IBM I ILE Concepts

Total Page:16

File Type:pdf, Size:1020Kb

IBM I ILE Concepts IBM i Version 7.2 Programming ILE Concepts IBM SC41-5606-10 Note Before using this information and the product it supports, read the information in “Notices” on page 189. This edition applies to IBM® i 7.2 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1997, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents ILE Concepts......................................................................................................... 1 PDF file for ILE Concepts............................................................................................................................. 3 Integrated Language Environment Introduction........................................................................................ 5 What Is ILE?............................................................................................................................................5 What Are the Benefits of ILE?................................................................................................................ 5 Binding...............................................................................................................................................5 Modularity......................................................................................................................................... 5 Reusable Components......................................................................................................................6 Common Runtime Services.............................................................................................................. 6 Coexistence with Existing Applications............................................................................................6 Source Debugger...............................................................................................................................6 Better Control over Resources..........................................................................................................6 Better Control over Language Interactions...................................................................................... 8 Better Code Optimization................................................................................................................. 9 What Is the History of ILE?.....................................................................................................................9 Original Program Model Description.................................................................................................9 Extended Program Model Description........................................................................................... 10 Integrated Language Environment Description............................................................................. 10 ILE Basic Concepts.................................................................................................................................... 13 Structure of an ILE Program.................................................................................................................13 Procedure............................................................................................................................................. 14 Module Object...................................................................................................................................... 14 ILE Program..........................................................................................................................................15 Service Program................................................................................................................................... 17 Binding Directory..................................................................................................................................19 Binding Directory Processing..........................................................................................................20 Binder Functions.................................................................................................................................. 20 Calling a Program or a Procedure........................................................................................................ 22 Dynamic Program Calls...................................................................................................................22 Static Procedure Calls.....................................................................................................................22 Procedure Pointer Calls.................................................................................................................. 23 Activation..............................................................................................................................................23 Error Handling Overview...................................................................................................................... 24 Optimizing Translator........................................................................................................................... 25 Debugger.............................................................................................................................................. 26 ILE Advanced Concepts.............................................................................................................................27 Program Activation...............................................................................................................................27 Program Activation Creation...........................................................................................................27 Activation Group...................................................................................................................................28 Activation Group Creation.............................................................................................................. 30 Default Activation Groups...............................................................................................................30 Non-Default Activation Group Deletion......................................................................................... 31 Service Program Activation..................................................................................................................33 Control Boundaries...............................................................................................................................35 Control Boundaries for Activation Groups..................................................................................... 35 Control Boundaries between OPM and ILE Call Stack Entries...................................................... 36 Control Boundary Use.....................................................................................................................37 iii Error Handling...................................................................................................................................... 37 Job Message Queues......................................................................................................................38 Exception Messages and How They Are Sent................................................................................ 38 How Exception Messages Are Handled..........................................................................................39 Exception Recovery........................................................................................................................ 39 Default Actions for Unhandled Exceptions.................................................................................... 40 Types of Exception Handlers.......................................................................................................... 41 ILE Conditions.................................................................................................................................43 Data Management Scoping Rules........................................................................................................ 43 Call-Level Scoping...........................................................................................................................44 Activation-Group-Level Scoping.....................................................................................................44 Job-Level Scoping...........................................................................................................................45 Teraspace and Single-Level Storage......................................................................................................... 47 Teraspace Characteristics....................................................................................................................47 Using Teraspace for Storage................................................................................................................ 47 Choosing a Program
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • Access Control
    Security Engineering: A Guide to Building Dependable Distributed Systems CHAPTER 4 Access Control Going all the way back to early time-sharing systems, we systems people regarded the users, and any code they wrote, as the mortal enemies of us and each other. We were like the police force in a violent slum. —ROGER NEEDHAM Microsoft could have incorporated effective security measures as standard, but good sense prevailed. Security systems have a nasty habit of backfiring, and there is no doubt they would cause enormous problems. —RICK MAYBURY 4.1 Introduction Access control is the traditional center of gravity of computer security. It is where se- curity engineering meets computer science. Its function is to control which principals (persons, processes, machines, . .) have access to which resources in the sys- tem—which files they can read, which programs they can execute, how they share data with other principals, and so on. NOTE This chapter necessarily assumes more computer science background than previous chapters, but I try to keep it to a minimum. 51 Chapter 4: Access Controls Figure 4.1 Access controls at different levels in a system. Access control works at a number of levels, as shown in Figure 4.1, and described in the following: 1. The access control mechanisms, which the user sees at the application level, may express a very rich and complex security policy. A modern online busi- ness could assign staff to one of dozens of different roles, each of which could initiate some subset of several hundred possible transactions in the system. Some of these (such as credit card transactions with customers) might require online authorization from a third party while others (such as refunds) might require dual control.
