Ed Gould wrote:
[...]
What we did way back when when we did not have RACF was to put a password for
update on the master catalog. It worked effectively. We never told the operator
the password so either the operator replied incorrectly or no reply and the job
timed out on a 522.
Ed,
This is
Gabe,
I haven't answers to all questions, but I hope this helps:
- What's new since the z/Journal article ran and what did the article
miss?
For me, nothing changed.
- What's the good and bad news about today's mainframe education?
Good news: In the Netherlands education/training is still
when I run my exec REXX the error appears:
1 +++ ?
IRX0013I Error running BRAS, line 1: Invalid character in program
what is this??
An invalid character as the message says. The question mark suggests
that it may be an unprintable character from REXX' point of view.
--
Peter Hunkeler
Hi
We see a very high CPU usage by the XCFAS address space
We have a z9 S07 with integrated CF, and currently only one z/OS 1.9
running in the SYSPLEX
I have opened a PMR, and after a number of SMF, RMF, component trace
etc, etc still nobody have any idea.
As we have a test/development
Hi
Thank you for your answer.
The PMR list is very long with different traces dumps etc etc
If you need I can send you .
My primary question if it is a normal behavior or not.
It can easily happen, I made some serious mistakes during the SYSPLEX
setup , GRS definition or elsewhere.
I have
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Steve Comstock
[ snip ]
And it struck me, not for the first time, how training
can be a relatively inexpensive way to say to an emloyee,
we believe in you, we value you; we want you to stay
happy and productive;
OK, that wasn't entirely coherent. I meant, There are companies who
buy them to resell, and every now and then, someone NEEDS one.
On Tue, Oct 7, 2008 at 9:32 AM, P S [EMAIL PROTECTED] wrote:
There are folks who buy them. And every now and then, someone wants to
buy one. So it's A Good Thing if
Let me guess: you want to encrypt something and don't want to have to
modify application programs.
My question is how you would control who is authorized to use your hook?
And, of course, how do you plan to manage the keys and the changing
thereof.
-Original Message-
From: IBM
Gabe,
Based on customer demand we began offering basic SyncSort training
earlier this year. The response has been overwhelming. We are
struggling to keep up with demand which is a wonderful problem to have!
Our experience is that people are enthusiastically embracing the
training. They are
Yeah, mainframes are about as obsolete as telephones.
And by far not as obsolete as buzzword journalism.
--
Peter Hunkeler
Credit Suisse
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL
Miklos,
I have opened a PMR, and after a number of SMF, RMF, component trace
etc, etc still nobody have any idea.
What exactly did IBM ask for? What do the RMF reports show? How many requests
to which structures, how many requests to which XCF groups? Buffer sizes of XCF
groups? What's your
Hi,
first post!
I've noticed an odd behavior in how WLM selects the aliases being moved from
one UCB to another to decrease IOSQ time.
A few months ago, we converted a number of base addresses to aliases while
converting/migrating some storage-pools from model9 to model27. (we run on
an STK
Ron,
You may find the information on our website useful, particularly the RACF
newsletters, white papers, and presentations available via the RACF Center
page. You'll also find information about various RACF Users Group which
might be close by. Here is the url:
http://www.rshconsulting.com
Amen Peter
Scott Ford
Senior Systems Engineer
[p] 678.266.3399 x304[m] 609-346-0399 identityforge.com
This message is for the designated recipient only and may contain
privileged, proprietary, or otherwise private information. If you have
received it in error, please notify the
On Tue, 7 Oct 2008 08:25:09 -0400, P S wrote:
Or just replace the first line of the program with /**/ and you'll
know it's good (less scientific, but easier!).
Ummm. If the program was loaded from SYSPROC, this will cause it
to be treated as a CLIST rather than an EXEC, and the OP is not
likely
Thanks Terry
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of
Traylor, Terry
Sent: 06 October 2008 21:14
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: HSM DASD Backup volumes
We have a few small z/OS 1.9 images which have no tape access and use
HSM
Or just replace the first line of the program with /**/ and you'll
know it's good (less scientific, but easier!).
On Tue, Oct 7, 2008 at 7:59 AM, Lizette Koehler [EMAIL PROTECTED] wrote:
Under ISPF, edit your REXX using ISPF Picture Strings. Issue the command
on the command line:F P'.'
Troy Allen Cross wrote:
Anyway, I have around 100 IBM 3179 terminals that I need to dispose.
