CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
Cics program, interval and task control commands-session 5Srinimf-Slides
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
JCL
Job Control Language (JCL) is a name for scripting languages used On IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem.
JCL acts as an interface between application programming and MVS Operating system.
Jcl is used for compilation and execution of batch programs.
Apart from the above functionalities JCL can also be used for,
1. Controlling the jobs.
2. Create GDG’S.
3. Allocate PDS,PS file with IBM Utilities.
4. Create Procs.
5. Sort the files.
JCL Coding Sheet
1,2,3----------Column Numbers----------72,73------------80
//JOBNAME JOB PARAMETERS------COMMENTS
// EXEC
// DD
//* ------------ Comment (* in 3rd column indicates line in comment)
//------------ End of JCL
Where // ----- Identification Field
job name------- Naming field
JOB,EXEC,DD - Statement / Operation
NOTE
If we want to continue parameters in the next line end the last parameter with “,” and continue next parameter only in 4-16 columns.
There are three statements in JCL.
JOB
EXEC
DD
JOB Statement:
Job statement is used to identify job name and job related parameters
JOBCARD = job name + job related parameters.
Syntax
//JOBNAME JOB ACCOUNT INFORMATION,’USERNAME’,CLASS=A-Z/0-9,
// NOTIFY =&SYSUID/RACF ID,MSGCLASS,
// MSGLEVEL=(X,Y),PRTY=0-15,
// TIME=(M,S),REGION=MB/KB,TYPRUN=SCAN/
// HOLD/COPY,COND=(RC,OPERATOR,STEPNAME)
// COND=ONLY OR COND=EVEN,RESTART=STEPNAME
JOBNAME
It is required to identify this job from other jobs in the SPOOL
1 to 8 characters minimum 1 character and maximum is 8 character.
1st character must be alphabet.
Other characters can be alphabets or numeric or $,&,#.
Example
Job names for personal or lab sessions
Userid + 1 / 2 chars
KC03P83$ ------- Userid is KC03P83
KC03P84&--------Userid is KCO3P84
ACCOUNTING INFORMATION
It is a keyword parameter and codes it after JOB statement.
It is used for billing purpose, in real time when we submit any job it is going to take some CPU time. Based on the CPU time there will be some amount involved where this amount has to go will be decided by A/C information parameters.
Examples
(8012T)
(80121I)
(8012M)
USERNAME
It is used to identify the user who has written the JCL.
It can be maximum of 20 characters.
Note Both A/C information and user name are positional parameters and the remaining job
card parameters are keyword parameters.
EX1: //KC03P83A JOB (487A),’JANAKI RAM’
EX2: //KC03P84& JOB (488T),’SOMISETTY’
NOTIFY
To which user id the job has to be notification after successful or unsuccessful completion.
Successful completion means MAXCC = 0 (or) 04 unsuccessful completion means MAXCC > 04.
If it is not coded,then user has to check the status of the job from the spo
Cics program, interval and task control commands-session 5Srinimf-Slides
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
JCL
Job Control Language (JCL) is a name for scripting languages used On IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem.
JCL acts as an interface between application programming and MVS Operating system.
Jcl is used for compilation and execution of batch programs.
Apart from the above functionalities JCL can also be used for,
1. Controlling the jobs.
2. Create GDG’S.
3. Allocate PDS,PS file with IBM Utilities.
4. Create Procs.
5. Sort the files.
JCL Coding Sheet
1,2,3----------Column Numbers----------72,73------------80
//JOBNAME JOB PARAMETERS------COMMENTS
// EXEC
// DD
//* ------------ Comment (* in 3rd column indicates line in comment)
//------------ End of JCL
Where // ----- Identification Field
job name------- Naming field
JOB,EXEC,DD - Statement / Operation
NOTE
If we want to continue parameters in the next line end the last parameter with “,” and continue next parameter only in 4-16 columns.
There are three statements in JCL.
JOB
EXEC
DD
JOB Statement:
Job statement is used to identify job name and job related parameters
JOBCARD = job name + job related parameters.
