The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
This Invention Disclosure Publication discloses a fast and effective method to validate a control block address that can become obsolete after a restart of a system in a sysplex environment that provides message and data sharing.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
77% of the total text.
Page 1 of 1
Method of Validating a Control Block in a Sysplex Environment .
In a sysplex environment that provides message and data sharing, messages can be put on a common storage media to be processed by any systems. In some occasions, output from these messages that are processed by a sharing system become obsolete across a system restart of an inputting system. A mechanism is needed to validate output messages that can be from a previous execution of an inputting system to avoid causing a storage exception.
A message is uniquely identified by a message token. A message token consists of a time stamp and a control block address which points to the data structure that represents an input message. This Invention Disclosure Publication discloses a validation method of a control block address using a message token.
Instead of scanning the entire allocated control block chain for the control block address in a message token, this validation method compares the time stamp in a message token with the inputting system restart time. If the time stamp in a message token is greater than the inputting system restart time, the message token is considered valid. This means the output message is not obsolete. The control block address in the message token that represents the input message can safely be used to locate the control block directly without causing a storage exception. If the time stamp in a message token is less than or equal to the inputting system restart time, the message...