CICS VSAM Transparency for z/OS, Version 1.2


Step 1 - Disable access in CICS

The first step is to disable access to the file in CICS. This can be achieved by stopping the CICS region, or stopping the file using the CEMT transaction. You should stop alternate index data sets as well as base cluster data sets.





Last updated: December 6, 2013 20:43:20

Information Information

Feedback


Timestamp icon Last updated: Friday, 6 December 2013


http://pic.dhe.ibm.com/infocenter/cicsts/v5r1/topic///topics/cvtugb0024.html