CICS VSAM Transparency for z/OS, Version 1.2


Step 1 - Disable access in CICS

The first step is to disable access to the file in CICS. This can be achieved by stopping the CICS region, or stopping the file using the CEMT transaction. You should stop alternate index data sets as well as base cluster data sets.





Last updated: November 9, 2012 20:42:52