There are a number of users around there who still use them,
although the 3279 was heavier, but had more features. Try
posting a few on eBay, and put a notice in one or more Hercules
groups
Under ISPF, edit your REXX using ISPF Picture Strings. Issue the command
on the command line:F P'.'
If there is a hex character the upper Right Hand corner of your ISPF Edit
session should tell you what the character is. The Cursor should be on the
section of your code with the hex data in
In
[EMAIL PROTECTED],
on 09/25/2008
at 03:04 PM, Carroll, William [EMAIL PROTECTED] said:
I am not very versed in jes2. I can not seem to find any decent
information on the subject. All of the jes2 lines Defined in the shop
are half-duplex.
What kind of lines? What protocol? If you're
In [EMAIL PROTECTED], on 09/25/2008
at 09:39 AM, Paul Gilmartin [EMAIL PROTECTED] said:
Haven't the archaic constraints on ordering of overriding DD statements
been much relaxed in recent OS releases?
Not relaxed, just changed in such a way as to break existing JCL.
--
Shmuel (Seymour
In [EMAIL PROTECTED], on
09/24/2008
at 08:12 PM, Lindy Mayfield [EMAIL PROTECTED] said:
Two questions came to mind. I tried to think of another mainframe besides
IBM's. Only Sperry and Unisys came to mind. I had to look in wikipedia
to see if they still exist. I think so.
Unisys is a
IBM-MAIN list,
It's been a long time since I posted to this list.
I've been busy working with AIX and Oracle (SunGard Banner ERP) the last few
years.
Anyway, I have around 100 IBM 3179 terminals that I need to dispose.
Do they have any value? Museum!?!? ;-)
Or, should I just send them with
On Tue, 7 Oct 2008 08:59:48 -0400, David Boyes [EMAIL PROTECTED] wrote:
Date:Mon, 6 Oct 2008 10:54:44 -0500
From:Mark Zelden [EMAIL PROTECTED]
1) Where the devil do you set the buffer size for a NJE link in
JES2? I can't find it anywhere.
2) What's the maximum buffer size
Out sourcing to India ?
Lehman was part of this too and the executives yearly remuneration ?
The chairman of the committee held up a chart suggesting that Fuld's
personal remuneration totalled $480m (£276m) over eight years, including
payouts of $91m in 2001 and $89m in 2005.
Why do we not
There are folks who buy them. And every now and then, someone wants to
buy one. So it's A Good Thing if you can find someone to take 'em,
even for pennies.
On Tue, Oct 7, 2008 at 9:01 AM, Chase, John [EMAIL PROTECTED] wrote:
-Original Message-
From: IBM Mainframe Discussion List On
Do they have any value? Museum!?!? ;-)
Every computer museum or retrocomputing group I know of either has a
few, or does not want any.
Or, should I just send them with our old PC scrap to an IT scrap recycler?
Probably best to send the to the recycler. They will likely go to
China to be
Can you post the first 5 or 6 lines in a fixed pitch font like Courier?
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at
Most of the Major Newspapers are experiencing declining readership.
Their revenues are down.
Belo spun off The Dallas Morning News as it continues to lose money.
Perhaps the paper may be obsolete first.
( that is if the government doesn't come in and prop them up)
-Original
I have gone round and round with the manuals on this and I think I have
the answer, but I just want to check my findings with others who have
done similar things. These questions are for a normal z/OS
LE/COBOL/Assembler non-authorized batch application environment not
using Unix System Services
An auditor said it, so it must be true :-))
Just kidding.
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Ulrich Boche
Sent: Monday, October 06, 2008 10:17 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Digital Certificate Implementation TN3270
Look at the OBTAIN macro for DASD resident datasets.
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DGT2S341/1.3.2
You'll need to get the volser that the dataset is on. If you simply have a
DD, the RDJFCB will get the DSN. You'd then need to do a catalog lookup to
find the volser.
Farley, Peter x23353 wrote:
So, besides actually issuing an OPEN, is there any non-authorized
facility or service that would simply let me discover some basic file
attributes for an allocated DD?
You can use the OBTAIN macro (see DFSMSdfp Advanced Services) to read
the DSCB.
--
Richard
I have a pool of several SMS managed storage volumes that are out of, or
soon will be, DSCB's.
The ones that are 'USE ATTRIB of PRIV', I can move dsns and extend the
VTOC in place via batch job.
