Search for tag: "dbrc"

Unit 10, Section 1: DBRC Security

This video describes: What DBRC commands and other resources can be secured The environments and other interfaces to RECON data sets that can be secured How the choices of security mechanisms,…

From  5500031CVP 5500031CVP

Unit 9, Section 2: Maximizing RECON Availability, Part 2

This video picks up the discussion from Part 1 about maintaining RECONs to ensure availability.

From  5500031CVP 5500031CVP

Unit 9, Section 1: Maximizing RECON Availability, Part 1

This video describes how to maintain the health of RECONs. Part 1 and 2 will cover ensuring RECON data sets are available, reallocating discarded RECONs, backing up the RECONs frequently, deleting…

From  5500031CVP 5500031CVP

Unit 8, Section 5: Change Accumulation Utility

This video describes the Database Change Accumulation utility, which offers you a way of sorting through your accumulated log data sets in advance, merging, and condensing them.

From  5500031CVP 5500031CVP

Unit 8, Section 4: Image Copy Scenarios and Commands

This video walks through Image Copy scenarios and some Image Copy utility commands used with DBRC.

From  5500031CVP 5500031CVP

Unit 8, Section 3: Image Copy Utilities

This video describes Image Copy utilities that call DBRC to update essential information in the RECON.

From  5500031CVP 5500031CVP

Unit 8, Section 2: Prefix Update Utility and a Reload Scenario

This video describes a Prefix Update, which is applicable only with logical relationships and uses data sets created by Scan utility as input. This video then describes the typical process database…

From  5500031CVP 5500031CVP

Unit 8, Section 1: Database Reorganization Utilities: Unload, Scan, and Reload 

This video describes some of the database reorganization utilities, specifically, the Unload, Scan, and Reload utilities.

From  5500031CVP 5500031CVP

Unit 7, Section 4: %SET TIMEFMT Keyword and the GENJCL.USER Command 

This video describes the %SET TIMEFMT keyword, which is used to specify a format for time stamps that appear in GENJCL output. This video also covers the GENJCL.USER command, which generates…

From  5500031CVP 5500031CVP

Unit 7, Section 3: DELETE Groups, GENJCL.RECOV, and Recovery Utility Skeletal JCL 

This video covers DELETE group and shows an example of IBM-supplied skeletal JCL.

From  5500031CVP 5500031CVP

Unit 7, Section 2: Control Keywords and SELECT Groups

This video describes how to use control keywords and SELECT groups.

From  5500031CVP 5500031CVP

Unit 7, Section 1: GENJCL Overview

This video describes how DBRC uses the skeletal JCL, information from the RECON data set, and instructions from a GENJCL command to generate the JCL and control statements that are needed to…

From  5500031CVP 5500031CVP

Unit 6, Section 10: Lab 4 - Subsystem Authorization

This video describes how the authorization process works. This lab demo shows the following steps:1. What prevents authorization and how to correct authorization failures2. How to modify flags and…

From  5500031CVP 5500031CVP

Unit 6, Section 9: Unauthorization, Sign-off, and Authorization Clean-up

This video describes unauthorization, which will remove the database entry for a database (registered or not) from the SSYS record. This video also covers normal and abnormal sign-off scenarios, and…

From  5500031CVP 5500031CVP

Unit 6, Section 8: DSSN, USID, and I/O Errors

This video describes several topics: recap of authorization, DSSN and USID fields, and I/O errors that can occur with full-function, HALDB, and Fast Path databases.

From  5500031CVP 5500031CVP

Unit 6, Section 7: Open Processing

This video describes database open processing, which usually occurs at the time of the first DL/I call.

From  5500031CVP 5500031CVP