that would constitute such 
documentation.

>If you feel that we are not competent enough to correctly determine our
>own needs, then why are you even talking to us?

If you need it so strongly, why haven't you asked for it properly/formally?
A discussion in IBM-MAIN hardly constitutes submission of a requirement. I 
might have missed it in the 10+ years that I have been monitoring customer 
submissions of requirements to the base control program, but I do not recall 
ever seeing a submitted requirement for such a function, either by an 
individual or SHARE.

It might be the case that even if you ask for something you won't get it.
But you're certainly more likely to get it if you ask than if you don't.
Again, I understand the desire (OK, need, if you want) for a way to list things 
For Debugging.  That does not mean that there is a need outside of that. Make 
your case. Present your requirement.  It certainly does not mean that you 
should be designing applications in a way that requires you to violate the 
rules and possibly puts customers at risk. That last sentence doesn't really 
apply to Dave, but rather to someone who is trying to shoe-horn the ENQ/GQSCAN 
approach into name/token with roll-your-own list.

Pat O'Keefe wrote
>Reading between the lines I see you saying "Submit a Requirement and
>justify it."  Maybe that requirement should come from users of
>the tools that currently use the unsupported techniques.   They
>would be the ones hurt when the unsupported techniques fail.
I probably wasn't direct enough that you had to "read between the lines".
Yes, exactly.
Actually, it's the customers who are hurt.

Peter Relson
z/OS Core Technology Design
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to