    [Show full text]
  • Red Hat Jboss Data Grid 7.2 Data Grid for Openshift
    Red Hat JBoss Data Grid 7.2 Data Grid for OpenShift Developing and deploying Red Hat JBoss Data Grid for OpenShift Last Updated: 2019-06-10 Red Hat JBoss Data Grid 7.2 Data Grid for OpenShift Developing and deploying Red Hat JBoss Data Grid for OpenShift Legal Notice Copyright © 2019 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian
    Northwestern Journal of Technology and Intellectual Property Volume 6 Article 3 Issue 1 Fall Fall 2007 Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Recommended Citation Christopher Soghoian, Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them, 6 Nw. J. Tech. & Intell. Prop. 46 (2007). https://scholarlycommons.law.northwestern.edu/njtip/vol6/iss1/3 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods.
    [Show full text]
  • The Basic Economics of Internet Infrastructure
    Journal of Economic Perspectives—Volume 34, Number 2—Spring 2020—Pages 192–214 The Basic Economics of Internet Infrastructure Shane Greenstein his internet barely existed in a commercial sense 25 years ago. In the mid- 1990s, when the data packets travelled to users over dial-up, the main internet T traffic consisted of email, file transfer, and a few web applications. For such content, users typically could tolerate delays. Of course, the internet today is a vast and interconnected system of software applications and computing devices, which society uses to exchange information and services to support business, shopping, and leisure. Not only does data traffic for streaming, video, and gaming applications comprise the majority of traffic for internet service providers and reach users primarily through broadband lines, but typically those users would not tolerate delays in these applica- tions (for usage statistics, see Nevo, Turner, and Williams 2016; McManus et al. 2018; Huston 2017). In recent years, the rise of smartphones and Wi-Fi access has supported growth of an enormous range of new businesses in the “sharing economy” (like, Uber, Lyft, and Airbnb), in mobile information services (like, social media, ticketing, and messaging), and in many other applications. More than 80 percent of US households own at least one smartphone, rising from virtually zero in 2007 (available at the Pew Research Center 2019 Mobile Fact Sheet). More than 86 percent of homes with access to broadband internet employ some form of Wi-Fi for accessing applications (Internet and Television Association 2018). It seems likely that standard procedures for GDP accounting underestimate the output of the internet, including the output affiliated with “free” goods and the restructuring of economic activity wrought by changes in the composition of firms who use advertising (for discussion, see Nakamura, Samuels, and Soloveichik ■ Shane Greenstein is the Martin Marshall Professor of Business Administration, Harvard Business School, Boston, Massachusetts.
