Previous Topic: 9.2.6 File Aging

Next Topic: 10.1 Available User Exits

10. MODIFICATION


At times, additional system customizing is needed to tailor
CA MICS to meet your data center's needs. There are many user
exit points provided within CA MICS.  Each of these points
corresponds to a position in the CA MICS logic where user
modification:

o Is likely to occur, based on our experience

o Presents only a slight possibility of compromising CA MICS
  database or operational integrity

o Is relatively easy to document and understand

Using the CA MICS exit facilities to augment CA MICS
processing logic is the safest method of system modification.
Generally, we consider that the CA MICS system administrator
has four levels or methods by which CA MICS can be augmented,
changed, or enhanced:

  o  CA MICS Standard Option and Parameter Definitions

     The diverse installation and definition options provide
     most users with adequate provisions for customizing
     CA MICS.

  o  Modification Through User Exits

     There may be site-dependent requirements that are not
     adequately addressed through the standard options and
     parameters of CA MICS.  In these cases, one or more of
     the user exit points available to you can be used to
     code user-written routines that would satisfy these
     extended requirements.

  o  Extension Through Field Developed Applications

     Although most users do not initially consider this a way
     of modifying CA MICS, the development of field-developed
     applications can be the most advantageous method of
     addressing the need to modify a CA MICS product. For
     example, it may be better to write an application to
     handle additional SMF data than to attempt to modify the
     logic of the CA MICS Analyzer for CA-IDMS.

  o  System Code Modification

     As a last resort, you may be able to satisfy your data
     center's requirements by implementing a source code
     change.

This chapter explains the user exits that are provided with
the CA MICS Analyzer for CA-IDMS.  You must carefully explore
whether it is necessary to develop any user exit routines.
To this end, first ensure that the requirement cannot be
satisfied through one of the standard options or definitions.
This process can be greatly facilitated by discussing the
requirement with CA Technical Support.

Before attempting to activate an exit, you should read and
fully understand the information contained in Section 4.3 of
the of the CA MICS System Modification Guide, User Exit
Facilities.  The following material is intended to
supplement, not replace, that discussion.

The design, coding, testing, and implementation of CA MICS
user exit routines should be approached with caution, as
errors can result, causing corruption of data.  You should be
meticulous in the definition and validation of the exit
routines to ensure that system integrity and performance have
not been adversely affected.

The following sections identify and describe the user exit
points that are available for processing:

    1 - Available User Exits
    2 - Exit Routine Considerations
    3 - Input Exits
    4 - Output Exits