An access method is a function of a mainframe operating system that enables access to data on disk, tape or other external devices. They were introduced in 1963 in IBM OS/360 operating system. Access methods provide an API for programmers to transfer data to or from device, and could be compared to device drivers in non-mainframe operating systems.
Read more about Access Method: Reasons For Introducing Access Methods, Storage Access Methods, Networking Access Methods, IMS, Modern Implementations
Famous quotes containing the words access and/or method:
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)
“The country needs and, unless I mistake its temper, the country demands bold, persistent experimentation. It is common sense to take a method and try it. If it fails, admit it frankly and try another. But above all, try something. The millions who are in want will not stand idly by silently forever while the things to satisfy their needs are within easy reach.”
—Franklin D. Roosevelt (18821945)