    [Show full text]
  • Part 1: Practical Time Management Strategies. Tyler Hoffman // Digital Solutions Consultant the Vision
    Part 1: Practical Time Management Strategies. Tyler Hoffman // Digital Solutions Consultant The Vision. 2 The Vision: Essentialism. 3 The Vision: Essentialism. Removing “non-essentials”… • Non-essential tasks • Non-essential engagements • Non-essential information …to focus on what is essential: • “What can I and only I do, that if done well, will make a real difference?” 4 The Plan: Big Rocks First. 5 The Plan: Eat that Frog. Plan, Prioritize and Complete your most essential tasks first. “There is never enough time to do everything, but there is always enough time to do the most important thing. ” 6 The Tools. 7 Eat that Frog: Upgrade Your Key Skills “With practice , you can learn any behavior or develop any habit that you consider either desirable or necessary.” 8 Lynda.com Online, Self-Paced Learning • Video-based online learning for hundreds of topics • Free for CWRU faculty • Available for computer, smartphone and tablet → case.edu/utech/lynda 9 Unlocking CWRU Account. • help.case.edu à reset forgotten password • IT Service Desk à 216.368.HELP (4357) 10 Grammarly Improve Grammar and Spelling • Browser plug-in for checking grammar and spelling online • Improves document and email proofreading in Microsoft Office • Basic account is free → grammarly.com → Lynda.com training video 11 Grammarly Check Grammar and Spelling Online 12 Eat that Frog: Plan Every Day in Advance “The most sophisticated Outlook system , computer app, or time planner is based on the same principle . It is based on your sitting down and making a list of everything you have to do before you begin.” 13 Wunderlist Create a Better To-Do List • Create lists of tasks that sync across all of your devices • Set reminders and due dates • Create sub-tasks • Invite collaborators • “Add to Calendar” feature → wunderlist.com → Lynda.com training video 14 Wunderlist Create a Better To-Do List 15 Eat that Frog: Use the ABCDE Method A A task that will yield very positive or negative results if you fail to do it.
    [Show full text]
  • Agile Processes in Software Engineering and Extreme
    Juan Garbajosa · Xiaofeng Wang Ademar Aguiar (Eds.) Agile Processes in Software Engineering and Extreme Programming LNBIP 314 19th International Conference, XP 2018 Porto, Portugal, May 21–25, 2018 Proceedings Lecture Notes in Business Information Processing 314 Series Editors Wil M. P. van der Aalst RWTH Aachen University, Aachen, Germany John Mylopoulos University of Trento, Trento, Italy Michael Rosemann Queensland University of Technology, Brisbane, QLD, Australia Michael J. Shaw University of Illinois, Urbana-Champaign, IL, USA Clemens Szyperski Microsoft Research, Redmond, WA, USA More information about this series at http://www.springer.com/series/7911 Juan Garbajosa • Xiaofeng Wang Ademar Aguiar (Eds.) Agile Processes in Software Engineering and Extreme Programming 19th International Conference, XP 2018 Porto, Portugal, May 21–25, 2018 Proceedings Editors Juan Garbajosa Ademar Aguiar Technical University of Madrid University of Porto Madrid, Madrid Porto Spain Portugal Xiaofeng Wang Free University of Bozen-Bolzano Bolzano Italy ISSN 1865-1348 ISSN 1865-1356 (electronic) Lecture Notes in Business Information Processing ISBN 978-3-319-91601-9 ISBN 978-3-319-91602-6 (eBook) https://doi.org/10.1007/978-3-319-91602-6 Library of Congress Control Number: 2018944291 © The Editor(s) (if applicable) and The Author(s) 2018. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
    [Show full text]
  • TIP/Ix Utilities
    TIP/ix Utilities IP-617 December 2014 This edition applies to TIP/ix 2.5 and revision levels of TIP/ix 2.5 until otherwise indicated in a new edition. Publications can be requested from the address given below. Inglenet Business Solutions Inc reserves the right to modify or revise this document without notice. Except where a Software Usage Agreement has been executed, no contractual obligation between Inglenet Business Solutions Inc and the recipient is either expressed or implied. It is agreed and understood that the information contained herein is Proprietary and Confidential and that the recipient shall take all necessary precautions to ensure the confidentiality thereof. If you have a license agreement for TIP Studio or TIP/ix with Inglenet Business Solutions Inc, you may make copies of this documentation for internal use. Otherwise, you may not copy or transmit this document, in whole or in part, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of Inglenet Business Solutions Inc. Inglenet Business Solutions Inc Toll Free: 1-800-387-9391 Website: http://www.Inglenet.com Sales: [email protected] Help Desk: [email protected] TIP Studio, TIP/ix, and TIP/30, and are registered trade marks of Inglenet Business Solutions Inc: This documentation occasionally makes reference to the products of other corporations. These product names may be trade marks, registered or otherwise, or service marks of these corporations. Where this is the case, they are hereby acknowledged as such by Inglenet Business Solutions Inc. © Inglenet Business Solutions Inc, 1990-2014 TIP/ix Utility Programs Contents TIP/ix Utility Programs ................................................
