Re: Assembler program calling a 'C' program with mixed case long names

2010-01-04 Thread Steve Austin
Hello Dave,

I was hoping the pre-linker would resolve the long names I specified on
the call to the 8 byte upper case names to which it renames the target
routines, but it does not. To get around this I am using CHANGE
statements in the linkedit step.

I'm doing this in order to link the program into a PDS rather than a
PDSE.

Is there something I'm missing?


The pre-linker I'm using is EDCPRLNK.

Thanks

Steve 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Thomas David Rivers
Sent: 24 December 2009 15:37
To: IBM-MAIN@bama.ua.edu
Subject: Re: Assembler program calling a 'C' program with mixed case
long names

Steve Austin wrote:
 Thanks for all your responses. I am now fighting with the pre-linker;
it
 does not pick up the long mixed case names I specified using alias
 statements.
 
 Steve
 


Steve,

   When you say pick up - what do you mean?

   And, which pre-linker is this?

- Dave Rivers -


-- 
riv...@dignus.comWork: (919) 676-0847
Get your mainframe programming tools at http://www.dignus.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

-

This email has been scanned for all known viruses by the MessageLabs
Email
Security Service and the Macro 4 internal virus protection system.
.


- 
This email has been scanned for all known viruses by the MessageLabs Email
Security Service and the Macro 4 internal virus protection system.
. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Assembler program calling a 'C' program with mixed case long names

2010-01-04 Thread Steve Austin
Thanks

I should have explained that I'm using the pre-linker so that I can link
to a PDS.

Steve  

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of David Crayford
Sent: 25 December 2009 00:48
To: IBM-MAIN@bama.ua.edu
Subject: Re: Assembler program calling a 'C' program with mixed case
long names

You can't use the pre-linker with GOFF.

If I were you I would ditch the pre-linker. It's functionally stabalized

  and the binder does everything you need and more. Only use the 
pre-linker if you want to use load modules in a PDS.

Steve Austin wrote:
 Thanks for all your responses. I am now fighting with the pre-linker;
it
 does not pick up the long mixed case names I specified using alias
 statements.
 
 Steve
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of Binyamin Dissen
 Sent: 23 December 2009 18:45
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Assembler program calling a 'C' program with mixed case
 long names
 
 On Wed, 23 Dec 2009 15:55:12 - Steve Austin
 steve.aus...@macro4.com
 wrote:
 
 :Is it possible to persuade the assembler to create mixed case ESD
 names?
 :The GOFF option allows long names, but the ESD entries are upper
case.
 
 
 Look at the assembler ALIAS statement.
 
 --
 Binyamin Dissen bdis...@dissensoftware.com
 http://www.dissensoftware.com
 
 Director, Dissen Software, Bar  Grill - Israel
 
 
 Should you use the mailblocks package and expect a response from me,
 you should preauthorize the dissensoftware.com domain.
 
 I very rarely bother responding to challenge/response systems,
 especially those from irresponsible companies.
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 -


 This email has been scanned for all known viruses by the MessageLabs
 Email
 Security Service and the Macro 4 internal virus protection system.
 .


 
 -

 This email has been scanned for all known viruses by the MessageLabs
Email
 Security Service and the Macro 4 internal virus protection system.
 .

 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

-

This email has been scanned for all known viruses by the MessageLabs
Email
Security Service and the Macro 4 internal virus protection system.
.


- 
This email has been scanned for all known viruses by the MessageLabs Email
Security Service and the Macro 4 internal virus protection system.
. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Assembler program calling a 'C' program with mixed case long names

2010-01-04 Thread David Crayford

Steve Austin wrote:

Thanks

I should have explained that I'm using the pre-linker so that I can link
to a PDS.



Out of curiosity why are you tied to a PDS? You will get much better 
mileage from a PDSE. GOFF, XPLINK, programs  16MB and future features 
that will only be supported by PDSE program objects.


Steve  


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of David Crayford
Sent: 25 December 2009 00:48
To: IBM-MAIN@bama.ua.edu
Subject: Re: Assembler program calling a 'C' program with mixed case
long names

You can't use the pre-linker with GOFF.

If I were you I would ditch the pre-linker. It's functionally stabalized

  and the binder does everything you need and more. Only use the 
pre-linker if you want to use load modules in a PDS.


Steve Austin wrote:

Thanks for all your responses. I am now fighting with the pre-linker;

it

does not pick up the long mixed case names I specified using alias
statements.

Steve

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Binyamin Dissen
Sent: 23 December 2009 18:45
To: IBM-MAIN@bama.ua.edu
Subject: Re: Assembler program calling a 'C' program with mixed case
long names

On Wed, 23 Dec 2009 15:55:12 - Steve Austin
steve.aus...@macro4.com
wrote:

:Is it possible to persuade the assembler to create mixed case ESD
names?
:The GOFF option allows long names, but the ESD entries are upper

case.


Look at the assembler ALIAS statement.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

-




This email has been scanned for all known viruses by the MessageLabs
Email
Security Service and the Macro 4 internal virus protection system.
.




-



This email has been scanned for all known viruses by the MessageLabs

Email

Security Service and the Macro 4 internal virus protection system.
.



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

-

This email has been scanned for all known viruses by the MessageLabs
Email
Security Service and the Macro 4 internal virus protection system.
.


- 
This email has been scanned for all known viruses by the MessageLabs Email
Security Service and the Macro 4 internal virus protection system.
. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Assembler program calling a 'C' program with mixed case long names

2010-01-04 Thread Steve Austin
The code I am writing is a prototype, but it is intended that something
like it will be shipped to customers in time. 
I don't know that PDSE usage will be an issue to anyone, but experiece
suggests that someone will at least question the requirement, so for the
time being I'm avoiding using a PDSE.

Steve  

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of David Crayford
Sent: 04 January 2010 11:52
To: IBM-MAIN@bama.ua.edu
Subject: Re: Assembler program calling a 'C' program with mixed case
long names

Steve Austin wrote:
 Thanks
 
 I should have explained that I'm using the pre-linker so that I can
link
 to a PDS.
 

Out of curiosity why are you tied to a PDS? You will get much better 
mileage from a PDSE. GOFF, XPLINK, programs  16MB and future features 
that will only be supported by PDSE program objects.

 Steve  
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of David Crayford
 Sent: 25 December 2009 00:48
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Assembler program calling a 'C' program with mixed case
 long names
 
 You can't use the pre-linker with GOFF.
 
 If I were you I would ditch the pre-linker. It's functionally
stabalized
 
   and the binder does everything you need and more. Only use the 
 pre-linker if you want to use load modules in a PDS.
 
 Steve Austin wrote:
 Thanks for all your responses. I am now fighting with the pre-linker;
 it
 does not pick up the long mixed case names I specified using alias
 statements.

 Steve

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of Binyamin Dissen
 Sent: 23 December 2009 18:45
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Assembler program calling a 'C' program with mixed case
 long names

 On Wed, 23 Dec 2009 15:55:12 - Steve Austin
 steve.aus...@macro4.com
 wrote:

 :Is it possible to persuade the assembler to create mixed case ESD
 names?
 :The GOFF option allows long names, but the ESD entries are upper
 case.

 Look at the assembler ALIAS statement.

 --
 Binyamin Dissen bdis...@dissensoftware.com
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me,
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems,
 especially those from irresponsible companies.


--
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN
INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

 -



 This email has been scanned for all known viruses by the MessageLabs
 Email
 Security Service and the Macro 4 internal virus protection system.
 .



 -


 This email has been scanned for all known viruses by the MessageLabs
 Email
 Security Service and the Macro 4 internal virus protection system.
 .



--
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN
INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 -


 This email has been scanned for all known viruses by the MessageLabs
 Email
 Security Service and the Macro 4 internal virus protection system.
 .


 
 -

 This email has been scanned for all known viruses by the MessageLabs
Email
 Security Service and the Macro 4 internal virus protection system.
 .

 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN 

Re: ADCD CD

2010-01-04 Thread Jan MOEYERSONS
On Thu, 31 Dec 2009 13:31:44 -0600, David Logan 
loga3...@comcast.net wrote:

Since it is a development box, there hasn't been a lot of time given to
it.

IMHO, development is just as well a customer of systems as any other user...

So why not give them the attention they deserve?

Jantje.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ADCD CD

2010-01-04 Thread David Logan
It's a bit like being a beer company. We just don't have the budget for
mainframes. It's considered secondarily at best. One of the things on my
list is to create a quality backup system. I have to minimize DASD usage so
that I can find a backup solution that doesn't cost a fortune. That was (and
still is) a 1st quarter goal.

David Logan

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of Jan MOEYERSONS
Sent: Monday, January 04, 2010 5:33 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: ADCD CD

On Thu, 31 Dec 2009 13:31:44 -0600, David Logan 
loga3...@comcast.net wrote:

Since it is a development box, there hasn't been a lot of time given to
it.

IMHO, development is just as well a customer of systems as any other user...

So why not give them the attention they deserve?

Jantje.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Peter Relson
I'm still intrigued that the (undocumented) option's name
contains the substring 32G. 

Use2GTo32G: Satisfy this request for n 1M segments using storage in the 
range 2G to 32G.

At some release 64-bit LE moved the CAA and other control blocks from
starting at 4G to 32G. 

I suspect this isn't true. LE has no control whatsoever over the origin 
(address returned by IARV64) which determines the address at which its 
above-2G blocks are placed. But RSM's giving the range 2G to 32G to Java 
likely meant that when LE requested storage from IARV64, it no longer was 
given an address as low as 4G.

Peter Relson
z/OS Core Technology Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread McKown, John
One thing that, IMO, is keeping JCL in business is shear inertia. Too many 
times I've had people, especially programmers, resist doing any unnecessary 
clean up of JCL. IMO, all COND processing should be done with the new 
IF/ELSE/ENDIF construct. But I can't even get them to write new JCL using this, 
much less convert old JCL (It works and it's too much trouble to change, test, 
and run through change control.) They keep cutting and pasting old JCL into 
new JCL. The same with the newer constructs in COBOL. They like to cut and 
paste (supposedly) working code.

Relative to this is the internal control blocks created via JCL need to stay 
the same, or very similar. Why? We couldn't use the new if CA-11 doesn't 
support it. That is why we don't use UNIX and REXX stuff. CA-11 doesn't support 
restarting complex shell scripts or REXX programs. I guess doing that would 
require something akin to checkpoint restart for compiled programs. And who 
uses that???

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Clark Morris
 Sent: Sunday, January 03, 2010 9:28 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Why is JCL so bad was Re: Basic question on passing 
 JCL set symbol to proc
 
 On 3 Jan 2010 06:49:27 -0800, in bit.listserv.ibm-main you wrote:
snip
 
 JCL was designed for OS360 on a 256K real machine (the original design
 point for PCP was 64K).  In addition, I suspect that the design was
 done by engineers or mathematicians for whom not and and not or
 were familiar concepts.  Virtually all of the printers were upper case
 only and at least in my shop it was a struggle to get a printer that
 printed the special characters correctly (the 48 character train was
 adequate FSVO adequate).  Lower case was out of the question.  Memory
 and instruction cycles were at a premium.  Even on a 1 megabyte mod 65
 we were stingy about region sizes.  
 
 While I share your (Paul's) distaste for JCL, the crime is that IBM
 hasn't provided a clear migration path for at least new things to
 either REXX or one of the shells.  It also hasn't provided a migration
 path so that we could have longer member names, longer data set names
 and a generation data set facility for ESDS data sets.  We are stuck
 on software architecture that was designed for the limitations of the
 original 360's using work arounds and kludges.  It is for this reason
 that I am not optimistic about the long term viability of the z series
 and z/OS. 
 
 -- gil
 
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Edward Jaffe
 Sent: Friday, January 01, 2010 10:42 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: dead zone
 
 Steve Samson ssam...@dc.rr.com writes:
  The bar is a thick one, from 2g to 4g, sacrificed to avoid a
  somewhat unlikely compatibility exposure. Undisciplined use of the
  high-order bit in 31-bit addresses could have led to unexpected
  results. The thick bar avoids such a problem. Considering the vast
  magnitude of 64-bit virtual addresses, why should anyone care or do
  anything to circumvent the omitted address range?
  
 
 The z/OS RSM developers introduced functionality to allow Java to 
 acquire storage within the previously thick bar for 
 performance reasons.
 
 -- 
 Edward E Jaffe

Hum, that is very curious to me. But I guess it expands the 
available/addressable storage without switching from AMODE(31) to AMODE(64) and 
back. Java is a storage pig. And too much stuff in z/OS still requires 
AMODE(31) storage (like DCBs et al.)

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Binyamin Dissen
On Mon, 4 Jan 2010 07:26:15 -0600 McKown, John
john.mck...@healthmarkets.com wrote:

: -Original Message-
: From: IBM Mainframe Discussion List 
: [mailto:ibm-m...@bama.ua.edu] On Behalf Of Edward Jaffe
: Sent: Friday, January 01, 2010 10:42 AM
: To: IBM-MAIN@bama.ua.edu
: Subject: Re: dead zone
 
: Steve Samson ssam...@dc.rr.com writes:
:  The bar is a thick one, from 2g to 4g, sacrificed to avoid a
:  somewhat unlikely compatibility exposure. Undisciplined use of the
:  high-order bit in 31-bit addresses could have led to unexpected
:  results. The thick bar avoids such a problem. Considering the vast
:  magnitude of 64-bit virtual addresses, why should anyone care or do
:  anything to circumvent the omitted address range?
 
: The z/OS RSM developers introduced functionality to allow Java to 
: acquire storage within the previously thick bar for 
: performance reasons.

:Hum, that is very curious to me. But I guess it expands the 
available/addressable storage without switching from AMODE(31) to AMODE(64) and 
back. Java is a storage pig. And too much stuff in z/OS still requires 
AMODE(31) storage (like DCBs et al.)

The storage between 2g and 4g is NOT accessible in 31 bit mode.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen
 Sent: Monday, January 04, 2010 7:50 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: dead zone
 
snip
 :Hum, that is very curious to me. But I guess it expands the 
 available/addressable storage without switching from 
 AMODE(31) to AMODE(64) and back. Java is a storage pig. And 
 too much stuff in z/OS still requires AMODE(31) storage (like 
 DCBs et al.)
 
 The storage between 2g and 4g is NOT accessible in 31 bit mode.
 
 --
 Binyamin Dissen bdis...@dissensoftware.com

You're right! So, why bother and how does it improve performance? I guess we'll 
never know. It is likely proprietary. Another reason that z/OS is dying. IBM 
wants it to be as closed as software on the i. Tell the unwashed masses 
nothing. And make the vendors pay through the nose for that information. Lyrics 
money, money, MONEY. 

http://www.lyricsondemand.com/tvthemes/apprenticelyrics.html

Still brain dead from New Years, I guess.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 360 programs on a z/10

2010-01-04 Thread Howard Brazee
On 02 Jan 10 14:49:04 -0800, Charlie Gibbs cgi...@kltpzyxm.invalid
wrote:

At least there was a somewhat reasonable excuse.  At one PPOE I recall
that my boss and his boss would regularly spend $100 worth of time
arguing over a $10 item in the budget.

Sometimes that is a worthwhile investment, when we include the benefit
of getting them out of the workers' way.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 360 programs on a z/10

2010-01-04 Thread Howard Brazee
On Sun, 3 Jan 2010 18:50:35 -0800 (PST), hanco...@bbs.cpcn.com wrote:

Around 1971 the Bell System implemented a major rate reduction and
rate structure change.  All dialed direct calls became a minute
minimum instead of three minutes.  Weekend and late-night calls dialed
direct calls became quite cheap, as low as 5c a minute for short
distances.  This was a boon to college kids who were often up late at
night.  (If direct dialing wasn't available the rates still applied).

