From 5500031CVP 5500031CVP
This video describes how you can detect database corruption, for example, by using pointer checker tools, reviewing the functions that IMS checks automatically such as segment codes, and looking at pseudo abends.