    [Show full text]
  • Before the Federal Communications Commission Washington, D.C. 20554
    Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Implementation of Section 304 of the ) CS Docket No. 97-80 Telecommunications Act of 1996 ) ) Commercial Availability of Navigation Devices ) ) Compatibility Between Cable Systems and ) PS Docket No. 00-67 Consumer Electronics Equipment ) COMMENTS OF MICROSOFT CORPORATION Gerard J. Waldron Jodi M. Steiger Covington & Burling LLP 1201 Pennsylvania Avenue, N.W. Washington, DC 20004 (202) 662-6000 Its Counsel August 24, 2007 TABLE OF CONTENTS INTRODUCTION & SUMMARY ……………………………………………………………..1 I. MICROSOFT SUPPORTS THE GOALS OF SECTION 629 FOR ALL MVPDs........ 3 A. Rules Should Include the Personal Computer ............................................................... 4 B. Rules Should Attempt to Achieve Economic Viability for all Interested Parties ....... 5 II. THE COMMISSION’S RULES SHOULD PROMOTE RETAIL AVAILABILITY OF DEVICES BY PROMOTING NETWORK COMPETITION AND TAKING INTO ACCOUNT THE TECHNOLOGY BEING USED BY DIFFERENT MVPDs............................................................................................................................... 6 A. Network Competition Promotes Retail Availability...................................................... 6 B. The Commission’s Cable-Centric Navigation Device Rules Should Not Be Applied to Non-Cable MVPDs ....................................................................................................... 7 C. The CEA and NCTA Proposals Under Consideration Should Not Be Applied to IPTV................................................................................................................................
    [Show full text]
  • The AWK Pattern Processing Language
    000.book.fm Page 531 Wednesday, September 30, 2009 10:13 AM 12 The AWK Pattern Processing Language In This Chapter AWK12Chapter12 is a pattern-scanning and processing language that searches one or more files for records (usually lines) that Syntax . 532 match specified patterns. It processes lines by performing Arguments . 532 actions, such as writing the record to standard output or Options . 533 incrementing a counter, each time it finds a match. Unlike procedural languages, AWK is data driven: You describe the Patterns . 534 data you want to work with and tell AWK what to do with Actions. 535 the data once it finds it. Variables . 535 You can use AWK to generate reports or filter text. It works Functions. 536 equally well with numbers and text; when you mix the two, Associative Arrays. 538 AWK usually comes up with the right answer. The authors of AWK (Alfred V. Aho, Peter J. Weinberger, and Brian W. Control Structures . 539 Kernighan) designed the language to be easy to use. To Examples . 541 achieve this end they sacrificed execution speed in the origi- getline: Controlling Input . 558 nal implementation. Coprocess: Two-Way I/O. 560 Getting Input from a Network. 562 Copyright © 2010 Mark G. Sobell 531531 000.book.fm Page 532 Wednesday, September 30, 2009 10:13 AM 532 Chapter 12 The AWK Pattern Processing Language AWK takes many of its constructs from the C programming language. It includes the following features: • A flexible format • Conditional execution • Looping statements • Numeric variables • String variables • Regular expressions • Relational expressions •C’s printf • Coprocess execution (gawk only) • Network data exchange (gawk only) Syntax A gawk command line has the following syntax: gawk [options] [program] [file-list] gawk [options] –f program-file [file-list] The gawk utility takes its input from files you specify on the command line or from standard input.