Syntax
//JOBNAME JOB ACCOUNT INFORMATION,’USERNAME’,CLASS=A-Z/0-9,
// NOTIFY =&SYSUID/RACF ID,MSGCLASS,
// MSGLEVEL=(X,Y),PRTY=0-15,
// TIME=(M,S),REGION=MB/KB,TYPRUN=SCAN/
// HOLD/COPY,COND=(RC,OPERATOR,STEPNAME)
// COND=ONLY OR COND=EVEN,RESTART=STEPNAME
JOBNAME
It is required to identify this job from other jobs in the SPOOL
1 to 8 characters minimum 1 character and maximum is 8 character.
1st character must be alphabet.
Other characters can be alphabets or numeric or $,&,#.
Example
Job names for personal or lab sessions
Userid + 1 / 2 chars
KC03P83$ ------- Userid is KC03P83
KC03P84&--------Userid is KCO3P84
ACCOUNTING INFORMATION
It is a keyword parameter and codes it after JOB statement.
It is used for billing purpose, in real time when we submit any job it is going to take some CPU time. Based on the CPU time there will be some amount involved where this amount has to go will be decided by A/C information parameters.
Examples
(8012T)
(80121I)
(8012M)
USERNAME
It is used to identify the user who has written the JCL.
It can be maximum of 20 characters.
Note Both A/C information and user name are positional parameters and the remaining job
card parameters are keyword parameters.
EX1: //KC03P83A JOB (487A),’JANAKI RAM’
EX2: //KC03P84& JOB (488T),’SOMISETTY’
NOTIFY
To which user id the job has to be notification after successful or unsuccessful completion.
Successful completion means MAXCC = 0 (or) 04 unsuccessful completion means MAXCC > 04.
If it is not coded,then user has to check the status of the job from the spo
CICS error and exception handling-recovery and restart-session 6Srinimf-Slides
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
Contains information about the DB2 DSNZPARM that forms the DB2 configuration parameters. All about the different types of zPARMs. A way to update them dynamically.
Top jcl interview questions and answers job interview tipsjcltutorial
You'll likely be asked difficult questions during the interview. Preparing the list of likely questions in advance will help you easily transition from question to question.
Maintec Technologies provides affordable access to latest Mainframe infrastructure for development, training, additional short term capacity increases and outsourcing needs. Leverage our Mainframe infrastructure, without investing the time, expense and manpower it would take to build your own!.
Z4R: Intro to Storage and DFSMS for z/OSTony Pearson
This session covers basic storage concepts for z/OS operating system with examples for Flash, Disk and Tape devices and how to use DFSMS policy-based management. Presented at IBM TechU in Johannesburg, South Africa September 2019
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly. Nicely covered on how to view the abends in CICS.
This slide contains all the basic concepts of ISPF. It's giving the simple and easy step to get the knowledge of Interactive system productivity facility. If u like it then give me feedback on email anilbharti85@gmail.com Thanks v much.
A K Bharti
It is required that after the course study
you should:
Have a general concept about DT
Master Panorama DT operation
Master Panorama data analysis
Chapter 1 DT Introduction
Chapter 2 Panorama DT Introduction
Chapter 3 Panorama DT Data Analysis
Collect System Air interface data
Analyze Air interface data
Assist Export Analysis report
Qualcom CAIT
CDMA Air Interface Tester
WILL TECH DM2K/Pecker
Pecker Navigator, Pecker Analyzer
Panorama
Qualcom CAIT
CDMA Air Interface Tester
WILL TECH DM2K/Pecker
Pecker Navigator, Pecker Analyzer
Panorama
CICS error and exception handling-recovery and restart-session 6Srinimf-Slides
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly.
Contains information about the DB2 DSNZPARM that forms the DB2 configuration parameters. All about the different types of zPARMs. A way to update them dynamically.
Top jcl interview questions and answers job interview tipsjcltutorial
You'll likely be asked difficult questions during the interview. Preparing the list of likely questions in advance will help you easily transition from question to question.
Maintec Technologies provides affordable access to latest Mainframe infrastructure for development, training, additional short term capacity increases and outsourcing needs. Leverage our Mainframe infrastructure, without investing the time, expense and manpower it would take to build your own!.
Z4R: Intro to Storage and DFSMS for z/OSTony Pearson
This session covers basic storage concepts for z/OS operating system with examples for Flash, Disk and Tape devices and how to use DFSMS policy-based management. Presented at IBM TechU in Johannesburg, South Africa September 2019
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly. Nicely covered on how to view the abends in CICS.