The ones that are 'USE ATTRIB of STOR', I cannot work with as I get this
message, 'ICK31025I VOLUME NOT
Farley, Peter x23353 wrote:
So, besides actually issuing an OPEN, is there any non-authorized
facility or service that would simply let me discover some basic file
attributes for an allocated DD?
Unless they've been discontinued lately, try the LOCATE and
CAMLST macros.
Gerhard Postpischil
Look at the OBTAIN macro for DASD resident datasets.
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DGT2S341/1.3.2
You'll need to get the volser that the dataset is on. If you simply have a
DD, the RDJFCB will get the DSN. You'd then need to do a catalog lookup to
find the
You might want to check out the SVC-99 Information Request parameters.
IIRC, you can point to a DD statement without opening the dataset.
Farley, Peter x23353 wrote:
I have gone round and round with the manuals on this and I think I have
the answer, but I just want to check my findings with
Anyone have a computer outage notification policy they might want to share with
me? I'm looking for wording in regards about who to notify, and when, when
various applications become unavailable (and I guess available too). Things
like after x hours of unavailability, notify CIO. After x
All,
A big THANK-YOU! to everyone who responded...I have a better understanding
now, but may have more questions as the project progresses!
Again, I can't thank all who responded enough!
Lucy Arnold
Storage Manager
U.C. Davis Medical Center
916-734-5498
Use attributes don't make any difference with an SMS managed volume. All of
our SMS managed volumes are USE PRIVATE. Works well. If you want to stop SMS
from allocating on a particular volume, you must mark the volume as DISNEW.
This is done with an operator command similar to:
V
Thanks John. Somehow I missed OBTAIN when I was browsing that manual.
RDJFCB with an X'13' EXLST entry will return the first few volume serial
numbers assigned to the dataset, so RDJFCB and OBTAIN would seem to be
the way to go.
-Original Message-
From: IBM Mainframe Discussion List
Thanks, I think that's what I'll be using.
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Richard Peurifoy
Sent: Tuesday, October 07, 2008 12:23 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Determining file attributes *before* OPEN
Thanks, but LOCATE/CAMLST only returns a volume list, not D(S)CB
attributes.
I can get the first few volumes from RDJFCB as well, along with the DSN,
and that's enough info to use OBTAIN (which I missed the first time
around) to get the DSCB.
-Original Message-
From: IBM Mainframe
I called myself looking at those parameters, but perhaps I missed
something. I will look again.
Thanks.
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Rick Fochtman
Sent: Tuesday, October 07, 2008 12:35 PM
To: IBM-MAIN@BAMA.UA.EDU
I am trying to find a working JES2 exit 52 that adds a card to the current JOB
card. I am not well-versed in JES2 exits and I have tried contacting some of
the local shops. Unfortunately, they either don't use such an exit or it
doesn't
do the routine I require.
Since I have joined this
Hey Claude,
All of our SMS volumes are mounted PRIVATE, including temporary storage. They
work just fine.
Linda Mooney
-- Original message --
From: Richbourg, Claude [EMAIL PROTECTED]
I have a pool of several SMS managed storage volumes that are out of, or
soon
HI all,
Can anyone say how to lock a PDS. All the members of my PDS are sensitive can I
lock them with password
Please help me.
Regards,
Ram Balaji.S
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send
Look in your Sample JES Library.
On Z/os 1.8 it is SYS1.SHASSAMP HASX52A
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Frank Martinez
Sent: Tuesday, October 07, 2008 12:09 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: JES2 Exit 52 Working Sample
I
Lindy Mayfield
This is a curious question...
-Original Message-
From: Lindy Mayfield [EMAIL PROTECTED]
To: IBM-MAIN@BAMA.UA.EDU
Sent: Tue, 7 Oct 2008 10:25 am
Subject: Re: PDS Lock
What utility is used to password protect a dataset? That's one thing
I've never seen in over 20
On Tue, 7 Oct 2008 13:24:24 -0400, Ram Balaji [EMAIL PROTECTED] wrote:
Hi David,
Iam not aware security packages... Is it possible to do it with JCLs... I
mean while creating the PDS itself can we we lock it...?
Regards,
Ram Balaji.S
Basically, no. If you have a security package, then that is
On Tue, 7 Oct 2008 12:31:08 -0500, Cebell, David [EMAIL PROTECTED] wrote:
It is difficult to imagine a shop without some type of security package.
That said,
You may want to look at the LABEL Parameter of the DD Statement.
Probably won't work anymore. It requires that a special dataset, named
Forgot to mention that my solution with the ADDSD only works on a RACF
protected system. I don't know Top Secret or ACF2.
