|
This video describes: What DBRC commands and other resources can be secured The environments and other interfaces to RECON data sets that can be secured How the choices of security mechanisms,…
|
|
This video picks up the discussion from Part 1 about maintaining RECONs to ensure availability.
|
|
This video describes how to maintain the health of RECONs. Part 1 and 2 will cover ensuring RECON data sets are available, reallocating discarded RECONs, backing up the RECONs frequently, deleting…
|
|
This video describes the Database Change Accumulation utility, which offers you a way of sorting through your accumulated log data sets in advance, merging, and condensing them.
|
|
This video walks through Image Copy scenarios and some Image Copy utility commands used with DBRC.
|
|
This video describes Image Copy utilities that call DBRC to update essential information in the RECON.
|
|
This video describes a Prefix Update, which is applicable only with logical relationships and uses data sets created by Scan utility as input. This video then describes the typical process database…
|
|
This video describes some of the database reorganization utilities, specifically, the Unload, Scan, and Reload utilities.
|
|
This video describes the %SET TIMEFMT keyword, which is used to specify a format for time stamps that appear in GENJCL output. This video also covers the GENJCL.USER command, which generates…
|
|
This video covers DELETE group and shows an example of IBM-supplied skeletal JCL.
|
|
This video describes how to use control keywords and SELECT groups.
|
|
This video describes how DBRC uses the skeletal JCL, information from the RECON data set, and instructions from a GENJCL command to generate the JCL and control statements that are needed to…
|
|
This video describes how the authorization process works. This lab demo shows the following steps:1. What prevents authorization and how to correct authorization failures2. How to modify flags and…
|
|
This video describes unauthorization, which will remove the database entry for a database (registered or not) from the SSYS record. This video also covers normal and abnormal sign-off scenarios, and…
|
|
This video describes several topics: recap of authorization, DSSN and USID fields, and I/O errors that can occur with full-function, HALDB, and Fast Path databases.
|
|
This video describes database open processing, which usually occurs at the time of the first DL/I call.
|