Previous Topic: CA Chorus and CIA Real-Time ProcessingNext Topic: How Unloading the Security Information Works


Unloading the Security Information

This section contains the following topics:

How Unloading the Security Information Works

How to Unload the Security Information

Estimate Storage Requirements

Allocate the Unload Data Set

Check Authorization to Run the Unload Utility

Run the Unload Utility