The competition of free long distance calls for cellular phones and
Internet phones hasn't yet finished this process.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Assembler program calling a 'C' program with mixed case long names

2010-01-04 Thread Charles Mills
I hear the same thing from customers: ooh, I don't like PDSE's.

(cf. John McKown's post this morning on why JCL continues to be so bad.)

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of Steve Austin
Sent: Monday, January 04, 2010 4:24 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Assembler program calling a 'C' program with mixed case long
names

The code I am writing is a prototype, but it is intended that something
like it will be shipped to customers in time. 
I don't know that PDSE usage will be an issue to anyone, but experiece
suggests that someone will at least question the requirement, so for the
time being I'm avoiding using a PDSE.

Steve  

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of David Crayford
Sent: 04 January 2010 11:52
To: IBM-MAIN@bama.ua.edu
Subject: Re: Assembler program calling a 'C' program with mixed case
long names

Steve Austin wrote:
 Thanks
 
 I should have explained that I'm using the pre-linker so that I can
link
 to a PDS.
 

Out of curiosity why are you tied to a PDS? You will get much better 
mileage from a PDSE. GOFF, XPLINK, programs  16MB and future features 
that will only be supported by PDSE program objects.

 Steve  
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of David Crayford
 Sent: 25 December 2009 00:48
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Assembler program calling a 'C' program with mixed case
 long names
 
 You can't use the pre-linker with GOFF.
 
 If I were you I would ditch the pre-linker. It's functionally
stabalized
 
   and the binder does everything you need and more. Only use the 
 pre-linker if you want to use load modules in a PDS.
 
 Steve Austin wrote:
 Thanks for all your responses. I am now fighting with the pre-linker;
 it
 does not pick up the long mixed case names I specified using alias
 statements.

 Steve

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of Binyamin Dissen
 Sent: 23 December 2009 18:45
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Assembler program calling a 'C' program with mixed case
 long names

 On Wed, 23 Dec 2009 15:55:12 - Steve Austin
 steve.aus...@macro4.com
 wrote:

 :Is it possible to persuade the assembler to create mixed case ESD
 names?
 :The GOFF option allows long names, but the ESD entries are upper
 case.

 Look at the assembler ALIAS statement.

 --
 Binyamin Dissen bdis...@dissensoftware.com
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me,
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems,
 especially those from irresponsible companies.


--
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN
INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

 -



 This email has been scanned for all known viruses by the MessageLabs
 Email
 Security Service and the Macro 4 internal virus protection system.
 .



 -


 This email has been scanned for all known viruses by the MessageLabs
 Email
 Security Service and the Macro 4 internal virus protection system.
 .



--
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN
INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 -


 This email has been scanned for all known viruses by the MessageLabs
 Email
 Security Service and the Macro 4 internal virus protection system.
 .


 
 -

 This email has been scanned for all known viruses by the MessageLabs
Email
 Security Service and the Macro 4 internal virus protection system.
 .

 
 

Re: 360 programs on a z/10

2010-01-04 Thread Howard Brazee
On 3 Jan 2010 10:27:51 GMT, Huge h...@nowhere.much.invalid wrote:

When I worked for Xerox, my boss made an international telephone call to
query a 20c discrepancy on my expenses.

When I worked for EDS, I got called up because my meal expenses were
whole dollar amounts.We were expected to calculate tips to the
penny instead of rounding them.Who does that?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Bookshelves under BookMangler

2010-01-04 Thread Paul Gilmartin
On Sun, 3 Jan 2010 21:09:47 -0800, Charles Mills wrote:

Does this
 http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/dz9zr002/B.0
work for you? (Watch out for the fold.)

It is kinda stale:

Title: z/Architecture Principles of Operation
Document Number: SA22-7832-02
Build Date: 04/24/03 14:06:49 Build Version: 1.3.0 of BUILD/VM Version: 
UG03921
DropDate: Tuesday, October 2, 2001

IBM seems determined to drop HTML support for at least this manual.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of Rick Fochtman
Sent: Sunday, January 03, 2010 7:20 PM

Can someone out there point me to what bookshelf contains the PoPs
manual? All I've been able to find is a PDF and I need the instruction
tables from Appendix B in an editable format.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 360 programs on a z/10

2010-01-04 Thread Howard Brazee
On Sun, 03 Jan 2010 20:29:41 -0700, Joe Pfeiffer
pfeif...@cs.nmsu.edu wrote:

 Note that both Patton and Montgomery agreed that the best approach was
 a spearhead across Europe into Germany.  They disagreed on who should
 lead it, each wanted to be the sole leader of the action.  Eisenhower
 overruled both and ordered a broad approach.  Was Eisenhower or Patton
 correct?  Again, Hindsight is 20/20.

And we do know that Eisenhower was correct enough.  And that's what
really counts.

Unless we were one of the casualties who might have been better off
with a better way.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 360 programs on a z/10

2010-01-04 Thread Howard Brazee
On Mon, 04 Jan 2010 06:02:41 -0500, Anne  Lynn Wheeler
l...@garlic.com wrote:

one of boyd's stories about ww2 ... was US running ww2 on mass hordes,
overwhelming resources, and logistics (because it didn't people to run
it based on skills). one example he used was sherman tank that was
significantly overmatched ... but US could produce them at ten times the
rate of german tanks ... and so could win via attrition (modulo issue
with morale among tank crews that were being used as cannon fodder).

Even more important than out-tanking the enemy was out-Jeeping them. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Seymour's signature

2010-01-04 Thread Shmuel Metz (Seymour J.)
In 003901ca8bd0$35157ea0$9f407b...@org, on 01/02/2010
   at 09:22 AM, Charles Mills charl...@mcn.org said:

New decade; time for a new signature.

Yes, and as soon as Congress changes the law I will change my sig to match
:-(
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CAPS Fantasia (was: argv for z/OS C++ batch)

2010-01-04 Thread Shmuel Metz (Seymour J.)
In 201001022133.o02lxeva031...@imr-mb02.mx.aol.com, on 01/02/2010
   at 02:33 PM, Paul Gilmartin paulgboul...@aim.com said:

Are you suggesting that diacritical marks should be
considered embellishments, lacking semantic significance?

I suspect that he's suggesting transforming to a locale-dependent
canonical form for sorting.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CAPS Fantasia (was: argv for z/OS C++ batch)

2010-01-04 Thread Shmuel Metz (Seymour J.)
In listserv%201001011741487253.0...@bama.ua.edu, on 01/01/2010
   at 05:41 PM, Paul Gilmartin paulgboul...@aim.com said:

So, in some environments, font sensitivity is with us;

ITYM code-page sensitivity, and if we ever switch to Unicode[1] then that
issue should disappear as well.

(OS X and OSol both appear to have used UTF-8. 

In which case your Russian file names should be rendered properly without
font sensitivity.

[1] Raw, e.g., UCS-4, or with a transform, e.g., UTF-8
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Shmuel Metz (Seymour J.)
In listserv%201001030048166875.0...@bama.ua.edu, on 01/03/2010
   at 12:48 AM, Paul Gilmartin paulgboul...@aim.com said:

Your problem in this instance is that JCL makes the colossal design
blunder of interpreting metacharacters _after_
symbol substitution.  Rexx, for example, knows better.

There are two ways to design syntax for symbol substitution; expressions
and interpolation. Rexx uses the former, and has no need to recognize
metacharacters inside quoted strings, other than recognizing doubled
framing characters. JCL, like BASH, CLIST, Perl and Script, uses
interpolation. Each approach has advantages and disadvantages.

The blunders in JCL, IMHO, are not in the design but in implementation
details, e.g., the default for SPACE=.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Seymour's signature

2010-01-04 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Shmuel Metz (Seymour
J.)
 
 In 003901ca8bd0$35157ea0$9f407b...@org, on 01/02/2010
at 09:22 AM, Charles Mills charl...@mcn.org said:
 
 New decade; time for a new signature.
 
 Yes, and as soon as Congress changes the law I will change my sig to
match
 :-(

I certainly wouldn't hold my breath waiting for any such change.  :-(

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VSAM LSR

2010-01-04 Thread John Kington
Paul,

I have an application that has several VSAM datasets.
These datasets currently use NSR (Non Shared Resources).

The Application is written in assembler.
I want to switch some of the Files to use LSR.
If two files share a buffer pool do I need to concern my self with
the contents of the buffer pool or is the Access Method handling that.

In other words If I issue a VSAM GET for File A, is VSAM managing the contents 
of the LSR buffer pool with respect to the two files that may or may nor have 
records in the buffer pool ?

Do I need to use any additional Assembler VSAM macros to manage the
contents of the buffer pool ?
 
I believe someone else mentioned batch LSR but you could use system managed 
buffering if the vsam datasets are SMS managed. It would be even less work than 
implementing batch LSR. My testing showed very good results such that I would 
problably not bother to setup LSR in an assembler program again.

Regards,
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Seymour's signature

2010-01-04 Thread Tom Marchant
On Fri, 1 Jan 2010 21:45:42 -0800, David Alcock wrote:

Every year I hope in vain that he changes his email signature...

Ted's is much worse, IMO.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Mark Zelden
On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com wrote:

   I was told that compressed pointers for storage below 32GB fit
into a smaller space, so more compressed pointers fit in a cache
line, leading to more effective cache utilization.  Performance is
all about the caches these days.  I am not a Java person.  I don't
know what a compressed pointer is.


From what (I think) I understand / remember from what I heard
at SHARE, it is addresses of large object pages.  And since they are
in 1M increments / boundaries, the lower 3 bytes aren't needed as
long as the thing that needs those addresses understands what
they are.  (So obviously you need z/OS 1.9 or above and a z10
with large page support turned on take advantage of this new function). 

  I'm still intrigued that the (undocumented) option's name
  contains the substring 32G.  Is 32GiB the size of a particular
  granule in 64-bit storage management?  Or might the 32 refer
  to a fictitious 32-bit addressing capability?



How many 32bit pointers can fit in 30G?  I think 4026531840  - which
would represent 3840T of virtual storage (if my math is correct  - which
it probably isn't). I'm getting dizzy thinking about these large numbers.


  The range from 2GB to 32GB is set aside for a particular intended
user, which is the JVM.



On Mon, 4 Jan 2010 07:58:37 -0600, McKown, John
john.mck...@healthmarkets.com wrote:



 The storage between 2g and 4g is NOT accessible in 31 bit mode.


You're right! So, why bother and how does it improve performance? I guess
we'll never know. It is likely proprietary.

Since it was talked about at SHARE, I don't think it's proprietary.  It's
just not GUPI.

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Tom Marchant
On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com wrote:

   I was told that compressed pointers for storage below 32GB fit
into a smaller space, so more compressed pointers fit in a cache
line, leading to more effective cache utilization.  Performance is
all about the caches these days.  I am not a Java person.  I don't
know what a compressed pointer is.


Just a wild guess.  If all pointers are to storage on a doubleword boundary,
the address can be shifted right three bits.  Then you can point to any
doubleword below 32 GB using an unsigned 32-bit address.  How that might
help performance is a mystery to me.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: argv for z/OS C++ batch

2010-01-04 Thread Thomas David Rivers

You can do precisely this with the Dignus Systems/C++ compiler
and our Direct CALL environment.

   - Dave Rivers -


Charles Mills wrote:


Sam -

Thanks and thanks.

I'm trying to write a C++ program that will allow standard z/OS utility
linkage. It wants to look as much as possible like other programs that
expect a parm 1 and a parm 2 passed via R1 - words 0 and 1.

I can do whatever I want on the C++ side but I would like the caller to be
able to use standard linkage.

The C++ program is big and involved and I really can't afford to give up the
C/C++ library.

I just ran an experiment and determined two things:

1. The C++ program can be loaded via standard assembler macros absent any
CEE routines with no problems. I used LINKMVS from Rexx because it was easy
to do.

2. However ... argv[0] = the C program's name; argv[1] = the first parameter
passed on LINKMVS; the second parameter was nowhere to be found. This is a
problem.

I see writing an assembler stub to get control first, establish the LE
environment, and then call the C++ main (or a pseudo- main), passing the
two arguments somehow, probably as a list passed as argv[1]. 


Does anyone know an easier way? Seems like a pretty obvious need: write a
C++ program that starts up with standard z/OS
multiple-parameter-pointers-pointed-to-by-R1 linkage.

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of Sam Siegel
Sent: Saturday, December 26, 2009 4:55 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: argv for z/OS C++ batch

Charles,

The other option you have is to look at METAL C or system C.  Or a third
party compiler.

Regards,
Sam

On Sat, Dec 26, 2009 at 9:14 PM, Charles Mills charl...@mcn.org wrote:

 


Trying to figure out this subject.



The C/C++ Language Reference on p. 207 says Under z/OS batch . argv[0]
Returns the program name in uppercase argv[1 to n] Returns the arguments
   


as
 


you enter them. Not the most useful documentation - I don't think as you
enter them is terribly clear as it pertains to z/OS batch.



The C/C++ User's Guide on p. 70 says When NOARGPARSE is in effect,
arguments on the invocation line are not parsed, argc has a value of 2,
   


and
 


argv contains a pointer to the string.



Question: Does anyone know if a NOARGPARSE C++ program called via LINK or
ATTACH would receive parm 2 - the second word pointed to by R1 - anywhere?
Is there a recommended way to do this?



What I'd like to end up with is a C program that did me no favors - if
invoked from JCL EXEC, then argv[1] would point to the PARM= string if any
(as is) and if called via LINK or ATTACH would get the vector pointed to
by the caller's R1 as argv[1, 2, 3 .].
   



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
 




--
riv...@dignus.comWork: (919) 676-0847
Get your mainframe programming tools at http://www.dignus.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Paul Gilmartin
On Mon, 4 Jan 2010 09:27:48 -0600, Mark Zelden wrote:

How many 32bit pointers can fit in 30G?  I think 4026531840  - which
would represent 3840T of virtual storage (if my math is correct  - which
it probably isn't). I'm getting dizzy thinking about these large numbers.

Well, 32768 1MiB pages fit below 32GiB, so those can be identified by
15-bit pointers (reserving 1 bit for ?).  I surmise this allows
compaction of the page table by a factor of 2.

I'd say abbreviated rather than compressed.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 360 programs on a z/10

2010-01-04 Thread Howard Brazee
On Mon, 04 Jan 2010 09:18:21 -0500, jmfbahciv jmfbah...@aol wrote:

 Note that both Patton and Montgomery agreed that the best approach was
 a spearhead across Europe into Germany.  They disagreed on who should
 lead it, each wanted to be the sole leader of the action.  Eisenhower
 overruled both and ordered a broad approach.  Was Eisenhower or Patton
 correct?  Again, Hindsight is 20/20.

 And we do know that Eisenhower was correct enough.  And that's what
 really counts.
 
 Is it really enough??? If *many* more lives could have been saved by 
 doing things a different way and *still* succeeding... would that *not* 
 have been better???
 

You are unbelievable.  Do you really wish that Europe dithered until
after Germany had the atomic bomb?

He implied nothing of the kind. The question was - if, say, Patton
and Montgomery were right, that the war could have been won quicker
with fewer casualties - wouldn't that have been better?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


OT: World War 2

2010-01-04 Thread Chase, John
Subject line changed.

-jc-

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Howard Brazee
 Sent: Monday, January 04, 2010 9:53 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: 360 programs on a z/10
 
 On Mon, 04 Jan 2010 09:18:21 -0500, jmfbahciv jmfbah...@aol wrote:
 
  Note that both Patton and Montgomery agreed that the best
approach was
  a spearhead across Europe into Germany.  They disagreed on who
should
  lead it, each wanted to be the sole leader of the action.
Eisenhower
  overruled both and ordered a broad approach.  Was Eisenhower or
Patton
  correct?  Again, Hindsight is 20/20.
 
  And we do know that Eisenhower was correct enough.  And that's
what
  really counts.
 
