ca.portal.admin

Re:Re: [IDMSVENDOR-L] Access to Lock Data Used in PMRM?

Discussion created by ca.portal.admin on Mar 9, 2010
then perhaps the real question becomes:=3D20 =3D20 does Ms Kline need this =
information real time as it happens, or can=3D20 daily reports suffice=3D20=
=3D20 if the latter, then certainly the log can be interrogated and all=3D=
20 necessary information can be retrieved=3D20 if the former - good luck - =
even if you sat all day executing lockmon=3D20 you MIGHT see stalls buildin=
g, but many deadlocks could come and go=3D20 between two hits of the ENTER =
key=3D20 =3D20 chris=3D20



The information transmitted is intended only for the person or entity to wh=
ich it is addressed and may contain CONFIDENTIAL material. If you receive =
this material/information in error, please contact the sender and delete or=
destroy the material/information.
"
IDMS 3rd-party providers forum
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP
IDMSVENDOR-L@LISTSERV.IUASSN.COM
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: [IDMSVENDOR-L] Access to Lock Data Used in PMRM?
"Chris is correct - these are ""long term locks"" which can be held across a pseudo-converse (when there is no active task), as contrasted to Database locks which can only be held during an active database run unit (which can not exist when there is no active task).

In ADS there are ""implicit locks"" placed automatically by ADS (there are ways to manage this through sysgen and compile options), and explicit long term locks that can be placed by application code. During the pseudo-converse the long term resources are transferred from the active task (TCE) resource chain to the LTERM resource chain.

HTH - cheers - Gary


Gary Cherlet
Justice Technology Services
Department of Justice, SA Government
Telephone +61 (0)8 8226 5199
Facsimile +61 (0)8 8226 5311
Mobile +61 (0)41 333 1613
MailTo:gary.cherlet@sa.gov.au

This e-mail message and any attachments are qualified as follows: Addressing: If you have received this e-mail in error, please advise by reply e-mail to the sender. Please also destroy the original transmission and its contents. Confidentiality: This e-mail may contain confidential information which also may be legally privileged. Only the intended recipient(s) may access, use, distribute or copy this e-mail. Individual Views: Unless otherwise indicated, the views expressed are those of the sender, not Justice Technology Services. Computer Viruses: It is the recipient's responsibility to check the e-mail and any attached files for viruses.

Outcomes