    [Show full text]
  • Development of a Distributed Design System For
    DEVELOPMENT OF A DISTRIBUTED DESIGN SYSTEM FOR INTEGRATED CIRCUIT DESIGN USING VAX 1117 50 AND SCALDSYSTEM COMPUTERS A Thesf-s Presented to The FacuJ.ty of the Col.1.ege of Engineering and Technology Ohfo University In Partial. Ful.fi.l.lment of the Requttements for the Degree Master of Science Robert Stratton Nobl.es,, TI -4L March, 1986 ACKNOWLEDGEMENTS I wou1.d Iike to thank my advl.sor, Dr. Harold KJ.ock not only for his support of this thesi.~,but for his interest in and support of my graduate work altogether. My thanks to the members of my committee: Dr. Janusz Starzyk and Dr. Robert Curt!.s who helped to form my earliest interest in VLSI deslgn (whj.c.h launched this thesis), and t.o Dr. Israel Uri.el.1, for his interest and val.uab1.e sugges- t l.ons . I wou1.d also I.lke to express my appreci.at!.on here for the help given to me by my mother and father, who have al-ways belleved j.n me. And final.l.y, my deepest gratitude goes to my wife, Kfm, whose support has meant everything to me. TABLE OF CONTENTS Page ACKNOWLEDGEMENTS i LIST OF FIGURES CHAPTER 1 : INTRODUCTION CHAPTER 2: AN INTRODUCTION TO THE UNIX SYSTEM 2.1 A Short View of rhe Hi-story of UNIX 2.2 Conventions Used In Thfs Thesis 2.3 The UNIX File System 9 2.4 UNIX System I/O 2.5 The UNIX Command Intetpreter(SheJ.1.) CHAPTER 3: VAX AND SCALDSYSTEX DESIGN ENVIRONMENTS 17 3.1 SCALDsystem Resources 3.1.1 Hardware Resources 3.1.2 The 0peratJ.ng System and F3.l.e System Layouts 20 3.1.3 SCALDsystem Integrated Cj.rcuf.t Desi.gn Software 26 3.2 VAX System Resources 3.2.1 Hardware Resources 3.2.2 The Operating System and File System Layouts 35 3.2.3 Integrated Circuit Design Software 41 CHAPTER 4: VAX/SCALDSYSTEM COMMUNICATIONS 4 5 4.1 Communi.catj.ons Usi.ng the Tip Program 4 5 4.2 Ini.t.Sal.iz3.ng UNIX Terminal.
    [Show full text]
  • READS Training and Reference Manual 4
    W I S C O N S I N D E P A R T M E N T O F T R A N S P O R T A T I O N READS System Administrator: [email protected] (608) 266-9490 Updated December 11, 2019 READS is developed and maintained for WisDOT by BEM Systems Inc. http://bemsys.com/ Table of Contents READS New User Training READS Setup READS Launch Page 4 WAMS ID 5 READS Account Request 7 PC Settings 8 READS Email List 9 READS Overview Highlights 11 System Control and Conventions 12 Main Menu Overview 13 Project & Plat Basic Navigation 14 Assignments 17 Exercise 1 ‐ Projects, Plats, Assignments 19 Parcels, Participants & Interests Exercise 2 ‐ Parcels, Participants, Interests 24 Waiver of Appraisal and Offer Negotiation Diary 34 Legal Descriptions 36 Exercise 3 ‐ Nominal Valuation, Offer, Log 37 Appraisal and Offer Correctly Entering Remnants 42 Exercise 4 ‐ Appraisal Valuation, Offer 51 READS Log, Documents & Letters Electronic Records law 56 Save as PDF 58 READS Logs 60 Turn Off / On Word Document Protection 62 Documents and Letters 64 Exercise 5 ‐ Log 67 Payment Requests & E-Authorization 71 Exercise 6 ‐ Payment Request, E‐Authorization 73 Delegation Table 78 Relocation Relocation Documents and Letters 81 Adding Relocatees (residential, business, signs) 82 Assignments 88 Residential Owner Relocation Certificate of Legal Residency 89 90 Relocation Package Exercise 7 ‐ Residency Cert, Package Receipt, Letter 91 Comparables Exercise 8 ‐ Comparables, RHP, Comparison Chart, Summary 95 Relocation Assistance Diary 102 Relocation Claims Exercise 9 ‐ Relocation Claims 103 Individual Relocation Case Report 109 Exercise 10 ‐ Replacement, Case Report 111 Business Owner Relocation 118 Business Move Worksheet Reporting Reporting in READS 119 Exercise 11 ‐ Reporting 125 The READS Launch Page READS Only Works with Internet Explorer The READS Launch Page is here: https://wisconsindot.gov/Pages/doing-bus/eng-consultants/cnslt-rsrces/re/reads.aspx To find it on the Internet 1.
    [Show full text]