This slide contains all the basic concepts of ISPF. It's giving the simple and easy step to get the knowledge of Interactive system productivity facility. If u like it then give me feedback on email anilbharti85@gmail.com Thanks v much.
A K Bharti
It is required that after the course study
you should:
Have a general concept about DT
Master Panorama DT operation
Master Panorama data analysis
Chapter 1 DT Introduction
Chapter 2 Panorama DT Introduction
Chapter 3 Panorama DT Data Analysis
Collect System Air interface data
Analyze Air interface data
Assist Export Analysis report
Qualcom CAIT
CDMA Air Interface Tester
WILL TECH DM2K/Pecker
Pecker Navigator, Pecker Analyzer
Panorama
Qualcom CAIT
CDMA Air Interface Tester
WILL TECH DM2K/Pecker
Pecker Navigator, Pecker Analyzer
Panorama
An example of a product charter that was favorably reviewed by management, but never produced. This is a good reference example of taking an existing product SKU and making sweeping improvements using gap analysis.
Python questions in pdf for data science interviews. A question bank on python for practice. In Reddit and Sanfoundry, you will get random questions, but here these are in order. The difficult to answer questions explained clearly.
CICS is the power of mainframe. It has all the capabilities to handle online transactions. The ppt covers highly useful CICS concepts to refresh your CICS knowledge quickly. Well explained about data access in CICS.
How To Master PACBASE For Mainframe In Only Seven DaysSrinimf-Slides
IBM VisualAge Pacbase is a code-switching structured programming language that is developed and maintained by IBM. VisualAge Pacbase runs on both IBM and non-IBM mainframes and integrates with IBM WebSphere Studio Application Developer. When compiling Pacbase code it is first translated into COBOL and then compiled to binary.
Easytrieve plus is an information retrieval and data management system. It is a primitive form of 4GL whose English like language and simple syntax provide the tools for easy data retrieval and report generation, Easytrieve Plus can now produce reports in HTML format. This feature allows you to create reports that can be viewed either from a local disk or LAN or from a World Wide Web server using the Web browser.
A command macro is a text file that contains one or more commands and/or command macro statements and that has a name ending with the suffix .cm. You invoke a macro by entering its name. The operating system then sequentially executes the commands and macro statements in the file.
A command macro is useful to replace one of the following:
a long command string that you issue frequently
a group of internal commands, command macros, and/or program modules that together perform an operation you regularly require
a sequence of internal commands, command macros, and/or program modules that you execute in a certain way depending on external factors
PLI Presentation for Mainframe Programmers. PL/I is one of the prominent language being used in Mainframe after COBOL. Still PLI being used in many banking and financial projects.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
CICS basic mapping support - session 3
1. CICS - Basic Mapping Support
DAY 1 - SESSION 3
Updated in Nov 2004
2. Session 3 : ObjectivesTo Understand the
Screen classification and Primary functions of BMS
BMS Macros - Mapsets, Maps and Fields and their attributes
Physical and Symbolic maps and their Assembly
BMS I/O operations - SEND and RECEIVE Maps
Cursor positioning on the screen
Field attribute modification facility – MDT & Symbolic
override
3. CICS Program Design
The User interface for CICS
programs is implemented
using Basic Mapping Support
(BMS)
BMS is a standard facility
provided by CICS, to deal with
the formatted screen
operations
4. Basic Mapping Support - BMS
Screen defined through BMS is called a MAP
Collection of one or more maps – MAPSET
