Additional Information for TDF Presentation


Slide 10



Because of inheritance and pass-through, all attaches are intercepted. If an attach designates a program that is not a target program, it still is setup for trap processing. This is required so that TDF can pass-through any traps that may be set in shared code and so that TDF can intercept a designated program that may be attached by this program. In other words, if TASK A attaches TASK B which attaches TASK C, you can intercept TASK C by designating it as a target program without designating TASK A or B. This video was shown in the description for diagnosis with no boundaries, if you haven’t seen it, it demonstrates inheritance well.

Watch a 4 minute video




Copyright © 1998-2014 Arney Computer Systems. All rights reserved.      
Comments on this site? contact the Webmaster at webmaster@arneycomputer.com

Arney Computer Systems, PO Box 382511, Duncanville, Texas 75138, USA
Tel: 214-306-0754     E-Mail: info@arneycomputer.com