--
John
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED]
On Tue, 7 Oct 2008 19:25:10 +0200, Lindy Mayfield
[EMAIL PROTECTED] wrote:
What utility is used to password protect a dataset? That's one thing
I've never seen in over 20 years.
The TSO PROTECT command updates the PASSWORD dataset. It is so old that I
doubt that any system actually uses it any
IBM treats CTC links as BSC, so you would set the NJE buffer size via
TPDEFBELOWBUF=(SIZE=).
For NJE over TCPIP JES2 just passes the data over to Comm Server,
so you need to work with those folks (and probably your networking people,
too.)
You will probably get better answers if you
In a message dated 10/7/2008 12:02:05 P.M. Central Daylight Time, [EMAIL
PROTECTED] writes:
Thanks, but LOCATE/CAMLST only returns a volume list, not D(S)CB
attributes.
I can get the first few volumes from RDJFCB as well, along with the DSN,
and that's enough info to use OBTAIN (which I
Lindy Mayfield wrote:
I would have never guessed passwords could still be used, but then I
went over to an ISPF edit screen and the password field is still there.
I've ignored it for so long I don't see it anymore.
I seem to remember that passwords aren't even checked anymore for sms
If you want all volume serial numbers use RDJFCB along with EXLST entry
X'13' (EXARL in IHAEXLST) retrieve allocation information instead of
entry X'07' (EXLRJFCB) and use IHAARL and IHAARA to map the ARL and ARA
returned (the JFCB is in ARAJFCB).
Dave Kreiss
-Original Message-
From: IBM
Hi all,
Is there any free?Mainframe(JCL,CICS) simulators available for desktop PC?
They say NEXUS terminal is free nut I cant find a working host name/ Ip address
for it...
Regards,
Ram Balaji.S.
(Dying Hard to explore Mainframes)
(IBM Mainframe Discussion List) wrote:
Get the DSN from the RDJFCB. Then get the volsers from either the RDJFCB or
the data returned via LOCATE. Plug each volser into the CAMLST that you use
with OBTAIN, then do the OBTAIN to read the DSCB for each volume. Or use the
volser from the
On Tue, 7 Oct 2008 06:55:27 +0200, Barbara Nitz wrote:
Dave,
a few questions:
1. Is your sysplex located fully on the box that was POR'd?
Barbara,
We're not a sysplex, so none of this applies. But that's an interesting
situation for those that are. Do you IPL in a specific order in a
I make it a point NOT to have a PASSWORD dataset on my sysres. I consulted at
a shiop a few years ago that had one, and it was a PITA, since they were
securing some datasets with password, and others using RACF, believe it or not.
Lindy Mayfield [EMAIL PROTECTED] 10/7/2008 1:58 PM
I would
On Tue, 7 Oct 2008 19:25:10 +0200, Lindy Mayfield
[EMAIL PROTECTED] wrote:
What utility is used to password protect a dataset? That's one thing
I've never seen in over 20 years.
The TSO PROTECT command (TSO HELP PROTECT). It is ignored on
RACF systems (and Top Secret) but still works on ACF2
Thanks to all who responded. I mounted them PRIVATE and expanded the
VTOC as much as I could.
Life is now good/better.
Regards,
Claude
Claude Richbourg
Florida Department of Corrections
z Systems Programmer
850-921-1383
--
For
On Tue, 7 Oct 2008 14:20:22 -0400, Ram Balaji [EMAIL PROTECTED] wrote:
Hi all,
Is there any free?Mainframe(JCL,CICS) simulators available for desktop PC?
They say NEXUS terminal is free nut I cant find a working host name/ Ip
address for it...
Regards,
Ram Balaji.S.
(Dying Hard to explore
On Tue, 7 Oct 2008 14:36:29 -0400, Scott Rowe [EMAIL PROTECTED] wrote:
I make it a point NOT to have a PASSWORD dataset on my sysres. I consulted
at a shiop a few years ago that had one, and it was a PITA, since they were
securing some datasets with password, and others using RACF, believe it or
On Tue, 7 Oct 2008 13:47:44 -0400, John Eells [EMAIL PROTECTED] wrote:
snip
(There's more...but nobody rational uses password protection any more.)