  Is it really enough??? If *many* more lives could have been saved
by
  doing things a different way and *still* succeeding... would that
*not*
  have been better???
 
 
 You are unbelievable.  Do you really wish that Europe dithered until
 after Germany had the atomic bomb?
 
 He implied nothing of the kind. The question was - if, say, Patton
 and Montgomery were right, that the war could have been won quicker
 with fewer casualties - wouldn't that have been better?
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: OT: World War 2

2010-01-04 Thread Ed Finnell
 
In a message dated 1/4/2010 10:05:14 A.M. Central Standard Time,  
jch...@ussco.com writes:

Subject line changed
 

Thankfully, get back on track some of early computers  were used for 
calculating artillery
trajectories. Remember at coffee break Admiral Hopper  told us, Nimitz 
figured out U-Boats were
being deployed in 'optimal coverage patterns'. So guess  where you send the 
 destroyers?


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad?

2010-01-04 Thread john gilmore
About JCL, Paul Gilmartin wrote:

 

 . . . Its objectives make JCL more like a macro processor than a  programming 
language, but it failed to incorporate much of the current assembler's macro 
processing capability, and neither JCL nor HLASM conditional assembly has 
graceful branching nor [sic] clean iteration.

 

Statements of this sort are and should be constitutionally protected, but this 
one is without much redeeming technical merit.

 

JCL has been criticized by those who have not mastered it since the time of OS 
PCP.  Its syntax, borrowed from that of then current assemblers, is said to be 
difficult to learn, for reasons that I have never understood; but it is not 
indefensible.  In particular, it is more powerful than the alternatives to it 
that I have seen.

 

He begins here by attempting to distinguish a macro processor and a programming 
language, implying it would seem that a macro processor is not a programming 
language; but he then proceeds immediately to criticize, a little 
ungrammatically but unambiguously enough, both JCL and the HLASM as lacking two 
of the important attributes of programming languages, viz., graceful 
branching and clean iteration.  Now grace and cleanliness are in the eyes of 
their beholders.  Consider

 

|baid   setc  'macname'.'__boolean_array__'  
|  gblb  (baid)(1) 
|nbae  seta  n'(baid) 
|iseta  0
|.reiz_loop anop
|iseta  i+1
|eoasetb  (i gt nbae)
|   aif   (eola).reiz_lend
|(baid)(i) setb 0 
|   ago  .reiz_loop 
|.reiz_lend anop

 

This HLASM macro-language statement group resets the elements of an array of 
created global binary/boolean set symbols to their default value, boolean 0.  
Someone unfamiliar with the HLASM macro language would find it unintelligible; 
and there is a familiar, now tedious perspective from which it is judged 
long-winded and/or detail-ridden; but there is nothing unclean about it.

 

Examples of this sort could be proliferated ad infinitum et nauseam, but they 
would not persuade Mr. Gilmartin to my views, and that is as well.

 

What distresses me about these views is not their substance, with which I 
expect usually to disagree.  It is his perspective.   He judges that his needs, 
which I often judge to be whims, should be satisfiable all but immediately, 
without much programming, by a tool that he is using and that the machinery 
employed to do so should conform to his particular, municipal notions of 
cleanliness and grace.

  

These requirements ensure that he will always be dissatisfied with every tool 
he uses that was designed and implemented by others.  We are all creatures of 
our own very different experiences.

John Gilmore Ashland, MA 01721-1817 USA


  
_
Hotmail: Trusted email with powerful SPAM protection.
http://clk.atdmt.com/GBL/go/177141665/direct/01/
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


hfs VS zfs

2010-01-04 Thread Ward, Mike S
Hello all, we are planning to migrate from z/os 1.7 to 1.11. In our
planning we are trying to decide if we want to go to zfs instead of the
hfs. Is there anyone out there that can think of any good reasons not to
go to zfs when we do our upgrade?
==
This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to which they are
addressed. If you have received this email in error please notify the
system manager. This message contains confidential information and is
intended only for the individual named. If you are not the named
addressee you should not disseminate, distribute or copy this e-mail.
Please notify the sender immediately by e-mail if you have received
this e-mail by mistake and delete this e-mail from your system. If you
are not the intended recipient you are notified that disclosing, copying,
distributing or taking any action in reliance on the contents of this
information is strictly prohibited.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad?

2010-01-04 Thread Charles Mills
Are you saying JCL is not so bad?

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of john gilmore
Sent: Monday, January 04, 2010 8:30 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Why is JCL so bad?

About JCL, Paul Gilmartin wrote:

 

 . . . Its objectives make JCL more like a macro processor than a
programming language, but it failed to incorporate much of the current
assembler's macro processing capability, and neither JCL nor HLASM
conditional assembly has graceful branching nor [sic] clean iteration.

 

Statements of this sort are and should be constitutionally protected, but
this one is without much redeeming technical merit.

 

JCL has been criticized by those who have not mastered it since the time of
OS PCP.  Its syntax, borrowed from that of then current assemblers, is said
to be difficult to learn, for reasons that I have never understood; but it
is not indefensible.  In particular, it is more powerful than the
alternatives to it that I have seen.

 

He begins here by attempting to distinguish a macro processor and a
programming language, implying it would seem that a macro processor is not a
programming language; but he then proceeds immediately to criticize, a
little ungrammatically but unambiguously enough, both JCL and the HLASM as
lacking two of the important attributes of programming languages, viz.,
graceful branching and clean iteration.  Now grace and cleanliness are
in the eyes of their beholders.  Consider

 

|baid   setc  'macname'.'__boolean_array__'  
|  gblb  (baid)(1) 
|nbae  seta  n'(baid) 
|iseta  0
|.reiz_loop anop
|iseta  i+1
|eoasetb  (i gt nbae)
|   aif   (eola).reiz_lend
|(baid)(i) setb 0 
|   ago  .reiz_loop 
|.reiz_lend anop

 

This HLASM macro-language statement group resets the elements of an array of
created global binary/boolean set symbols to their default value, boolean 0.
Someone unfamiliar with the HLASM macro language would find it
unintelligible; and there is a familiar, now tedious perspective from which
it is judged long-winded and/or detail-ridden; but there is nothing unclean
about it.

 

Examples of this sort could be proliferated ad infinitum et nauseam, but
they would not persuade Mr. Gilmartin to my views, and that is as well.

 

What distresses me about these views is not their substance, with which I
expect usually to disagree.  It is his perspective.   He judges that his
needs, which I often judge to be whims, should be satisfiable all but
immediately, without much programming, by a tool that he is using and that
the machinery employed to do so should conform to his particular, municipal
notions of cleanliness and grace.

  

These requirements ensure that he will always be dissatisfied with every
tool he uses that was designed and implemented by others.  We are all
creatures of our own very different experiences.

John Gilmore Ashland, MA 01721-1817 USA


  
_
Hotmail: Trusted email with powerful SPAM protection.
http://clk.atdmt.com/GBL/go/177141665/direct/01/
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


LE Task termination ECB

2010-01-04 Thread Saravanan J
Is there a way to get LE user abends U4083/U4082 in an ECB?

My application is this, I have an Assembler program (Non-LE). This attaches a 
C++ pgm (LE). When I run with heapchk(on) I get U4082 abend. The problem 
here is the C++ task doesnt get ended as the U4042 return code is not 
present in the ECB. Each time I have to manually cancel the job.
Thanks in advance

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Scott Rowe
IIRC, this is the type of thing they are doing, and as Jim mentioned: it 
improves performance because more pointers fit in a cache line,
and therefor use less cache.  With today's processor designs, using cache 
effectively can have huge performance benefits.
 

 Tom Marchant m42tom-ibmm...@yahoo.com 1/4/2010 10:45 AM 
On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com wrote:

   I was told that compressed pointers for storage below 32GB fit
into a smaller space, so more compressed pointers fit in a cache
line, leading to more effective cache utilization.  Performance is
all about the caches these days.  I am not a Java person.  I don't
know what a compressed pointer is.


Just a wild guess.  If all pointers are to storage on a doubleword boundary,
the address can be shifted right three bits.  Then you can point to any
doubleword below 32 GB using an unsigned 32-bit address.  How that might
help performance is a mystery to me.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 



CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains 
confidential and privileged information intended only for the addressee.  If 
you are not the intended recipient, please be advised that you have received 
this material in error and that any forwarding, copying, printing, 
distribution, use or disclosure of the material is strictly prohibited.  If you 
have received this material in error, please (i) do not read it, (ii) reply to 
the sender that you received the message in error, and (iii) erase or destroy 
the material. Emails are not secure and can be intercepted, amended, lost or 
destroyed, or contain viruses. You are deemed to have accepted these risks if 
you communicate with us by email. Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Anne Lynn Wheeler
scott.r...@joann.com (Scott Rowe) writes:
 Just a wild guess.  If all pointers are to storage on a doubleword boundary,
 the address can be shifted right three bits.  Then you can point to any
 doubleword below 32 GB using an unsigned 32-bit address.  How that might
 help performance is a mystery to me.

don't laugh, I've actually done that for an application ... which
involves huge number of pointers (significantly reduced storage required
before needing to roll over to 64-bit pointers).

-- 
40+yrs virtualization experience (since Jan68), online at home since Mar1970

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM BCDS is going larger

2010-01-04 Thread af dc
Hi Dave and Lizette,
I did another BCDS cds reorg last sunday, now it has:

STATISTICS
  REC-TOTAL4650469 SPLITS-CI--0
  REC-DELETED0 SPLITS-CA--0
  REC-INSERTED---0 FREESPACE-%CI--0
  REC-UPDATED0 FREESPACE-%CA--0
  REC-RETRIEVED---16310129 FREESPC---2024644608
ALLOCATION
  SPACE-TYPE--CYLINDER HI-A-RBA--3428352000
  SPACE-PRI---4650 HI-U-RBA--1403781120
  SPACE-SEC--0

ARC0148I BCDS TOTAL SPACE=3348000 K-BYTES, CURRENTLY 422
ARC0148I (CONT.) ABOUT 67% FULL, WARNING THRESHOLD=80%, TOTAL
ARC0148I (CONT.) FREESPACE=59%, EA=NO, CANDIDATE VOLUMES=0

Besides of runing every day, EXPIREBV job:
  HSEND  WAIT EXPIREBV EXECUTE SYSOUT(J)

I checked backup log and saw this:
  DFSMSHSM BACKUP LOG, TIME 19:03:20,  DATE 10/01/03
 ARC0680I EXPIRE BACKUP VERSIONS STARTING AT 19:03:21 ON 2010/01/03, SYSTEM
SYB1
 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR
PDFHSM.BACK.T392220.SYS3.DV.J1295, RC=0004
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
4, REASON=0, AGE=2993,
  DSN=PDFHSM.BACK.T392220.SYS3.DV.J1295
 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR
PDFHSM.BACK.U122420.SYS3.DV.J1295, RC=0004
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
4, REASON=0, AGE=2993,
  DSN=PDFHSM.BACK.U122420.SYS3.DV.J1295
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
28, REASON=0, AGE=2509,
  DSN=SYS3.DV.PROJCL.BACKUP.DBRM
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
28, REASON=0, AGE=   0,
  DSN=SYS3.DV.PROJCL.BACKUP.DBRM

however, I now did a HSEND  WAIT EXPIREBV DISPLAY SYSOUT(J)  and it's
generating a lot of records. At this time, job is still running and the
backup log has 28.761 lines.

Is it possible that the EXPIREBV  EXECUTE is not working at all after giving
above errors ??

 Any h'int is welcome
Many thx once more, A.Cecilio.




On Mon, Dec 28, 2009 at 12:19 PM, O'Brien, David W. (NIH/CIT) [C] 
obrie...@mail.nih.gov wrote:

 Antonio,

  One other question - When was the last time you ran Expirebv? I'm just
 wondering if you have extraneous rescords in your BCDS.

 Thank You,
 Dave O'Brien
 NIH Contractor
 
 From: Lizette Koehler [stars...@mindspring.com]
 Sent: Monday, December 28, 2009 7:16 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: DFHSM BCDS is going larger

 Antonio,

 At this point, you may wish to open an ETR to IBM to identify why your
 files
 are growing so quickly.  I would not think it should grow that fast unless
 there is a lot of backup functions running.

 How many volumes/datasets do you do HSM backup for?  It maybe that 4320
 Cylinders is insufficient for your DFHSM Backups.

 We do not do many.  We have daily full volume dumps for our critical
 system/application files.  We typically use DFHSM backups for TSO and
 Roscoe
 pools.  Not much else.

 I am not sure if there is a rule of thumb as to what makes good candidate
 volumes for backup.  Maybe others might have a suggestion.

 Lizette


 
  Hi Lizette and David,
  thx once more for your sugestions, here is a not so good upd:
  - My bcds today:
  ARC0148I BCDS TOTAL SPACE=3132000 K-BYTES, CURRENTLY 188
  ARC0148I (CONT.) ABOUT 87% FULL, WARNING THRESHOLD=80%, TOTAL
  ARC0148I (CONT.) FREESPACE=44%, EA=NO, CANDIDATE VOLUMES=0
 
  STATISTICS
REC-TOTAL4611413 SPLITS-CI--20950
REC-DELETED---232332 SPLITS-CA---1512
REC-INSERTED--346063 FREESPACE-%CI-10
REC-UPDATED---613409 FREESPACE-%CA-10
REC-RETRIEVED--273730657 FREESPC---1439428608
  ALLOCATION
SPACE-TYPE--CYLINDER HI-A-RBA--3207168000
SPACE-PRI---4350 HI-U-RBA--2788392960
SPACE-SEC--0
  VOLUME
VOLSERCPS096 PHYREC-SIZE12288
DEVTYPE--X'3010200F' PHYRECS/TRK4
VOLFLAGPRIME TRACKS/CA-15
EXTENTS:
LOW-CCHH-X'002E' LOW-RBA0
HIGH-CCHHX'027E' HIGH-RBA---426885119
LOW-CCHH-X'1866' LOW-RBA426885120
HIGH-CCHHX'272E' HIGH-RBA--3207167999
 
  So, I must schedule an DFHSM intervention soon, and decide if I'll
  alocate
  bcds with EA or use multicluster cds (I have Z/OS V1.8 and I don't know
  how
  to implement these func. I must read the manuals).
  Remember that I did the BCDS reorg on December 13th, and it becomes
  with 52%
  of free space. So after 15 days it grew 35%. I'ts very strange, we
  never had
  to reorg or augment the cds so often,
 
  So, any hints are welcome.
  Many thx once more, A.Cecilio.
 
 

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 

Re: dead zone

2010-01-04 Thread Doug Henry
Here is an IBM document that answers many of the questions raised in this 
thread.

Match 31-bit WebSphere Application Server performance with new features in 
64-bit Java on System z

http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf

Doug

On Mon, 4 Jan 2010 12:00:25 -0500, Scott Rowe scott.r...@joann.com 
wrote:

IIRC, this is the type of thing they are doing, and as Jim mentioned: it 
improves performance because more pointers fit in a cache line,
and therefor use less cache.  With today's processor designs, using cache 
effectively can have huge performance benefits.
 

 Tom Marchant m42tom-ibmm...@yahoo.com 1/4/2010 10:45 AM 

On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com 
wrote:

   I was told that compressed pointers for storage below 32GB fit
into a smaller space, so more compressed pointers fit in a cache
line, leading to more effective cache utilization.  Performance is
all about the caches these days.  I am not a Java person.  I don't
know what a compressed pointer is.


Just a wild guess.  If all pointers are to storage on a doubleword boundary,
the address can be shifted right three bits.  Then you can point to any
doubleword below 32 GB using an unsigned 32-bit address.  How that might
help performance is a mystery to me.

-- 
Tom Marchant


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Where have the control blocks gone?

