In the mid-1970’s (or it may have been the early 1980’s, the memory is fainter 
now) I took an operating systems overview class at a technical college nearby, 
and the instructor was an IBM Fellow whose name I have long since forgotten, 
but in one class he told us a story about how VSAM came to be as we know it 
today.  The following is my (perhaps faulty) memory of the story he told us.

The original Virtual Storage Access Method design was created by a group of 
people within IBM as a complete replacement for ALL then-existing access 
methods.  When it was presented to the IBM powers, one of the marketing/sales 
honchos screamed loudly that the conversion costs for existing customers would 
clobber sales (and therefore profits) and that this could not be tolerated as 
the way forward.  When the group that invented the idea refused to reduce the 
scope of the project, he took home the design paper and took out all the parts 
that would require IBM customers to convert existing code and processes, and 
the resulting design document became known as VSAM0 (VSAM zero) and this is the 
VSAM design that was implemented.

I have never seen any actual history that describes the events around the 
creation of VSAM as he related them, but that instructor seemed quite 
believable at the time, and he was an IBM Fellow so you would think he knew 
whereof he spoke.

Peter

From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> On Behalf Of 
Paul Gilmartin
Sent: Friday, May 24, 2024 11:03 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: VTOCs vs. catalogs


On Thu, 23 May 2024 22:24:06 -0500, Mike Schwab wrote:

>

>VSAM came from the Future Systems development as a complete

>replacement, Lynn Wheeler has posts about that.

>It was cut back to be an addition to MVS, then combined with CVOL

>catalogs to ICF.

>

"complete replacement" of what, specifically?  I have heard the

assertion that VSAM was intended to replace all other access

methods:  QSAM, BSAM, BPAM, ...

<Snipped>

--

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to