I know of 2 ACF2 shops that use them. I don't know about rational, but
when I asked why the sysprog told me he liked the extra prompt before
On Tue, 7 Oct 2008 13:50:21 -0500, Mark Zelden [EMAIL PROTECTED] wrote:
On Tue, 7 Oct 2008 14:36:29 -0400, Scott Rowe [EMAIL PROTECTED] wrote:
I make it a point NOT to have a PASSWORD dataset on my sysres. I consulted
at a shiop a few years ago that had one, and it was a PITA, since they were
Another possibility is to write a program to encrypt the PDS so that
no one else can make sense out of it.
Of course, anyone who looks at the PDS may think it is corrupted, and
delete it out from under you. :-)
--
For IBM-MAIN
POR? Why? AFAIK, the last three remaining reasons for a POR are: loss of
power, adding a new LPAR, and bringing up a box for the very first time.
I thought I heard that some relief in adding an LPAR is in the pipeline.
-Original Message-
From: IBM Mainframe Discussion List
IBM maintains a RACF home page at
www.ibm.com/servers/eserver/zseries/zos/racf/.
There are lots of links to presentations and other introductory
materials.
Clark
-Original Message-
From: Schwarz, Barry A [mailto:[EMAIL PROTECTED]
Sent: Monday, October 06, 2008 3:11 PM
Subject: Re: RACF
On Tue, 7 Oct 2008 14:06:28 EDT, IBM Mainframe Discussion List
[EMAIL PROTECTED] wrote:
... The only difference is which source (LOCATE or RDJFCB) will give you
the complete volser list, if either.
A complete list may not matter. For DSORG, RECFM, LRECL and BLKSIZE, the
first volume should be
snip
... how to protect my PDS ...
unsnip
If a SAF solution isn't available to the originator, I would suggest that
the originator look into a SCLM methodology since (s)he seems to be more
applications orientated. And if at 1.9, s(he) could use OMVS as the
repository and use ACL and UNIX
anyone using the parameter ? and suggestions on settings... experiences ?
--
Email Disclaimer
This E-mail contains confidential information belonging to the sender,
which may be legally privileged information. This
On Tue, 7 Oct 2008 15:32:16 -0400, Jack Kelly [EMAIL PROTECTED]
wrote:
snip
... how to protect my PDS ...
unsnip
If a SAF solution isn't available to the originator, I would suggest that
the originator look into a SCLM methodology since (s)he seems to be more
applications orientated. And if at
Hello all,
I'm trying to delete the following datasets:
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL *VSAM*
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.DATA OPSPR2
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.INDEX OPSPR2
For the first one a 'D'
I'm not sure that is completely true, I remember there being an issue, but I
don't remember the details. Not all datasets were protected by RACF (there
were no GROUPs or profiles for most HLQs), so that might have had something to
do with it.
Do you have a reference for PASSWORD protection
Try a DELETE NOSCRATCH on each component.
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Tuesday, October 07, 2008 3:22 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Help with deleting datasets which are not cataloged or don't
That makes sense, and matches the configuration I remember.
Walt Farrell [EMAIL PROTECTED] 10/7/2008 3:16 PM
On Tue, 7 Oct 2008 13:50:21 -0500, Mark Zelden [EMAIL PROTECTED] wrote:
On Tue, 7 Oct 2008 14:36:29 -0400, Scott Rowe [EMAIL PROTECTED] wrote:
I make it a point NOT to have a PASSWORD
This has been talked about numerous times, try the archives.
Easiest way is to recatalog the DSN and then delete it (hopefully no BCS
name issue) if you don't have one of the catalog products.
Jack Kelly
202-502-2390 (Office)
Thanks but this didn't do itJCL below...
//STEP01 EXEC PGM=IDCAMS
//SYSPRINT DD SYSOUT=*
DELETE -
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.INDEX -
NOSCRATCH -
DEL 'cluster name' NSCR
If that fails,
DEL 'component name' VVR FILE(DD1)
Where DD1 points to volume OPSPR2
HTH,
snip
I'm trying to delete the following datasets:
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL *VSAM*
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.DATA
And if your image has an OMVS segment, does that not
Imply that a Security package is present.
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of John McKown
Sent: Tuesday, October 07, 2008 3:07 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: PDS Lock
Could these datasets be catalogued/shared on another system? If so, and they
are unallocated and unwanted, then delete NOSCRATCH them from each system. On
the last system use the SCRATCH.
DELETE -
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL -
CLUSTER -
On Mon, 6 Oct 2008 21:45:45 -0400, Scott Ford [EMAIL PROTECTED] wrote:
If they are dead, I must be working on ghost machines..lol
PSI?