2010-01-04 Thread Steve Comstock

I've been debugging applications in z/OS and its
predecessors since 1975, and feel I have a pretty
good idea how to use a SYSUDUMP. But things are
getting a little mysterious right now.

I'm getting lots of dumps as I create and debug
a new application, and suddenly I've noticed:

* Instead of three (or more) SVRBs, there are only two

* When I force an abend right after OPEN the DCB does
  not show up as formatted in the dump (I can find the
  storage location and figure it out, but I'm surprised
  at this development).


Have there been some changes in SYSUDUMP formatting in
recent years? (I'm running z/OS 1.10 currently).


--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-393-8716
http://www.trainersfriend.com

  z/OS Application development made easier
* Our classes include
   + How things work
   + Programming examples with realistic applications
   + Starter / skeleton code
   + Complete working programs
   + Useful utilities and subroutines
   + Tips and techniques

== Ask about being added to our opt-in list:  ==
==   * Early announcement of new courses  ==
==   * Early announcement of new techincal papers ==
==   * Early announcement of new promotions   ==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Jim Phoenix

McKown, John wrote:

The storage between 2g and 4g is NOT accessible in 31 bit mode.

--
Binyamin Dissen bdis...@dissensoftware.com



You're right! So, why bother and how does it improve performance? I guess we'll never know. It is likely proprietary. 


--
John McKown 
Systems Engineer IV

IT

Administrative Services Group


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


  
It improves performance by avoiding the extra level of indirection when 
translating the virtual address to a real address on a TLB miss.  
Doesn't have to reference the region-table entry.

--
| Jim Phoenix  | Voice:   (310) 338-0400 x316   |
| Senior Software Developer| Fax: (310) 338-0801|
| Phoenix Software International   | Alt fax: (310) 337-2685|
| 831 Parkview Drive North | jimphoe...@phoenixsoftware.com |
| El Segundo, CA 90245 | http://www.phoenixsoftware.com |

Opinions expressed by this individual are not necessarily those of the 
Company.




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Does ISQL works for remote UDB(DB2) on Linux ?

2010-01-04 Thread Frank Swarbrick
Are you refering to the VSE DB2 CICS transaction ISQL?  If so, then yes you can.
-- 

Frank Swarbrick
Applications Architect - Mainframe Applications Development
FirstBank Data Corporation - Lakewood, CO  USA
P: 303-235-1403


On 1/3/2010 at 10:06 AM, in message
listserv%201001031106289777.0...@bama.ua.edu, Arye Shemer
aryeshe...@gmail.com wrote:
 Hello Forumers,
 Can I use the CICS transaction ISQL for remote UDB(DB2) database on Linux ?
 
 Thanks,
 
 Arye, Shemer.
  
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

 

The information contained in this electronic communication and any document 
attached hereto or transmitted herewith is confidential and intended for the 
exclusive use of the individual or entity named above.  If the reader of this 
message is not the intended recipient or the employee or agent responsible for 
delivering it to the intended recipient, you are hereby notified that any 
examination, use, dissemination, distribution or copying of this communication 
or any part thereof is strictly prohibited.  If you have received this 
communication in error, please immediately notify the sender by reply e-mail 
and destroy this communication.  Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM BCDS is going larger

2010-01-04 Thread O'Brien, David W. (NIH/CIT) [C]
A. Expirebv has two modes: Display and Execute. If this is the first time 
you've run the command, I would strongly urge you to run Display first and make 
sure that the backups being deleted are the ones you want deleted in accordance 
with your SMS Management class policies.

 B.Isyour log set up to issue all msgs. or only error msgs.? see HSM.Parmlib 
ARCCMDxx 
 SETSYS-  
 ACTLOGTYPE(DASD)  -  
 ACTLOGMSG(FULL) 

I hold issue a Hold Expirebv immediately
Re-run Listcat for BCDS to see if any records have been deleted.
Check ACTLOGMSG value.
Release Expirebv and run Expirebv display to see what remains to be deleted and 
whether those backups ought to be deleted.

Lizette, Your thoughts?
  
Thank You,
Dave O'Brien
NIH Contractor

From: af dc [acbi...@gmail.com]
Sent: Monday, January 04, 2010 12:20 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: DFHSM BCDS is going larger

Hi Dave and Lizette,
I did another BCDS cds reorg last sunday, now it has:

STATISTICS
  REC-TOTAL4650469 SPLITS-CI--0
  REC-DELETED0 SPLITS-CA--0
  REC-INSERTED---0 FREESPACE-%CI--0
  REC-UPDATED0 FREESPACE-%CA--0
  REC-RETRIEVED---16310129 FREESPC---2024644608
ALLOCATION
  SPACE-TYPE--CYLINDER HI-A-RBA--3428352000
  SPACE-PRI---4650 HI-U-RBA--1403781120
  SPACE-SEC--0

ARC0148I BCDS TOTAL SPACE=3348000 K-BYTES, CURRENTLY 422
ARC0148I (CONT.) ABOUT 67% FULL, WARNING THRESHOLD=80%, TOTAL
ARC0148I (CONT.) FREESPACE=59%, EA=NO, CANDIDATE VOLUMES=0

Besides of runing every day, EXPIREBV job:
  HSEND  WAIT EXPIREBV EXECUTE SYSOUT(J)

I checked backup log and saw this:
  DFSMSHSM BACKUP LOG, TIME 19:03:20,  DATE 10/01/03
 ARC0680I EXPIRE BACKUP VERSIONS STARTING AT 19:03:21 ON 2010/01/03, SYSTEM
SYB1
 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR
PDFHSM.BACK.T392220.SYS3.DV.J1295, RC=0004
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
4, REASON=0, AGE=2993,
  DSN=PDFHSM.BACK.T392220.SYS3.DV.J1295
 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR
PDFHSM.BACK.U122420.SYS3.DV.J1295, RC=0004
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
4, REASON=0, AGE=2993,
  DSN=PDFHSM.BACK.U122420.SYS3.DV.J1295
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
28, REASON=0, AGE=2509,
  DSN=SYS3.DV.PROJCL.BACKUP.DBRM
 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS=   *** RC=
28, REASON=0, AGE=   0,
  DSN=SYS3.DV.PROJCL.BACKUP.DBRM

however, I now did a HSEND  WAIT EXPIREBV DISPLAY SYSOUT(J)  and it's
generating a lot of records. At this time, job is still running and the
backup log has 28.761 lines.

Is it possible that the EXPIREBV  EXECUTE is not working at all after giving
above errors ??

 Any h'int is welcome
Many thx once more, A.Cecilio.




On Mon, Dec 28, 2009 at 12:19 PM, O'Brien, David W. (NIH/CIT) [C] 
obrie...@mail.nih.gov wrote:

 Antonio,

  One other question - When was the last time you ran Expirebv? I'm just
 wondering if you have extraneous rescords in your BCDS.

 Thank You,
 Dave O'Brien
 NIH Contractor
 
 From: Lizette Koehler [stars...@mindspring.com]
 Sent: Monday, December 28, 2009 7:16 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: DFHSM BCDS is going larger

 Antonio,

 At this point, you may wish to open an ETR to IBM to identify why your
 files
 are growing so quickly.  I would not think it should grow that fast unless
 there is a lot of backup functions running.

 How many volumes/datasets do you do HSM backup for?  It maybe that 4320
 Cylinders is insufficient for your DFHSM Backups.

 We do not do many.  We have daily full volume dumps for our critical
 system/application files.  We typically use DFHSM backups for TSO and
 Roscoe
 pools.  Not much else.

 I am not sure if there is a rule of thumb as to what makes good candidate
 volumes for backup.  Maybe others might have a suggestion.

 Lizette


 
  Hi Lizette and David,
  thx once more for your sugestions, here is a not so good upd:
  - My bcds today:
  ARC0148I BCDS TOTAL SPACE=3132000 K-BYTES, CURRENTLY 188
  ARC0148I (CONT.) ABOUT 87% FULL, WARNING THRESHOLD=80%, TOTAL
  ARC0148I (CONT.) FREESPACE=44%, EA=NO, CANDIDATE VOLUMES=0
 
  STATISTICS
REC-TOTAL4611413 SPLITS-CI--20950
REC-DELETED---232332 SPLITS-CA---1512
REC-INSERTED--346063 FREESPACE-%CI-10
REC-UPDATED---613409 FREESPACE-%CA-10
REC-RETRIEVED--273730657 FREESPC---1439428608
  ALLOCATION
SPACE-TYPE--CYLINDER HI-A-RBA--3207168000
SPACE-PRI---4350 HI-U-RBA--2788392960
SPACE-SEC--0
  VOLUME
VOLSERCPS096 PHYREC-SIZE12288
DEVTYPE--X'3010200F' 

Re: ADCD CD

2010-01-04 Thread Staller, Allan
Since you are accessing the 1.4 disks from another system, Just re-run
the compress from the other system.
I have had this happen in the past, and recovered with no issues.

HTH, 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of David Logan
Sent: Thursday, December 31, 2009 11:54 AM
To: IBM-MAIN@bama.ua.edu
Subject: ADCD CD

I need to get a copy of one of the ADCD CDs onto our mainframe so 
that I can get a file off of it. It's designed for the Flex, so it's the

PC CKD two-file thing that goes into the emulator to then be copied 
to internal DASD.

Is there any way to load these files from the CD right onto an empty 
volume? FTP them up and use DITTO or something, perhaps?

Basically, I am running an old z/OS on a z9, and I need to reload one 
of the systems files from S4RES1 and I am hoping I don't have to find 
and fire up a flex or MP3000 and create an OS, set up communications 
just to TSO XMIT and FTP a single PDS.

Any ideas?

Thanks!

David Logan

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Frank Swarbrick
VSE has better symbolic substitution and much better conditional logic.
-- 

Frank Swarbrick
Applications Architect - Mainframe Applications Development
FirstBank Data Corporation - Lakewood, CO  USA
P: 303-235-1403


On 1/3/2010 at 4:25 PM, in message 00fb01ca8ccb$f99b8890$ecd299...@org,
Charles Mills charl...@mcn.org wrote:
 I tell my students, OS/360 Job Control Language is the worst 
programming language ever designed anywhere by anybody for any 
purpose and it was done under my management. 
 
Don't brag; it's always possible to do worse.
 
 I recall that DOS/360 had a series of file-to-file utilities (no device
 independence so you needed a disk to tape utility, a card to tape utility, a
 tape to disk utility, ...) whose control card syntax was way worse than
 OS/360 JCL. DOS/VSE JCL is arguably worse than OS/MVS JCL: the DLBL
 statement with its umpteen positional parameters makes the DD statement look
 downright user-friendly. And VSE is much more dependent on POWER control
 cards than MVS is on JES control cards, and the syntax is totally different
 from JCL -- JES statements are at least closer to JCL in syntax.
 
 And anyone else ever write IV-Phase assembler? 5-character symbols, of which
 only three (24 bit word machine) were significant, so NOTAG was the same
 symbol as NOTUP. And it did not flag duplicates, it just silently redefined
 the symbol. Nor did it flag undefined symbols -- just passed them to the
 linker as externs. The JCL was pretty bad too ...
 
 Charles
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
 Of Paul Gilmartin
 Sent: Sunday, January 03, 2010 1:51 PM
 To: IBM-MAIN@bama.ua.edu 
 Subject: Re: Why is JCL so bad was Re: Basic question on passing JCL set
 symbol to proc
 
 On Sun, 3 Jan 2010 19:01:00 +0100, Lindy Mayfield wrote:
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

 

The information contained in this electronic communication and any document 
attached hereto or transmitted herewith is confidential and intended for the 
exclusive use of the individual or entity named above.  If the reader of this 
message is not the intended recipient or the employee or agent responsible for 
delivering it to the intended recipient, you are hereby notified that any 
examination, use, dissemination, distribution or copying of this communication 
or any part thereof is strictly prohibited.  If you have received this 
communication in error, please immediately notify the sender by reply e-mail 
and destroy this communication.  Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Doug Henry
 Sent: Monday, January 04, 2010 11:33 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: dead zone
 
 Here is an IBM document that answers many of the questions 
 raised in this 
 thread.
 
 Match 31-bit WebSphere Application Server performance with 
 new features in 
 64-bit Java on System z
 
 http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf
 
 Doug

Very interesting! Thanks for posting that URL. Using the bar for storage 
avoids out-of-memory errors in 31 bit Java and the overhead in 64 bit Java. The 
31 bit Java pointer is 24 bytes, but 48 bytes (with some padding bytes) in 64 
bit. So that reduces the storage overhead and page tables and TLB usage. At 
least, as best as I can tell.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CAPS Fantasia (was: argv for z/OS C++ batch)

2010-01-04 Thread Don Williams
Good point. I'm definitely Anglophone biased, as the only language I know is
English or rather American English. While I did ponder about code pages for
other languages, I felt that any comment would probably be opening my mouth
and inserting my foot. It seems I managed to do that anyway.

Early in my career, I was stationed in Germany. I learned that foreign
programmers were required to program in English, because the major
languages of the time (COBOL, FORTRAN, etc.) all used keywords spelled in
English. As a young kid, that seemed quite unfair, but when I asked those
programmers they thought nothing of it. They inferred that my question was
trivial and even the thought of supporting multi-lingual programming
languages would be counter-productive. Of course, they spoke English, so any
English keywords posed no problem; so they were likely biased. This kind
of reasoning, seems to lead to the question: is imposing a standard code
page that only contains ISO Latin characters fair? No, but it is expedient. 

Of course, most code pages have many characters with no standard translation
to other code pages. Therefore allowing multiple code pages is likely to
have challenges. However, fonts and code pages are not quite the same thing.
Fonts can have characteristics like color, boldness, size, etc. that are
independent of the code page. Based on the assumption that fonts and code
pages are different (perhaps a bad assumption) I figured that you could
translate all colors to black, remove boldness, etc. such that those kinds
of font characteristics would be independent of the code page. So when you
ignore font characteristics, a file called foo [in blue] would be same file
as foo [in red], etc. It might mean that the file system might need to have
two fields, one without font attributes for functional access, and another
with font attributes for display purposes. Of course, having two fields to
keep in sync is not expedient, but it would allow people to be expressive.

Case is different. As best as I can tell, case is not really a font
attribute. Case is a character attribute. Changing the case of a character,
is really changing the character; whereas changing the color of a character
does not. I don't know, but I expect there are many languages that don't
have the concept of case. I expect that in some languages, case is
important. The meaning of a word can significantly change when the case is
changed. In other languages, changing case may be insignificant. 

Has it been discussed what to do about writing orientation. Languages like
English are left to right, top to bottom. I believe that Chinese can be
bottom to top, right to left. I expect some other languages have still
different orientations.

My conclusion, there is probably no solution that will make everybody happy.
Therefore, a choice than is only expedient is probably the best we can do.


Don

Make everything as simple as possible, but no simplier. - Albert Einstein

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Why 2GTO32G in the IARV64?

2010-01-04 Thread McKown, John
Is answered in the PDF which Doug Henry specified:

http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf

quote

APAR OA26294 provides a direct assembler interface to z/OS Real Storage Manager 
(RSM), which allows memory allocations in the 2 GB (2^31) to 32 GB (2^35) 
virtual address range. The IBM JVM uses this API to allocate the Java heap in 
this virtual address range. It is noted that memory allocated using the RSM API 
can be backed by either 4 KB pages or large pages.

/quote

Why 2^35 (32G)? Because that is the upper limit on Java's heap for using 
compressed pointers. Above 32G of heap, Java does not compress pointers.


John McKown
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Mark Zelden
On Mon, 4 Jan 2010 11:32:36 -0600, Doug Henry doug_he...@usbank.com wrote:

Here is an IBM document that answers many of the questions raised in this
thread.

Match 31-bit WebSphere Application Server performance with new features in
64-bit Java on System z

http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf


Thanks!   I've been trying to find something like this since last week when
this thread started.  I couldn't even determine what Java level had the
function added when looking at the Java APARs.

