or Home
or About SDS
or In Print
or Technology
or Contact Us
|
- Some ++Dumb Relics in JAVA
- JAVA evolved from the C programming
language. Although JAVA eliminated some of the inherent problems
and limitations in C, some of the complexities and idiosyncrasies were retained. One of these is the ++ (and +, --, - ) syntax
for incrementing or decrementing counters. This article looks
ate a number of situations where this syntax may produce results
that are not what you would intuitively expect.
- JAVA Report January
2000
- Testing Flow for Year 2000 Validation
- Testing is 60% to 70% of the effort
[and cost] of Y2K projects. Yet the testing process has been
decimated or diluted in most IS organizations with the cutbacks
and "streamlining" of organizations over the past 10
to 15 years. The result is that many organizations have to go
back to school to learn how to test effectively and then how
to do it efficiently. The testing process is explained to guide
those responsible for the testing effort to make the process
work while being able to control the costs.
- Year/2000 Journal November/December
1998
- The [Y2K] Testing Monster
- Year 2000 remediation is followed by a testing process which
is often much more extensive and expensive than was planned for
in the initial project plans. This is because testing has been
somewhat forgotten in the past ten years and is easy to underestimate.
But there are some basic processes and procedures that, if followed,
can make a significant impact to the amount of time and money
that is spent to fully test your systems.
- Y2K Advisor October
1998
- Making Encapsulation Viable
- Encapsulation is a Year 2000 solution which has actually
been around for 30 years. The process is to isolate either programs
or data from changes to minimize the impact to repair those systems.
If data is encapsulated, files are not changed. If programs are
encapsulated, then code is not altered. Both has a particular
appeal to lessen the impact of Year 2000 remediation on the overall
IS structure. But is Encapsulation a viable solution - the answers
are here.
- Year/2000 Journal July/August 1998
- Year 2000 Basic Rules
- Year 2000 repair projects must decide which approach to take
- modifying data or modifying programs or both. Each approach
has its pros and cons to be considered. Since this decision will
impact support of these systems in the future, it is best to
perform the evaluation before implementing a solution that may
just have to be redone in a few months after the "heat of
the battle" has died down.
- Enterprise Systems Journal
June 1998
- Saving The Bacon: Avoid Getting
Burned by Delays in year 2000 Testing
- Year 2000 testing is much bigger and
complicated than most organizations want to believe or acknowledge.
The critical issues are understanding the process of testing
and implementing a realistic plan that will allow testing to
be successful. Although this may sound very easy, it is surprising
how many Year 2000 plans are "significantly behind"
in the testing process.
- Year 2000 Journal May/June 1998
- Basic Year 2000 Rules
- What is the primary concern with Year
2000 projects - trying to get done in time. The emphasis has
been shifting over the past few years from wome very philosophical
objectives to more practical ones to messages of plain survival
instinct. But just what impact do changes have on systems. This
discussion looks at what impact is made with the various Y2K
methodologies and what are the consequences. All too often, the
impact of methodologies is not fully understood and the resulting
surprises effect project completion.
- Enterprise System Journal June 1998
- Writing an Ageing Utility
for Year 2000 Testing
- Data ageing is the best method to generate
data which can be used to test Year 2000 changes. A data ageing
utility makes the process of ageing dates in files possible because
the volume and complexity of the data is just to much to handle
manually or to create from scratch. This article outlines the
requirements for ageing date values and provides a down-loadable
utility (DATEFIX version 1.00) that can age data files on IBM
mainframe systems.
- Technical Support November 1997 File: datefix1.exe (approx 60K)
- Date Impact Analysis
- Date Impact Analysis provides Year 2000 project planning
to be managed in an orderly and regimented manner so the optimal
value is obtained from the process. As time rapidly approaches
when systems will fail or generate incorrect results, a systematic
analysis of the potential problems in each system is necessary
to properly schedule the scarce Year 2000 resources to fix or
replace those systems or recognize that systems are not in danger
or the impact is only minimal.
- Technical Support October 1997
- Ageing Data Files for Year 2000
Testing
- Testing Year 2000 changes presents the most challenging and
costly part of the process to renovate systems for the century
rollover. In fact, old system or new systems all face the same
challenge to certify that the processes are fully functional
with multi-century dates. Ageing dates in data files provides
a methodology that make testing more effective because the data
is known and the results can either be duplicated or easily extrapolated
from earlier regression test results.
- Enterprise Systems Journal July 1997
- Three Centuries: Another Year/2000
Dilemma
- Most computerized systems were designed to deal with very
short time spans. That partially explains why the change in century
is causing such havoc with logic and results. But for those cases,
which are not that uncommon, the two century solution of simply
windowing the year into a 100 year range will just not suffice.
There will be dates which can span three centuries - 189x through
200x - which will create severe problems in these systems for
the next few years. Solutions must deal with these situations
or there could be significant processing problems as the century
rollover approaches.