Of Edward Jaffe
From what I know, just the opposite is true. Mainframe revenues at
large ISVs subsidize their entire business -- including massive
Tried that also, No Go.
Jack Kelly [EMAIL PROTECTED] 10/7/2008 4:34 PM
This has been talked about numerous times, try the archives.
Easiest way is to recatalog the DSN and then delete it (hopefully no BCS
name issue) if you don't have one of the catalog products.
Jack Kelly
202-502-2390
On Tue, 7 Oct 2008 16:25:23 -0400, Scott Rowe [EMAIL PROTECTED] wrote:
Do you have a reference for PASSWORD protection being ignored?
Already posted by George Fogg.
http://bama.ua.edu/cgi-bin/wa?A2=ind0810L=ibm-mainD=1amp;O=DF=S=P=39162
But that conflicts with what Walt wrote (sort of).
Try again, this time use only NOSCRATCH.
And, as another poster pointed out, verify we are working in the catalog
we think we are working in.
If all that fails, let's take a look at the specific error message(s).
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL
I think somebody's trying to get a 'free' education!
First, the question about 'locking' a PDS, and not understanding the response
regarding a security package.
Now, this one.
Look it up, research the problem, then ask!
--Original Message--
From: Ram Balaji
Sender: IBM Mainframe
I assume the list below was cut and pasted from ISPF 3.4, in which case I can
not imagine how the first entry could not be cataloged, how else could it have
been displayed?
Howard Rifkind [EMAIL PROTECTED] 10/7/2008 4:22 PM
Hello all,
I'm trying to delete the following datasets:
Yes it was.
Here is the listing from a LISTCAT.
CLUSTER --- PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL
DATA --- PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.DATA
INDEX -- PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.INDEX
NONVSAM --- SCRIPT.R40.ADCFASM
If you do a TSO DELETE 'PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL'what R
eturn Reason Codes do you get back from IDCAMS.
Might provide some clue as to what's going on.
Cheers.Jason.
Howard Rifkind [EMAIL PROTECTED]
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
There is an entry there but that's all.
Howard Rifkind [EMAIL PROTECTED] 10/7/2008 5:57 PM
Yes it was.
Here is the listing from a LISTCAT.
CLUSTER --- PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL
DATA --- PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.DATA
INDEX --
Thanks but this didn't do itJCL below...
//STEP01 EXEC PGM=IDCAMS
//SYSPRINT DD SYSOUT=*
DELETE -
PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL.INDEX -
NOSCRATCH -
IDC3012I ENTRY PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL NOT FOUND+
IDC0551I ** ENTRY PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL NOT DELETED
IDC0014I LASTCC=8
IDC3009I ** VSAM CATALOG RETURN CODE IS 8 - REASON CODE IS IGG0CLEG-42
***
post of the initial lines
** * Top of Data
**
==MSG -Warning- The UNDO command is not available until you change
==MSG your edit profile using the command RECOVERY ON.
000710 /* REXX para mostrar o dia da semana que cai o
Perhaps it is in the wrong catalog?
Howard Rifkind wrote:
IDC3012I ENTRY PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL NOT FOUND+
IDC0551I ** ENTRY PDB.SYSPROG.TMON.LMCICS.V22.VTCECNTL NOT DELETED
IDC0014I LASTCC=8
IDC3009I ** VSAM CATALOG RETURN CODE
Ummm. If the program was loaded from SYSPROC, this will cause it
to be treated as a CLIST rather than an EXEC, and the OP is not
likely to know it's good.
Ah. That would be a TSO requirement -- that the first line have REXX
in it? If so, then my apologies. I use Rexx on other platforms.
You're right. I had jumped back and taken only a quick glance at the
original post in the thread, and I was fooled by the wrapping. The //*
comment line was the only line in my email copy that had anything out to
the right, but that was not the line to which the OP was referring. The
In
[EMAIL PROTECTED],
on 09/24/2008
at 11:22 PM, Ted MacNEIL [EMAIL PROTECTED] said:
More to the point, century year that is not a mod 400 year is not a leap
year.
Not quite, but the adjustment won't be in my lifetime.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position;
Hi Ram,
Do not get confused with all these technical discussions that you received but
lets start at the very beginning :
a) Are you a User , a Systems programmer or just a programmer
b) If you say sensitive data .. what do you mean by that
c) Who should be able to see this data ? ex. Only
1 - 100 of 115 matches
Mail list logo