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread Jerry Whitteridge
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ward, Mike S
 Sent: Monday, January 04, 2010 8:41 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: hfs VS zfs
 
 Hello all, we are planning to migrate from z/os 1.7 to 1.11. 
 In our planning we are trying to decide if we want to go to 
 zfs instead of the hfs. Is there anyone out there that can 
 think of any good reasons not to go to zfs when we do our upgrade?

Most noticeable issue will be if you use indirect cataloging of the systems HFS 
files (for example locating them on the system res packs set). This is not 
available for zFS at this time. Due to this we have a mix of zFS and HFS files. 
SMPE owned and maintained files are HFS and roll with the system res vols. User 
and Application  files are zFS

Email Firewall made the following annotations.
--

Warning: 
All e-mail sent to this address will be received by the corporate e-mail 
system, and is subject to archival and review by someone other than the 
recipient.  This e-mail may contain proprietary information and is intended 
only for the use of the intended recipient(s).  If the reader of this message 
is not the intended recipient(s), you are notified that you have received this 
message in error and that any review, dissemination, distribution or copying of 
this message is strictly prohibited.  If you have received this message in 
error, please notify the sender immediately.   
 
==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Jerry Whitteridge
 Sent: Monday, January 04, 2010 12:21 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: hfs VS zfs
 
  -Original Message-
  From: IBM Mainframe Discussion List 
  [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ward, Mike S
  Sent: Monday, January 04, 2010 8:41 AM
  To: IBM-MAIN@bama.ua.edu
  Subject: hfs VS zfs
  
  Hello all, we are planning to migrate from z/os 1.7 to 1.11. 
  In our planning we are trying to decide if we want to go to 
  zfs instead of the hfs. Is there anyone out there that can 
  think of any good reasons not to go to zfs when we do our upgrade?
 
 Most noticeable issue will be if you use indirect cataloging 
 of the systems HFS files (for example locating them on the 
 system res packs set). This is not available for zFS at this 
 time. Due to this we have a mix of zFS and HFS files. SMPE 
 owned and maintained files are HFS and roll with the system 
 res vols. User and Application  files are zFS
 

I cheat. I never do a DASD copy of my DASD. I do a logical DSN copy from DASD 
to DASD, and I change some of the names as they are copies. What I do it make 
my system UNIX files have the system name and res volume in the DSN. 

OMVS.SYSNAME..SYSR1..ROOT

for example. That way, I don't need indirect cataloging. in BPXPRMnn

ROOT FILESYSTEM('OMVS.SYSNAME..SYSR1..ROOT')
 TYPE(ZFS) MODE(RDWR)

The same with some PARMLIBs, which I put as the __first__ PARMLIB in the 
concatenation. Like: SYS1.SYSNAME..PARMLIB. Ditto for special LPALIBs and 
LINKLIBs. Which, again, I put __first__ so that modules in them override the 
IBM modules of the same name. Things like ICEAMn.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Tom Marchant
On Mon, 4 Jan 2010 09:39:35 -0800, Jim Phoenix wrote:

McKown, John wrote:
 The storage between 2g and 4g is NOT accessible in 31 bit mode.

 Binyamin Dissen bdis...@dissensoftware.com


 You're right! So, why bother and how does it improve performance? 
I guess we'll never know. It is likely proprietary.

It improves performance by avoiding the extra level of indirection when
translating the virtual address to a real address on a TLB miss.
Doesn't have to reference the region-table entry.

What?

Addresses above 2 GiB need the region third index to translate them.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Where have the control blocks gone?

2010-01-04 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Steve Comstock
Sent: Monday, January 04, 2010 11:38 AM
To: IBM-MAIN@bama.ua.edu
Subject: Where have the control blocks gone?

I've been debugging applications in z/OS and its
predecessors since 1975, and feel I have a pretty
good idea how to use a SYSUDUMP. But things are
getting a little mysterious right now.

I'm getting lots of dumps as I create and debug
a new application, and suddenly I've noticed:

* Instead of three (or more) SVRBs, there are only two

* When I force an abend right after OPEN the DCB does
   not show up as formatted in the dump (I can find the
   storage location and figure it out, but I'm surprised
   at this development).


Have there been some changes in SYSUDUMP formatting in
recent years? (I'm running z/OS 1.10 currently).


SNIP

Check PARMLIB settings for dumps. Someone may have changed them on you. 

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Where have the control blocks gone?

2010-01-04 Thread Mike Myers

Steve:

I have been debugging dumps since OS/360 days (around 1967). While it is 
possible to have three SVRBs as the last active elements in the RB 
queue, it is far more typical in the case of an ABEND in an application 
program to have only two SVRBs. This assumes that the application 
program is running under a PRB (as is typical). When it ABENDs, an SVRB 
is created under which the ABEND process (SVC D) will run, followed by a 
second SVRB under which SNAP (SVC 33x - 51 decimal) runs to produce the 
dump. In the case you cite, where there are three SVRBs, that would 
occur if the application (running under a PRB) were to call a system 
service (such as OPEN) and caused it to ABEND by passing bad parameters. 
While this latter case is certainly possible, it is usually the former 
case which is most likely to occur for an application ABEND.


As for the DCB, I don't ever recall it being formatted in a dump, except 
possibly one produced by ABENDAID. It may not have even been formatted 
there either, as I personally had little contact with ABENDAID. I can't 
say I recall one being formatted in a SYSUDUMP. While it may have been 
present in the dump, I can only recall ever seeing it laid out as a 
block of data, but not formatted into firlds.


I do know that the formatter in IPCS (TCBEXIT IECDAFMT - at least I 
think that's the right exit - if not, then it's probably IECIOFMT) will 
display the DCB as a block of data, but does not format its fields either.


Mike Myers
Mentor Services Corporation

Steve Comstock wrote:

I've been debugging applications in z/OS and its
predecessors since 1975, and feel I have a pretty
good idea how to use a SYSUDUMP. But things are
getting a little mysterious right now.

I'm getting lots of dumps as I create and debug
a new application, and suddenly I've noticed:

* Instead of three (or more) SVRBs, there are only two

* When I force an abend right after OPEN the DCB does
  not show up as formatted in the dump (I can find the
  storage location and figure it out, but I'm surprised
  at this development).


Have there been some changes in SYSUDUMP formatting in
recent years? (I'm running z/OS 1.10 currently).




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dead zone

2010-01-04 Thread Doug Henry
Hi Mark and John,
Your welcome.

As always Bob Rogers was great when presenting this information.  

Doug

On Mon, 4 Jan 2010 12:22:02 -0600, Mark Zelden 
mark.zel...@zurichna.com wrote:

On Mon, 4 Jan 2010 11:32:36 -0600, Doug Henry 
doug_he...@usbank.com wrote:

Here is an IBM document that answers many of the questions raised in this
thread.

http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf


Thanks!   I've been trying to find something like this since last week when
this thread started.  I couldn't even determine what Java level had the
function added when looking at the Java APARs.

Mark
--
Mark Zelden

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Movin' on Up!

2010-01-04 Thread Guy Gardoit
You're obviously charging too much for your software if you can afford a
place like this!  Ok, just kidding, .. maybe ...  :-)

On Tue, Dec 22, 2009 at 11:24 AM, Edward Jaffe
edja...@phoenixsoftware.comwrote:

 http://www.phoenixsoftware.com/newlocation.htm

 --
 Edward E Jaffe
 Phoenix Software International, Inc
 831 Parkview Drive North
 El Segundo, CA 90245
 310-338-0400 x318
 edja...@phoenixsoftware.com
 http://www.phoenixsoftware.com/

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




-- 
Guy Gardoit
z/OS Systems Programming

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TSSO and z/OS 1.11.

2010-01-04 Thread Richbourg, Claude
Hello Brian,

I downloaded TSSO from the UPDATES section and it assembled fine. When
TSSO traps a message on the syslog and fires off a command, I now get
this from TSSO:

TSSA305E TSSO COMMANDS MAY NOT BE ISSUED FROM THIS ENVIRONMENT

Any ideas on what I may have missed or need to do? I do not really
understand what TSSO is fussing about unless it is console related..

Here is a snippet from  a 'D C' command;
CDCUSYSA  TYPE=SUBSYS   STATUS=ACT-CDCU COMPID=TSSO ASID=0020   
  DEFINED=(*ALL)
  MATCHED=(*ALL)
   ATTRIBUTES ON CDCU   
  AUTH=(MASTER) 
CDCUSYS1  TYPE=SUBSYS   STATUS=ACT-CDCU COMPID=TSSO ASID=0020   
  DEFINED=(*ALL)
  MATCHED=(*ALL)
   ATTRIBUTES ON CDCU   
  AUTH=(MASTER) 
CDCUSYS2  TYPE=SUBSYS   STATUS=ACT-CDCU COMPID=TSSO ASID=0020   
  DEFINED=(*ALL)
  MATCHED=(*ALL)
   ATTRIBUTES ON CDCU   
  AUTH=(MASTER) 

Any and all help would be much appreciated by you or someone you know
who may have the key. 

Regards,
Claude

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Brian Westerman
Sent: Saturday, December 26, 2009 10:30 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: TSSO and z/OS 1.11.

It had to be re-assembled, but appears to work correctly.

Brian

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ADCD CD

2010-01-04 Thread John Eells

David Logan wrote:
HAHA yes, getting a backup strategy in place is a key deliverable Q1 of 
next year :)


Since it is a development box, there hasn't been a lot of time given to 
it.


Re another question, it's not running. I'm using another partition to get 
at the z/OS 1.4 volumes, and yes, I know it may be out of sync, but I'd 
rather it running and out of sync than not running.

snip

It might not run if out of sync.  Or worse, it might *appear* to run but 
cause problems you don't see until they are widespread.  You really need 
the library you lost _at the level you lost it_ to be certain all will 
be well.


Mismatched levels of code are a support nightmare, too.

--
John Eells
z/OS Technical Marketing
IBM Poughkeepsie
ee...@us.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ADCD CD

2010-01-04 Thread Scott Rowe
I just had a thought, shouldn't you be able to use SMP/E GENERATE to re-build 
the target from the DLIBs, and then re-apply the maintenance?

 John Eells ee...@us.ibm.com 1/4/2010 2:39 PM 
David Logan wrote:
 HAHA yes, getting a backup strategy in place is a key deliverable Q1 of 
 next year :)
 
 Since it is a development box, there hasn't been a lot of time given to 
 it.
 
 Re another question, it's not running. I'm using another partition to get 
 at the z/OS 1.4 volumes, and yes, I know it may be out of sync, but I'd 
 rather it running and out of sync than not running.
snip

It might not run if out of sync.  Or worse, it might *appear* to run but 
cause problems you don't see until they are widespread.  You really need 
the library you lost _at the level you lost it_ to be certain all will 
be well.

Mismatched levels of code are a support nightmare, too.

-- 
John Eells
z/OS Technical Marketing
IBM Poughkeepsie
ee...@us.ibm.com 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 



CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains 
confidential and privileged information intended only for the addressee.  If 
you are not the intended recipient, please be advised that you have received 
this material in error and that any forwarding, copying, printing, 
distribution, use or disclosure of the material is strictly prohibited.  If you 
have received this material in error, please (i) do not read it, (ii) reply to 
the sender that you received the message in error, and (iii) erase or destroy 
the material. Emails are not secure and can be intercepted, amended, lost or 
destroyed, or contain viruses. You are deemed to have accepted these risks if 
you communicate with us by email. Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ADCD CD

2010-01-04 Thread Scott Rowe
Or, ACCEPT all maintenance that was applied, then GENERATE to a new target, 
then copy SYS1.LINKLIB back?
 
Sure, it's no 10 second fix, but it should work.

 Scott Rowe scott.r...@joann.com 1/4/2010 2:43 PM 
I just had a thought, shouldn't you be able to use SMP/E GENERATE to re-build 
the target from the DLIBs, and then re-apply the maintenance?

 John Eells ee...@us.ibm.com 1/4/2010 2:39 PM 
David Logan wrote:
 HAHA yes, getting a backup strategy in place is a key deliverable Q1 of
 next year :)
 
 Since it is a development box, there hasn't been a lot of time given to 
 it.
 
 Re another question, it's not running. I'm using another partition to get 
 at the z/OS 1.4 volumes, and yes, I know it may be out of sync, but I'd 
 rather it running and out of sync than not running.
snip

It might not run if out of sync.  Or worse, it might *appear* to run but 
cause problems you don't see until they are widespread.  You really need 
the library you lost _at the level you lost it_ to be certain all will 
be well.

Mismatched levels of code are a support nightmare, too.

-- 
John Eells
z/OS Technical Marketing
IBM Poughkeepsie
ee...@us.ibm.com 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 



CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains 
confidential and privileged information intended only for the addressee.  If 
you are not the intended recipient, please be advised that you have received 
this material in error and that any forwarding, copying, printing, 
distribution, use or disclosure of the material is strictly prohibited.  If you 
have received this material in error, please (i) do not read it, (ii) reply to 
the sender that you received the message in error, and (iii) erase or destroy 
the material. Emails are not secure and can be intercepted, amended, lost or 
destroyed, or contain viruses. You are deemed to have accepted these risks if 
you communicate with us by email. Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 



CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains 
confidential and privileged information intended only for the addressee.  If 
you are not the intended recipient, please be advised that you have received 
this material in error and that any forwarding, copying, printing, 
distribution, use or disclosure of the material is strictly prohibited.  If you 
have received this material in error, please (i) do not read it, (ii) reply to 
the sender that you received the message in error, and (iii) erase or destroy 
the material. Emails are not secure and can be intercepted, amended, lost or 
destroyed, or contain viruses. You are deemed to have accepted these risks if 
you communicate with us by email. Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ADCD CD

2010-01-04 Thread John Eells

Scott Rowe wrote:

I just had a thought, shouldn't you be able to use SMP/E GENERATE to re-build 
the target from the DLIBs, and then re-apply the maintenance?

snip

It might be better to ACCEPT all the maintenance first so the generated 
library matches the rest of the system from the outset.  If Dave has a 
running system this is a good way to go.  Note that any usermods will 
need to be reinstalled unless they were also accepted (which is rarely 
if ever recommended).  And he might need some STEPLIBs to the target 
system's MIGLIB and SASMMOD1 to get the right levels of SMP/E and HLASM. 
 See the z/OS Program Directory for the release you're working on to 
see what STEPLIBs are needed if you are running from a different level. 
 (e.g., for R11, see 6.1.3 Using High Level Assembler, Program 
Management Binder, and SMP/E for Subsequent z/OS V1.11.0 Installs.)


--
John Eells
z/OS Technical Marketing
IBM Poughkeepsie
ee...@us.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread Schwarz, Barry A
On a z9 BC running z/OS 1.8, there is a noticeable (~2 minutes) pause in the 
IPL sequence while zFS initializes, accompanied by a non-scrollable message 
on the log that eventually does clear.  We don't IPL that often so it is not a 
big deal for us.

Since zFS is VSAM, we had to adjust our pack cloning procedures but once we 
worked out the kinks it became a non-issue.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Ward, Mike S
Sent: Monday, January 04, 2010 8:41 AM
To: IBM-MAIN@bama.ua.edu
Subject: hfs VS zfs

Hello all, we are planning to migrate from z/os 1.7 to 1.11. In our
planning we are trying to decide if we want to go to zfs instead of the
hfs. Is there anyone out there that can think of any good reasons not to
go to zfs when we do our upgrade?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad?

2010-01-04 Thread Ted MacNEIL
JCL has been criticized by those who have not mastered it since the time of OS 
PCP.

I've been using JCL since February 1981.
I started in this business as a JCL jockey in Production Support for a Canadian 
Railway Company that was building a new data centre in Toronto.

