Protection for Source Code and Programs
Your REXX programs and algorithms are assets that you want to protect.
The Compiler produces object code, which helps you protect these assets by
discouraging people from making unauthorized changes to your programs. You can
distribute your REXX programs in object code only.
Load modules can be further protected by using a security server, such as RACF.
Improved Productivity and Quality
The Compiler can produce source listings, cross-reference listings, and messages,
which help you more easily develop and maintain your REXX programs.
The Compiler identifies syntax errors in a program before you start testing it. You
can then focus on correcting errors in logic during testing with the REXX interpreter.
Portability of Compiled Programs
A REXX program compiled under MVS/ESA can run under CMS. Similarly, a REXX
program compiled under CMS can run under MVS/ESA.
SAA Compliance Checking
The Systems Application Architecture (SAA) definitions of software interfaces,
conventions, and protocols provide a framework for designing and developing
applications that are consistent within and across several operating systems.
The SAA Procedures Language is a subset of the REXX language supported by the
interpreter under TSO/E, and can be used in this operating environment.
To help you write programs for use in all SAA environments, the Compiler can
optionally check for SAA compliance. With this option in effect, a warning message
is issued for each non-SAA item found in a program.
For more information, see
IBM Compiler and Library for REXX/370; Introducing the
Next Step in REXX Programming
.
Benefits of Using a Compiler
6
z/OS V1R1.0 TSO/E REXX User’s Guide
Summary of Contents for TSO/E REXX
Page 1: ...z OS TSO E REXX User s Guide SA22 7791 00 ...
Page 2: ......
Page 3: ...z OS TSO E REXX User s Guide SA22 7791 00 ...
Page 10: ...viii z OS V1R1 0 TSO E REXX User s Guide ...
Page 12: ...x z OS V1R1 0 TSO E REXX User s Guide ...
Page 14: ...xii z OS V1R1 0 TSO E REXX User s Guide ...
Page 18: ...xvi z OS V1R1 0 TSO E REXX User s Guide ...
Page 20: ...2 z OS V1R1 0 TSO E REXX User s Guide ...
Page 58: ...Tracing Expressions with the TRACE Instruction 40 z OS V1R1 0 TSO E REXX User s Guide ...
Page 78: ...60 z OS V1R1 0 TSO E REXX User s Guide ...
Page 86: ...Built In Functions 68 z OS V1R1 0 TSO E REXX User s Guide ...
Page 128: ...Issuing Other Types of Commands from an Exec 110 z OS V1R1 0 TSO E REXX User s Guide ...
Page 136: ...Debugging Execs 118 z OS V1R1 0 TSO E REXX User s Guide ...
Page 170: ...Protecting Elements in the Data Stack 152 z OS V1R1 0 TSO E REXX User s Guide ...
Page 201: ...Part 3 Appendixes Copyright IBM Corp 1988 2001 183 ...
Page 202: ...184 z OS V1R1 0 TSO E REXX User s Guide ...
Page 222: ...Using Variables 204 z OS V1R1 0 TSO E REXX User s Guide ...
Page 226: ...208 z OS V1R1 0 TSO E REXX User s Guide ...
Page 238: ...220 z OS V1R1 0 TSO E REXX User s Guide ...
Page 241: ......