An access method is a function of a mainframe operating system that enables access to data on disk, tape or other external devices. They were introduced in 1963 in IBM OS/360 operating system. Access methods provide an API for programmers to transfer data to or from device, and could be compared to device drivers in non-mainframe operating systems.
Read more about Access Method: Reasons For Introducing Access Methods, Storage Access Methods, Networking Access Methods, IMS, Modern Implementations
Famous quotes containing the words access and/or method:
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)
“I have a new method of poetry. All you got to do is look over your notebooks ... or lay down on a couch, and think of anything that comes into your head, especially the miseries.... Then arrange in lines of two, three or four words each, dont bother about sentences, in sections of two, three or four lines each.”
—Allen Ginsberg (b. 1926)