While we were moving from Montreal to Toronto, we had a lot of spare time in 
the new Control Room.
So, I spent a lot of time learning JCL, utilities,  CLISTs, and ISPF (then SPF) 
dialogues.
That helped jump-start my career when I moved on to a better job 6 months later.

While kludgy, and (possibly) inelegant, I don't find JCL that difficult.
Can it be improved? Yes.
Will it be? Business Case it!
But, stop b*tching about it.

-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread Ted MacNEIL
Is there anyone out there that can think of any good reasons not to
go to zfs when we do our upgrade?

I would do z/FS as a separate project, either before or after.
Moving from an unsupported release level to a bigger jump than supported by IBM 
will be complex enough.
-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Regina REXX under W/XP

2010-01-04 Thread Thompson, Steve
I am attempting to solve a problem I have with some special files that
get used to drive some work under z/OS.

 

So I thought the best thing to do is write the REXX code to run under
Windows. So when I execute the code, REXX comes back and says:

 

Error 13 running fully qualified path and file name, line 1: Invalid
character in program

Error 13.1 Invalid character in program ('ff'X)

 

[Where fully qualified path and file name is the actual fully
qualified Window's file name]

 

I can not find any doc for Error 13 (I have the manual for Regina REXX
printed and as a PDF). And I'm not seeing any odd characters in this
file (editing it with NOTEPAD).

 

Can anyone give me a clue as to where these errors are documented (I've
been to sourceforge, no joy. No joy with http://www.rexxla.org/ either).

 

Even better, what would cause this to think there is an X'FF' byte in
this record (the following is actually the first several records)?

 

/*

   Read CONFIG files for QC and insert today's date as needed.

 

   This initial area is to define all the things that must be

   set up for the rest of the exec to work. In particular the

   names of files and the handle to associate them with.

 */

 

 

Regards,

Steve Thompson


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


24 members of IBM-Main on Academia.edu

2010-01-04 Thread Richard Price
Dear IBM-Main members,

There was a great reaction by the IBM-Main members to the new mailing
list feature on Academia.edu. There are now 24 members of IBM-Main on
Academia.edu listing 43 research interests such as Physics,
Accelerator Physics and Particle Physics.  They have also listed
followers and photos.

There are over a thousand people listing the same research interests
as the IBM-Main members on Academia.edu, so there are lots of
researchers for IBM-Main members to discover.

To see the 24 members of IBM-Main on Academia.edu, and their research
interests and papers, follow the link below:

http://lists.academia.edu/See-members-of-IBM-Main

Richard

Dr. Richard Price, post-doc, Philosophy Dept, Oxford University.
Founder of Academia.edu

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread Tony Harminc
2010/1/4 Thompson, Steve steve_thomp...@stercomm.com:

 So I thought the best thing to do is write the REXX code to run under
 Windows. So when I execute the code, REXX comes back and says:

 Error 13 running fully qualified path and file name, line 1: Invalid 
 character in program

 Error 13.1 Invalid character in program ('ff'X)

It's probably part of a Unicode Byte Order mark (BOM) X'FEFF' or
X'FFFE', which Notepad will not show you. How did you create/save the
file?

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread Scott
Just to be sure, you have written a REXX program for Windows before?  You
can make a program run and 'SAY' some jibberish on the screen?

I don't want to assume too much and I'm not trying to be patronizing :)

Are you opening a file inside the REXX?  If so, how are you accessing that
file?

What are you using to edit the REXX program?  What format is the file?
UTF-8 or ASCII?  What line-endings did you specify?  Windows uses CR+LF,
while UNIX uses LF, and z/OS uses steam-powered wooden cogs.

If none of my suggestions work, I suggest including (at least part of) your
code in a zip file, uploaded somewhere so we can download and inspect it.
Alternatively, you may smoke some peyote and speak to Cowlishaw's spirit for
the answers you seek.

Wait, he's still alive??

Scott

On Mon, Jan 4, 2010 at 12:29 PM, Thompson, Steve 
steve_thomp...@stercomm.com wrote:

 I am attempting to solve a problem I have with some special files that
 get used to drive some work under z/OS.



 So I thought the best thing to do is write the REXX code to run under
 Windows. So when I execute the code, REXX comes back and says:



 Error 13 running fully qualified path and file name, line 1: Invalid
 character in program

 Error 13.1 Invalid character in program ('ff'X)



 [Where fully qualified path and file name is the actual fully
 qualified Window's file name]



 I can not find any doc for Error 13 (I have the manual for Regina REXX
 printed and as a PDF). And I'm not seeing any odd characters in this
 file (editing it with NOTEPAD).



 Can anyone give me a clue as to where these errors are documented (I've
 been to sourceforge, no joy. No joy with http://www.rexxla.org/ either).



 Even better, what would cause this to think there is an X'FF' byte in
 this record (the following is actually the first several records)?



 /*

   Read CONFIG files for QC and insert today's date as needed.



   This initial area is to define all the things that must be

   set up for the rest of the exec to work. In particular the

   names of files and the handle to associate them with.

  */





 Regards,

 Steve Thompson


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Tony Harminc
Sent: Monday, January 04, 2010 2:37 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Regina REXX under W/XP

2010/1/4 Thompson, Steve steve_thomp...@stercomm.com:

 So I thought the best thing to do is write the REXX code to run under
 Windows. So when I execute the code, REXX comes back and says:

 Error 13 running fully qualified path and file name, line 1: Invalid
character in program

 Error 13.1 Invalid character in program ('ff'X)

It's probably part of a Unicode Byte Order mark (BOM) X'FEFF' or
X'FFFE', which Notepad will not show you. How did you create/save the
file?

SNIP

I wrote it using TSO/ISPF. I then copied it via Windows (Copy/Paste
operation) into Notepad -- paying particular attention to NOT capturing
attribute bytes. Then I manually deleted all the follow-on bytes in
Notepad specifically to avoid any such issue.

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thompson, Steve
 Sent: Monday, January 04, 2010 2:29 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Regina REXX under W/XP
 
 I am attempting to solve a problem I have with some special files that
 get used to drive some work under z/OS.
 
 So I thought the best thing to do is write the REXX code to run under
 Windows. So when I execute the code, REXX comes back and says:
 
 Error 13 running fully qualified path and file name, line 1: Invalid
 character in program
 
 Error 13.1 Invalid character in program ('ff'X)
 
 [Where fully qualified path and file name is the actual fully
 qualified Window's file name]
 
 I can not find any doc for Error 13 (I have the manual for 
 Regina REXX
 printed and as a PDF). And I'm not seeing any odd characters in this
 file (editing it with NOTEPAD).
 
 Can anyone give me a clue as to where these errors are 
 documented (I've
 been to sourceforge, no joy. No joy with 
 http://www.rexxla.org/ either).
 
 Even better, what would cause this to think there is an X'FF' byte in
 this record (the following is actually the first several records)?
snip
 Regards,
 
 Steve Thompson

Any chance that the file is UTF? If so, it might have a BOM (Byte Order Mark) 
as the first two (or 4) bytes of the file. The BOM is 'FFFE'x for a UTF-16 
little endian UTF file. A BOM of 'FE'x is for UTF-32 Little Endian 
files. Windows is Little Endian. IIRC, normal Windows programs know to look 
for and ignore BOMs.

http://unicode.org/faq/utf_bom.html#BOM

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Scott
Sent: Monday, January 04, 2010 2:44 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Regina REXX under W/XP

Just to be sure, you have written a REXX program for Windows before?
You
can make a program run and 'SAY' some jibberish on the screen?
SNIP

Yes, a few years ago using NT.

SNIP
I don't want to assume too much and I'm not trying to be patronizing :)

Are you opening a file inside the REXX?  If so, how are you accessing
that
file?
SNIP
Yes, I am opening a file, but we haven't even gotten to the first line
of executable code, which is TRACE I.

snip

What are you using to edit the REXX program?  What format is the file?
UTF-8 or ASCII?  What line-endings did you specify?  Windows uses CR+LF,
while UNIX uses LF, and z/OS uses steam-powered wooden cogs.
SNIP
(editing it with NOTEPAD)
SNIPPAGE

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread Scott
Go into Notepad and do a Save As...

In the bottom pull-down box, is it ANSI or something else?

Rather than using your TRACE statement in the REXX code, just call regina
with the -tI flag.  That should work, according to the documentation:

http://voxel.dl.sourceforge.net/project/regina-rexx/regina-documentation/3.3/regina33.pdf

Scott

On Mon, Jan 4, 2010 at 12:47 PM, Thompson, Steve 
steve_thomp...@stercomm.com wrote:

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of Scott
 Sent: Monday, January 04, 2010 2:44 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Regina REXX under W/XP

 Just to be sure, you have written a REXX program for Windows before?
 You
 can make a program run and 'SAY' some jibberish on the screen?
 SNIP

 Yes, a few years ago using NT.

 SNIP
 I don't want to assume too much and I'm not trying to be patronizing :)

 Are you opening a file inside the REXX?  If so, how are you accessing
 that
 file?
 SNIP
 Yes, I am opening a file, but we haven't even gotten to the first line
 of executable code, which is TRACE I.

 snip

 What are you using to edit the REXX program?  What format is the file?
 UTF-8 or ASCII?  What line-endings did you specify?  Windows uses CR+LF,
 while UNIX uses LF, and z/OS uses steam-powered wooden cogs.
 SNIP
 (editing it with NOTEPAD)
 SNIPPAGE

 Regards,
 Steve Thompson

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of McKown, John
Sent: Monday, January 04, 2010 2:46 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Regina REXX under W/XP

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thompson, Steve
 Sent: Monday, January 04, 2010 2:29 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Regina REXX under W/XP
 
 I am attempting to solve a problem I have with some special files that
 get used to drive some work under z/OS.
 
 So I thought the best thing to do is write the REXX code to run under
 Windows. So when I execute the code, REXX comes back and says:
 
 Error 13 running fully qualified path and file name, line 1: Invalid
 character in program
 
 Error 13.1 Invalid character in program ('ff'X)
SNIPPAGE

Any chance that the file is UTF? 

SNIP

BINGO!

I went back to notepad and did a Save AS and it showed UNICODE. So I
changed it to ANSI and retried it and it took right off.

Thanx. I'd been battling this between meetings for most of the morning.

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread McKown, John
If I were you, I'd ftp upload the file in BINARY back to the mainframe, then 
look at it using ISPF/BROWSE to see what the beginning of the file looks like. 
What version of Windows are you using? I tried the same as you on Win XP Pro, 
using notepad and doing a cut'n'paste from my Hummingbird emulator. The file 
did __not__ have a BOM, just as you said.

--
John McKown 

Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thompson, Steve
 Sent: Monday, January 04, 2010 2:48 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Regina REXX under W/XP
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of Scott
 Sent: Monday, January 04, 2010 2:44 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Regina REXX under W/XP
 
 Just to be sure, you have written a REXX program for Windows before?
 You
 can make a program run and 'SAY' some jibberish on the screen?
 SNIP
 
 Yes, a few years ago using NT.
 
 SNIP
 I don't want to assume too much and I'm not trying to be 
 patronizing :)
 
 Are you opening a file inside the REXX?  If so, how are you accessing
 that
 file?
 SNIP
 Yes, I am opening a file, but we haven't even gotten to the first line
 of executable code, which is TRACE I.
 
 snip
 
 What are you using to edit the REXX program?  What format is the file?
 UTF-8 or ASCII?  What line-endings did you specify?  Windows 
 uses CR+LF,
 while UNIX uses LF, and z/OS uses steam-powered wooden cogs.
 SNIP
 (editing it with NOTEPAD)
 SNIPPAGE
 
 Regards,
 Steve Thompson
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regina REXX under W/XP

2010-01-04 Thread Stocker, Herman
Steve,

You may want to contact Mark Hessling directly, he is the person (last I
heard anyway) that maintains it:

Regina REXX Interpreter -- By Mark Hessling 
email:  hessl...@lightlink.com 


Regards, 

Herman Stocker 
It is impossible to make anything foolproof, because fools are so ingenious.

 -- Robert Heinlein


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of Thompson, Steve
Sent: Monday, January 04, 2010 3:29 PM
To: IBM-MAIN@bama.ua.edu
Subject: Regina REXX under W/XP


I am attempting to solve a problem I have with some special files that get
used to drive some work under z/OS.

 

So I thought the best thing to do is write the REXX code to run under
Windows. So when I execute the code, REXX comes back and says:

 

Error 13 running fully qualified path and file name, line 1: Invalid
character in program

Error 13.1 Invalid character in program ('ff'X)

 

[Where fully qualified path and file name is the actual fully qualified
Window's file name]

 

I can not find any doc for Error 13 (I have the manual for Regina REXX
printed and as a PDF). And I'm not seeing any odd characters in this file
(editing it with NOTEPAD).

 

Can anyone give me a clue as to where these errors are documented (I've been
to sourceforge, no joy. No joy with http://www.rexxla.org/ either).

 

Even better, what would cause this to think there is an X'FF' byte in this
record (the following is actually the first several records)?

 

/*

   Read CONFIG files for QC and insert today's date as needed.

 

   This initial area is to define all the things that must be

   set up for the rest of the exec to work. In particular the

   names of files and the handle to associate them with.

 */

 

 

Regards,

Steve Thompson


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the
archives at http://bama.ua.edu/archives/ibm-main.html

- --


The sender believes that this E-mail and any attachments were free of any
virus, worm, Trojan horse, and/or malicious code when sent. This message and
its attachments could have been infected during transmission. By reading the
message and opening any attachments, the recipient accepts full
responsibility for taking protective and remedial action about viruses and
other defects. The sender's employer is not liable for any loss or damage
arising in any way from this message or its attachments.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


PCI and Auditors perceptions thereof

2010-01-04 Thread Hal Merritt
Trying to do some due diligence in planning some data transfers and getting 
really confused.

Many seem to be saying that all FTP traffic has to be encrypted to meet PCI 
standards. And yet I cannot find any such statement in the PCI standards.  But 
I did find a requirement for firewall packet inspection which, I am told, is 
impossible if the traffic is encrypted.  Did I read that right?


NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PCI and Auditors perceptions thereof

2010-01-04 Thread Rob Schramm
Hal,

Try 1.1.5, 2.2.2 and 6.5.9 PCI DSS Requirement coupled with 

http://en.wikipedia.org/wiki/File_Transfer_Protocol#Security 

Most of the PCI stuff is done generally to allow for as much as possible 
instead of documenting each specific protocol and remediation.  Although 
if you have engaged a PCI Qualified Security Assessor .. they should be 
able to point to everything the PCI folks care about.

-Rob Schramm
Sirius Computer Solutions


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread Richard Peurifoy
On Mon, 4 Jan 2010 12:07:22 -0800, Schwarz, Barry A 
barry.a.schw...@boeing.com wrote:

On a z9 BC running z/OS 1.8, there is a noticeable (~2 minutes) pause in the 
IPL sequence while zFS initializes, accompanied by a non-scrollable message 
on the log that eventually does clear.  We don't IPL that often so it is not a 
big deal for us.

This is probably cause becaue the file system hadn't been properly shutdown.
This causes the file system to be verified when starting.

If you issue 

F OMVS,STOPPFS=ZFS

before you finish shutting the system down, I think it will come up faster.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Richard Peurifoy
 Sent: Monday, January 04, 2010 3:27 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: hfs VS zfs
 
 On Mon, 4 Jan 2010 12:07:22 -0800, Schwarz, Barry A 
 barry.a.schw...@boeing.com wrote:
snip
 
 This is probably cause becaue the file system hadn't been 
 properly shutdown.
 This causes the file system to be verified when starting.
 
 If you issue 
 
 F OMVS,STOPPFS=ZFS
 
 before you finish shutting the system down, I think it will 
 come up faster.
 
 --
 Richard

Is that needed even if I do

F OMVS,SHUTDOWN

??

