ca.portal.admin

Re:Re: [IDMSVENDOR-L] Access to Lock Data Used in PMRM?

Discussion created by ca.portal.admin on Mar 9, 2010
then perhaps the real question becomes:

does Ms Kline need this information real time as it happens, or can
daily reports suffice

if the latter, then certainly the log can be interrogated and all
necessary information can be retrieved
if the former - good luck - even if you sat all day executing lockmon
you MIGHT see stalls building, but many deadlocks could come and go
between two hits of the ENTER key

chris
"
IDMS Public Discussion Forum
IDMS-L@LISTSERV.IUASSN.COM
SMTP
IDMS-L@LISTSERV.IUASSN.COM
IDMS-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: Access to Lock Data Used in PMRM?
"Chris is correct - these are ""long term locks"" which can be held across a p=
seudo-converse (when there is no active task), as contrasted to Database lo=
cks which can only be held during an active database run unit (which can no=
t exist when there is no active task).=20

In ADS there are ""implicit locks"" placed automatically by ADS (there are wa=
ys to manage this through sysgen and compile options), and explicit long te=
rm locks that can be placed by application code. During the pseudo-converse=
the long term resources are transferred from the active task (TCE) resourc=
e chain to the LTERM resource chain.

HTH - cheers - Gary=20


Gary Cherlet
Justice Technology Services
Department of Justice, SA Government
Telephone +61 (0)8 8226 5199
Facsimile +61 (0)8 8226 5311
Mobile +61 (0)41 333 1613
MailTo:gary.cherlet@sa.gov.au

This e-mail message and any attachments are qualified as follows: Addressin=
g: If you have received this e-mail in error, please advise by reply e-mai=
l to the sender. Please also destroy the original transmission and its con=
tents. Confidentiality: This e-mail may contain confidential information w=
hich also may be legally privileged. Only the intended recipient(s) may ac=
cess, use, distribute or copy this e-mail. Individual Views: Unless otherw=
ise indicated, the views expressed are those of the sender, not Justice Tec=
hnology Services. Computer Viruses: It is the recipient's responsibility t=
o check the e-mail and any attached files for viruses.

Outcomes