CICS management functions
Interval control
Expiration times
Request identifiers
Task control
Controlling sequence of access to resources
Program control
Program linking
Application program logical levels
Link to another program expecting return
Passing data to other programs
COMMAREA
Channels
INPUTMSG
Using the INPUTMSG option on the RETURN command
Using mixed addressing modes
Using LINK to pass data
Using RETURN to pass data
Storage control
Overview of CICS storage protection and transaction isolation
Storage protection
Storage categories
Transaction isolation
Reducing system outages
Protecting application data
Protecting CICS from being passed invalid addresses
Aiding application development
Defining the storage key for applications
System-wide storage areas
Task lifetime storage
Program working storage specifically for exit and PLT programs
Passing data by a COMMAREA
The GETMAIN command
Selecting the execution and storage key
User-key applications
CICS-key applications
Tables
Map sets and partition sets
Storage protection exception conditions
Using transaction isolation
MVS subspaces
Subspaces and basespaces for transactions
The common subspace and shared storage
Transient data control
Intrapartition transient data queues
Extrapartition queues
Indirect queues
Automatic transaction initiation (ATI)
Temporary storage control
Temporary storage queues
Typical uses of temporary storage control
[[
Contents
Previous Page
|
Next Page
Index
]]