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 360 programs on a z/10

2010-01-04 Thread Howard Brazee
On Mon, 4 Jan 2010 13:22:24 -0800 (PST), hanco...@bbs.cpcn.com wrote:

Many government agencies add very hefty surcharges to collect calls
placed by inmates in jails and prisons.  They claim it's to cover
security costs but IMHO it's just a way to raise revenue.   Usually
the families of prison inmates are quite poor.  Even if they weren't
poor to start with, the loss of the main breadwinner to prison makes
them poor.

Family contacts go a long way to reduce re-offending.  Making such
contacts harder increases the chances an inmate will re-offend when he
gets out.  Not smart policy.


 It's starting to backfire, though - now that cell phones are so
 widespread (and rates are dropping), more and more people choose
 to use their cell phone instead of the room phone.

Smuggled cell phones is a security problem in prisons.  They let
gangsters conduct business while on the inside.

Could it be that making such contacts harder decreases the chance that
an inmate will re-offend when he gets out?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PCI and Auditors perceptions thereof

2010-01-04 Thread Scott
Packet inspection?  Weird.

You can, with FTPS, open up the control channel so the Firewall can monitor
the control connection (port 21), which lets it dynamically assign ports
that the server/client negotiate for the data connection (aka port 20).
SFTP (SSH) is entirely encrypted and cannot have its activity monitored.

Scott

On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com wrote:

 Trying to do some due diligence in planning some data transfers and getting
 really confused.

 Many seem to be saying that all FTP traffic has to be encrypted to meet PCI
 standards. And yet I cannot find any such statement in the PCI standards.
  But I did find a requirement for firewall packet inspection which, I am
 told, is impossible if the traffic is encrypted.  Did I read that right?


 NOTICE: This electronic mail message and any files transmitted with it are
 intended
 exclusively for the individual or entity to which it is addressed. The
 message,
 together with any attachment, may contain confidential and/or privileged
 information.
 Any unauthorized review, use, printing, saving, copying, disclosure or
 distribution
 is strictly prohibited. If you have received this message in error, please
 immediately advise the sender by reply email and delete all copies.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread Richard Peurifoy
On Mon, 4 Jan 2010 15:30:36 -0600, McKown, John 
john.mck...@healthmarkets.com wrote:

 -Original Message-
 From: IBM Mainframe Discussion List
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Richard Peurifoy
 Sent: Monday, January 04, 2010 3:27 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: hfs VS zfs

 On Mon, 4 Jan 2010 12:07:22 -0800, Schwarz, Barry A
 barry.a.schw...@boeing.com wrote:
snip

 This is probably cause becaue the file system hadn't been
 properly shutdown.
 This causes the file system to be verified when starting.

 If you issue

 F OMVS,STOPPFS=ZFS

 before you finish shutting the system down, I think it will
 come up faster.

 --
 Richard

Is that needed even if I do

F OMVS,SHUTDOWN

I think so, but am not positive. We haven't been runnuing
ZFS very long, and I have not experimented a great deal.

If the file system has not been properly shutdown, you get
the following sequence of messages for each file that was open:

IOEZ00397I recovery statistics for ETC:
IOEZ00391I   Elapsed time was 14 ms
IOEZ00392I   1 log pages recovered consisting of 2 records
IOEZ00393I   Modified 1 data blocks
IOEZ00394I   1 redo-data records, 0 redo-fill records
IOEZ00395I   0 undo-data records, 0 undo-fill records
IOEZ00396I   0 not written blocks
IOEZ00400I   0 blocks zeroed

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: hfs VS zfs

2010-01-04 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Richard Peurifoy
 Sent: Monday, January 04, 2010 3:53 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: hfs VS zfs
snip
 Is that needed even if I do
 
 F OMVS,SHUTDOWN
 
 I think so, but am not positive. We haven't been runnuing
 ZFS very long, and I have not experimented a great deal.
 
 If the file system has not been properly shutdown, you get
 the following sequence of messages for each file that was open:
 
 IOEZ00397I recovery statistics for ETC:
 IOEZ00391I   Elapsed time was 14 ms
 IOEZ00392I   1 log pages recovered consisting of 2 records
 IOEZ00393I   Modified 1 data blocks
 IOEZ00394I   1 redo-data records, 0 redo-fill records
 IOEZ00395I   0 undo-data records, 0 undo-fill records
 IOEZ00396I   0 not written blocks
 IOEZ00400I   0 blocks zeroed
 
 --
 Richard

Thanks for the info. I've never seen those messages.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Where have the control blocks gone?

2010-01-04 Thread Steve Comstock

Thompson, Steve wrote:

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Steve Comstock
Sent: Monday, January 04, 2010 11:38 AM
To: IBM-MAIN@bama.ua.edu
Subject: Where have the control blocks gone?

I've been debugging applications in z/OS and its
predecessors since 1975, and feel I have a pretty
good idea how to use a SYSUDUMP. But things are
getting a little mysterious right now.

I'm getting lots of dumps as I create and debug
a new application, and suddenly I've noticed:

* Instead of three (or more) SVRBs, there are only two

* When I force an abend right after OPEN the DCB does
   not show up as formatted in the dump (I can find the
   storage location and figure it out, but I'm surprised
   at this development).


Have there been some changes in SYSUDUMP formatting in
recent years? (I'm running z/OS 1.10 currently).


SNIP

Check PARMLIB settings for dumps. Someone may have changed them on you. 


Regards,
Steve Thompson


Nope.


--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-393-8716
http://www.trainersfriend.com

  z/OS Application development made easier
* Our classes include
   + How things work
   + Programming examples with realistic applications
   + Starter / skeleton code
   + Complete working programs
   + Useful utilities and subroutines
   + Tips and techniques

== Ask about being added to our opt-in list:  ==
==   * Early announcement of new courses  ==
==   * Early announcement of new techincal papers ==
==   * Early announcement of new promotions   ==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


GSE Security Meeting 4th Feb 2010, London UK

2010-01-04 Thread Mark Wilson
All, 

The next meeting of the GSE Enterprise Security Working group will take
place on Thursday 4th February at the Logicalis Office in Central London.

The address for the venue is:-

2nd Floor 
18 King William Street
London 
EC4N 7BP 

Please find below the agenda for the day.

Would you reply to this e-mail if you would like to attend.

Regards

Mark

AGENDA

09:00   09:30   Arrive at meeting  coffee

09:30   10:00   Introduction  GSE Working Group Business:
·   Membership
·   Annual Conference
·   Future Venues
·   Future Topics

10:00   11:00   CICS Security Expanded
Following on from her well received session at the GSE conference, Julie
will delve deeper into some of the areas of CICS security that caused most
discussion.
Julie-Ann Williams  (Millenia)

11:00   11:15   Coffee

11:15   12:30   Time for a spring clean of your RACF database?
This session will provide you with practical hints and tips on cleaning
up your RACF database and how to keep it clean.
Rob van Hoboken (IBM)

12:30   13:30   Lunch

13:30   14:00   RACF Authorisation Checking ­ The Jigsaw Puzzle
This is an interactive session to refresh or even test your knowledge.

14:00   15:00   z/OS Unix Security
This session contains the following highlights:-
§  Describe best practices for UID and GID definition
§  Understand what superuser means in the z/OS implementation and
how to minimise its use
§  Implement control of z/OS Unix logical resources
§  Explain why unowned files and directories are to be avoided
§  Discuss extended ACLs pitfalls
Paul Arnerich (TSD UK)

15:00   15:15   Coffee

15:15   16:15   TBC

16:15   16:30   Round Up  Finish

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Where have the control blocks gone?

2010-01-04 Thread Steve Comstock

Mike Myers wrote:

Steve:

I have been debugging dumps since OS/360 days (around 1967). While it is 
possible to have three SVRBs as the last active elements in the RB 
queue, it is far more typical in the case of an ABEND in an application 
program to have only two SVRBs. This assumes that the application 
program is running under a PRB (as is typical). When it ABENDs, an SVRB 
is created under which the ABEND process (SVC D) will run, followed by a 
second SVRB under which SNAP (SVC 33x - 51 decimal) runs to produce the 
dump. In the case you cite, where there are three SVRBs, that would 
occur if the application (running under a PRB) were to call a system 
service (such as OPEN) and caused it to ABEND by passing bad parameters. 
While this latter case is certainly possible, it is usually the former 
case which is most likely to occur for an application ABEND.


Right. Went back to my notes and that's what I have; should
have checked first. My mantra has been third RB from the
bottom is the villain and I knew it could be (and usually is)
a PRB, but got tangled up in recall as third SVRB.




As for the DCB, I don't ever recall it being formatted in a dump, except 
possibly one produced by ABENDAID. It may not have even been formatted 
there either, as I personally had little contact with ABENDAID. I can't 
say I recall one being formatted in a SYSUDUMP. While it may have been 
present in the dump, I can only recall ever seeing it laid out as a 
block of data, but not formatted into firlds.


Ah, the ever-wonderful firlds. :-)

Anyway, you're right on this count, too. Guess I've been
concentrating too deeply on one area and not paying
attention to what I already know but mis-remembered.

Thanks for your note. I'll go back to my code now.




I do know that the formatter in IPCS (TCBEXIT IECDAFMT - at least I 
think that's the right exit - if not, then it's probably IECIOFMT) will 
display the DCB as a block of data, but does not format its fields either.


Mike Myers
Mentor Services Corporation

Steve Comstock wrote:

I've been debugging applications in z/OS and its
predecessors since 1975, and feel I have a pretty
good idea how to use a SYSUDUMP. But things are
getting a little mysterious right now.

I'm getting lots of dumps as I create and debug
a new application, and suddenly I've noticed:

* Instead of three (or more) SVRBs, there are only two

* When I force an abend right after OPEN the DCB does
  not show up as formatted in the dump (I can find the
  storage location and figure it out, but I'm surprised
  at this development).


Have there been some changes in SYSUDUMP formatting in
recent years? (I'm running z/OS 1.10 currently).




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html




--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-393-8716
http://www.trainersfriend.com

  z/OS Application development made easier
* Our classes include
   + How things work
   + Programming examples with realistic applications
   + Starter / skeleton code
   + Complete working programs
   + Useful utilities and subroutines
   + Tips and techniques

== Ask about being added to our opt-in list:  ==
==   * Early announcement of new courses  ==
==   * Early announcement of new techincal papers ==
==   * Early announcement of new promotions   ==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PCI and Auditors perceptions thereof

2010-01-04 Thread Donald Russell
Until recently, I was using FTPS to send data from MVS to zLinux
then it broke.
Apparently somebody (re)configured a firewall so it now stops the AUTH
TLS portion of the negotiation or something the symptom is the
authentication negotiation fails... I'm told it's because the firewall
mangles the digital certificate.

SFTP works fine using USS... but I don't have USS on all the MVS
systems I need to send data from...

Is there a way to run SFTP (FTP/SSH) from MVS without USS?

(If I can do that, I can avoid tracking down the firewall people to
get the FTP/TLS thing working I PREFER to use SFTP, but FTPS is
acceptable... and I want the process to be the same on all the MVS
systems, not sftp here, ftps there...)

Cheers


On Mon, Jan 4, 2010 at 13:50, Scott sc...@aitrus.org wrote:
 Packet inspection?  Weird.

 You can, with FTPS, open up the control channel so the Firewall can monitor
 the control connection (port 21), which lets it dynamically assign ports
 that the server/client negotiate for the data connection (aka port 20).
 SFTP (SSH) is entirely encrypted and cannot have its activity monitored.

 Scott

 On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com wrote:

 Trying to do some due diligence in planning some data transfers and getting
 really confused.

 Many seem to be saying that all FTP traffic has to be encrypted to meet PCI
 standards. And yet I cannot find any such statement in the PCI standards.
  But I did find a requirement for firewall packet inspection which, I am
 told, is impossible if the traffic is encrypted.  Did I read that right?


 NOTICE: This electronic mail message and any files transmitted with it are
 intended
 exclusively for the individual or entity to which it is addressed. The
 message,
 together with any attachment, may contain confidential and/or privileged
 information.
 Any unauthorized review, use, printing, saving, copying, disclosure or
 distribution
 is strictly prohibited. If you have received this message in error, please
 immediately advise the sender by reply email and delete all copies.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Shmuel Metz (Seymour J.)
In listserv%201001031756492921.0...@bama.ua.edu, on 01/03/2010
   at 05:56 PM, Paul Gilmartin paulgboul...@aim.com said:

Why are there TPUT/TGET/PUTLINE/GETLINE (whatever) rather than just doing
QSAM I/O to SYSTSPRT and SYSTSIN?

Because they provide functionality not present in QSAM.

And JCL and Rexx both leave an undefined symbol as it appeared in 
the source, with no warning. 

The first is necessary because symbols were an afterthought and IBM
overloaded the  when they added symbols. Both behaviors are actually
useful. 

I take it that you adhere to the philosophy of always enabling NOVALUE in
Rexx?
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Shmuel Metz (Seymour J.)
In listserv%201001031108554432.0...@bama.ua.edu, on 01/03/2010
   at 11:08 AM, Paul Gilmartin paulgboul...@aim.com said:

Does anyone know a plausible design rationale for the current
restrictions on symbol substitution?

The fact that things were added after the original design, including
symbols.

Rather, I ascribe it to Conway's law at its perniciousest.  Design and
coding of parsers for the various JCL operands was parceled out to
different programmers.  Each could decide independently whether to
support symbol substitution. 

Most of the coding was done before there were symbols.

Once again, the deficiencies I perceive in Rexx are:

OS issues rather than REXX issues. If z/OS had the suuport it would be
easy for Rexx to exploit it.

-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Shmuel Metz (Seymour J.)
In 0377b9a583fd0e4aacd676ee33ee994b2aa61...@sdkmail13.emea.sas.com, on
01/03/2010
   at 07:01 PM, Lindy Mayfield lindy.mayfi...@ssf.sas.com said:

This is what Fred Brooks said about JCL:

As in his book, there are statements there that suggest he was not in
touch with his own projects.

Whereas what you really want is a schedule time operation in whatever
language you're working in.

That, of course, assumes that the job only uses programs written in a
single language.

-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Shmuel Metz (Seymour J.)
In a6d1k5hsqsjkmo5c9ues4h18tktqlta...@4ax.com, on 01/03/2010
   at 11:28 AM, Clark Morris cfmpub...@ns.sympatico.ca said:

JCL was designed for OS360 on a 256K real machine (the original design
point for PCP was 64K). 

256 KiB? We ran OS/360 PCP on a 128 KiB machine[1]. With 256 KiB we were
able to run MFT II for production.

 Virtually all of the printers were upper case
only and at least in my shop it was a struggle to get a printer that
printed the special characters correctly

Why? The TN train was available[2] for the 1403-N1. Did you have only 1443
printers or 1403 printers older than the Nancy One?

Lower case was out of the question.

Why?

[1] Well, we did IPL on a 64 KiB machine, but not for production.

[2] Yes, it was slower than AN, HN or PN.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PCI and Auditors perceptions thereof

2010-01-04 Thread Scott
Donald, what troubleshooting have you done?  I'm happy to help you work
through the issues, as there's a few solutions/workarounds for you to try.

I've worked through our own firewall issue and even some instances where two
firewalls were at play.  It's not mangling the Digital Certificate.  Rather,
it cannot monitor the control channel and the client/server connection drops
after negotiation.

Scott

On Mon, Jan 4, 2010 at 2:54 PM, Donald Russell russell@gmail.comwrote:

 Until recently, I was using FTPS to send data from MVS to zLinux
 then it broke.
 Apparently somebody (re)configured a firewall so it now stops the AUTH
 TLS portion of the negotiation or something the symptom is the
 authentication negotiation fails... I'm told it's because the firewall
 mangles the digital certificate.

 SFTP works fine using USS... but I don't have USS on all the MVS
 systems I need to send data from...