◦assembler language program that defines the format of the
maps that are used by a program
5. BMS - Primary Functions
Device independence
Constant Information Handling
Access to data fields of the Screen
Terminal Paging
Message Routing
6. BMS - Sample Screen
ITEM-NO : XXXXXXXXXX
NAME : XXXXXXXXXXXXXXXXXXXXXXXX
QUANTITY : XXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
F1=Help F3=Exit F12=Cancel
Constant Field(protected)
Data Entry Field(Unprotected)
Data Entry Field(Unprotected)
Auto Skip Field
Stopper Field
Message Field
7. BMS - Field Types in Sample
Layout
ITEM-NO : XXXXXXXXXX
NAME : XXXXXXXXXXXXXXXXXXXXXXXX
QUANTITY : XXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
F1=Help F3=Exit F12=Cancel
Legend :
: Attribute byte : Autoskip Field : Stopper Field
8. Basic Mapping Support - Map
Types
Physical map
•Is a load module that contains the screen
locations of data the BMS needs
Symbolic map
•Is a data structure, using which, fields can
be referred to in the CICS application
program
9. BMS - Map Definition Macros
DFHMSD - Defines a Mapset
DFHMDI - Defines a Map in a Mapset
DFHMDF - Defines a field in a Map
10. BMS - Map Definition Macros
DFHMSD Mapset Definition - Start
DFHMDI Map Definition - Map 1 Map 1
DFHMDF Field Definition in a Map - Field 1
DFHMDF Field Definition in a Map - Field 2
……
……
DFHMDI Map Definition - Map 2 Map 2
DFHMDF Field Definition in a Map - Field 1
DFHMDF Field Definition in a Map - Field 2
……
……
DFHMSD Mapset Definition - End
11. BMS Macros - Rules
Col. Col. Col. Col
1 9 16 72
+-------+---------+---------------------------------+
LABEL Op-Code Parameters separated continuation
by commas(parm1=..) char Col.72
Example
MAPSTNM DFHMSD TYPE=MAP,MODE=INOUT, X
LANG=COBOL,TIOAPFX=YES
12. BMS - DFHMSD Macro
setname DFHMSD TYPE={ &SYSPARM | DSECT | MAP },
MODE={ IN | OUT | INOUT },
LANG={ASM | COBOL | C | PLI },
TERM=terminal_type
STORAGE=AUTO,
TIOAPFX={ YES | NO },
CTRL=(ctrl1,ctrl2...)
Example.
col col col col
1---------------9-------------16---------------------------------------------------------------
72
ACCTSET DFHMSD TYPE=MAP,MODE=INOUT,LANG=COBOL, X
STORAGE=AUTO,TIOAPFX=YES
13. BMS - DFHMSD Macro
(cont’d)
Extended Attributes
MAPATTS = (COLOR,HILIGHT)
DSATTS = (COLOR,HILIGHT)
EXTATT = {YES, NO, MAPONLY }
- To define color, high intensity, etc., as per CUA standards.
- Results in additional variables for each attribute in the symbolic
map.
14. BMS - DFHMDI Macro
mapname DFHMDI SIZE=(lines,columns),
LINE=line_number,
COLUMN=column_number,
JUSTIFY={ LEFT | RIGHT },
CTRL(ctrl1,ctrl2...)
Example.
MENUMAP DFHMDI SIZE(24,80),LINE =1,COLUMN =1, X
JUSTIFY=LEFT,CTRL(ALARM,FREEKB)
16. BMS - DFHMDF Macro - Field
Attributes
Field Attributes
◦ Field Intensity : NORM / BRT / DRK
◦ Field protection attribute : PROT / UNPROT / ASKIP
◦ Field Characteristic : NUM
◦ Initial Cursor Positioning : IC
◦ Field Modification Indication : FSET
17. BMS - MDTs and their
Manipulation
MDT indicates whether a field is modified or not
MDT on will ensure that data is received into the program
MDTs can be turned on by
Specifying the FSET attribute in the physical map
Setting the attribute byte to FSET in the symbolic map
Keying data into the field
18. BMS - MDT manipulation -
FRSET
an attribute of DFHMSD macro
turns off all MDTs on the screen before sending a
map
requires the physical map field attribute or the
symbolic override to control the MDT status
19. BMS - Ending a Mapset
definitionCol. Col. Col. Col
1 9 16 72
+-------+---------+----------------------------+
DFHMSD TYPE=FINAL
END
21. BMS - Symbolic Map ContentsTwo 01-level items generated based on map name
01-level Item names suffixed with “I” or “O” for Input &
Output respectively
Additional level items defined for
◦ Field for Length
◦ Field for Attribute
◦ Field for Modified Data Indication
◦ Field for Input data
◦ Field for Output Data.
01-level Item for Output REDEFINES Input area.
27. BMS - SEND MAP command
(Contd.)
