ca.portal.admin

Re:Re: [IDMSVENDOR-L] Access to Lock Data Used in PMRM?

Discussion created by ca.portal.admin on Mar 9, 2010
then perhaps the real question becomes:=20 =20 does Ms Kline need this
information real time as it happens, or can=20 daily reports suffice=20 =20
if the latter, then certainly the log can be interrogated and all=20
necessary information can be retrieved=20 if the former - good luck - even
if you sat all day executing lockmon=20 you MIGHT see stalls building, but
many deadlocks could come and go=20 between two hits of the ENTER key=20 =20
chris=20



The information transmitted is intended only for the person or entity to
which it is addressed and may contain CONFIDENTIAL material. If you receive
this material/information in error, please contact the sender and delete or
destroy the material/information.
"
IDMS Public Discussion Forum
IDMS-L@LISTSERV.IUASSN.COM
SMTP
IDMS-L@LISTSERV.IUASSN.COM
IDMS-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: Access to Lock Data Used in PMRM?
"i'm hungry - can i have a bagel to go with the locks ?

Chris Hoelscher
IDMS/DB2 Database Architect
Humana Inc
502-476-2538
choelscher@humana.com

you only need to test the programs that you want to work correctly




The information transmitted is intended only for the person or entity to which it is addressed and may contain CONFIDENTIAL material. If you receive this material/information in error, please contact the sender and delete or destroy the material/information.
"
IDMS 3rd-party providers forum
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP
IDMSVENDOR-L@LISTSERV.IUASSN.COM
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: [IDMSVENDOR-L] Access to Lock Data Used in PMRM?
"i'm hungry - can i have a bagel to go with the locks ?

Chris Hoelscher
IDMS/DB2 Database Architect
Humana Inc
502-476-2538
choelscher@humana.com

you only need to test the programs that you want to work correctly




The information transmitted is intended only for the person or entity to which it is addressed and may contain CONFIDENTIAL material. If you receive this material/information in error, please contact the sender and delete or destroy the material/information.
"
IDMS Public Discussion Forum
IDMS-L@LISTSERV.IUASSN.COM
SMTP
IDMS-L@LISTSERV.IUASSN.COM
IDMS-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: Access to Lock Data Used in PMRM?
"Some bright spark had the idea of using CSYPGNUM, or a variant thereof, as =
an extended run unit in the premap to get a ""next number"" (as such the Cobo=
l program currencies would be included in the ADS currency save/restore log=
ic) - which the user can then decide to use or not to use in the response p=
rocess business logic.=20

This may be the type of update that you are referring to?

Cheers - Gary=20

Gary Cherlet
Justice Technology Services
Department of Justice, SA Government

"""""""" Telephone +61 (0)8 8226 5199
@@ Facsimile +61 (0)8 8226 5311
> Mobile +61 (0)41 333 1613
\/ MailTo:gary.cherlet@sa.gov.au

Murphy says:
1. ""Everything is a system.""
2. ""Everything is part of a larger system.""
3. ""The universe is infinitely systematized both upward (larger systems) an=
d downward (smaller systems).""
4. ""All systems are infinitely complex (the illusion of simplicity comes fr=
om focusing attention on one or a few variables).""

This e-mail message and any attachments are qualified as follows: Addressin=
g: If you have received this e-mail in error, please advise by reply e-mai=
l to the sender. Please also destroy the original transmission and its con=
tents. Confidentiality: This e-mail may contain confidential information w=
hich also may be legally privileged. Only the intended recipient(s) may ac=
cess, use, distribute or copy this e-mail. Individual Views: Unless otherw=
ise indicated, the views expressed are those of the sender, not Justice Tec=
hnology Services. Computer Viruses: It is the recipient's responsibility t=
o check the e-mail and any attached files for viruses.

Outcomes