 Is there a way to run SFTP (FTP/SSH) from MVS without USS?

 (If I can do that, I can avoid tracking down the firewall people to
 get the FTP/TLS thing working I PREFER to use SFTP, but FTPS is
 acceptable... and I want the process to be the same on all the MVS
 systems, not sftp here, ftps there...)

 Cheers


 On Mon, Jan 4, 2010 at 13:50, Scott sc...@aitrus.org wrote:
  Packet inspection?  Weird.
 
  You can, with FTPS, open up the control channel so the Firewall can
 monitor
  the control connection (port 21), which lets it dynamically assign ports
  that the server/client negotiate for the data connection (aka port 20).
  SFTP (SSH) is entirely encrypted and cannot have its activity monitored.
 
  Scott
 
  On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com
 wrote:
 
  Trying to do some due diligence in planning some data transfers and
 getting
  really confused.
 
  Many seem to be saying that all FTP traffic has to be encrypted to meet
 PCI
  standards. And yet I cannot find any such statement in the PCI
 standards.
   But I did find a requirement for firewall packet inspection which, I am
  told, is impossible if the traffic is encrypted.  Did I read that right?
 
 
  NOTICE: This electronic mail message and any files transmitted with it
 are
  intended
  exclusively for the individual or entity to which it is addressed. The
  message,
  together with any attachment, may contain confidential and/or privileged
  information.
  Any unauthorized review, use, printing, saving, copying, disclosure or
  distribution
  is strictly prohibited. If you have received this message in error,
 please
  immediately advise the sender by reply email and delete all copies.
 
  --
  For IBM-MAIN subscribe / signoff / archive access instructions,
  send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
  Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 
  --
  For IBM-MAIN subscribe / signoff / archive access instructions,
  send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
  Search the archives at http://bama.ua.edu/archives/ibm-main.html
 

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Paul Gilmartin
On Mon, 4 Jan 2010 11:46:20 -0500, Shmuel Metz (Seymour J.) wrote:

coding of parsers for the various JCL operands was parceled out to
different programmers.  Each could decide independently whether to
support symbol substitution.

Most of the coding was done before there were symbols.

Does that mean before there were PROCs?  PROCs are little use
without symbols.  Or was everything done with overrides?

Once again, the deficiencies I perceive in Rexx are:

OS issues rather than REXX issues. If z/OS had the suuport it would be
easy for Rexx to exploit it.

For most of what I cited, JCL/initiator exploits it.  That
suggests that something is in initiator that would more properly
be in allocation.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Where have the control blocks gone?

2010-01-04 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Steve Comstock
Sent: Monday, January 04, 2010 4:27 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Where have the control blocks gone?

Thompson, Steve wrote:
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of Steve Comstock
 Sent: Monday, January 04, 2010 11:38 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Where have the control blocks gone?
 
 I've been debugging applications in z/OS and its
 predecessors since 1975, and feel I have a pretty
 good idea how to use a SYSUDUMP. But things are
 getting a little mysterious right now.
 
 I'm getting lots of dumps as I create and debug
 a new application, and suddenly I've noticed:
 
 * Instead of three (or more) SVRBs, there are only two
 
 * When I force an abend right after OPEN the DCB does
not show up as formatted in the dump (I can find the
storage location and figure it out, but I'm surprised
at this development).
 
 
 Have there been some changes in SYSUDUMP formatting in
 recent years? (I'm running z/OS 1.10 currently).
 
 
 SNIP
 
 Check PARMLIB settings for dumps. Someone may have changed them on
you. 
 
 Regards,
 Steve Thompson

Nope.

SNIP

Yeah, I was deep in thought on IPCS -- somehow the SYSUDUMP didn't
register right. And then I have to remember, we have written our own
formatting tools for various CBs...

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PCI and Auditors perceptions thereof

2010-01-04 Thread Donald Russell
The troubleshooting *I've* done is quite minimal. I'm not an MVS sys
prog. I developed a TSO clist (REXX) that runs as a batch process
(PGM=IKJEFT1A) to send files to a zLinux system. It was all working
fine, I saw the messages about successful negotiation, and the
transfer continued successfully.

A few weeks ago, that changed... now I get negotiation failed, and
the required authentication causes FTP to exit.
(At first I thought my cert had expired... I went through all that...)

In reporting this to our MVS people, they did a trace and determined
the cause to be a firewall issue. They say the cert is being
mangled... you say it's due to not being able to monitor the control
channel.

FTP fails with TLS negotion Failed.

Now that the holidays are past, I hope to get to the correct people to
find out when things changed. As I mentioned, this was working fine at
one point.

I'm told the firewall has to be specifically configured for FTP/SSL...
and those requests were never done... (So, why did it ever work? hmmm)





On Mon, Jan 4, 2010 at 15:29, Scott sc...@aitrus.org wrote:
 Donald, what troubleshooting have you done?  I'm happy to help you work
 through the issues, as there's a few solutions/workarounds for you to try.

 I've worked through our own firewall issue and even some instances where two
 firewalls were at play.  It's not mangling the Digital Certificate.  Rather,
 it cannot monitor the control channel and the client/server connection drops
 after negotiation.

 Scott

 On Mon, Jan 4, 2010 at 2:54 PM, Donald Russell russell@gmail.comwrote:

 Until recently, I was using FTPS to send data from MVS to zLinux
 then it broke.
 Apparently somebody (re)configured a firewall so it now stops the AUTH
 TLS portion of the negotiation or something the symptom is the
 authentication negotiation fails... I'm told it's because the firewall
 mangles the digital certificate.

 SFTP works fine using USS... but I don't have USS on all the MVS
 systems I need to send data from...

 Is there a way to run SFTP (FTP/SSH) from MVS without USS?

 (If I can do that, I can avoid tracking down the firewall people to
 get the FTP/TLS thing working I PREFER to use SFTP, but FTPS is
 acceptable... and I want the process to be the same on all the MVS
 systems, not sftp here, ftps there...)

 Cheers


 On Mon, Jan 4, 2010 at 13:50, Scott sc...@aitrus.org wrote:
  Packet inspection?  Weird.
 
  You can, with FTPS, open up the control channel so the Firewall can
 monitor
  the control connection (port 21), which lets it dynamically assign ports
  that the server/client negotiate for the data connection (aka port 20).
  SFTP (SSH) is entirely encrypted and cannot have its activity monitored.
 
  Scott
 
  On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com
 wrote:
 
  Trying to do some due diligence in planning some data transfers and
 getting
  really confused.
 
  Many seem to be saying that all FTP traffic has to be encrypted to meet
 PCI
  standards. And yet I cannot find any such statement in the PCI
 standards.
   But I did find a requirement for firewall packet inspection which, I am
  told, is impossible if the traffic is encrypted.  Did I read that right?
 
 
  NOTICE: This electronic mail message and any files transmitted with it
 are
  intended
  exclusively for the individual or entity to which it is addressed. The
  message,
  together with any attachment, may contain confidential and/or privileged
  information.
  Any unauthorized review, use, printing, saving, copying, disclosure or
  distribution
  is strictly prohibited. If you have received this message in error,
 please
  immediately advise the sender by reply email and delete all copies.
 
  --
  For IBM-MAIN subscribe / signoff / archive access instructions,
  send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
  Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 
  --
  For IBM-MAIN subscribe / signoff / archive access instructions,
  send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
  Search the archives at http://bama.ua.edu/archives/ibm-main.html
 

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send 

Re: Where have the control blocks gone?

2010-01-04 Thread Mike Myers

Steve:

Good mantra third RB  I've used the same one many times when 
teaching dump reading.


Mike

Steve Comstock wrote:

Mike Myers wrote:

Steve:

I have been debugging dumps since OS/360 days (around 1967). While it 
is possible to have three SVRBs as the last active elements in the RB 
queue, it is far more typical in the case of an ABEND in an 
application program to have only two SVRBs. This assumes that the 
application program is running under a PRB (as is typical). When it 
ABENDs, an SVRB is created under which the ABEND process (SVC D) will 
run, followed by a second SVRB under which SNAP (SVC 33x - 51 
decimal) runs to produce the dump. In the case you cite, where there 
are three SVRBs, that would occur if the application (running under a 
PRB) were to call a system service (such as OPEN) and caused it to 
ABEND by passing bad parameters. While this latter case is certainly 
possible, it is usually the former case which is most likely to occur 
for an application ABEND.


Right. Went back to my notes and that's what I have; should
have checked first. My mantra has been third RB from the
bottom is the villain and I knew it could be (and usually is)
a PRB, but got tangled up in recall as third SVRB.




As for the DCB, I don't ever recall it being formatted in a dump, 
except possibly one produced by ABENDAID. It may not have even been 
formatted there either, as I personally had little contact with 
ABENDAID. I can't say I recall one being formatted in a SYSUDUMP. 
While it may have been present in the dump, I can only recall ever 
seeing it laid out as a block of data, but not formatted into firlds.


Ah, the ever-wonderful firlds. :-)

Anyway, you're right on this count, too. Guess I've been
concentrating too deeply on one area and not paying
attention to what I already know but mis-remembered.

Thanks for your note. I'll go back to my code now.




I do know that the formatter in IPCS (TCBEXIT IECDAFMT - at least I 
think that's the right exit - if not, then it's probably IECIOFMT) 
will display the DCB as a block of data, but does not format its 
fields either.


Mike Myers
Mentor Services Corporation

Steve Comstock wrote:

I've been debugging applications in z/OS and its
predecessors since 1975, and feel I have a pretty
good idea how to use a SYSUDUMP. But things are
getting a little mysterious right now.

I'm getting lots of dumps as I create and debug
a new application, and suddenly I've noticed:

* Instead of three (or more) SVRBs, there are only two

* When I force an abend right after OPEN the DCB does
  not show up as formatted in the dump (I can find the
  storage location and figure it out, but I'm surprised
  at this development).


Have there been some changes in SYSUDUMP formatting in
recent years? (I'm running z/OS 1.10 currently).




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html






--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 360 programs on a z/10

2010-01-04 Thread Rick Fochtman

-snip---


Note that both Patton and Montgomery agreed that the best approach was
a spearhead across Europe into Germany.  They disagreed on who should
lead it, each wanted to be the sole leader of the action.  Eisenhower
overruled both and ordered a broad approach.  Was Eisenhower or Patton
correct?  Again, Hindsight is 20/20.
 


And we do know that Eisenhower was correct enough.  And that's what
really counts.
   

Is it really enough??? If *many* more lives could have been saved by 
doing things a different way and *still* succeeding... would that *not* 
have been better???


 


You are unbelievable.  Do you really wish that Europe dithered until
after Germany had the atomic bomb?
   



He implied nothing of the kind. The question was - if, say, Patton
and Montgomery were right, that the war could have been won quicker
with fewer casualties - wouldn't that have been better?
 


unsnip--
Since none of us were likely there, and since the principal decision 
makers have all met their maker, it doesn't really matter. I'm sure 
that these are all questions that caused a LOT of lost sleep, not to 
mention the political concerns. War itself is a stupendous waste of men 
and material; anything that reduces the amount of these costs is 
goodness. And having been involved in combat, in Viet Nam, I can tell 
you that the suffering inflicted on non-combatants in the area is 
emminently more terrible and senseless.


Now let's get back on-topic.

Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PCI and Auditors perceptions thereof

2010-01-04 Thread Phil Smith
The following specifies what you can and can't do with FTP (Link is from the 
PCI SSC site - FAQ section):

http://selfservice.talisma.com/display/2n/index.aspx?c=58cpc=MSdA03B2IfY15uvLEKtr40R5a5pV2lnCUb4i1Qj2q2gcid=81cat=catURL=r=0.577978789806366

Is it permissible to use FTP if proper security measures are implemented?

PCI DSS requirement 1.1.7 states that any risky protocols such as FTP must have 
documentation in place that defines the business justification for use and that 
appropriate security measures must be implemented. For example, secure FTP 
should be used, and FTP passwords and TELNET passwords used for non-console 
administrative access should be encrypted in transmission and in storage as 
prescribed in PCI DSS requirement 8.4 and 2.3 respectively. The documentation 
as well as implemented security measures should be reviewed by a Qualified 
Security Assessor (QSA) to ensure full effectiveness. The QSA will determine, 
among other things, that the selected approach is robust enough to withstand 
common attacks. For questions about whether a specific implementation is 
consistent with the standard or is compliant with a requirement, please 
contact a Qualified Security Assessor (QSA). A list of QSAs can be found at 
www.pcisecuritystandards.org/pdfs/pci_qsa_list.pdfhttp://www.pcisecuritystandards.org/pdfs/pci_qsa_list.pdf.


As Rob Schramm noted, FTP is called out in the PCI DSS 1.2.1 Standard:

Requirement 1.1.5, and Test 1.1.5b

1.1.5.b Identify insecure services, protocols, and ports allowed; and verify 
they are necessary and that security features are documented and implemented by 
examining firewall and router configuration standards and settings for each 
service. An example of an insecure service, protocol, or port is FTP, which 
passes user credentials in clear-text.

Requirement 2.2.2 and Test 2.2.2

2.2.2 For a sample of system components, inspect enabled system services, 
daemons, and protocols. Verify that unnecessary or insecure services or 
protocols are not enabled, or are justified and documented as to appropriate 
use of the service. For example, FTP is not used, or is encrypted via SSH or 
other technology.

More generally however, its ALL of Requirement 4 of the standard applies: 
Requirement 4: Encrypt transmission of cardholder data across open, public 
networks

e.g. Requirement 4.1 and Test 4.1.a

4.1.a Verify the use of encryption (for example, SSL/TLS or IPSEC) wherever 
cardholder data is transmitted or received over open, public networks

 *   Verify that strong encryption is used during data transmission
 *   For SSL implementations:
* Verify that the server supports the latest patched versions.
* Verify that HTTPS appears as a part of the browser Universal Record 
Locator (URL).
* Verify that no cardholder data is required when HTTPS does not appear 
in the URL.

 *   Select a sample of transactions as they are received and observe 
transactions as they occur to verify that cardholder data is encrypted during 
transit.
 *   Verify that only trusted SSL/TLS keys/certificates are accepted.
 *   Verify that the proper encryption strength is implemented for the 
encryption methodology in use.

(Check vendor recommendations/best practices.)
--
...phsiii

Phil Smith III
p...@voltage.com
Voltage Security, Inc.
www.voltage.com
(703) 476-4511 (home office)
(703) 568-6662 (cell)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc

2010-01-04 Thread Clark Morris
On 4 Jan 2010 15:22:46 -0800, in bit.listserv.ibm-main you wrote:

In a6d1k5hsqsjkmo5c9ues4h18tktqlta...@4ax.com, on 01/03/2010
   at 11:28 AM, Clark Morris cfmpub...@ns.sympatico.ca said:

JCL was designed for OS360 on a 256K real machine (the original design
point for PCP was 64K). 

256 KiB? We ran OS/360 PCP on a 128 KiB machine[1]. With 256 KiB we were
able to run MFT II for production.

 Virtually all of the printers were upper case
only and at least in my shop it was a struggle to get a printer that
printed the special characters correctly

Why? The TN train was available[2] for the 1403-N1. Did you have only 1443
printers or 1403 printers older than the Nancy One?

The trains were available.  The management desire for the fastest
print speed dictated the 48 character chain.  I think that it was the
1980's before we got the QNC chain which had 60 characters where 45 of
them were in all of the sets (5 I think) and 15 were scattered 3 to a
set.  The name and exact details are subject to hazy recollection.  In
any case the problems with obtaining the chains were management
objectives and values, not technical ones.

Lower case was out of the question.

Why?

Low print speed, no programs to take advantage of it and no perceived
business value.

[1] Well, we did IPL on a 64 KiB machine, but not for production.

[2] Yes, it was slower than AN, HN or PN.
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


  1   2   >