Solved

How is an usual path to put  a system in operation ?

Posted on 2011-02-16
2
563 Views
Last Modified: 2012-06-27
Hi Experts

I confess I'm a little intimidated seeing a mainframe interface (the black screens).

What is the name of IBM's  mainframe interface ?

Could you please give me an usual path for edit a set of COBOL programs / compile them/  linkedit then with CICS libraries/ DB2 libraries and then run it ( I'm not wanting an extensive reply - just an outline)

(If you could put it using a Clipper metaphor it could be fine)

Thanks in advance !
 (Sorry if I'm abusing...)
0
Comment
Question by:Eduardo Fuerte
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 34907015
Well,

I already told you a bit in our other thread, but I'm by no means familiar with things like Clipper, sorry.

Mainframe Interface? There are menu-driven, ASCII based things like TSO/ISPF or DB2I, there is also the old ICCF (don't know whether this still exists, though).
For z/VM there is CMS.

As for preparing COBOL/CICS/DB2 programs - you might want to look at the below linked stuff, it's from IBM's CICS Infocenter and deals with "Preparing CICS DB2 programs for execution and production".

http://publib.boulder.ibm.com/infocenter/cicsts/v3r1/index.jsp?topic=/com.ibm.cics.ts31.doc/dfhtk/dfhtk1y.htm

wmp
0
 

Author Closing Comment

by:Eduardo Fuerte
ID: 34915018
Now it's matter of my efforts to better understand.
And then return back here with new questions...

Thank you very much.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Part One of the two-part Q&A series with MalwareTech.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question