Modernization Hub

Share Your Product Experience

Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.

Share Your Experience
Categories
2
Recommended
Claim Your Listing
Verified Vendor Access
Request Access Now

Product Overview

TICTOC's architecture centers around intercepting system calls related to date and time on z/OS. It redirects these calls to its own routines, which return the simulated date and time as configured. The main components are: 1.

**TICTOC EXEC:** The primary command used to initiate the TICTOC environment. 2. CNTL:** The configuration file that specifies the simulated date and time, as well as the applications to be affected.

This file is read when TICTOC is initialized. 3. **System Call Interception Routines:** These routines modify the CVT (Communication Vector Table) to redirect date and time requests to TICTOC routines.

CNTL file. CNTL file to intercept and redirect date and time requests. There is no database involved; the simulated date and time are stored in memory.

TICTOC does not expose APIs in the traditional sense. It operates by intercepting system calls. CNTL file.

Competing products like Hourglass offer similar functionality, but TICTOC continues to be supported by Can Do Systems.

Frequently Asked Questions

How does TICTOC simulate different dates and times?

TICTOC intercepts system calls related to date and time. It then returns the date and time specified by the user, instead of the actual system date and time. This allows applications to run as if it were a different date without impacting the actual system.

What are the common use cases for TICTOC?

TICTOC is primarily used for testing date-sensitive application logic. This includes year-end processing, month-end processing, leap year calculations, and other time-based events. It is also used for simulating future dates for application demonstrations or training.

What configuration files are used by TICTOC?

TICTOC supports a configuration file, typically named TICTOC.CNTL, which defines the date and time to be simulated. This file is read when TICTOC is initialized. The file contains parameters such as the simulated date, time, and the applications to be affected.

How does TICTOC intercept system calls?

TICTOC intercepts system calls related to date and time. This interception is achieved through modifications to the system's dispatching routines. The specific method involves altering the CVT (Communication Vector Table) to redirect date and time requests to TICTOC routines.

Help Improve This Directory

Notice outdated information? Have insights about this product? Help the mainframe community stay informed with accurate, current data.

Are You a Vendor? Claim Your Listing

Take control of your product listings. Add verified information, showcase updates, and unlock a Claimed Vendor badge across the directory.

Claim Your Listing Now