ca.portal.admin

IDMS 16.0 upgrade gets s800

Discussion created by ca.portal.admin on Apr 28, 2008
Latest reply on Apr 29, 2008 by ca.portal.admin
Has anyone on 16.0 experienced S800 abends in the condense step of the
journal offload jobs? Or any S800's at all?

Lutz Petzold
TDM UDB/IDMS Support
Monday, Tuesday, Friday 401 782 2265
Wednesday, Thursday 860 636 0291
Page 860 366 0865 or Telalert



This e-mail may contain confidential or privileged information. If you
think you have received this e-mail in error, please advise the sender
by reply e-mail and then delete this e-mail immediately.
Thank you. Aetna
"
IDMS Public Discussion Forum
IDMS-L@LISTSERV.IUASSN.COM
SMTP
IDMS-L@LISTSERV.IUASSN.COM
IDMS-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: One program One queue Two Schemas in One CV
"Use the Queue Name and Task Code to differentiate. If the program that
does the Put Queue is running against database D1 use the current Queue
Name convention. If it is running against D2 then add D2 to the front or
back of the Queue Name.

The D2 Queues will of course be associated with a different Task Code
that includes the D2 convention. The programs that are triggered by the
Queue threshold can Accept Task Code to see if they are the original
Task Code - so they run against D1 - if the Task Code contains the D2
name then Bind to database D2. The SET TIMER Task command would specify
the name of the task Code that invoked the program - so the D1/D2 flag
is perpetuated through the system.

Just a thought - HTH - cheers - Gary


Gary Cherlet
Justice Technology Services
Department of Justice, SA Government
Telephone +61 (0)8 8226 5199
Facsimile +61 (0)8 8226 5311
Mobile +61 (0)41 333 1613
MailTo:cherlet.gary@saugov.sa.gov.au

This e-mail message and any attachments are qualified as follows:
Addressing: If you have received this e-mail in error, please advise by
reply e-mail to the sender. Please also destroy the original
transmission and its contents. Confidentiality: This e-mail may contain
confidential information which also may be legally privileged. Only the
intended recipient(s) may access, use, distribute or copy this e-mail.
Individual Views: Unless otherwise indicated, the views expressed are
those of the sender, not Justice Technology Services. Computer Viruses:
It is the recipient's responsibility to check the e-mail and any
attached files for viruses.

Outcomes