Debugging Assembler and C code - A Live Demonstration
Project and Program:
Application Architecture Development and Integration,
LE and Programming Languages
Tags:
Proceedings ,
SHARE Phoenix 2019 ,
2019
Over the decades, z/OS has continually become more robust and more secure. Indeed the complexity of this fascinating platform is what makes it so powerful. It's not enough just to read the Principles of Operation - one has to internalize it and that can take decades.
Another barrier is reading dumps, which forces a human to translate object code, to retain numerous addresses and calculate offsets in order to gain information.
What if this could all be made easier - even transparent? What if you could SEE the source code laid over raw memory, follow execution and SEE the addresses manipulated by the underlying code? What if you could explore OS internals and SEE the architecture as it's explained in the "POO"?
The impetus for us to offer this session is to show younger zNextGen programmers how much easier working with Assembler and C languages can be on the z/OS platform. Reading dumps becomes a thing of the past. You gain understanding of z/OS much faster. You join the ranks of senior software engineers much sooner. You learn more quickly, and you get more done.-Bob Shimizu-ColeSoft Marketing, Inc.
Back to Proceedings File Library