Close

Storage Violations in CICS - prevention, detection and recovery

(5G)

Stream: Virtual Room 5
Time: 09:00 - 10:00


Presentation

What is a CICS storage violation? How does CICS detect storage violations? What actions might CICS take following a storage violation? How can you prevent storage violations? How should you recover from a storage violation?

This session will discuss good practice in the prevention, detection and recovery from CICS storage violations.

Attachments

5G Attachments

Speakers


  • Steve Foley at IBM UK LTD.
  • Steve Foley is a Chartered IT Professional, and a Brand Technical Specialist for IBM Z Software. He has worked with CICS and the mainframe in systems programming and technical pre-sales roles since 1987, and speaks frequently on CICS and IBM Z topics. He has a BSc (Hons) in Computer Science from Edinburgh University.


  • Steve Foley at IBM UK LTD.
  • Steve Foley is a Chartered IT Professional, and a Brand Technical Specialist for IBM Z Software. He has worked with CICS and the mainframe in systems programming and technical pre-sales roles since 1987, and speaks frequently on CICS and IBM Z topics. He has a BSc (Hons) in Computer Science from Edinburgh University.


    Feedback

    Click here to give some Feedback so we can make it even better next year!