Session Evaluation

Storage violations in CICS have been around since CICS itself. The unique way CICS manages storage makes applications run really fast, but still allows for storage to be corrupted. Even with all the storage protections turned on an application can violate itself or other running tasks. This presentation will cover what a storage violation is, how its detected and how you can determine the offending program that overlays storage. Several examples of detection will be covered using a captured storage violation dump and IPCS.