ca.portal.admin

Re:Re: [IDMSVENDOR-L] Access to Lock Data Used in PMRM?

Discussion created by ca.portal.admin on Mar 9, 2010
then perhaps the real question becomes:=3D20 =3D20 does Ms Kline need this =
information real time as it happens, or can=3D20 daily reports suffice=3D20=
=3D20 if the latter, then certainly the log can be interrogated and all=3D=
20 necessary information can be retrieved=3D20 if the former - good luck - =
even if you sat all day executing lockmon=3D20 you MIGHT see stalls buildin=
g, but many deadlocks could come and go=3D20 between two hits of the ENTER =
key=3D20 =3D20 chris=3D20



The information transmitted is intended only for the person or entity to wh=
ich it is addressed and may contain CONFIDENTIAL material. If you receive =
this material/information in error, please contact the sender and delete or=
destroy the material/information.
"
IDMS 3rd-party providers forum
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP
IDMSVENDOR-L@LISTSERV.IUASSN.COM
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: [IDMSVENDOR-L] Access to Lock Data Used in PMRM?
"Some bright spark had the idea of using CSYPGNUM, or a variant thereof, as an extended run unit in the premap to get a ""next number"" (as such the Cobol program currencies would be included in the ADS currency save/restore logic) - which the user can then decide to use or not to use in the response process business logic.

This may be the type of update that you are referring to?

Cheers - Gary

Gary Cherlet
Justice Technology Services
Department of Justice, SA Government

"""""""" Telephone +61 (0)8 8226 5199
@@ Facsimile +61 (0)8 8226 5311
> Mobile +61 (0)41 333 1613
\/ MailTo:gary.cherlet@sa.gov.au

Murphy says:
1. ""Everything is a system.""
2. ""Everything is part of a larger system.""
3. ""The universe is infinitely systematized both upward (larger systems) and downward (smaller systems).""
4. ""All systems are infinitely complex (the illusion of simplicity comes from focusing attention on one or a few variables).""

This e-mail message and any attachments are qualified as follows: Addressing: If you have received this e-mail in error, please advise by reply e-mail to the sender. Please also destroy the original transmission and its contents. Confidentiality: This e-mail may contain confidential information which also may be legally privileged. Only the intended recipient(s) may access, use, distribute or copy this e-mail. Individual Views: Unless otherwise indicated, the views expressed are those of the sender, not Justice Technology Services. Computer Viruses: It is the recipient's responsibility to check the e-mail and any attached files for viruses.

Outcomes