- Year 2000 Journal June 1997
- Reducing Testing Effort for
Year 2000 Projects
- Year 2000 correction and testing efforts depend heavily upon
the number of date fields, the number of data files, the volume
of data in those files and whether data files are input-only
or updates during processing. Date fields effect the code and
file changes. Data files and data volume effect the testing process
and resources required. Type of file access effects regression
testing and dictates data which must be saved and validated for
correctness. This article discusses how to use SMF data to limit
the files that must be captured. Input files are required to
run a process and output, or updated, files must be verified
for correctness. By limiting which files are captured and compared,
resources and time are saved. Another process also analyzes the
volume of data which is involved for each system (by dataset)
so resources can be allocated. Code is provided (via download)
to perform these functions using an assembler language program
and several CLISTs (CLISTs are an IBM MVS language which runs
under TSO or in batch).
- Year 2000 Journal May
1997 File: y2k_dsn.job (approx 56K bytes)
- YEAR 2000 Analysis: Gaining Maximum
Value from the Process
- Projects to correct the problems which will result from the
century rollover were unexpected expenses to many companies.
As long as this effort must be expended, it seems logical to
get the maximum value from the dollars being spent to examine
almost every aspect of each system. This articles walks through
the various Year 2000 solutions and offers some suggestions about
selection of a solution methodology and about collecting all
of the knowledge into a knowledge-base to be retained after the
Year 2000 project is done and gone.
- Enterprise Systems Journal
March 1997
- Locating Wasted DASD Space
- Everyone assumes that datasets are allocated efficiently
because of the BLKSIZE=0 option in JCL. But many datasets have
allocations hard coded with less than optimal blocking or have
migrated from other devices or device types. This CLIST uses
data obtained in ISPF option 3.4 to point out datasets which
are not optimally allocated.
- Technical Support Nov 1996 File: waste_sp.asc (approx 4,000 bytes)
- VSAM File Initialization
Code
- VSAM files must be initialized before they can be read or
updated. The VSAMINIT utility program will initialize any VSAM
(KSDS, RRDS or ESDS) file and thus eliminate the need for special
JCL or separate programs for each file.
- Technical Support Sept 1996 File: vsaminit.asm (approx 34,000
bytes)
-
- Sharing DB2 Application Code
- Intercepting DB2 application calls to allow one module to
execute in any environment (CICS, IMS, Batch or Call Attach).
Also includes support for VS/COBOL and COBOL-II mixed mode support.
- IDUG Solutions Journal Jan 1996
- Managing Data Tables in CICS
- Data table manager routine coded in COBOL to store data in
CICS using Temporary Storage Queues.
- Technical Support May 1995 File: cics_tsq.cob (50,000 bytes)
- Printing via the JES Spool
in CICS
- A simple interface coded in COBOL to print files from CICS
to JES network printers using the JES SPOOLxxxx functions.
- Technical Support April 1995. File: cics_prt.cob (approx 35,000
bytes)
- Faster Queries with SOUNDEX Strings
- Using SOUNDEX to improve relational database query performance.
- DBMS Magazine
February 1995
- A Simplified Query Process
- Developing a method for balancing performance and functionality
for multiple selection criteria queries using static SQL.
- Data Base Programming and Design September 1994
- Retaining Historical Data
- Retaining historical data in a relational database to provide
added functionality for point-in-time processing. An implemented
methodology is discussed for a corporate database model.
- Enterprise Systems Journal July 1994
-
MORE ANCIENT WRITINGS
Evaluating Automated Systems: Under the Microscope
NaSPA S/370-390 Operating Systems Solutions June1994
COBOL-II Pointers NaSPA S/370-390 Operating Systems
Solutions May 1994
Replication: Answering the Call Database Programming
and Design Apr 1994
Optical Storage and the Mainframe Technical Support
Dec 1992
CICS Development on the PC Technical Support
Nov 1992
WTO Loop Isolation: Preventing a System Outage Enterprise
Systems Journal July 1992
Data Compression Considerations Technical Support
July 1992
IBM's MVS Linkage Editor Utility (and Load Modules)
Technical Support May 1992
MVS Subtasks Under CICS Enterprise Systems Journal
May 1992
The Sort Termination Exit and Hipersorting Technical
Support May 1991
REXX for Systems Programmers Technical Support
Dec 1990
Protecting Deleted DASD Data: A Simple Solution Enterprise
Systems Journal Nov 1990
Automated Backup: Intelligent Selection Reduces Risks
and Resources Disaster Recovery Journal Jun-Jul-Aug
1990
Optical Disk Technology: Charting Its Growth Path
Unisphere May 1990
Sorting Methodologies Mainframe Journal May
1990
Synchronous and Asynchronous Processing Technical
Support Apr 1990
Interrogating the Eligible Device Table (EDT) Mainframe
Journal Nov 1989
Mainframe Optical: Here to Stay? or Here to Stay!
Inside DPMA Oct 1989
Sort Exit Processing Mainframe Journal Sept
1989
Modifications to a DBMS: The Optical Connection Technical
Support Sept 1989
DB2 Data Base Estimator Tools for the PC Database
Programming and Design Aug 1989
A Survey of Optical Disk Technology Mainframe Journal
May 1989
IPL-Text for IBM Mainframe Systems Technical Support
Nov 1988
A DSS (Development Support System) for DB2 Program Development
Explain Vol III 1988
Dynamic ISPF Libraries Specification Technical
Support Aug 1988
|