Data to be prepared before SENDing the MAP :
◦ Field Length : fieldname +L
◦ Field Attribute : fieldname +A
◦ Field Content : fieldname +O
29. BMS - SEND MAP command
(Contd.)
SENDING MAP WITH NEITHER MAPONLY NOR DATA ONLY
EXEC CICS SEND MAP(‘MAPSMP’)
MAPSET(‘MAPSETS’)
END EXEC.
SYMBOLIC MAP PHYSICAL MAP
OUTPUT DATA STREAM
31. BMS - RECEIVE MAP
command
THE RECEIVE MAP COMMAND RECEIVES DATA
FROM THE TERMINAL. THE SYMBOLIC MAP WILL
CONTAIN THE DATA.
DATA IN THE SYMBOLIC MAP
fieldname+L Contain the length of the input data.
fieldname+F Flag field- Set to x’80’ or X’82’ if the field is modified,
but cleared.
fieldname+I Contains the input data. Filled with x’00’ if no data is
entered.
32. BMS - Changing Field
Attributes
Need for changing Field attributes
◦ Highlighting fields in error
◦ Protecting fields during deletion
IBM Supplied copy library DFHBMSCA contains all
possible attribute combinations
Can be copied into the application program
33. BMS - Cursor Positioning
Cursor positioning required for positioning the
cursor during SEND
◦ In the first data entry field during data entry
◦ In the first field resulting in data entry error
Cursor Positioning Techniques :
◦ Initial cursor positioning
◦ Direct cursor positioning
◦ Symbolic cursor positioning
34. BMS - Cursor Positioning
(Contd.)Static positioning (Initial)
• If IC option is specified in the ATTRB field of DFHMDF macro the cursor will be
placed at this field
Dynamic/Symbolic positioning
• Place -1 into the field length field (“L” suffix). cursor will be placed in this field.
Dynamic/Relative positioning. CURSOR (data-value) option is
used
35. BMS - Detecting Cursor
Position
The EIB field EIBCPOSN can be used to determine
where the cursor was positioned on the screen
On a RECEIVE, CICS updates the EIB with the following
information:
The screen cursor position relative to zero is placed in
EIBCPOSN
The name of the input key the terminal operator pressed
is placed in the field EIBAID.
36. BMS - AIDKEY
WORKING STORAGE SECTION.
COPY DFHAID.
PROCEDURE DIVISION.
EXEC CICS RECEIVE MAP(‘MAPSMP’) MAPSET(‘MAPSETS’) END-EXEC
EVALUATE TRUE
W HEN EIBAID = DFHPF12
EXEC CICS RETURN END-EXEC
W HEN EIBAID = DFHENTER
PERFORM 1000-PROCESS-DATA
THRU 1000-PROCESS-DATA-EXIT
W HEN EIBAID = OTHER
MOVE ‘Invalid Key Pressed’ TO MESSAGEO
END-EVALUATE.
Copybook containing the
definitions for AID keys
37. Direct Cursor Positioning :
ExampleEXEC CICS SEND
MAP(.........)
MAPSET(....)
CURSOR(100)
ERASE
END-EXEC.
WORKING-STORAGE SECTION
COPY DFHAID.
.......
PROCEDURE DIVISION.
EXEC CICS RECEIVE
MAP(.........)
MAPSET(....)
INTO (…..)
END-EXEC.
IF EIBAID=DFHPF12 THEN
........
IF EIBAID=DFHENTER THEN
.......
IF EIBCPOSN LESS THAN 100 THEN
........
38. BMS - SEND/RECEIVE -
Example
SEND MAP (‘MAPSMP’)
MAPSET(‘MAPSETS’)
MAPONLY
RECEIVE MAP (‘MAPSMP’)
MAPSET(‘MAPSETS’)
NAME :
ITEM-NO :
QUANTITY :
NAME : BOLT
ITEM-NO : 0023
QUANTITY : 5000
39. Session 3 : Summary
Primary functions of BMS
Screen classification; Mapsets, Maps and Fields;
macros and their attributes
Changing Field Attributes - MDT manipulation
Preparation of Physical and Symbolic maps
Sample Layout of Symbolic map
BMS I/O operations - SEND and RECEIVE maps
Cursor positioning